News about Oracle's Solaris and Sun Hardware
System News
Nov 10th, 2014 — Nov 16th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 201, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


IT - CxO
x
Privacy is the New Killer App
ComputerWorld, November 14th, 2014
"A funny thing is happening in the wake of the Edward Snowden NSA revelations, the infamous iCloud hack of celebrity nude photos, and the hit parade of customer data breaches at Target, Home Depot and the U.S. Postal Service. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.

But there's a silver lining to the cloud: For probably the first time since the launch of Facebook, people are actually sitting down to think about their privacy and about who's doing what with our data -- specifically, what we're willing to share, and what we're willing to give up to advertisers in the name of easy sharing, constant communication and sweet, sweet validation..."

Data Breaches: 8 Tips for Board-Level Discussions
Information Week, November 10th, 2014
"Recent high-profile breaches put you in the board's spotlight on security. Here's how to shine. With all the recent news of massive data spills and security breaches, corporate boards are asking tough questions of their executive management and, in turn, their information security teams. What did those companies do wrong? How does our company compare? Are we next?

Welcome to the hot seat. You have their attention. Now your job is to leverage this opportunity to garner their respect, deepen their trust, and increase their investment in a strategic information security program. It's going to be a difficult conversation. But the white-hot spotlight gives you a chance to shine..."

Military Vets Excel in IT, Companies Find
ComputerWorld, November 11th, 2014
"To commemorate Veteran's Day 2014, Computerworld is honoring a few good companies that have gone above and beyond the call of duty in their commitment to hire veterans into IT and other business positions. The seven firms profiled here are known for treating their workers right; all were named to Computerworld's 100 Best Places to Work in IT list for 2014.

They're also all members of 100,000 Jobs Mission, a coalition founded in early 2011 by JPMorgan Chase. The goal of the mission -- which initially encompassed 10 other organizations, including high-tech firms such as Cisco, AT&T, Verizon and EMC -- was to collectively hire 100,000 U.S. veterans into the private sector by the year 2020..."

7 Ways IT Can Do a Better Job of Listening To Users
IT World, November 6th, 2014
"Admit it, IT doesn't always do the best job of listening to its customers. Here are 7 strategies you can use to turn things around...

Consider the plight of the typical automaker. Many of their customers are frustrated with their car experiences, yet this frustration can't be easily tapped due to data firewalls that surround the car buying and ownership process. As an example, your local garage might not know anything about your past service history at the dealership. Or if you have called the manufacturer's call center to report a faulty part, the dealer doesn't know about that call..."

IT Talent Shortage: Ugly Truths
Information Week, November 7th, 2014
"IT pros are starting to feel disposable. Wake up, IT leaders: Relationships like this don't survive. Successful IT people are fierce, smart, generous, proud, and brutally honest. When I wrote about the IT talent shortage debate, I expected passionate reader email about painful job hunting, and I got it..."

"As one of the 'unemployable' IT workers with 3 decades of experience, I think you are missing something," one reader emailed me. "The one thing that was not discussed is how we are treating the people as disposable commodities in an industry where it can take decades to develop the knowledge, wisdom, and experience that is required."

    Oracle
    x
    A New Look for Oracle Documentation
    Revised docs.oracle.com
    Janice wrires, "The documentation teams at Oracle have been busy the past few months. In addition to updating product-specific content, all Oracle documentation teams have been working together on a revised docs.oracle.com site that should move our information into a more modern paradigm.

    The new docs.oracle.com site just went live this past weekend. The revised site is a significant change, but we think you'll like it..."

    SPARC
    x
    Murex Looks to SPARC Solaris Systems to Provide Value
    By Mike Mulkey
    Mike Mulkey writes, "Managing risk in a real-time capital market industry is something Murex customers have been doing successfully for over 27 years. Murex builds software platforms for integrated trading, risk management, processing and clearing solutions for financial institutions, corporations and utilities located across the globe.

    Murex has a long history with Oracle, starting with SPARC Solaris systems in 1992, moving to a Java development platform in 1998, and beginning development on the Oracle Database back in 2001. Murex customers demand reliable solutions, which are extremely secure and very performant - as they are operating in real-time.

    In this video, Fabrice Blanc, Alliances Director, Murex, describes why 80% of Murex customers run on Solaris systems today. He also describes the partnership with Oracle and how they are now looking to explore new emerging technologies like Database 12c and the Oracle cloud.

    Exadata
    x
    SAS Big Data Analytics
    On Oracle Engineered Systems
    Oracle and SAS have been partners for over 20 years and they continue to work closely on joint technology projects to increase solution benefits to customers. One such technology area is Big Data Analytics on Oracle Engineered Systems.

    Paul Kent, Vice President of Big Data at SAS, discusses SAS strategy for Big Data Analytics and how Oracle Engineered Systems simplify implementations for customers at increased performance and reduced risk in this video...

    Virtualization
    x
    Compare and Contrast (and mix-n-match) Oracle's SPARC V12N choices
    PDoms, LDoms, and different flavors of Solaris Zones
    A new white paper from Oracle's Elite Engineering Exchange team provides an excellent guide to the different virtualization technologies available on SPARC platforms, including guidance on when to employ each - either alone, or in combination with another technology. PDoms, LDoms, and different flavors of Solaris Zones are evaluated in terms of

    • Security Isolation
    • Resource Isolation
    • Efficiency
    • Availability
    • Serviceability
    • Flexibility
    • Agility

    Although the paper is not specific to database deployments, the key points apply to all workload tiers. And while the discussion is on SPARC technologies, many points apply to all virtualization technologies...

    IT - Storage
    x
    Seagate Preps for 30TB Laser-Assisted Hard Drives
    ComputerWorld, November 11th, 2014
    "Seagate Technology is boosting investments in laser-assisted hard disk drive technology that it projects will allow it to increase capacity five-fold.

    The laser technology, known as heat-assisted magnetic recording (HAMR), is able to write smaller, more-stable bits onto the magnetic surface of a spinning disk. Today, Seagate's largest capacity drive using conventional recording is 6TB. Using HAMR, that capacity could theoretically increase to 30TB..."

      Flash Memory: Blurring the Line Between SLC and MLC
      Network Computing, November 6th, 2014
      "The flash market has become more complex with SSDs that can switch flash blocks from multi-level cell to single-level cell and back.

      Just a few years ago, most steely-eyed storage guys had a pretty simplistic view of flash memory. Single-level cell (SLC) flash, worth well more than its weight in gold, was fast and endurant enough for crushing enterprise workloads, while everything else was suitable for laptop SSDs at best.

      Most of us have evolved beyond that simplistic view, but I hear otherwise knowledgeable storage folks reveal that they don't really know what today's flash market looks like..."

