News about Oracle's Solaris and Sun Hardware
System News
Oct 27th, 2014 — Oct 2nd, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 200, Issue 5 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

NTT DOCOMO Implements Oracle Communications Diameter Signaling Router
to Support New LTE Infrastructure
Oracle announced that NTT DOCOMO, the leading wireless communications service provider (CSP) in Japan with more than 63 million subscribers, has implemented Oracle Communications Diameter Signaling Router to support roaming for its mobile customers.

Oracle Communications Diameter Signaling Router enables NTT DOCOMO to accelerate the launch of new, advanced mobile services that leverage an LTE infrastructure. The CSP can now support roaming on LTE bands to ensure subscribers have access to the same advanced capabilities while traveling abroad. With the Oracle Communications Diameter Signaling Router, NTT DOCOMO completed the entire project - from purchase order to live customer traffic - in just six months.

Oracle Communications Diameter Signaling Router was implemented as a virtualized solution providing high reliability and advanced functionality with a small physical footprint well suited to support LTE roaming.

Hard Partitioning With Oracle Solaris Zones
An Oracle White Paper - Oct 2014

This document describes hard partitioning with Oracle Solaris Zones (also known as Oracle Solaris Containers), and how to use it to conform to the Oracle licensing policies for partitioned environments.

The approved hard partition configurations described below apply to all types of Oracle Solaris Zones, which include but are not limited to Native Zones, Kernel Zones, Oracle Solaris Legacy Containers and, Oracle Solaris 10 Zones on Oracle Solaris 11.

NOTE: the Oracle licensing document referenced above states that the acceptable way to configure Oracle Solaris Zones is using 'capped Zones/Containers only'. The use of the designation 'capped' is a generic way of stating the Oracle Solaris Zone has a defined upper CPU boundary which is less than all the CPUs on the system. In this instance the term 'capped' refers to all valid methods of configuring Oracle Solaris Zones as hard partitions. It should not be specifically associated with the capped-cpu setting used by the zonecfg command.

Business Value of Engineered Systems
Papers on E-Business Suite, PeopleSoft, Siebel
Werner Watschke writes, "Engineered Systems are optimized to run PeopleSoft, E-Business Suite, JD Edwards and Siebel which provides customers with extreme performance improvements over any other platform. While performance is a key driver for customers to consider Engineered Systems there are many additional business benefits that are just as important. These additional benefits include:

  • Reduced risk
  • Simplified monitoring and management
  • Consolidation
  • Business agility
  • IT spending less on day to day activities and more time adding value to the organization
  • Easier and faster application upgrades
  • Reduced cost

Werner provides lines to three white papers that explain not in technical jargon but in business and application specific language exactly how the above benefits are achieved by running Oracle Applications on Engineered Systems.

Advania Selects Oracle SuperCluster over HP and IBM for Oracle E-Business Suite Consolidation
Using Oracle SuperCluster, Advania has achieved a more stable platform
Advania hf, one of the largest IT service providers and consultancy firms in Iceland, has consolidated its Oracle E-Business Suite implementation and Oracle Database on Oracle SuperCluster with Oracle Solaris.

With more than 10,000 corporate clients and 1,100 employees in 17 offices across three countries, Advania sought to modernize and streamline its infrastructure with a single high-availability solution to deliver higher performance and scalability with lower operational costs and simplified management. Advania selected Oracle SuperCluster over solutions from HP and IBM, ultimately recognizing that running Oracle software on Oracle SuperCluster provided better performance and both architectural and business continuity for its customers, while helping minimize risk.

Friday Spotlight: Managing Oracle VM 3.3 from Oracle Enterprise Manager 12c
By Honglin Su
Honglin Su writes, "In the previous blog, we announced that the new virtualization plug-in ( for Oracle Enterprise Manager 12c Cloud Control was available. With the latest virtualization plug-in update, Oracle Enterprise Manager 12c works seamlessly with Oracle VM Manager 3.3. In today's blog, Daniel Ritzman, Principal Best Practices Consultant from Oracle VM product management team, covers how to use the new plug-in to enable Oracle Enterprise Manager 12c to manage an Oracle VM 3.3 installation..."
IT - Storage
Technique for HAMR Media Promises Improved Writeability for Next-Gen HDDs
SearchStorage, October 28th, 2014
"Heat-assisted magnetic recording (HAMR) is a new process that realizes the three goals of magnetic recording-readability, writeability and stability.

Agency for Science, Technology and Research (A*STAR), Singapore's researchers have now succeeded in improving its writeability by employing a thermal design that permits a higher density recording.

HAMR magnetically records data using a laser to locally heat the area being written. Careful control of the thermal spot size on the medium and the thermal gradient during writing allows more information to be written in a smaller area. The recording medium's thermal profile is influenced by its physical and chemical properties, such as its optical characteristics, microstructure and layer structure, which impact the recording performance and density..."

Nanotechnology to Create Next-Gen Holograms for Storage
Storage Newsletter, October 28th, 2014
"Holograms made of tiny particles of silver could double the amount of information that can be stored in digital optical devices, such as sensors, displays and medical imaging devices.

Researchers from the University of Cambridge have developed a new method for making multi-coloured holograms from a thin film of silver nanoparticles, which could increase the storage capabilities of typical optical storage devices.

The interference produced by the interaction of light with the nanoparticles allows the holograms to go beyond the normal limits of diffraction, or the way in which waves spread or bend when they encounter an opening or obstacle. The results were recently published in the journal Proceedings of the National Academy of Sciences..."

    How File Virtualization and Hybrid Cloud Can Solve the Copy Data Dilemma
    Storage Switzerland, October 28th, 2014
    "'The biggest risk to success is perpetuating the status quo.' So said VMworld CEO, Pat Gelsinger, during his keynote address at VMworld. He went on to say that, 'Today's world is stuck in silos. Developers against IT, on-premise against off premise, traditional apps against cloud-native apps.' In his 'Brave new IT' presentation, Gelsinger emphasized that IT has to lead the way and be the agents of change that can drive innovation and true business transformation via the software defined data center (SDCC)..."
    IT - Technology
    IT Certifications: Discover Where the Value Lies
    IT Web, October 23rd, 2014
    "Knowing which certification will help elevate your career or land a job is not only difficult, it's different among different facets of IT.

    Also, the best-known certifications aren't necessarily the ones that will help you succeed. In fact, analysts warn that some certification vendors can throw enough money into promotion of their certifications to move the engagement needle, making the choice of which certification to choose even more difficult..."

      Getting Chipped: Why I Will Live with an NFC Chip Implant for a Year
      Network World, October 28th, 2014
      "There are days when even your wife thinks you're crazy. In my case one of those days was when I told her I decided to implant a near-field communication chip in my hand.

      "You of all people? And that thing will stay in your arm for a year?" she asked incredulously. She had a point, of course, because I'm the one who always says that any possible breach of my own -- and my reader's -- privacy should be contested with all possible measures..."

        FBI Facial Recognition System Gives Officers an Investigative Lead
        Government Technology, October 20th, 2014
        "New FBI facial recognition technology released in September means more than 18,000 law enforcement agencies can search potential criminals by face in addition to fingerprint.

        The facial recognition tool, called the Interstate Photo System, lets officers automatically compare a suspect's digital facial image against the 20 million and growing images available for searches, giving officers an investigative lead.

