News about Oracle's Solaris and Sun Hardware
System News
Nov 17th, 2014 — Nov 23rd, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 201, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

And Two Become One:
The Convergence of Social & Mobile
Amy Sorrells writes, "By now everyone should understand the importance of all things mobile. Yesterday at the annual WOMMA Summit, Terry City from BuzzFeed said the following that quickly garnered lots of Twitter love: 'If it doesn't work on mobile, it doesn't work.' And with every new smartphone sold this becomes increasingly right on.

The shift to social media being consumed on mobile devices is very real. But many brands' existing strategies are based on the wrong assumption that social is still a desktop/laptop thing. Do people still use desktops and laptops for social networking? Of course they do. It's just that social media usage is rising and it's being driven by the proliferation of smartphone adoption.

And it is not just social activities; mobile is driving changes across many behaviors from shopping to service to search..."

    Are Two HPs Better Than One?
    By kgee
    HP recently announced plans to split into two separate companies. One company will target enterprise customers (data center infrastructures), the other will focus on the client side (consumers). This move has sparked a series of questions among financial and industry analysts alike: What will it mean to customers who currently hold enterprise agreements or other company-wide contracts with HP products and services? HP stated the goal to split the company was to become profitable again, however, very few details were provided around HP's planned execution. "This would not have been possible three years ago," Whitman said, referring to a proposal to spin off PCs in 2011.
    Oracle CEO Mark Hurd: Make HR A Real-Time Application
    Forbes, October 20th, 2014
    Michael Hickins writes in Forbes, "If a company's survival hinges on the ability of its people to execute against a well-conceived strategy, then its fate depends to a huge extent on its ability to attract, retain, and motivate the best people for the job."

    "Talent is at the core of success," Oracle CEO Mark Hurd told an audience of human resources executives on November 18 at a conference in London, England. Hurd rejected the notion that companies need to hire "the best" people generally-but said one of his primary responsibilities as CEO is to ensure the company hires "the best people for what I have to do."

    "I have to be able to articulate generally the skills we need, and that needs to trickle throughout the organization," he said...

    SPARC M7 - Security in Silicon (SIS)
    The M7 chip completely changes the game
    Angelo writes, "One of the very interesting feature on the M7 Processor is something we are calling Software In Silicon (SiS). The ultimate software optimization is putting the software feature directly into Silicon. To get an overview of SiS listen to Juan Loaiza our Sr. VP of technology speak about it at OOW 2014 In the next series of posts I plan on talking about the various SiS features in the M7 chip. In this post we will talk about Application Data Integrity - ADI

    SPARC M7 - Security in Silicon

    Today's hackers have been busy finding ways to exploit points of vulnerability in application. Every week we hear of some popular company loosing data through Data Breach. Famous viruses like Heartbleed SSL virus have been making headline news. One of the more popular exploits uses buffer overflow. Application developers often do not check sizes of function arguments. Hackers exploit this to over write or read past memory buffers. Many software based solutions have been proposed to help guard from these types of attacks. The problem with a software based solution is the very high overhead - often 80X - 100X times slower. No production environment can take this type of overhead..."

    Siemens Teamcenter Optimized with Oracle SuperCluster
    Recently Siemens achieved Oracle SuperCluster Optimized status
    Siemens PLM Software is a world-leading provider of product lifecycle management (PLM) software, systems and services. It has over nine million licensed seats and 77,000 customers worldwide. Siemens' Teamcenter is one of the world's most widely used digital lifecycle management software.

    Recently Siemens achieved Oracle SuperCluster Optimized status after testing and tuning Teamcenter 10.1 on Oracle SuperCluster with Oracle Solaris 11, Oracle WebLogic Server 12c, Oracle Database 11g Release 2 and Oracle Database RAC.

    Siemens wanted to define an integrated architecture that would address PLM requirements for large Automotive, Aerospace, and other manufacturing companies and provide scalability to support the anticipated growth of number of users without any degradation in the performance characteristics...

    Oracle VM VirtualBox 4.3.20 Released
    maintenance release
    Oracle VM VirtualBox 4.3.20 has just been released. This maintenance release of VirtualBox 4.3 improves stability and fixes regressions.

    For more details see the ChangeLog, or just simply download it now at the community or Oracle download sites.

    IT - Storage
    Is Storage Management Overload Making IT less Relevant?
    Storage Switzerland, November 20th, 2014
    "IT administrator 'overload' is becoming the new norm for many organizations. Flat or declining IT budgets combined with accelerated data growth and an increasing demand for new business application services is putting many IT organizations in a quandary: How to meet the needs of the business while maintaining existing staff levels and keeping a lid on costs.