      A Hybrid NAS for Unstructured Data
      Storage Switzerland, November 11th, 2014
      "Periodically a data center will try to consolidate down to a single storage system. In almost every case this proves to be a futile exercise. Some workloads need high performance but have modest capacity requirements, and others have modest performance requirements but high capacity and longer retention needs. A storage system that tries to meet all of these demands typically has to overcompensate and provides way too much performance or not enough capacity, all of which leads to a much higher cost.

      Nowhere is this gap more apparent than when having to store unstructured data, the traditional sweet spot for network attached storage (NAS) systems. Most NAS from vendors like EMC, NetApp, and HDS have moved upstream from simple file storage into databases and virtualization. While they can still support the dramatic growth that's often seen in unstructured data, they do so at a higher cost..."

      Why Solid-State Disks are Winning The Argument
      The Register, November 7th, 2014
      "Perhaps the most perplexing question I have been posed this year is: "Why should I use SSDs?"

      On the face of it, it is a reasonable question. When it was put to me, however, I just sat there staring at the wall, trying to form a coherent thought. Where to begin?

      As it was late at night, I decided that starting with a brief history of storage types and then diverging into a full-blown 'why spinning rust was sent from hell to make me miserable' rant was probably the wrong approach.

      So I flipped the question on its head. What is the business case for the traditional magnetic hard drive?..."

        Software-Defined Storage: A Reality Check
        Network Computing, November 10th, 2014
        "The hype around software-defined storage has focused on leveraging commodity hardware, which obscures many of the technology's real benefits.

        Software-defined storage has generated both unbridled excitement and massive confusion. Vendors push their own software-defined storage messages, whether it's a focus on storage virtualization capabilities and the ability to manage multiple types of hardware -- including commodity hardware -- as a single pool of storage, or on delivering storage controller functionality as software and allowing IT pros to select their own, often commodity, hardware..."

          Java Technology
          x
          Developing with Oracle WebLogic Server 12.1.3
          Whitepaper and Video by Steve Button
          Juergen writes, "Accompanying the release of Oracle WebLogic Server 12.1.3 a whitepaper was published that describes the new developer oriented features that the product release contains. As this previous blog describes, it covers in some detail the new and updated Java EE APIs provided in the release:

          • Java API for WebSocket 1.0
          • Java API for JSON Processing 1.0
          • Java API for RESTful Web Services 2.0
          • Java Persistence API 2.1

          It also discusses the general developer features of Oracle WebLogic Server, including the existing Java EE 6 support and some new additional capabilities such as the WebSocket Emulation library and a programming model for developing applications that use the ServerSent-Event feature of HTML5..."

          Oracle's Java 8 set to shake up the M2M and IoT markets
          Antony Savvas reports
          With the recent launch of Java 8, Oracle has thrown the cat amongst the pigeons when it comes to providing an improved development platform for M2M and the Internet of Things. Antony Savvas reports.

          "A single upgrade to Java is seen as an M2M game changer by Oracle and its growing number of third party developers busily working around the Java platform, whose first official version reared its head back in 1996.

          Oracle sees Java 8 as 'the most significant upgrade' to the software since it acquired Sun Microsystems and its software portfolio in 2010. Although the jump from Java 7 to Java 8 was delayed by a year to enable developers to iron out some security issues, many plaudits say it has been worth the wait..."

          IT - Technology
          x
          Scientists Connect Two Human Brains at Different Locations
          Business 2 Community, November 7th, 2014
          "Researchers at the University of Washington have completed a project that feels like something out of a sci-fi movie. The group has published a paper titled A Direct Brain-to-Brain Interface in Humans, in which they enabled communication among two people in different locations.

          The goal of the project was to allow two humans to communicate and cooperatively complete a task. The participants were only allowed to use signals sent from one of the volunteer's brains to the other participants brain.

          According to researchers, the goal was to create a 'Brain-to-Brain Interface' that was made possible by equipping the individuals with electroencephalography (EEG) headsets..."

            6 Tips for Adopting Open Source
            GCN, November 13th, 2014
            "Open source code drives collaborative innovation from a larger pool of developers at a lower cost, which is why federal agencies are adopting the 'open source first' model. In fact Sonny Hashmi, CIO of the General Services Administration, recently announced that implementing open source software is among his top priorities this year.

            So what's the best way to increase your agency's adoption of open source software and keep it secure? Here are six tips to get you there:..."

            Robotic Spiders May Someday Build Satellites in Space
            ComputerWorld, November 11th, 2014
            "By 2030, when the U.S. government or a company wants a new satellite in orbit, a robotic spider might build it in space.

            Six- or eight-legged robotic spiders, capable of working with a 3D printer, gripping large objects and welding them together, are expected to build satellites or small spacecraft in the lower Earth orbit.

            That means fewer spacecraft will be built on the ground, packed into a spacecraft and launched into space. Avoiding the stresses and expense of launch, the satellites will be less expensive, bigger and higher functioning..."

              U.S. Sets Sights on 300 Petaflop Supercomputer
              ComputerWorld, November 14th, 2014
              "U.S. officials Friday announced plans to spend $325 million on two new supercomputers, one of which may eventually be built to support speeds of up to 300 petaflops, faster than any supercomputer running today.

              The U.S. Department of Energy, the major funder of supercomputers used for scientific research, wants to have the two systems - each with a base speed of 150 petaflops - possibly running by 2017. Going beyond the base speed to reach 300 petaflops will take additional government approvals..."

                IT - Bitcoin
                x
                The Face of Bitcoin Documentary
                Bitcoin Magazine, November 8th, 2014
                "The Bitcoin community has been rapidly growing since its creation.

                What was believed to be just a group of geeks and anarchists has transformed into an extremely diverse and passionate community.

                I've come to realize that much of the bitcoin community is represented by avatars and usernames on the Internet. There is a shortage of physical human representation. For any grassroots movement to acquire legitimacy, people need to see real people.

                EasyBitz, a payment network powered by crypto-currency, has begun an initiative to film the real faces of the bitcoin community..."

                Gold Vs. Bitcoin? The Greatest Rivalry Of The 21st Century
                CryptoCoinsNews, November 14th, 2014
                "Gold. The name itself is synonymous with wealth, status, precious value, and the pinnacle of all commodities extant. So much so that 98% of the world's population has never seen gold outside of the random necklace or bracelet of questionable actual content. Its scarcity, and elusiveness are legend. Thus, its incredible perceived value. Is Gold destined to reign forever, in a class of one, as the be-all-end-all of desired assets on this planet? Maybe. Maybe not..."
                  Bitcoin Offers A Radically Different Model Of Governance
                  CryptoCoinsNews, November 11th, 2014
                  "In a brilliant essay on Bitcoin and the promise it holds for a decentralized future (published on the Pirate Party founder Rick Falkvinge's website), Nozomi Hayase explained the disruptive potential of Bitcoin. Now she further elaborates in a new essay on Falkvinge's site, and explores how the Bitcoin ecosystem offers a different model of governance and how within it, our familiar notion of power can be redefined to mean something radically different..."
                  The Tipping Point of Bitcoin Micropayments
                  CoinDesk, November 15th, 2014
                  "Jose Pagliery writes about technology for CNNMoney. He has covered the growth of bitcoin, penning dozens of articles on digital currency, writing for the Atlanta Journal-Constitution, the Daily Business Review and the Miami Herald. He is also the author of 'Bitcoin and the Future of Money'. In this excerpt from the book, Pagliery looks at the advantages and use cases of micropayments..."
                  Intuit Brings Bitcoin Payments To Quickbooks Integrating Bitpay Into Paybycoin Service
                  CryptoCoinsNews, November 12th, 2014
                  "Intuit and BitPay announced the integration of Bitcoin payments into the Quickbooks PayByCoin service. The integration will allow the company to offer the option of paying by Bitcoin to their customers.