        "What this does for our criminal justice community is it provides them another tool to be able to go out and identify criminals," said Stephen Morris, assistant director of the Criminal Justice Information Services Division of the FBI..."

          Neural Networks Draw on Context to Improve Machine Translations
          IT World, October 24th, 2014
          "Researchers at the University of Amsterdam are using neural networks to help a statistical machine translation systems learn what all human translators know -- that the best translation of a word often depends on the context.

          Machine translation systems such as Google Translate or those at guess how to translate words and phrases based on how often they appear in a large corpus of human-translated texts. Such tools are increasingly important as individuals and businesses seek to access information or buy products and services from other countries where different languages are spoken..."

          IT - Bitcoin
          Digital Revolution in the Granite State
          Bitcoin Magazine, October 31st, 2014
          "New Hampshire - the first colony to sever ties from Great Britain - is once again leading the revolution. Along with its centuries-long 'Live Free or Die' culture, New Hampshire is becoming a Mecca for digital currency enthusiasts. In just the last few years, Bitcoin experts and entrepreneurs have been eagerly coming to New Hampshire to spread their message.

          Many Bitcoin users are members of the Free State Project: a cooperative organization encouraging liberty-lovers to migrate to New Hampshire. Members of the Free State Project range from Democrat and Republican Party members to crypto-anarchists, and many in between. As Bitcoin represents an incredible technological advance in the direction of liberty, it should come as no surprise that early Bitcoin movers are invested ideologically as well as financially.

          Here are some examples indicating Bitcoin's growing popularity in the Granite State:..."

          What Bitcoin Can Learn from Social Media's Success
          CoinDesk, November 1st, 2014
          "Facebook, MySpace and Twitter took the web by storm in the 2000s, enabling a wave of communication never before possible on the Internet.

          The appeal of social media didn't transition from tech-savvy high schoolers to the mass market overnight, however. It took time for the industry to build the necessary infrastructure to properly scale for mainstream use.

          Because of its status as new and disruptive technology, there are some who see the parallels between the social media industry and the bitcoin industry.

          Sean Percival, who was involved in the early stages of social media as the vice president of MySpace and now focuses on digital currencies as an investor, has observed what he considers striking similarities..."

          Taking Bitcoin Beyond the Banked
          CoinDesk, October 28th, 2014
          "Seven months ago, the Bitcoin Foundation formed the Committee for Financial Inclusion. Andreas Antonopoulos was to head it, and things looked promising for a while.

          Since then, however, Antonopoulos has stepped down, following concerns about the foundation's management. "No one stepped up as a replacement," said one senior executive at the foundation. Another confirmed that the Committee for Financial Inclusion was on hold for now..."

          Miami To Host Second North American Bitcoin Conference
          CryptoCoinsNews, November 1st, 2014
          "This January, the city of Miami plays host to the second annual North American Bitcoin Conference or the NABC. The event returns to Miami after successful Bitcoin conferences in Amsterdam and Chicago.

          The Amsterdam conference was attended by over 1,100 people from more than 50 countries. The Chicago event saw more than 1,200 attendees representing the Bitcoin community worldwide. It is to be expected that Miami will be just as well attended if not better..."

          Developer Creates Blockchain Passport Technology Based On Bitcoin
          CryptoCoinsNews, October 31st, 2014
          "Christopher Ellis has created software that allows anyone to create a World Citizen Passport. The software uses PGP encryption software and the Blockchain to create an identification paper that is almost impossible mathematically to fake. Not only can the Blockchain be used to store these world passports, it can store all kinds of documents including loans, contracts, and receipts, as well as simplify modern banking.

          The Blockchain's potential has barely been tapped into by society as a whole. Ellis' new World Citizen Passport software utilizes the Blockchain in ways that have never been done before..."

          Bitcoin 2.0: Sidechains And Ethereum And Zerocash, Oh My!
          TechCrunch, October 25th, 2014
          "Strange, interesting, and wildly ambitious things are afoot in the world of Bitcoin and blockchains. I give you Zerocash, a completely anonymous currency; Ethereum, a blockchain platform designed to decentralize much of the Internet; and sidechains, a proposal to accelerate the evolution of Bitcoin itself. Any one of these could conceivably become a very big deal. All three? Prick up your ears.

          If you're not au fait with blockchains, your head may already be swimming. Some background: Bitcoin, the infamous cryptocurrency, is built on a new kind of distributed-consensus technology called a blockchain, which allows transactions to be securely stored and verified without any centralized authority at all, because (to oversimplify) they are validated by the entire network..."

          Cloud Computing
          More Than 100 Global Systems Integrators Join the Oracle Cloud Marketplace
          To Offer Implementation Services and Drive Cloud Success
          The Oracle Cloud Marketplace, a one-stop shop for Oracle customers seeking trusted business applications from Oracle partners that leverage the Oracle Cloud platform, has extended its offerings to include consulting and implementation services from more than 100 system integrators (SIs), including Capgemini, Deloitte, and Infosys. Customers can now easily locate and evaluate SI services that can help them maximize the business benefits of Oracle Cloud software-as-a-service (SaaS) and platform-as-a-service (PaaS) solutions, and SIs gain a centralized marketplace for promoting their services to Oracle's global customer base.
          Oracle Linux - The Engine Behind the Modern Data Center
          Webinars: November 18th and 25th
          Chris Kawalek writes, "With increasing budget constraints and resource limitations, it's becoming more and more important to leverage technological advances to squeeze as much value as possible out of your data center deployments. Innovative tools such as Ksplice, DTrace, Linux Containers, Docker, Spacewalk, and more, can help you to deploy and manage your deployments quicker and easier, increasing overall ROI. Join this November webcast series to learn how these technologies with Oracle Linux can streamline deployment and management of your critical IT systems..."
          IT - Cloud
          NIST Spotlights Five Actors in the Cloud
          TechRepublic, October 23rd, 2014
          "The National Institute of Standards and Technology (NIST) cloud computing standards roadmap (PDF) describes five cloud actors: consumer, provider, auditor, broker, and carrier. Each actor interacts with another actor depending on the role the actor performs in the cloud. Here's a rundown of each actor category...

          s a cloud consumer, you request cloud services from a cloud provider or a cloud broker to help you choose multiple providers. How much control you get from the provider depends on the type of cloud services you request..."

          The Management Gap Between You and Cloud Apps
          Network Computing, October 24th, 2014
          "Software-as-a-service (SaaS) and cloud computing have become fixtures in the enterprise, and that trend is sure to continue for a long time to come. But the reality is that, to date, those gaining real benefit from the cloud at the enterprise level have been limited largely to isolated pockets.

          These include software development and operations teams leveraging infrastructure- and platform-as-a-service (IaaS and PaaS) to slash costs and improve agility; sales teams licensing their own SaaS CRM systems; or lines of business "going rogue" and sidestepping IT by using apps like Dropbox to facilitate easier file sharing inside and outside the company..."

          Moving to a Cloud: What Workloads Should I Move to a Cloud Environment?
          Business 2 Community, October 26th, 2014
          "Before you start considering business Cloud storage, be clear on what you understand by 'Cloud'. It's used in various ways by different people to mean different things. When IT consultants talk about Cloud, they mean multi-server systems that are highly adaptable and often automated.