    So Many Silos, So Little Time

    Across many organizations it is not uncommon for one or two IT administrators to manage multiple silos of infrastructure. These administrators often juggle the responsibilities of managing application systems, virtualized environments, networking resources, storage and data protection. The challenge is that these individuals are constantly busy..."

    Enterprise Hybrid Drives: Who Manages the Flash?
    Network Computing, November 13th, 2014
    "Solid-state hybrid drives designed for the enterprise seem like an attractive option for boosting performance, but they come with management challenges.

    At the end of a recent seminar, an audience member asked how I felt about enterprise hybrid disk drives. Could vendors, and even users, boost the performance of their disk arrays by replacing their 600 GB HDDs with 600 GB solid-state hybrid drives (SSHDs)?

    Before answering the question, let's look back at the evolution of the SSHD. Like a hybrid storage system, a hybrid disk drive combines multiple storage media to deliver a price/performance proposition better than flash or spinning disks alone..."

    RAID Redefined
    Network Computing, November 19th, 2014
    "Even though the storage market as we know it is based entirely on RAID, it's become fashionable in recent years for storage vendors to proudly proclaim that their shiny new toys don't use old, broken-down RAID, but some other data protection scheme. While it's true that today's multi-terabyte drives expose problems with the traditional RAID levels, abandoning the term RAID seems to create more confusion than clarity.

    Instead, I propose that we redefine the D in RAID (redundant array of independent disks) to mean data, or more properly, data objects..."

      Java Technology
      Oracle Java ME Embedded 8.1
      Live on OTN
      Oracle Java ME Embedded 8.1 is live on OTN. This release is an update of Oracle Java ME Embedded 8, including new platforms and features. Application development is supported through the Oracle Java ME SDK 8.1.

      Visit the Java ME documentation portal to study the latest versions of the Release Notes and Getting Started Guides for the following supported platforms:

      • Raspberry Pi Model B (ARM11/Linux)
      • Freescale FRDM-K64F (Cortex-M4/mbed) Developer Preview
      • Microsoft Windows 7 (32-bit or 64-bit)

      The Java ME Developer's Guide is intended for developers who want to build Oracle Java ME Embedded software for embedded devices...

      GlassFish Server Open Source Edition 4.1 Released
      By John Clingan
      GlassFish Server 4.1 Open Source Edition is available for download! This release of the world's first Java EE 7 application server includes multiple new and valuable features and updates. Here is a quick look at what's new:

      Updated Platform Support. This release adds support for Java 8, CDI 1.2, and WebSocket 1.1. GlassFish, the world's first Java EE 7 application server, maintains leading compatibility with the latest Java EE specifications.

      Improved Developer Experience.While GlassFish 4.1 remains an open-source only release, quality and a productive developer experience remain a key focus. GlassFish Server is made up of over 20 sub-projects...

      Java Magazine: The Internet of Things
      Java is everywhere...
      Caroline Kvitka writes, "Java is everywhere. As the Internet of Things (IoT) moves from hype to reality, we're seeing embedded Java used in a wide range of applications, from industrial automation systems and medical imaging devices to connected vehicles and smart meters. In the November/December 2014 issue of Java Magazine, we bring you the latest on Java and the IoT.

      In our interview with Oracle's Henrik Stahl, we discuss the opportunities and challenges that the IoT presents for Java developers, and how changes in Java SE and Java ME (and their embedded versions) make it easier to reassemble and strip down code for smaller devices..."

      Read all about it in the current issue of Java Magazine!

      IT - Technology
      New Cruise Ship a Floating Heaven for Tech Geeks
      Network World, November 19th, 2014
      "Walking up the gangway to board Royal Caribbean's tech-laden Quantum of the Seas, it was hard not to marvel. Across the harbor was Manhattan, and at 348 meters the new ship is almost as long as the Empire State Building is tall. But it's what the ship contains that made my inner geek salivate.

      While most passengers were ogling the food options I checked the speed of the satellite WiFi and tested the raft of other technology onboard - including robot waiters and virtual seascapes - that the company hopes will increase passenger convenience..."

        11 Top Science & Technology Research Labs
        Network Computing, November 18th, 2014
        "Research labs often have formidable missions: Protect and ensure the integrity of the nation's nuclear weapons, address energy challenges, and solve environmental problems. These goals may seem lofty to the average IT organization focused on maintaining the corporate network or building out cloud infrastructure.

        But, oftentimes, the resulting research and development efforts have a trickle-down effect. The technology changes business and life as we know it. The Internet, software-defined networking, and network device interoperability all have their roots in research labs..."

        The 10 Mightiest Supercomputers on the Planet
        Network World, November 17th, 2014
        "China retains top spot for fourth consecutive Top500 list

        It was a familiar top 10 released today by the authors of the twice-annual Top500 ranking of world supercomputers, with most entries largely unchanged from this summer's list. Here's a look at the 10 fastest machines in the world..."