                  The integration also allows for next day settlement in their bank accounts as well. The quick deposit to their bank accounts will help companies avoid the volatility in the Bitcoin price yet still able to accept it. This type of protection will make Bitcoin more attractive to companies eliminating the risk of a large swing in value..."

                  Payments Giant NCR to Integrate Bitcoin into Small Business Service
                  CoinDesk, November 10th, 2014
                  "Global payments conglomerate NCR has announced that one of its merchant point-of-sale (POS) systems will soon offer bitcoin support.

                  The integration of bitcoin into the NCR Silver POS is expected to happen sometime before the end of this year. The system will also support mobile bitcoin wallet payments and will be a free service attached to its POS platform..."

                  HP Survey: 79% of US Organisations Plan to Adopt Digital Currencies
                  CoinDesk, November 13th, 2014
                  "Digital currencies now feature in the long-term strategies of US businesses, according to a new study of electronic payment trends.

                  The Ponemon Institute report, commissioned by tech giant hp, found that 79% of respondents planned to support digital currencies like bitcoin in the future.

                  Additionally, 80% of the 634 US residents surveyed said they expect digital currencies to overtake paper currencies in the future..."

                  Think Tank: Blockchain Could be 'Economic Layer' for the Web
                  CoinDesk, November 11th, 2014
                  "The Institute for Ethics and Emerging Technologies (IEET) has published a brief article advocating the use of blockchain technology.

                  In the article, the IEET describes the blockchain as next-generation information technology with many potential upsides in a number of fields beyond digital currencies.

                  The IEET made a clear distinction between 'bitcoin 1.0' (currency) and other emerging technologies, classified as 'bitcoin 2.0' (contracts) and 'bitcoin 3.0' (beyond currency and finance) applications of blockchain technology..."

                  Solaris
                  x
                  Oracle OpenWorld 2014 Solaris Presentations Now Available
                  By Larry Wake
                  Larry writes, "Another Oracle OpenWorld is over, and as usual, there was a lot to take in. Markus Flierl had a great recap, covering what we said about Oracle Solaris, as did Rick O'Herron over on the Oracle Hardware blog, summarizing what's happening with SPARC M7.

                  Whether or not you got to attend this year, you might want to take a look at the presentations, which are now posted for many of the sessions. You can go to the entire content catalog (a mere 2,800+ sessions for OpenWorld and JavaOne!), or drill down to just the Oracle Solaris-related sessions via our ever-popular Focus on Oracle Solaris guide..."

                  MySQL
                  x
                  Use MySQL for Visual Studio in Visual Studio 2013 Community edition
                  Replaces the very limited Visual Studio Express version
                  Gab Martinez writes, "A lot a great announcements were done today at the Visual Studio Connect event. And one of the things we are more excited about is hearing that there is a new edition of Visual Studio: Visual Studio 2013 Community.

                  This edition was launched today and it basically replaces the very limited Visual Studio Express version that has been around since some years ago. There is a huge difference between Visual Studio Express and the, just launched today, Visual Studio 2013 Community edition: The new version is extensible, so now you can add third party plugins. So that means that you can use this new Visual Studio Community edition along with MySQL for Visual Studio without any restrictions.

                  Some of the features that you have within this MySQL product are:..."

                  Cloud Computing
                  x
                  Oracle Sales Cloud Wins Big!
                  Technology Innovation Award in Cloud Computing for 2014 from Ventana Research.
                  Kathryn Perry writes, "Oracle Cloud Applications received the Technology Innovation Award in Cloud Computing for 2014 from Ventana Research. The award is based on the strength of our portfolio, which includes infrastructure, platform, tools, and applications.

                  The November 5 report announcing the award specifically focuses on the high level of maturity of Oracle Sales Cloud.

                  Ventana Research acknowledged that Oracle has been playing catch up with salesforce.com - but that has changed now..."

                  Linux
                  x
                  Oracle Linux images for Docker released
                  Build, ship, and run distributed application with Docker
                  Avi Miller writes, "The Oracle Linux team is pleased to announce an update to Docker on Oracle Linux, along with the release of official Docker images for Oracle Linux 6 and 7. With this update, customers will have access to the tools needed to create, manage and deploy Docker containers on Oracle Linux.

                  The Docker Engine and Official Oracle Linux images are fully supported as part of Oracle Linux Basic and Premier support subscriptions. The scope of Oracle Linux support for Docker can be found in My Oracle Support, Document ID 1921163.1.

                  Docker is an open platform for developers and sysadmins to build, ship, and run distributed applications. Consisting of Docker Engine, a portable, lightweight runtime and packaging tool, and Docker Hub, a cloud service for sharing applications and automating workflows, Docker enables apps to be quickly assembled from components and eliminates the friction between development, QA, and production environments. As a result, IT can ship faster and run the same app, unchanged, on laptops, data center VMs, and any cloud..."

                  IT - Cloud
                  x
                  Cloud Technologies Will Power The Most Successful Businesses In 2015
                  Forrester, November 13th, 2014
                  "What's ahead for cloud computing in 2015? Check out our report for Forrester's take on the most important trends in cloud computing and what you should do about them. In 2014, cloud entered the formal IT portfolio, and technology managers stopped treating cloud as competition. In 2015, cloud technologies will mature into the driving force powering the most successful companies. Cloud enables unparalleled levels of sustained innovation. Companies that harness its power will win, serve and retain customers better than their competitors -- in less time and for less money -- if they take advantage of all the cloud has to offer. But where should you start?..."
                  Midsize Businesses Have Most to Lose in the Cloud
                  Business 2 Community, November 6th, 2014
                  "The more I read, the more it's becoming clear that it's midsize businesses who have the most to lose in the cloud.(Ironically, they also have the most to gain from a move to the cloud, so go figure!).

                  The upside is that the shift to cloud based computing has made it possible for small and midsize businesses (SMB's) to access software and applications they previously may not have been able to afford, which is pretty cool..."