          There is more to the business Cloud than storage. Data is not the only workload and it is not necessarily the thing you should move to a Cloud environmnet first. Think in terms of memory and CPU usage - both are expensive to provide in-house.

          Cloud flexibility is ideal for variable workloads:..."

            100 Million Cloud File ANALYSIS reveals Shadow Data Threat
            Help Net Security, October 24th, 2014
            "Elastica conducted a security analysis of more than 100 million files being shared and stored in leading public-cloud applications. Research revealed that 20 percent of broadly shared files contain compliance-related data, 5 percent of enterprise users are responsible for driving 85 percent of the exposure risk, and employees each store an average of 2,037 corporate files in the cloud.

            Further analysis revealed that files being stored and shared among insiders and outsiders hold sensitive personal health information (PHI) regulated by HIPAA, personally identifiable information (PHI) such as social security numbers, and customer payment card information regulated by the Payment Card Industry Data Security Standard (PCI DSS)..."

            IT - CxO
            How I Became a CISO: Janet Levesque, RSA
            Dark Reading, October 27th, 2014
            "RSA's newest chief information security officer says she landed the job because of her ability to build relationships, not a background in crypto or a pile of certs.

            One might assume that the CISO of RSA -- one of the world's premier suppliers of encryption technology -- would have been breaking codes in nursery school. Yet Janet Levesque, RSA's new CISO, did not start thinking about cryptography until quite a while later..."

            Hiring Just for Skills Can Be a Big Mistake
            TLNT, October 27th, 2014
            "Harvard Business School found that four factors are critical to success in business:

            • Information;
            • Intelligence;
            • Attitude; and,
            • Skills.

            The surprise was that information, I.Q. and skills combined accounted for only seven percent of success while attitude accounted for 93 percent!..."

              Gartner's Top 10 Strategic Tech Trends for 2015
              Insurance Networking News, October 27th, 2014
              "The top trends for 2015 cover three themes: the merging of the real and virtual worlds, the advent of intelligence everywhere, and the technology impact of the digital business shift.

              Gartner defines a strategic technology trend as one with the potential for significant impact on the organization in the next three years. Factors that denote significant impact include a high potential for disruption to the business, end users or IT, the need for a major investment, or the risk of being late to adopt.

              The top trends for 2015 cover three themes: the merging of the real and virtual worlds, the advent of intelligence everywhere, and the technology impact of the digital business shift..."

              Succession Planning: Why IT Leaders Should Groom their Replacements
              Government Technology, October 23rd, 2014
              "Government lives and dies by its policies and procedures -- but sometimes it's best to just ignore them.

              When Corpus Christi, Texas, City Manager Ronald Olson learned by way of casual conversation that his CIO, Michael Armstrong, was considering retirement, he likely experienced a bit of panic -- and for good reason: The city is midway through an ERP replacement, a community development implementation and a utility billing project, to name just a few projects.

              Armstrong, who counts the number of open IT projects as 'insane,' is an experienced CIO who has spent seven years learning his city's quirks. And finding, negotiating with, hiring and acclimating a replacement was a process the city guessed would take about a year -- a disruption categorized as 'unacceptable.' So instead of following the usual procedures outlined by human resources, Olson told Armstrong to find his replacement so they could hire her directly and train her to take over his position before his departure.

              And that's exactly what has happened..."

              6 Ways to Maximize Your IT Training Budget
              CIO, October 29th, 2014
              "Customized, in-house training often zeros in on topics relevant to your business. However, it comes with an equally high price tag. If your employees simply need to fill in knowledge gaps or get up to speed with a specific software package, there are a plethora of affordable, flexible options for even the most limited budgets...

              Although the economy is picking up ever so slightly, IT departments remain on the lookout for ways to do more with less - fewer people, fewer resources, less money. That's why learning how to stretch the training budget as far as possible can pay significant dividends. This is true both for those organizations seeking to develop employee skills and knowledge for the least expenditure, and for employees looking to improve and enhance their career potential and longevity..."

                November South Florida vBeers
                Save the Dates! 3 Events in South Floirda
                Join us for one of the three South Florida vBeers events. The South Florida vBeers events happen three times a month, once per county:

                Wednesday November 12th

                Wednesday November 19th

                Wednesday November 26th

                Details @ and the vBeers South Florida LinkedIn group.

                IT - DR
                Combining Cloud With Disaster Recovery and Business Continuity
                Data Center Knowledge, October 20th, 2014
                "Emergencies happen, environments go down, but the business process must go on! Right? Over the past few years, smaller and even mid-size organizations found it challenging to enter the DR and even business continuity conversation.

                First things first: it's important to understand that disaster recovery and business continuity are two different business objectives. However, they can certainly overlap. Even today there is still some confusion about what the cloud can really deliver. Not so much how the cloud works, but more around DR capabilities. Folks, whether you're a small shop or a large enterprise, if you have haven't looked at the cloud as a DR or business continuity option, it's time that you do..."

                Business continuity planning essential
                IT-Online, October 28th, 2014
                "Business continuity planning - how to carry on operating even after a disaster - is still often thought of an expensive exercise that only large corporates can afford, says Warren Olivier of Veeam.

                'But it's now easier than ever before, and affordable for most companies. In the era of the always-on business, failing to do this planning is irresponsible.' Olivier, who is Veeam's Regional Manager for Southern Africa, says the tools available in the virtualised modern data centre can automate much of the process of recovering after a disaster, whether it's due to natural causes like earthquake, fires and floods or human action like computer viruses and terrorist attacks..."

                IT - PM
                Don't Assume You Have All the Answers
      , October 28th, 2014
                "Today's post comes along with a generous serving of humble pie for the author. I like to think of myself as a really smart and analytical kind of person. But recently that line of thinking ran me straight into a brick wall and brought a solution from an unexpected (to me) source. To truly grasp the lesson, I have to tell you a little about myself and my family. I have a wonderful, gorgeous, smart and all round great daughter in high school. She loves two main things... Math and Volleyball. A good combination, if you ask me..."
                  When are You Coming Home? Five Practical Tips to Realizing Work/Life Balance
                  Project Management Advisor, October 28th, 2014
                  "If you've been in the business world since the mid 1990s you've likely heard your management espouse the desire for employees to achieve greater work/life balance. Many U.S. companies have adopted programs to help employees strike a better life balance by providing health club benefits, entertainment discount programs, and additional time off for events such as the birth of a child.

                  Despite all this, Americans are of the most overworked and flat-out busy people on earth, recently surpassing the Japanese and long surpassing the Europeans. With all this discussion of work/life balance, how can we in the U.S. also be of the most overworked people in the world? The answer is pretty simple; many of us talk work/life balance, but don't live work/life balance primarily because we don't know how to do it..."

                  IT investments: 5 common mistakes
                  Information Week, October 29th, 2014
                  "As companies grow and their finances improve, smart management teams often look to invest in technologies that improve operations, worker productivity, and market knowledge. Implementing new or upgraded enterprise software, cloud infrastructures, or big data reporting tools are some of the cutting-edge projects that are top of mind these days. If you haven't done a big IT project in a while, the benefits can be significant, but the risks are higher than many other types of investments. Here are some common mistakes you can avoid to improve your chances of benefiting from an IT investment..."
                  Oracle Virtual Technology Summit Kicks Off November 18
                  Featured at the Summit: Securing Mobile apps and data in a BYOD world
                  The Oracle Technology Network (OTN) invites you to the next Virtual Technology Summit, on November 18th. Learn first hand from Oracle and community experts about Oracle Middleware, Mobile Architectures and more. Participate in hands-on labs and technical presentations, and chat with other developers. Register here!