          Coming by 2023, An Exascale Supercomputer In the U.S.
          ComputerWorld, November 19th, 2014
          "The U.S. has set 2023 as the target date for producing the next great leap in supercomputing, if its plans aren't thwarted by two presidential and four Congressional elections between now and then.

          It may seem odd to note the role of politics in a story about supercomputing. But as these systems get more complex -- and expensive -- they compete for science dollars from a Congress unafraid of cutting science funding.

          That political reality has frustrated the supercomputing community, and prompted an effort at this year's big supercomputing conference, SC14, here to educate researchers on the need to sell the benefits of supercomputing to a broader audience..."

            IT - Bitcoin
            Blocksign: Signing Documents on the Blockchain
            Bitcoin Magazine, November 20th, 2014
            "The Blockchain creates and records all digital currency transactions using mathematics.

            The Bitcoin blockchain uses the computing power on Earth to solve these math problems that confirm transactions made using the digital currency Bitcoin.

            As many are familiar with the cryptocurrency Bitcoin, many people still don't understand blockchain's other uses..."

            Hellobit to Launch Service to Cut International Remittance Costs by Up to Half
            Bitcoin Magazine, November 19th, 2014
            "San Francisco based Hellobit today debuted a service distinctly aimed at disrupting the $500+ billion a year money transfer industry used to send money home to families in emerging markets. International remittance is dominated by companies such as Western Union and MoneyGram, and used heavily to send money to India, Mexico, The Philippines and many other countries..."
            Mozilla Now Accepting Bitcoin in Response to User Demand
            CoinDesk, November 20th, 2014
            "Mozilla, the open-source development community behind the popular Firefox web browser, is now accepting bitcoin donations.

            The Mozilla Foundation, the non-profit entity that provides support for the community's broad open-source development, will be partnering with Coinbase to accept bitcoin contributions. The California-based bitcoin services provider announced the deal on its blog, where it reinforced that, per its policies toward charities, it will not charge fees for the donations it processes..."

            SpectroCoin Launches Bitcoin-to-Cash Service in 25 Countries
            CoinDesk, November 20th, 2014
            "SpectroCoin is now allowing its customers to convert bitcoin into cash in 25 countries across Europe and Central Asia.

            The announcement is the latest from the UK and Lithuania-based bitcoin services provider, which added merchant processing to its existing brokerage and wallet offerings in August.

            Speaking to CoinDesk, SpectroCoin CEO Vytautas Karalevi&#269;ius compared his company's newest service to traditional remittance offerings, emphasizing that his company intends to make extending services to the underbanked in its region a core focus..."

            Half Of The World.s Population To Have Internet Access By 2018
            CryptoCoinsNews, November 22th, 2014
            "According to eMarketer, good news is on the horizon for anyone pulling for mainstream digital currency use. Everyone who knows bitcoin also knows that Internet access is a pure necessity for the technology to thrive and in just three years' time, half of the world's population will be online and connected.

            eMarketer revealed that by 2018, 3.6 billion people will be connected to the internet. In 2013, the earth's population was over 7.1 billion people..."

            Bitquest - A Minecraft Videogame With Bitcoin Economy
            CryptoCoinsNews, November 21st, 2014
            "BitQuest is a Minecraft server where you can find and use Bitcoin within the game. This ongoing project will create a public Minecraft server with a Bitcoin-denominated trading system and unique MMORPG (Massively Multiplayer Online Role Playing Game) features.

            The economy in BitQuest is based on the Emerald element. You can mine it or exchange it for other elements, just like currency. You can buy food, armor or even enchanted weapons, it's up to you..."

            World Bank: Bitcoin Is Not A "Ponzi Scheme"
            CryptoCoinsNews, November 19th, 2014
            "People tend to fear things that they don't understand, and will hide behind that fear with blind attacks that sound right, but are just as ignorant, if not more so. Bitcoin clearly does not fall into the definition of a 'Ponzi scheme' at all, and this has been double-checked by what many have called the world's largest 'Ponzi scheme,' The World Bank.

            Kaushik Basu has just completed a 'working research paper' for the World Bank, and while mainly going over the history of said scheme from its origins. Basu, in so doing, felt the need to shine a fairly positive light on Bitcoin, and illuminate how it doesn't fit this paradigm...:"

            IT - FOSS
            14 fabulous open source gifts for the holidays
  , November 18th, 2014
            "The annual gift guide serves up open source gadgets and gifts that kids, adults, hobbiests, and beginners are sure to love and appreciate. Get someone started tinkering with SparkFun's WeevilEye beginner soldering kit. Show your niece how cool programming can be with Adafruit's wearable bracelet. And, don't we all have at least one homebrewer in our lives? For them, check out the BrewPi temperature controller. And that's just to name a few! See the full list of our 14 best gifts for the holidays this year in the article..."
            MySQL November Newsletter
            Webcast: MySQL Performance Demystified,...