                    Pros and Cons of Building Cloud-Native Apps In AWS
                    SearchAWS, November 10th, 2014
                    "Those who design and build cloud applications already understand the importance of exploiting the native features of the cloud platform, such as AWS and others. This means you write an application to the strengths of the platform, and don't try to be all things to all clouds.

                    Each cloud provider has its own way to leverage its native features. Typically, you can access these features via layers, including the topmost virtual platform/OS and underlying resources (such as storage and data), and then the cloud-native services, such as provisioning and tenant management. Tenant management provides the ability to share the physical and virtual resources within the cloud with those who are leveraging the cloud services, or tenants.

                    The reasons you exploit cloud-native features include:..."

                    3 IT Practices that Add Risk to Cloud
                    Dark Reading, November 7th, 2014
                    "Over the past week, several studies have shed more light on how cloud and SaaS practices within enterprises are changing the face of IT security. The data, along with common sense, shows that IT is way beyond the point of no return when it comes to stopping cloud deployment for the sake of security. However, there may be hope for reducing risk from cloud usage through more engagement of the IT department from procurement, through deployment and administration..."
                    You Should Listen to that Annoying Cloud Skeptic
                    InfoWorld, November 11th, 2014
                    "You might enjoy mocking the people in your organization who push back on cloud adoption, but it's good to have them around. Sometimes they're right.

                    You know the type: While everyone is talking about their cloud computing plans, the naysayer crosses his or her arms while talking about how the use of the cloud is 'unsecure' and 'costs too much.' ...

                    These naysayers were in the majority a few years ago, but today their voices are now largely ignored. It's now safe - even trendy - to push the use of public cloud computing; gone is the worry of being fired or shunned. Also, for the most part, cloud implementations seem to be working. The facts are on your side, too..."

                    Enterprise Exposure to Cloud Apps Rises, Security Controls Spread Thin
                    Wall Street & Technology, November 12th, 2014
                    "The average number of cloud services used in financial services has jumped to 844. Security risks are greater than many perceived. Can IT keep up?

                    According to a recent Cloud Security Alliance survey, '33% of companies have a 'full steam ahead' attitude toward the cloud and another 41% of companies are moving with caution.' The survey, which canvassed over 350 companies across all major verticals, was conducted by the cloud visibility company Skhyhigh Networks and published in Skyhigh's third quarter 'Cloud Adoption and Risk Report'..."

                    vBeers-SF
                    x
                    vBeers @ Boca - Biergarten - Wed Nov 19th
                    6pm - 9pm:
                    Join us for vBeers @ Boca. We meet on the 3rd Wednesday of each month in Boca Raton, FL. The next meeting will be at Biergarten Boca, which is located in on US 1, just South of Palmetto Park and East of I-95.

                    Biergarten Boca Raton

                    • 309 Via De Palmas #90
                    • Boca Raton, FL 33432

                    Please Register.

                    Join us for one of the three South Florida vBeers events. The South Florida vBeers events happen three times a month, once per county:

                    Wednesday November 19th

                    Wednesday November 26th

                    Wednesday December 10th

                    Details posted to vBeers South Florida LinkedIN Group.

                    IT - DR
                    x
                    Salvation Army Finds Refuge, Recovery In The Cloud
                    Information Week, November 11th, 2014
                    "In the heart of the Midwest, the Salvation Army is learning how a cloud service can cost-effectively provide disaster recovery, a function which may have previously been considered too expensive for the nonprofit agency.

                    The Central Territory of the Salvation Army operates 350 centers that rely on IT services from a Des Plaines, Ill., office. About 6,500 clients in 11 states rely on those centers for programs fighting drug addiction and human trafficking; they also offer food distribution, disaster relief, and shelter for the homeless. Those clients would be hard pressed if the centers' IT systems went down..."

                    IT - PM
                    x
                    8 Lessons from Rosetta Comet Mission
                    Information Week, November 13th, 2014
                    "What does the European Space Agency's amazing Philae probe landing tell us about where we are as a spacefaring civilization, where we're going, and how to get there?

                    Picking into the details of the European Space Agency's amazing Philae probe landing on a comet reveals how far we've come, how far we have to go, and how to boldly go where no one has gone before you. While we're all still in the glow, let's take a moment to review those lessons..."

                      Guide the team members
                      Toolbox.com, November 9th, 2014
                      "Guide the team members, don't harness them... If you would like to be that leader of a team who consistently succeeds and is almost always happy while working then guide your team. Don't harness them with an abundance of procedures, standards, rules and regulations. Today's IT team members want to succeed however they very much so want to be challenged. Face it, we are fixers, that is our main manner of operations..."
                        What Software Project Managers can Learn from NASA
                        IT Web, November 12th, 2014
                        "I think we can all agree that when it comes to building stuff, NASA has a long history of knowing what it's doing. That doesn't just apply to rockets and spaceships and cool hardware like that; NASA also has a pretty good track record of building high functioning and pretty reliable software. So, when NASA gives out advice on how to manage a project, we should all listen.

                        I bring this all up because I recently came across the list 'A Project Manager's Lessons Learned,' 128 rules compiled back in 1995 by Jerry Madden, Associate Director of the Flights Project Directorate at NASA's Goddard Space Flight Center. The list, apparently, has been in the public domain for some time, but this was the first that I'd seen it. After taking a spin through all of the rules, I thought that a number of them would certainly still apply today, particularly for software project managers..."

                          A Project Manager's Lessons Learned
                          Flight Projects Directorate (NASA), November 12th, 2014
                          Jerry Madden, Retired Associate Director (400) writes, "None of these are original--It's just that we don't know where they were stolen from!..."

                          • There is no such thing as previously-flown hardware, i.e., the people who build the next unit probably never saw the previous unit; there are probably minor changes; the operational environment has probably changed; and the people who check the unit out will in most cases not understand the unit or the test equipment.

                          • Most equipment works 'as built,' i.e., not as the designer planned. This is due to layout of the design, poor understanding on the designer's part, or poor understanding of component specifications.

                          • The source of most problems is people but damned if they will admit it. Know the people working on your project, so you know what the real weak spots are.

                          See the rest of the list in the longer version of this article.

                            IT - Networks
                            x
                            Vigilance and the Enterprise of Things
                            Help Net Security, November 11th, 2014
                            "Most enterprises allow BYOD in their environment, with varying levels of supervision. Typically, these are tablets and smartphones but the number of other Internet of Things devices being brought into the enterprise is on the rise. I like to refer to this as the Enterprise of Things.

                            Many of the organizations I work with are just beginning to grapple with the implications of this shift, and I think a number of aspects need to be considered as we deal with this new reality. Here is a quick run-down of some of the items to consider..."

                            The Internet of Fishy Things
                            Network World, November 5th, 2014
                            "Sometimes it takes a fish to do a man's job.

                            Scientists at the Pacific Northwest National Laboratory have developed a sensor-laden, synthetic Sensor Fish that can be used to swim into hydropower facilities like dams to evaluate structures and other environmental systems.