                  • North America - November 18th / 10am PT to 12:30pm PT
                  • APAC English - November 19th / 10am IST to 1:30pm IST
                  • EMEA - November 26th / 9am-12:30pm GMT / 10:00am CET / 1:00pm

                  Featured at the Summit: Securing Mobile apps and data in a BYOD world

                  IT - Networks
                  SDN Education: 9 Ways to Learn
                  Network Computing, October 23rd, 2014
                  "With software-defined networking gaining steam, most networking pros don't need to be convinced that it's a technology they need to learn.

                  According to research firm Dell'Oro Group, the SDN market will grow more than 65% this year as SDN branches out into production deployment beyond major cloud providers. There's a plethora of SDN products available now from both networking heavyweights and startups. With all the changes in data center networking, data centers will look significantly different by 2020, according to Alan Weckel, Dell'Oro vice president..."

                  255 Terabits a Second: New Fiber Speed Record?
                  Network World, October 27th, 2014
                  "Researchers from the University of Central Florida and Eindhoven University of Technology say that they've developed a new fiber optic medium that allows data to be sent and received at up to 255Tbps, a roughly twenty-fold increase over current fiber.

                  The innovation, described in a paper for the current online edition of the journal Nature Photonics, lies in the use of a group of seven microstructured fibers, rather than a single one. Eindhoven University of Technology professor Chigo Okonkwo, one the paper's principal authors, said that the individual fibers are less than 200 microns in diameter..."

                    Will RDMA over Ethernet Eclipse Infiniband?
                    Network Computing, October 27th, 2014
                    "Remote Direct Memory Access (RDMA) is a technology that allows data to be written from one machine directly into the memory of another system. This bypasses many of the operating systems and network stacks that slow down transfers. A good analogy is a delivery service that delivers from my desk to yours, versus the postal system.

                    RDMA has long been associated with InfiniBand, and is, in many ways, the only reason for the existence of that link type. Where InfiniBand has been deployed, performance is higher and latencies lower. This makes RDMA attractive in the high-performance computing (HPC) market and in financial services trading systems where time equals money..."

                    WAN Challenges Demand an SDN Upgrade
                    Network Computing, October 28th, 2014
                    "Software-defined networks can improve application performance for enterprises, overcoming MPLS limitations, traffic tromboning, and branch office bandwidth constraints.

                    One of the most frustrating aspects of the modern enterprise is the poor responsiveness of applications. It doesn't make sense that SaaS applications such as Office365 work better on a home broadband connection than they do on an expensive office connection. This problem extends all the way up to the backbone of the infrastructure: the WAN network architecture..."

                    IT - Operations
                    What to Look for In a Data Center Backup Generator
                    TechRepublic, October 27th, 2014
                    "Managers of data centers offering colocation and cloud services sign contracts guaranteeing 100% uptime. Most engineering types would say that's impossible; however, that kind of guarantee is the cost of doing business in today's market. If the service is anything less than 100%, clients get substantive refunds, and the data center loses credibility.

                    That could explain why data-center operators will spend millions of dollars on backup power-generation equipment, which more often than not amounts to diesel generator sets similar to the Cummins model pictured above..."

                      Do It Right the First Time: The IT Infrastructure Mistake You Can't Afford to Make
                      Business 2 Community, October 24th, 2014
                      "So you're opening your first office or lab - or planning an infrastructure upgrade or move to a new location due to a sudden spurt in growth. Congratulations! You're probably hustling to communicate with new stakeholders, plan your transition, and increase your productivity capacity. The last thing you want to worry about is whether your IT infrastructure will support your growth, but you know an upgrade is in order.

                      Many biotech start-ups in this position make the understandable mistake of purchasing only the minimum IT infrastructure necessary to support their current operations, reserving a larger portion of new cash influx for increases in staff, equipment, and marketing. Unfortunately, failing to plan for future IT needs can cause work flow challenges and poor decisions under stressful situations. Additionally, this mistake leads to expensive technology pivots that can cause the company its edge..."

                      Beware the Electro-Magnetic Data Center Threat
                      Network Computing, October 24th, 2014
                      "No matter if your company's data resides in a private data center, a co-located facility, or a cloud service provider, you want it to be as safe as possible. But there's one danger that almost no data center protects against: an electro-magnetic pulse. EMPs can occur naturally in the environment in the form of solar flares. They can also be triggered by people in what's often referred to as an "e-bomb."

                      Either way, an overabundance of EMPs will render electronics completely useless. To counter this potential threat, one recently opened data center in Pennsylvania claims to protect against both manmade and naturally occurring EMPs. The owner of the facility has not disclosed the building materials it used, but it hopes to fend off any impending solar storm or nuclear event. So are EMPs something that enterprise IT decision makers need to consider?..."

                        IT - Security
                        Most Businesses Do Not Understand Risks of Data Breaches, Study Finds
                        ComputerWeekly, October 28th, 2014
                        "More than 70% of executives say their organisations do not understand fully the risks associated with data breaches, a Ponemon Institute survey has revealed.

                        Less than half of top executives, including board members, are kept informed about the breach response process, according to the 2014 Executive Breach Preparedness Research Report, commissioned by HP.

                        Of the nearly 500 senior executives polled in the UK and the US, only 45% said they were accountable for the incident-response process..."

                        A Simple Formula for Usable Risk Intelligence
                        Dark Reading, October 27th, 2014
                        "As a few insightful colleagues have pointed out this year, "threat intelligence" is a confusing concept that isn't yet well-defined. Ask around a bit about "What is threat intelligence?" and you'll get descriptions of solutions and services that range from malware databases to signature detection tools and IDS/IPS systems to on-site consulting services -- and everything in between.

                        Yet, on first blush, the two terms seen together seem to immediately make sense. It's "intelligence," as in gathering detailed info on something, and "threat" -- that's what you're gathering info about. Just query Google for "intelligence gathering," and it's clear..."

                        Disaster as CryptoWall Encrypts US Firm's Entire Server Installation
                        TechWorld, October 23rd, 2014
                        "Here is a tale of ransomware that will make your blood run cold," announced Stu Sjouwerman of security training firm KnowBe4 in a company newsletter this week and he wasn't exaggerating.

                        One of his firm's customers contacted him on 14 October for advice on how to buy Bitcoins after all seven of its servers containing 75GB of data had been encrypted by a recent variant of the hated CryptoWall ransom Trojan.

                        An admin had clicked on a phishing link which was bad enough. Unfortunately, the infected workstation had mapped drives and permissions to all seven servers and so CryptoWall had quickly jumped on to them to hand the anonymous professional a work day to forget..."