                            Using Sensor Fish, PNNL researchers say they can measure the various forces juvenile salmon experience as they pass through dams...."

                              Internet of Things to Reach 30 Billion Devices in 2020
                              Help Net Security, November 10th, 2014
                              "While most everyone agrees that the Internet of Things (IoT) is poised for explosive growth and represents boundless opportunities - billions of connected things driving trillions in revenue - understanding where the revenue opportunities lie across different technology layers has remained elusive.

                              A newly released IoT ecosystem forecast from IDC provides much needed clarity, defining the hardware, software, services, connectivity, and security that make up the evolving IoT ecosystem. The worldwide IoT market is forecast to grow from $1.3 trillion in 2013 to $3.04 trillion in 2020 with a compound annual growth rate (CAGR) of 13%..."

                              Proactive Network Management: The Basics
                              Network Computing, November 14th, 2014
                              "Bandwidth spikes, sluggish websites, and slow backups are just some of the unexpected problems that IT pros fear. Don't wait for disaster to strike.

                              IT administrators are creatures of habit, which is why they prefer their networks to be as predictable as possible. But lots of unexpected things can happen: applications slowing to a crawl, spikes in bandwidth use, declining VoIP quality, customer complaints about slow websites, or unexplained database failures. These sorts of network incidents anomalies can hurt productivity or indicate a dangerous security breach..."

                              Common DNS Record Times: What they Mean
                              SearchNetworking, November 9th, 2014
                              "In my previous article, I described how the domain name system (DNS) works. In this section, I'm going to deal with common DNS record types and server responses...

                              Address records: The simplest response is an address (A) record. When the client creates a query for www.foo.com, the authoritative DNS server for that domain responds with one or more IP addresses. To anthropomorphize slightly, the client asks a question and the server responds:..."

                                Converged Ethernet vs. More Links
                                Network Computing, November 7th, 2014
                                "Converged Enhanced Ethernet improves Ethernet performance but is expensive. With the cost of 10 GbE equipment dropping and 25 GbE on the horizon, it may be cheaper to add more links.

                                Though benchmarks often don't show it, Ethernet is a sloppy transmission vehicle. It relies on a collision mechanism that resolves two sources addressing the same receiver by forcing them to turn around and try again, both using random timeouts to do so. This collision process reduces performance, possibly by considerable amounts, and it introduces extra latency..."

                                Understanding IPv6: Solicited-Node Multicast in Action
                                Network Computing, November 11th, 2014
                                "In the last installment of her IPv6 series, Denise Fishburne explains how to find the MAC address associated with a Layer 3 IPv6 address.

                                The last few blogs in my series on IPv6 have focused on solicited-node multicast, which provides the functionality for Neighbor Discovery in IPv6 addressing. We ended the last blog with a cliffhanger, asking, "In IPv6, how do we find the Layer 2 MAC address associated with a Layer 3 IPv6 address?"

                                IT - Operations
                                x
                                2014: The Year the Cloud Killed the Datacenter
                                ZDNet, November 11th, 2014
                                "This year more and more CxOs pulled the life support on their own datacenter infrastructure in favor of ever-maturing public and private cloud offerings...

                                Back in the summer of 2013 I wrote a series of articles on what I called the "Datacenter Zombie Apocalypse."

                                The first was an observation of the troubles IBM was undergoing trying to shift its very datacenter-oriented services and outsourcing business to one that was more cloud focused and how it might serve as a bellwether for the IT industry as a whole.

                                The other was about how, as an IT practicioner, one might transition their skills to be more cloud-oriented.

                                Where are we now with all of this, over a year later?..."

                                Heating Your House with Cloud Computing
                                Information Week, November 13th, 2014
                                "Is it time to get serious about recycling the radiant heat from servers into heating for other buildings large and small?...

                                The cloud apparently is made of hot air -- the heat exhaust from servers in data centers -- and a growing number of companies and organizations are trying to use that heat, rather than disperse it.

                                Heat reuse is not a new idea; it has been implemented in data centers and other energy-intensive facilities such as laboratories..."

                                  Only 47% of IT Pros Are Confident in their Hardware Configurations
                                  Help Net Security, November 11th, 2014
                                  "Respondents of a new Tripwire survey were asked about the level of confidence they have in their application of foundational security controls, including hardware and software inventory, vulnerability management, patch management and system hardening.

                                  These controls are required by the most widely recognized global security standards and organizations, including:..."

                                  IT - Security
                                  x
                                  Aligning Risk Analysis and IT Security Spending
                                  Help Net Security, November 10th, 2014
                                  "IT security spending should be aligned with risk analysis results. Too frequently, though, this is not the case.

                                  Thought leaders in information security have been describing a shift in security control effectiveness over time from network-based, to application-based, and ultimately to data-centric security.

                                  Eight years on from the Jericho Forum identifying the phenomena of de-perimeterization, and the consequences of this on information security, it is more than a little discouraging how much of the security technology spend across the industry is still focused on network security controls, and how little is spent on application security and data-centric security controls..."

                                  How I Became a CISO: Jennings Aske, Nuance Communications
                                  Dark Reading, November 10th, 2014
                                  "With the training of an attorney, the curiosity of an academic, and some fortuitous timing, Aske rode the compliance wave straight through to the CISO role.

                                  The regulatory compliance wave of the late 90s and early 2000s carried unsuspecting people from a variety of professions into a career in information security. Jennings Aske, CISO of Nuance Communications, was one of those who caught the wave -- but not just because he had the good fortune of being in the right place at the right time.

                                  Like many chief information security officers, Aske did not set out for a career in security or even technology..."

                                  Vigilance and the Enterprise of Things (EoT)
                                  Help Net Security, November 11th, 2014
                                  "Most enterprises allow BYOD in their environment, with varying levels of supervision. Typically, these are tablets and smartphones but the number of other Internet of Things devices being brought into the enterprise is on the rise. I like to refer to this as the Enterprise of Things.

                                  Many of the organizations I work with are just beginning to grapple with the implications of this shift, and I think a number of aspects need to be considered as we deal with this new reality. Here is a quick run-down of some of the items to consider..."

                                  Are Fingerprints Pins or Physical Artifacts?
                                  CSO Online, November 11th, 2014
                                  "A judge's ruling that a person can be forced to open his phone with his fingerprint ignores the fact that the fingerprint scan is just a substitute PIN, which can't be required by law enforcement...

                                  In security and privacy circles today, no good deed goes unpunished. Consider Apple's recent privacy initiative. Under its new encryption policy, Apple can't divulge confidential information about its customers' data, because only the consumer's credentials can unlock the data - and those credentials are completely under the control of the customer. For added security, Apple layered biometric authentication (fingerprint) on top, so that people wouldn't have to type their passwords/PINs in public, exposing themselves to the dangers of shoulder-surfing..."

                                  A Holistic Approach to Protecting Intellectual Property
                                  Help Net Security, November 10th, 2014
                                  "Protecting intellectual property (IP) is high priority for security professionals, but IP can be a vague term. What exactly is included under the umbrella of IP? And what's the best way to protect IP within an organization?

                                  Intellectual property goes beyond pre-patent data; it's an all-inclusive term that includes projects in every department, sales campaigns and earnings details. It truly is not just one thing - it's almost anything that can give you a competitive advantage. Typically, IP data itself tends to be unstructured. It's found in documents, drawings, spreadsheets, and emails, and is shared and moved around via personal clouds. Unstructured data is difficult to protect through traditional security products, which are primarily designed to protect structured data. It's a huge problem to even find and specify the IP data to be protected, never mind actually protecting it..."

                                  What Happens When Enterprises Promote Employees with Low Security Iqs?
                                  CSO Online, November 12th, 2014
                                  "I love the new TV show 'Scorpion', which depicts extreme geniuses Walter O'Brien and his team solving high-risk crisis scenarios using nearly impossible solutions. As everyone should know, the real-life Walter O'Brien, whose high IQ and comparable achievements spawned the basis for the TV drama actually identified the brother terrorists who were behind the Boston Marathon bombing, according to CBS, Boston.

                                  O'Brien comes by his intellect naturally. Enterprises are still searching for manmade means to effectively spawn higher Security IQs among employees whose risky behavior welcomes attacks right in the door..."

                                  From Malware to Breach
                                  Dark Reading, November 6th, 2014
                                  "New report maps attack behavior after the initial exploit gets dropped on a machine in a victim organization. Got malware? More than likely you do, but don't panic: The bulk of infections can be traced to standard botnet activity like spamming and click-fraud rather than data theft, a new study of real-world breaches has found.

                                  Targeted attacks that go after a company itself from the get-go actually remain relatively rare: Most malware infections are bulk attacks that cast a wide net, the report says. Some 85% of the attacks that hit the victim organizations in the study were opportunistic, and 15% were targeted. Two percent of the machines hit in opportunistic attacks were spreading bot malware to other machines in the victim organization..."

                                    Taking Aim at Passwords
                                    Bank Systems and Technology, November 13th, 2014
                                    "MasterCard today announced that is co-creating, along with Visa, a new authentication standard in online payment security, featuring invisible authentication and far fewer prompts for passwords.

                                    According to MasterCard, the new approach will result in far fewer password interruptions at the point of sale. In the event that an authentication challenge is needed, cardholders will be able to identify themselves with the likes of one-time passwords, or fingerprint biometrics, rather than committing static passwords to memory, the company said..."

                                    Hackers are Targeting Execs on the Road Through Hotel Networks
                                    ComputerWorld, November 10th, 2014
                                    "For the past four years a group of sophisticated hackers has compromised the networks of luxury hotels to launch malware attacks against corporate executives and entrepreneurs traveling on business in the Asia-Pacific region.

                                    The cyberespionage group, which researchers from Kaspersky Lab dubbed Darkhotel, operates by injecting malicious code into the Web portals used by hotel guests to log in to the local network and access the Internet, typically by inputting their last name and room number..."

                                      IT - Careers
                                      x
                                      10 Steps To Conquering Information Overload
                                      Forbes, November 14th, 2014
                                      "We've all heard the phrase 'information overload.'

                                      It reminds us of tweets, texts, emails, the endless stream of interesting articles on Facebook, those viral videos we can't help but click on, the numerous phone photos and videos we take, Secret posts, fleeting Snapchat photos and more.

                                      But actually the cognitive flood can be even simpler than that, says Daniel Levitin, McGill University psychology professor and author of 'The Organized Mind: Thinking Straight in the Age of Information Overload'..."

                                      Power Career Moves That Will Get You Noticed
                                      Forbes, November 13th, 2014
                                      "Sometimes the classics just don't mesh with modern-day reality.

                                      Take, for example, Benjamin Franklin's famous musings on the formula for success: 'Early to bed and early to rise, makes a man healthy, wealthy and wise.'

                                      That may still be true ... for some of us. But in today's fast-paced, 24-hour economy, the words of a man who lived over two centuries ago don't necessarily apply to today's ambitious professionals.

                                      Enter Lauren Maillian Bias, a serial entrepreneur who's making waves in the business world-and redefining what it means to kill it in any career..."

                                        10 Smart Tech Toys for Kids
                                        Information Week, November 11th, 2014
                                        "The holiday shopping season has arrived, and whichever cultural/religious/atheistic tradition you follow, it probably involves an exchange of gifts. Unless, of course, you celebrate Festivus. Sadly, many of us aren't fond of the season's gift-buying rituals and the stresses they bring. A 2013 survey commissioned by Staples Canada of more than 1,500 Canadian adults showed that 89% of holiday gift buyers admit to having problems buying presents for at least one person on their shopping list. And half of gift givers find it hard to buy presents for a very basic reason: they run out of ideas..."
                                          Control over Personal Info Nearly Dead
                                          ComputerWorld, November 12th, 2014
                                          "Internet companies have run amok with our personal data, and people aren't entirely sure what to do about it, judging from the results of a new survey.

                                          More than 90 percent of Americans feel they've lost control over how their personal information is collected and used by companies, particularly for advertising purposes, according to the results of a survey by the Pew Research Center, published Wednesday.

                                          Eighty percent expressed concern over how third parties like advertisers accessed the data they share on social media sites. Pew did not gather the names of which sites specifically respondents meant..."

                                            IT - Social Media
                                            x
                                            Secure Your 2015 Social Marketing Budget Now
                                            Forrester, November 12th, 2014
                                            "The 2015 budgeting season is underway, and my colleague and Research Associate Mike Carpenter has provided some excellent guidance on how to secure the resources you will need to run your 2015 social marketing programs:

                                            Say the words social media marketing in a budget meeting and C-suiters immediately flip on their ROI blinders. Many marketers assume that executives will just 'get' social, but lack of organizational buy-in continues to limit funding for social marketing programs. Thankfully there is a way to secure your budget just in time for 2015: speak in a language executives understand by building a business case for social..."

                                              Facebook Experiment Points to Data Ethics Hurdles in Digital Research
                                              SearchDataManagement, November 14th, 2014
                                              "A controversial Facebook research study that came to light this year provides fodder for discussions on the ethical issues involved in digital experimentation efforts...

                                              Digital experimentation is a flowering field. But a Facebook experiment that came into the public eye earlier this year has cast a harsh light on the practice.

                                              Many people see the Web as a big laboratory for research, it's true. But digital experimentation will not get a free ticket to ride. Ethics issues -- ones that may come to affect the work of data management and analytics professionals -- lurk in the fabric of the new techniques..."