                        EY Releases New Global Information Security Survey For 2014
                        Forrester, October 30th, 2014
                        "EY has released its Global Information Security Survey 2014. The survey, published every year, focuses on the issues facing information security pros for the coming year. Many of the trends identified in the report are trends that Forrester has seen evolve in the past two years. At the same time, these trends are accelerating. I am one analyst that is reluctant to paint information security with the fear, uncertainty, doubt (FUD) brush, but after reading the EY report I am not sure that FUD is inaccurate. We live in challenging times and the EY report validates this assertion. For example the research shows:.."
                        DNS is Ubiquitous And It's Easily Abused to Halt Service Or Steal Data
                        Network World, October 23rd, 2014
                        "The global Domain Name System (DNS) is ubiquitous across the Internet. It's absolutely fundamental to the way we work. It's a whole lot easier to bring up a browser and type rather than try to remember its more complex address of

                        DNS is so important that we tend to regard it as Internet plumbing: it goes everywhere, it gets through all the firewalls and it's there when we need it - usually. Unfortunately, DNS also has the characteristic of being poorly secured, which can lead to all sorts of problems.

                        Just as metal thieves have figured out that copper plumbing in old houses has value as scrap, cyber attackers have learned the value in using DNS to attack infrastructures and steal data..."

                        Keep Calm & Verify: How to Spot a Fake Online Data Dump
                        Dark Reading, October 29th, 2014
                        "Determining whether a data dump on Pastebin or elsewhere online is legit can be time-consuming and resource-intensive. Deloitte & Touche offers tips for how to weed out the fake hacks.

                        You've seen the online claims and headlines: hackers boasting on Twitter or another online forum that they've hacked a major company's database or website and have leaked the stolen user credentials or credit-card numbers for all to see on Pastebin or another site..."

                          The Big One: The Makings of a Global Cyber Attack
                          InfoWorld, October 28th, 2014
                          "When a potentially major security flaw gets announced, à la SandWorm, Shellshock, and Heartbleed, those of us in the computer security field can't be sure it's a 'big one' that would attack or compromise the majority of the computers in the world or your enterprise. Whether the technical methods are familiar or novel, most of the discovered attack methods don't go big.

                          We've had lots of 'big ones' in the past. The Robert Morris worm of 1988 infected around 6,000 computers. That doesn't sound like a lot today, but back then, it represented about 10 percent of the computers hooked to the Internet. Since then, far bigger and faster-spreading worms appeared, most notably Michelangelo, Code Red, Melissa, SQL Slammer, ILoveYou, and Blaster..."

                          Insider Threats: Breaching the Human Barrier
                          Dark Reading, October 20th, 2014
                          "A company can spend all the money it has on technical solutions to protect the perimeter and still not prevent the attack that comes from within.

                          Undoubtedly, every InfoSec professional has heard the argument that the perimeter was broken. That was so 1995. The new rage is to break the 'human barrier.' You know, those things that run the companies. Increasingly, attackers are using social engineering to target a corporation's most vulnerable asset: the human. From there attackers hack the systems and completely own the company from the inside out..."

                            Insider Threats Still Pose Major Problems for Enterprises
                            TechRepublic, October 23rd, 2014
                            "SpectorSoft, a user activity monitoring and analysis software firm, recently commissioned a survey to identify the top issues surrounding "insider threats" and identify some best practices to deal with those threats. The SpectorSoft 2014 Insider Threat Survey revealed some interesting facts about how enterprises are dealing with the challenges associated with insider threats.

                            One of the most reveling aspects of the survey is that the majority of enterprises can neither detect nor deter insider threats, making them especially vulnerable to fraud, data breaches, and intellectual property theft. The survey, which tallied the opinions of some 355 IT professionals, showed that some six in ten respondents are not adequately prepared to deal with insider threats..."

                            Some IT Pros Still Turn Off Security Features for Performance: McAfee
                            IT World Canada, October 29th, 2014
                            "Every department in an enterprise is under pressure these days to increase performance, which sometimes means taking shortcuts. But a new report from McAfee suggests that many IT departments are putting their organizations' security at risk.

                            The report, issued Wednesday, found that more than one-third of the 504 IT pros surveyed admitted to turning off firewall features or refusing to enable certain security functions to increase network performance.

                            The most common features disabled by network administrators include deep packet inspection (DPI), anti-spam, anti-virus, and VPN access. DPI is the feature most frequently disabled, although it blocks suspicious traffic automatically. However DPI can put high demands on network resources..."

                            100 Million Cloud File Analysis Reveals Shadow Data Threat
                            Help Net Security, October 24th, 2014
                            "Elastica conducted a security analysis of more than 100 million files being shared and stored in leading public-cloud applications. Research revealed that 20 percent of broadly shared files contain compliance-related data, 5 percent of enterprise users are responsible for driving 85 percent of the exposure risk, and employees each store an average of 2,037 corporate files in the cloud.

                            Further analysis revealed that files being stored and shared among insiders and outsiders hold sensitive personal health information (PHI) regulated by HIPAA, personally identifiable information (PHI) such as social security numbers, and customer payment card information regulated by the Payment Card Industry Data Security Standard (PCI DSS)..."

                            6 Ways to Stop Criminal Attackers in their Tracks
                            CSO Online, October 28th, 2014
                            "There is no way to stop malware from entering your network, simply because malware is evolving too rapidly. A report from Pandalabs found that 30 million new malware threats were created in 2013 - an average of 82,000 per day. Additionally, entrance to the network is the shortest point of the breach chain and according to FireEye, 82 percent of malware disappears an hour after activation. Security experts should accept that their networks will be breached and focus on how to eliminate the hackers inside before it is too late..."
                            IT - Careers
                            IT Contracting: 5 Tips For Success
                            Information Week, October 27th, 2014
                            "There are upsides to contract work for the IT pros who want them. Flexible hours, potentially lucrative rates driven by skills shortages and other market forces, and the possibility of working remotely top the list. Another benefit: There are a growing number of these jobs.

                            In a survey conducted late last year by IT recruiting firm Mondo, nearly half of IT decision-makers said they planned to hire more contractors than permanent employees, with one in three reporting a growing budget for contractors. Mondo alone currently places around 5,000 candidates in contract jobs every year..."

                              For Big Raises in IT, Look To Mobile, Security, Big Data
                              IT Web, October 27th, 2014
                              "IT salaries will remain mostly stagnant in 2015, except for workers with highly coveted skill sets, according to a report tracking IT salaries and skills demand in the coming years.

                              "When you look at the actual salaries, just speaking in general, what you see is a lot of highly paid positions. You don't see a lot of big increases," said Jack Cullen, president of IT staffing firm Modis, which presented this data in its 2015 IT salary guide. "Companies don't want to pay exorbitant rates. However, when they have a particular niche that's really hard to fill, they don't want to lose the right talent."..."

                                10 Outlandish Resume Lies that Can Kill Your Job Chances
                                CIO, October 27th, 2014
                                "A recent CareerBuilder survey found that 58 percent of hiring managers and HR professionals have found a lie on a candidate's resume, and 33 percent of the 2,188 respondents said lying on resumes has increased in this post-recession job market. Aside from the 'standard' lies like fudging dates of employment, embellishing a job title, or claiming greater responsibilities, respondents found some truly laughable whoppers that stuck with them over time. Here are the most unusual lies employers caught on candidates' resumes...

                                In a recent CareerBuilder survey, HR and hiring managers were asked to identify the most ridiculous fabrications they have spotted on applicants' resumes. Here are 10 of the worst whoppers they have ever seen..."