                                              IT - Compliance
                                              x
                                              IT Compliance Strategies for Mainframe Applications
                                              Network Computing, November 11th, 2014
                                              "Organizations face a host of challenges when updating their core mainframe applications for compliance. Here are some ways to reduce IT compliance costs.

                                              The mainframe remains fully entrenched in today's core business operations. In a 2014 Vanson Bourne survey of global 590 CIOs and IT directors, respondents expect their organizations to continue relying on mainframe applications for another 10 years. However the majority (81%) of CIOs find it difficult justifying the expense of maintaining core mainframe applications, and 51% admit that, as a result, their businesses are exposed to compliance and risk issues..."

                                                9 Tips for Maintaining PCI Compliance
                                                IT World Canada, November 11th, 2014
                                                "Version 3.0 of Payment Card Industry's data security standard (PCI DSS) comes into effect Jan. 1, 2015. Most organizations should be prepared by now. But they also have to be ready to maintain compliance - and not just with a once-a-year assessment. We've borrowed from the PCI best practices guide to offer these tips on how to stay on top. For details read the guide. But remember, compliance alone won't prevent intrusions. All images from Shutterstock.com..."
                                                Storage
                                                x
                                                Designing a Robust Deployment Architecture for Storage Repositories
                                                By PoorFrodo

                                                PoorFrodo, an Oracle blogger, writes, "Getting your storage repositories right is one of the more important aspects of planning and deploying Oracle VM. Throwing everything into one or two different storage repositories is not very robust nor is it conducive to backups, routine maintenance, high availability or disaster recovery. Conversely, allocating a storage repository for each individual Oracle VM guest is not scalable or practical.

                                                You need to put some thought into the way you design and deploy Oracle VM storage repositories to gain maximum flexibility, scalability and recoverability. So, here are a few things to think about..."

                                                IT - Backup
                                                x
                                                Big Data: A Backup Nightmare?
                                                Network Computing, November 6th, 2014
                                                "Big data presents data protection challenges, but an enterprise can avoid problems by putting a priority on availability and making sure the data center is updated to modern standards. As the technology landscape changes, some things remain the same. In particular, the need to protect data is a timeless duty that is expected for the modern data center.

                                                The investments companies have put into the data center are really the only way they can satisfy new demands from end users..."

                                                IT - Mobile
                                                x
                                                12 Surprising Ways Personal Technology Betrays your Privacy
                                                CSO Online, November 6th, 2014
                                                "It's not just your boss or the government that's spying on you, it's also the devices and technologies you embrace...

                                                Our great privacy fears tend to be centered around others invading out privacy, whether it's Google reading your email, your boss monitoring your computer use, or the NSA eavesdropping on phone calls.

                                                The problem is, we don't think about the very technologies we voluntarily embrace and what kind of snooping they do, and they do a lot of tracking. Some of it can and is used for benign or helpful reasons, but that can be turned against you very fast.

                                                Here are 12 ways your personal technology is betraying your privacy..."

                                                IT - Big Data
                                                x
                                                Build vs. Buy: What's the Best Solution for My App Analytics?
                                                Business 2 Community, November 9th, 2014
                                                "There is something inordinately tempting about having complete control over the creation of your analytics platform.

                                                But then again, few things compare to having a team of experts do it for you.

                                                Thus the ongoing dilemma of build vs buy - particularly, when it comes to an analytics solution. Because of the prevalence of analytics today, it can often seem that the best option is to invest in creating a platform custom to your needs (it can't be that difficult, right?). This is a completely valid approach, and it simply means you think the best possible solution is one that's built internally. But what about the potential negatives to this approach? These are the elements that can be overlooked at the onset, and only become apparent after you've already invested too much time, money and resources..."

                                                Where do Big Data, Internet of Things Intersect?
                                                Information Management, November 7th, 2014
                                                "What if two of the biggest technology trends -- Big Data and the Internet of Things (IoT) -- actually converged or intersected? Actually, they are -- spanning everything from kitchen appliances to smart buildings. Not by coincidence, technology giants and startups are seeking to help data chiefs, CIOs and CFOs make sense of the convergence..."
                                                Overcoming Big Data security obstacles
                                                Help Net Security, November 7th, 2014
                                                "When it comes to security, Big Data can be the cause of many obstacles. As Big Data often contains enormous quantities of personally identifiable information, privacy becomes a very real and primary concern.

                                                The consequences of a security breach affecting Big Data can be more devastating than the consequences of other breaches as it will affect a significantly larger group of people. As a result, not only will the damage be reputational, but there will also be significant legal ramifications that an organization then has to deal with..."

                                                Big Data Survey: Trouble Brewing for IT
                                                Information Week, November 10th, 2014
                                                "Just 30% of respondents say their companies are very or extremely effective at identifying critical data and analyzing it to make decisions, down from 42% in 2013. What gives?

                                                The more you know, the more you know what you don't know. This year's InformationWeek Big Data and Analytics Survey stands as a prime example of that adage

                                                We see companies moving in a positive direction on some fronts -- they're integrating more with external data sets, expanding their use of analysis tools, and focusing more on customer data. However, this progress is tempered by a disturbing shift..."

                                                Leveraging Three Tiers of Health Data
                                                Information Week, November 11th, 2014
                                                "Terry Fouts, M.D., is the chief medical officer of Emeryville, Calif.-based analytics vendor MedeAnalytics. Fouts' medical executive career follows a 19-year career as a practicing internist. He recently spoke with Health Data Management about the current state of analytics, including the integration of data from outside the clinical domain..."
                                                Top10
                                                x
                                                Top Ten Articles for last few Issues
                                                Vol 201 Issue 1; Vol 200 Issues 1, 2, 3,4 and 5; Vol 199 Issues 2,3 and 4
                                                We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                • Solaris 9 exiting Extended Support period
                                                • Unix: Catching up with Unix errors
                                                • Oracle FS1-2 Flash Storage System
                                                • New Logzilla Drives for the Oracle 7000 ZFSSA
                                                • vBeers @ Broward - Funky Buddha - Wed Nov. 12th
                                                • Oracle Announces Latest Release of Oracle Database Appliance Software
                                                • Oracle Virtual Technology Summit Kicks Off November 18
                                                • Live Webcast on Oracle VM Built for Enterprise Applications Optimized for Oracle
                                                • Come and learn how Northumbrian Water embraced Oracle's Mobile Framework
                                                • Large Enterprises View Business Transformation as Essential to Ability to Compete

                                                The longer version of this article has list of top ten articles for the last 8 weeks.

                                                  IT - Encryption
                                                  x
                                                  The Best Secure Messaging Apps that Protect You from Surveillance
                                                  ComputerWorld, November 10th, 2014
                                                  "If you use Skype, SnapChat, Facebook chat, WhatsApp, or Google off-the-record chat, then it's time for you to rethink your digital communications strategy and switch to other more secure messaging programs that better protect your privacy. The EFF evaluated 39 messaging products and provided a Secure Messaging Scorecard to show which ones are easy to use yet secure enough to keep the government from snooping on your messages..."
                                                  LibreOffice
                                                  x
                                                  LibreOffice 4.3.4
                                                  fourth minor release of LibreOffice 4.3 "fresh" family
                                                  The Document Foundation announces LibreOffice 4.3.4, the fourth minor release of LibreOffice 4.3 "fresh" family, which is a stable release of the more advanced version of the software, and is targeted to users focusing on features. LibreOffice 4.3.4 contains over 60 bug fixes.

                                                  People interested in technical details can find change logs for LibreOffice 4.3.4 here.

                                                  Download LibreOffice

                                                  LibreOffice 4.3.4 "Fresh" is immediately available for download.

                                                  LibreOffice users, free software advocates and community members can support The Document Foundation with a donation at http://donate.libreoffice.org

                                                  Developer
                                                  x
                                                  Oracle Solaris Studio 12.4
                                                  Dramatically Improves Developer Productivity
                                                  Oracle Solaris Studio 12.4 enables developers to generate higher performing, reliable, and secure applications in record time. The latest release of Oracle's #1 C, C++ and FORTRAN development environment for Oracle systems includes dramatically enhanced software analysis tools to help developers optimize application performance and quickly identify memory errors for improved application reliability. It also includes enhanced standards-based, high performance compilers with advanced optimization capabilities, resulting in the best application performance on Oracle's newest SPARC and x86 systems.

                                                  Oracle Solaris Studio is included in Oracle's Software in Silicon Cloud and uses the Software in Silicon Application Data Integrity (ADI) feature to help developers find and fix memory errors with minimal overhead.

                                                  Oracle Solaris Studio 12.4 is free to download from the Oracle Technology Network site.

                                                  Networking
                                                  x
                                                  Oracle to Showcase Carrier Ethernet 2.0 Network-as-a-Service Orchestration
                                                  With Full Business System Integration
                                                  Oracle and InfoVista have been selected to demonstrate 'CE 2.0 Network-as-a-Service (NaaS) Orchestrated and Assured' at the Metro Ethernet Forum's Global Ethernet Networking (MEF GEN14) event's Proof of Concept Showcase. Taking place November 17-20 in Washington D.C., the showcase is the focal point of the GEN14 event and will highlight leading-edge implementations of dynamic cloud-centric services featuring innovations in software-defined networking (SDN), network functions virtualization (NFV), service orchestration, and automated provisioning.
                                                  Security
                                                  x
                                                  Oracle-Sponsored Study Highlights the Need for More Vigilant Enterprise Database Security
                                                  81 percent see privilege abuse and human error as the greatest risks to enterprise data
                                                  Data breaches cost organizations millions, damage their reputation, and result in lost customers and business opportunities. A new survey of 353 Independent Oracle Users Group (IOUG) database and IT professionals examines the state of enterprise database security, where the biggest risks lie, and how organizations can improve upon their security strategies.

                                                  The Independent Oracle Users Group (IOUG) has released a global survey titled DBA - Security Superhero: 2014 IOUG Enterprise Data Security Survey.

                                                  The survey, conducted by Unisphere Research and sponsored by Oracle, polled 353 IOUG database security managers, database administrators, and directors or managers of IT in companies spanning various industries including IT services, government, education, utilities, transportation, and financial services...

                                                  Oracle at Gartner Identity and Access Management Summit
                                                  Dec 2nd - 4th, 2014 in Las Vegas
                                                  As organizations consume an increasing number of mobile and cloud apps, identity management becomes fragmented. Organizations have inconsistent access policies and lose visibility into who has access to what. To avoid these risks and costs, they are increasingly adopting a strategy of extending enterprise identity services to the cloud. This presentation explores how organizations are using Identity Management to give users access to all their data from any device while providing an intelligent centralized view into user access rights across mobile, cloud and enterprise environments. See how Oracle Identity Management can securely accelerate your adoption of mobile and cloud applications.
                                                  Nexenta News
                                                  x
                                                  Join Nexenta & VMware for Key Insights into the Software-Defined Hyper-Convergence Story
                                                  Nov 19th Webinar: 8AM PST, 11AM EST, 4PM UK, 5PM CET
                                                  Join Nexenta & VMware on November 19, at 8 AM PST for the complete software-defined hyper-convergence story.

                                                  Learn more about how Virtual SAN & file services fit in your environment, the Nexenta & VMware partnership, the opportunities associated with Software-Defined Storage offerings, and how your business can benefit.

                                                  During this webinar, Rawlinson Rivera, Sr. Technical Marketing Architect at VMware, and Michael Letschin, Director, Product Management, Solutions at Nexenta will discuss:

                                                  • The simplified storage provisioning and management of VMware Virtual SAN's high performance hypervisor-converged storage

                                                  • The extension of VMware Virtual SAN to VMware EVO: RAIL, which combines compute, networking, and storage resources into a hyper-converged infrastructure appliance to create a simple, easy to deploy all-in-one solution

                                                  • How NexentaConnect for VMware Virtual SAN adds value by offering file services, snapshots, and self-service file recovery for VMware Virtual SAN

                                                  • How Nexenta's Software-Defined Storage solutions can serve a wide variety of workloads and business-critical situations

                                                  Register

                                                  Level3 News
                                                  x
                                                  Centauro Boosts Online Technology Infrastructure with Level 3 Services
                                                  Key selling point: Level 3's global network
                                                  Level 3 announced an agreement with Centauro, a large sporting goods retail chain in Latin America, for dedicated Internet services and a private Local Area Network (LAN).

                                                  To support recent growth in regional markets, Centauro needed to update its technology infrastructure and services.

                                                  A key selling point for Centauro was Level 3's global network. Every Level 3 data center is located directly on its backbone and is carrier neutral. The network allowed Centauro to reduce latency issues and costly metro access while at the same time providing a secure and redundant solution for Centauro's various locations to share important data.

                                                  Private Cloud Connectivity Comes of Age at AWS re:Invent
                                                  Network Plays Critical Role In A Successful Cloud Strategy
                                                  Level 3 Communications launched its Level 3 Cloud Connect Solutions nearly one year ago. In that time, the company has seen a major transformation in the way businesses are thinking about the network strategy required to successfully migrate and operate IT infrastructure and apps in the Cloud.

                                                  AWS re:Invent 2014 is powered by Level 3 Communications

                                                  At this year's AWS re:Invent, Level 3 will provide the high performance network connectivity needed to bring AWS Direct Connect, live, to the show.

                                                  AWS Direct Connect will power the Test Drive Showroom and an ongoing demonstration of Amazon Workspaces, as well as showcase the AWS Management console vCenter plug-in that enables the transfer of VMware workloads into AWS over Direct Connect.

                                                  Trending in
                                                  Vol 231, Issue 3
                                                  Trending IT Articles