                                  IT - Social Media
                                  Learnings from the Hollywood Data Leaks
                                  Business 2 Community, October 24th, 2014
                                  "The recent iCloud hack and subsequent leak of intimate photos of Hollywood celebrities has made it clear that even the rich and famous aren't immune to data loss. The fatal mistake these stars made was to forget that data, be it an email or photo, isn't static. More often than not it goes straight to the cloud, where in theory it can be accessed from anywhere.

                                  What's happened to the stars of the screen is exactly what's happened to countless businesses and high profile individuals over the years. Clearly, there is still some progress to be made when it comes to protecting sensitive data within the cloud. But what other high profile sectors are in danger of suffering a similar fate to Jennifer Lawrence, and how can they protect themselves in the future?..."

                                    Horrible Social Media Misfires
                                    CIO, October 29th, 2014
                                    "Just in time for Halloween, here are 12 scary, shocking, horrifying and just plain horrible social media misfires from the past year. We're talking big brands - DiGiorno Pizza, J. P. Morgan, US Airways - making even bigger mistakes or, for one reason or another, catching beatings on social media sites.

                                    To build our house of social media horrors, we asked the digital marketing community for input. We asked about the social media faux pas they remember most vividly, and the lessons we can learn from the blunders. We also found a few examples in blogs and articles..."

                                      11 Ways to Wreck Your Social Relationships
                                      Oracle, October 29th, 2014
                                      "Social media marketing is all about building authentic relationships. It involves many of the things human relationships live and die by; knowing the person, trust, altruism, patience, etc. So it follows naturally the opposite traits would lead to relationship failure; narcissism, mistrust, selfishness and the like.

                                      When you look at how some brands treat their fans, followers and customers on social, it kind of makes you wonder what their real world human relationships are like. Even as long as social marketing has been around and as much thought leadership has been written on the subject, customers are still NOT getting the experience they want to have with their brands on social.

                                      There are plenty more, but here are 11 ways you can risk having your customers one day tell you, 'We need to talk.'..."

                                        IT - Virtualization
                                        Virtualization Made Simple with Hyperconverged Infrastructure
                                        Storage Switzerland, October 28th, 2014
                                        "Across many data center environments, business data and new applications are rapidly proliferating. In large part, server virtualization has contributed to this growth since it removes many of the logistical barriers for bringing new business systems online. And while there are many benefits to implementing virtualized infrastructure, like improved resource efficiency, enhanced application availability and increased business agility, there can also be a great deal of added complexity in managing these environments. As virtual machines are deployed, IT administrators also need to configure and provision all the necessary storage and networking resources to support these systems..."
                                        NIST Drafts Guide for Hypervisor Security
                                        GCN, October 21st, 2014
                                        "The National Institute of Standards and Technology released a draft of SP-800-125 A, Security Recommendations for Hypervisor Deployment, for public comment. Because of widespread growth in server virtualization for hosting enterprise applications and providing cloud services, recommendations for secure deployment of hypervisor platforms are needed, the standards agency said.

                                        Since the January 2011 publication of NIST's SP 800-125, Guide to Security for Full Virtualization Technologies, both the feature set of hypervisors as well as tools for configuring the virtualized infrastructure spawned by the hypervisor have seen considerable increase..."

                                        What's Lurking in Your Virtualized Data Center
                                        Storage Newsletter, October 28th, 2014
                                        "Datacenters are fraught with operational hazards, and because virtual infrastructure is extremely complex and dynamic, many vulnerabilities go undetected and can be onerous to find. On the other hand, known hazards are often ignored because administrators underestimate or don't understand their scope, severity and risk.

                                        For example, we recently spoke with a well-known company who told us they brought down a large portion of their datacenter during an upgrade because of incompatibilities between their PCIe cards and ESX. A seemingly trivial issue resulted in hours of costly disruption to their business..."

                                        IT - Email
                                        Has Email Peaked?
                                        Information Week, October 31st, 2014
                                        "The following is excerpted from Message Not Received: How New Technologies and Simpler Language Can Fix Your Business Communications (Wiley, March, 2015). In his seventh book, author Phil Simon examines how we communicate, use, and often misuse language and technology at work.

                                        For a long time now, email has served as the default mode of business communication, and a fair amount of research confirms as much. For instance, in 2013, the Radicati Group released its Email Statistics Report, 2013-2017. Among the study's most interesting findings:..."

                                          Common email mistakes that'll haunt most professionals
                                          The Next Web, October 31st, 2014
                                          "Denise Chan is the US Inbound Marketing Associate for Mailjet, an email service provider with more than four years of experience and 25,000 clients across 158 countries.

                                          Navigating your email campaigns into your customer's inbox can be a scary process. Broken links, wrong subject lines, using spam words - these spooky mistakes that can haunt an email marketer for weeks.

                                          Let's identify these common errors, how to avoid them and maybe, just maybe you'll come out of the process in one piece..."

                                            3 Tips on Making Your Email Design Responsive
                                            Business 2 Community, November 1st, 2014
                                            "We don't have to tell you how important it is to have a design that is multi-device friendly - the numbers speak for themselves. Today, 65% of emails are first opened on a mobile device. And with 75% of readers highly likely to delete emails that are not optimized for the third screen, you really only have one chance of getting your message through to your audience. That means: adapt to your environment.

                                            Here are a few tips on how to design responsive emails, thereby making your emails efficient on all kinds of platforms:..."

                                              Oracle ZFS Storage Appliance Plug-in for Enterprise Manager (v2.0) Now Available
                                              By John Shell
                                              Version 2.0 of the Oracle ZFS Storage Appliance Plug-in for Enterprise Manager is now available. The plug-in supports the capture and display of metrics from any number of ZFS Storage Appliances in the Enterprise Manager interface. Also available through the interface are all tunable settings (including support for provisioning of projects and shares).

                                              As noted in the 2014 IOUG Database Storage Survey, for a vast majority of customers, the current vendor-supplied storage management tools provide insufficient insight into the effects of the database on storage. Using Enterprise Manager with the ZFS Storage Appliance Plug-in takes a large step towards solving this problem.

                                              IT - Database
                                              NoSQL takes the database market by storm
                                              Network World, October 27th, 2014
                                              "CARFAX, the online vehicle tracking and valuation website, built its first database in 1984 based on technology named OpenVMS. At the time, it was cutting edge for its ability to handle millions of records.

                                              But the company grew. 'We had a hard time scaling it and finding people to work on OpenVMS,' says Jai Hirsch, senior systems architect for data technologies at CARFAX. The company needed a new database.

                                              For years the default enterprise databases have been based on SQL, a programming language that databases from Oracle, Microsoft, SAP and many other companies predominantly use. But increasingly, SQL databases aren't an ideal fit for companies like CARFAX. Traditionally, SQL databases are based on rows and columns; CARFAX has 13.6 billion records associated with 700 million vehicles. A column-based system would have required thousands of columns and tabs, but for any given vehicle maybe only a dozen of them would be populated. It just wasn't ideal for CARFAX..."

                                              IT - Backup
                                              Cloud data protection for laptops, desktops and mobile devices
                                              SearchDataBackup, October 27th, 2014
                                              "The first thing you need to know about achieving cloud data protection for laptops and mobile devices is that there are a number of different products for doing so. These products range from endpoint backup products such as Druva inSync, file synchronization and sharing products from companies like CTERA, and traditional backup software products with a cloud backup option. There are also a number of cloud backup providers such as Mozy Enterprise that offer enterprise-grade cloud backups for endpoints..."
                                                IT - Big Data
                                                Big Data Wars: How Technology Could Tip the Mid-Term Elections
                                                Network World, October 27th, 2014
                                                "After John Kerry lost a very winnable election in 2004, Democrats were worried that Republicans had gained an almost insurmountable lead in both technology and data analysis.

                                                'Progressive technology infrastructure was born in 2004, when we got our teeth kicked in,' says Bryan Whitaker, COO of the NGP VAN, a privately held company that offers technology-based services to Democratic candidates..."

                                                It's the End of Innovation as We Know It
                                                Information Management, October 24th, 2014
                                                "Everybody talks about the importance of innovation. But history has proven that having one big idea isn't enough. Long-term success depends on an entrepreneur's ability to operationalize that big idea, while continuing to develop new products and processes.

                                                In the past, businesses have relied on a lot of trial and error to come up with new ideas. Today, data is driving innovation. The convergence of the Internet of Things with advanced technology solutions is putting meaningful data into the hands of decision-makers at the exact moment they need it. Consequently, using data to guide innovation, whether disruptive or incremental, will transform the global marketplace in ways we are only beginning to understand..."

                                                  Why You Keep Failing at Big Data (Hint... It's Your Vendors' Fault)
                                                  TechRepublic, October 23rd, 2014
                                                  "It's not surprising that most enterprises still don't know how to extract value from their data: vendors keep telling them half the story. Which half, of course, largely depends on whether it's an incumbent vendor trying to repurpose yesterday's data infrastructure for today's data sources or an upstart vendor trying to shoehorn today's data infrastructure for yesterday's data sources.

                                                  The companies that effectively tackle big data are those that aren't blinded by either camp and instead learn how to blend different data infrastructure to tackle a variety of data types and sources..."

                                                  Making Rewards Count: Turning Data into Profit
                                                  Bank Systems and Technology, October 24th, 2014
                                                  "The digital revolution is transforming the way in which consumers interact with brands, and the retail banking sector is no exception to this. Over the past decade, the retail banking experience has evolved to deliver a more connected experience and these services have driven competitive differentiation for banks. Particularly for newer, more agile entrants, like First Direct.

                                                  However, online banking, mobile banking and remote account management are now more often considered a necessity rather than a benefit for the "connected customer" who expects a personalized service from their bank 24 hours a day, seven days a week..."

                                                  Big Data Digest: Rise of the Think-Bots
                                                  ComputerWorld, October 24th, 2014
                                                  "It turns out that a vital missing ingredient in the long-sought after goal of getting machines to think like humans -- artificial intelligence -- has been lots and lots of data.

                                                  Last week, at the O'Reilly Strata + Hadoop World Conference in New York,'s head of artificial intelligence, Beau Cronin, asserted that AI has gotten a shot in the arm from the big data movement. "Deep learning on its own, done in academia, doesn't have the [same] impact as when it is brought into Google, scaled and built into a new product," Cronin said..."

                                                  IT - Mobile
                                                  7 Mobile Marketing Stats Every Local Business Should Know
                                                  Business 2 Community, October 26th, 2014
                                                  "For today's local businesses, having a robust online presence has become a necessity. But is your business up to speed on the demands for mobile marketing as well? Here are five mind-blowing stats about mobile every local business needs to know.

                                                  1) Smartphones have hit mainstream. One significant contributing factor in the rise of mobile marketing is the dramatic increase in mobile device usage across all demographic groups. In fact, according to a report by Pew Research, an estimated 58% of American adults now use a smartphone on a daily basis..."

                                                    40% of Enterprise Employees Use Personal Devices for Work
                                                    Help Net Security, October 24th, 2014
                                                    "Approximately 40 percent of U.S. consumers who work for large enterprises said they use their personally owned smartphone, desktop or laptop daily for some form of work purposes, according to a recent survey by Gartner.

                                                    The study, which was conducted in June 2014, surveyed more than 4,300 U.S. consumers about their technology usage and attitudes in order to gain a better picture of how devices are used for work and leisure..."

                                                    When it Comes to Mobile, IT Is Out of Touch
                                                    Network World, October 28th, 2014
                                                    "I used to be with it, but then they changed what it was. Now what I'm with isn't it and what's it seems weird and scary to me. It'll happen to you!" warned Abraham Simpson -- of the Springfield Simpsons -- way back in 1996.

                                                    It's true, and like it or not, mobile is the new gamemaker in business -- if you haven't adopted a mobile strategy that enables productivity on the go, rest assured that your competitors have. And even if you have, there's an arms race to build better, more user-friendly applications, faster..."

                                                      IT - BYOD
                                                      BYOD: Why the biggest security worry is the fool within rather than the enemy without
                                                      ZDNet, October 27th, 2014
                                                      "The vast majority - 95 percent - of IT managers are prepared to admit that they are struggling to tackle all the potential security threats they face and 87 percent believe that the biggest threats came from mobile devices in the hands of careless employees, according to a new survey.

                                                      Check Point's third annual security survey is focused this year on mobile devices. The company interviewed 700 IT professionals in the US, UK, Germany, Canada and Australia..."

                                                      Mobility/BYOD = Power to the People
                                                      CIO, October 30th, 2014
                                                      "When we enable mobile employees to use their own devices, we should empower them to do far more than just speak with customers, colleagues and family while driving or check both business and personal email on the same device.

                                                      Truly empowering mobile workers with bring-your-own-device (BYOD) enables them to accomplish, immediately and anywhere, what used to tie them to their desks.

                                                      Consider the simple example of traveling employees being able to track expenses as they make them. We used to have to carefully keep track of every receipt and hope we wouldn't lose any..."

                                                      Top Ten Articles for last few Issues
                                                      Vol 200 Issues 1, 2, 3 and 4; Vol 199 Issues 1, 2,3 and 4; Vol 198 Issue 5
                                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                      • Game Changing Innovation with Power8?
                                                      • Power of SPARC T5 scalability unleashed
                                                      • Why Should Your Oracle Database Run on Oracle Solaris 11?
                                                      • Virtual Compute Appliance and ZFS Storage Appliance
                                                      • Enterprise-class Virtualization for SPARC servers
                                                      • Learn How to Use OpenStack on Oracle Solaris From the Comfort of Your Desktop
                                                      • 10 ways to help users move from Microsoft Office to LibreOffice
                                                      • 10 ways Oracle uses its own technology for business success
                                                      • Oracle OpenStack for Oracle Solaris Multi-Node Docs
                                                      • Oracle StorageTek T10000D Tape Drive achieves FIPS 140-2 Validation

                                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                                        IT - Server
                                                        Server Configuration Management on IaaS Clouds
                                                        SearchCloudSecurity, October 29th, 2014
                                                        "Infrastructure as a service (IaaS) configuration management is an important aspect of cloud security, but not all industry best practices align perfectly. Security configurations from the Center for Internet Security, Microsoft, and other operating system and application providers are just a few of the approaches available for securely configuring these environments.

                                                        In this tip, let's examine the different baselines and ways to apply server configuration hardening practices within IaaS clouds..."

                                                        Shellshock Attacks Mail Servers
                                                        ZDNet, October 27th, 2014
                                                        "Reports are emerging that attacks are being performed against SMTP servers using the Shellshock bug. The campaign seeks to create an IRC botnet for DDOS attacks and other purposes.

                                                        Shellshock emerged about a month ago and immediately was recognized widely as a serious problem.

                                                        The bug had been in the Bash shell for 20 years and was widely deployed in a configuration that made it easy to exploit.

                                                        Many of those vulnerable configurations are on forgotten systems, long considered stable and which may be difficult to patch.

                                                        This SMTP vector is a good example of the problem, as mail servers are often left untouched for long periods..."

                                                        IT - Encryption
                                                        Clueless FBI Sabotages its Own Anti-Encryption Campaign
                                                        InfoWorld, October 24th, 2014
                                                        "FBI Director James Comey continues to bang the drum about the evils of smartphone encryption and the harm it will do to U.S. law enforcement efforts. Fortunately, few people are persuaded, possibly because Comey himself seems of two minds -- and baffled by technology to boot.

                                                        Comey has been on a media tear denouncing the default smartphone encryption provided by Apple, with its recently released iOS 8, and Google, with its next-generation Lollipop Android OS. No one without the passcode -- not even Apple or Google -- can break the encryption, which leaves law enforcement "struggling to keep up" with criminals, Comey said in a speech to the Brookings Institution..."

                                                        IT - Tape
                                                        LTFS Tape-Disk Hybrid Storage: Who Needs Cloud?
                                                        Enterprise Storage Forum, October 28th, 2014
                                                        "It may not be fashionable, but when it comes to archiving or backing up large amounts of data at low cost then it's hard to beat the economics of magnetic tape. The storage medium itself is cheap, offers high capacity, and when not in use it consumes little or no power - so even if disks were free, tape might still be cheaper to own.

                                                        But there are drawbacks, of course. Accessing data stored on tape can be slow, and traditional tape archiving and backup systems tend to be highly proprietary: the way the data is stored, and the database containing the tape indexes that allow you to access data is unique to each vendor. That means tapes made with one system can't be used in any other..."

                                                        LibreOffice 4.3.3 And LibreOffice 4.2.7
                                                        Both versions can be deployed in enterprise environments
                                                        "The Document Foundation announces LibreOffice 4.3.3, the third minor release of LibreOffice 4.3 'fresh' family, and LibreOffice 4.2.7, the last minor release of LibreOffice 4.2 'still' family. Together, there are over 200 fixes for bugs and regressions.

                                                        LibreOffice 4.3.3 'Fresh' is a stable release of the more advanced version of the software, and is targeted to users focusing on features. LibreOffice 4.2.7 'Still' is a stable release of the more tested version of the software, and is targeted to users focusing on continuity. Both versions can be deployed in enterprise environments, according to corporate policies, when backed by professional support..."

                                                        The Document Foundation Joins The Open Source Business Alliance (OSB Alliance)
                                                        OSB Alliance is Europe's biggest association of companies and organizations developing, building and using open source software
                                                        The Document Foundation (TDF) joins the Open Source Business Alliance (OSB Alliance), to strengthen LibreOffice ecosystem by creating stronger ties with companies and organizations deploying the free office suite on a large scale.

                                                        The aim of OSB Alliance is to improve the success of open source software and open collaboration, through the dissemination of information, the creation of positive conditions for software developers and users, and the active networking between all players. Within this environment, interoperability plays an important role for everyone, and especially for enterprise users.

                                                        Mobile Devices - The Weakest Link of Enterprise Security?
                                                        Suhas Uliyar, VP Mobile Strategy, Product Management, Oracle
                                                        Suhas Uliyar, VP Mobile Strategy, Product Management, Oracle, writes, "Today's truly mobile enterprises place mobility at their core, transforming their operations, engaging better with customers and partners and creating innovative business models that boost revenue. As gateways into the mobile enterprise, the security of devices is critical: if devices are not protected in the right way, they represent a weak link in enterprise systems and data security.

                                                        A recent Oracle survey showed that mobile devices are being lost and stolen to a fairly alarming degree - especially by the young. 73 per cent of workers aged between 16 and 24 admitted to having lost their mobile device at least once, while 52 per cent owned up to having had their mobile device stolen on at least one occasion. The research uncovered a generational trend: among 45-54-year-olds, device theft was reported at just 20 per cent and losses at 36 per cent..."

                                                        Nexenta News
                                                        Most central and local government organizations are overspending on legacy storage solutions
                                                        Legacy storage cost the UK public sector $1955 / TB, while SDS cost only $606/TB

                                                        140 government departments bought extra storage in 2013, spending £13,876,068 (~ USD$22M) in total on 11,439 TBs equaling an average of £1213 per TB (~ USD$1,955 per TB)

                                                        Only five public sector departments bought open source or Software-Defined Storage (SDS) in 2013. The figures show they spent £242,918 (~USD$ 391K) in total on 645.6 TBs equaling an average of £376 per TB (~ USD$606 per TB) ...

                                                        Most central and local government organizations are overspending on legacy storage solutions - money which could have funded 447 Band 5 NHS Nurses or 443 Firemen or 511 Prison Officers or 410 Police Officers.

                                                        Nexenta and Mirantis Advance Software-Defined Storage in OpenStack
                                                        Mirantis OpenStack gives developers and operators the reliability, choice and freedom they want for their private clouds
                                                        Nexenta and Mirantis, the pure-play OpenStack company, announced Nexenta's certification as a Mirantis Technology Partner. Customers are now able to use the NexentaStor block and file storage solution with Mirantis OpenStack, the leading OpenStack distribution.

                                                        "Mirantis OpenStack gives developers and operators the reliability, choice and freedom they want for their private clouds. Working with Nexenta extends these values to their storage requirements," said Mirantis CMO, Boris Renski...

                                                        Solinea and Nexenta Announce Strategic OpenStack Partnership
                                                        Cloud Services innovator and Software-Defined Storage leader develop joint solutions for OpenStack adopters
                                                        Solinea (@solineainc), the OpenStack software and services company, and Nexenta (@Nexenta), the global leader in Software-Defined Storage (#softwaredefinedstorage) (SDS) announce an exciting new strategic partnership to revolutionize the adoption of Open Infrastructure solutions. The partnership will leverage Solinea's proven capabilities in delivering cloud strategy, architecture, implementation, and adoption services to global enterprises, with Nexenta's award winning portfolio of innovative SDS solutions.

                                                        Nexenta's SDS solutions enable enterprises to create optimized storage clusters for open, agile and secure OpenStack environments that scale quickly and easily. Its flagship solution, NexentaStor, enables enterprises to build feature-rich clouds, maintain complete control of the software stack, avoid vendor lock in and significantly impact total cost of ownership (TCO). Whilst its next generation scale-out object, block and file Storage, NexentaEdge, is designed for OpenStack clouds and Big Data applications.

                                                        Level3 News
                                                        Level 3 Completes Acquisition of tw telecom
                                                        Ombined Enterprise Value Of $27 Billion Creates A Stronger Competitor To Deliver Significant Customer Benefits
                                                        Level 3 Communications, Inc. (NYSE: LVLT) announced it completed its acquisition of tw telecom. The transaction further positions the company as a global leader in the rapidly evolving business communications market.

                                                        The combined company provides enterprise, government and carrier customers around the world with one of the most comprehensive product portfolios in the industry, supported by its global network and deep metro footprint across North America.

                                                        Trending in
                                                        Vol 235, Issue 2
                                                        Trending IT Articles