            The MySQL November Newsletter is available! Find out upcoming webcasts and events all around the globe, and read technical tips written by MySQL experts at Oracle and in the community. Below are the highlights in this edition:

            • Webcast: MySQL Performance Demystified: Tuning and Best Practices for Developers and DBAs on November 19
            • Webcast: MySQL Replication - What's New in MySQL 5.7 and Beyond on November 25
            • Meet MySQL Experts in Upcoming Events
            • Blog: Monitoring MySQL from Oracle Enterprise Manager
            • New Case Study: SCSK Gains a High-Performance and Scalable Enterprise Database Platform with MySQL Enterprise Edition

            You can read it online.

            MySQL Workbench 6.2.4 GA
            maintenance release for MySQL Workbench 6.2
            The MySQL developer tools team announces 6.2.4 as our maintenance release for MySQL Workbench 6.2.

            MySQL Workbench 6.2 is the new version for the official MySQL graphical development tool.

            MySQL Workbench 6.2 focuses on support for innovations released in MySQL 5.6 and MySQL 5.7 DMR (Development Release) as well as MySQL Fabric 1.5, with features such as:...

            MySQL Enterprise Monitor 3.0.17
            maintenance release with a few new features

            Andy Bang, "We are pleased to announce that MySQL Enterprise Monitor 3.0.17 is now available for download on the My Oracle Support (MOS) web site. It will also be available via the Oracle Software Delivery Cloud in a few weeks. This is a maintenance release that includes a few new features and fixes a number of bugs. You can find more information on the contents of this release in the change log.

            You will find binaries for the new release on My Oracle Support. Choose the 'Patches & Updates' tab, and then choose the 'Product or Family (Advanced Search)' side tab in the 'Patch Search' portlet..."

            Cloud Computing
            Jackson Hewitt Provides 1 Million Training Courses Annually
            Delivers Consistent, Efficient Support with Flexible, Scalable Cloud Solutions
            "Oracle's software-as-a-service platforms - Oracle RightNow Cloud Service and Oracle Taleo Learn Cloud Service - work very well in our highly seasonal and geographically dispersed business. We've gained highly scalable, flexible, robust, and available solutions that we can access with an affordable, pay-as-you-go approach." - Tim Bechtold, Vice President of Customer Service, Jackson Hewitt Tax Service Inc.

            Read the entire Jackson Hewitt's Customer Success Story with Oracle Service Cloud here.

            Oracle Helps Midsize Organizations Quickly and Easily Migrate to Oracle Sales Cloud
            New Oracle partner solutions streamline CRM migration for midsize organizations by reducing complexity, cost, and business downtime

            "The rise of the always-connected customer, third-party data providers, and data-driven marketing has significantly increased the amount of customer data available to sales teams. To capitalize on the opportunities this wealth of data presents, growing midsize organizations often need to migrate to more advanced customer relationship management (CRM) solutions that can use the data to increase sales and optimize efficiency through enhanced mobility, analytics, partner relationship management, and industry-specific capabilities. Oracle's new Oracle Accelerate for Oracle Sales Cloud simplifies and streamlines such migrations, enabling partners to help customers quickly and easily transform their sales operations with Oracle Sales Cloud..."

            IT - Cloud
            Cloud Computing's Not-so-Secret Mission
            Network World, November 18th, 2014
            "There is no denying that the cloud and cloud computing have changed the way many of us are doing business. You only had to attend last week's sold out AWS re:Invent conference in Las Vegas to see the cloud out in force.

            But as the cloud matures, we are seeing another layer of cloud computing that promises to shake the foundation of our IT infrastructure to its core - the advent of IT-as-a-Service, which will be perhaps the cloud's highest calling..."

            How to make hybrid cloud computing pay-off
            GIGAOM, November 21st, 2014
            "One of the big themes at AWS Re:Invent was that fact that AWS is moving fast to support hybrid cloud computing. Of course, AWS has no aspirations to purchase or build a private cloud (not counting the CIA cloud). Instead, they want to support more hybrid options using partners, and creative technology approaches such as VPC (virtual private clouds).

            It's no secret that most enterprises are moving toward hybrid and multi-cloud computing. In some cases, there is a clear business case. Other times, it just seems like 'hybrid' is the approach that gives an enterprise the most options and the most control..."

            Applying Data Quality Rules is a Job for Users -- And Data Virtualization
            SearchDataManagement, November 20th, 2014
            "Whose responsibility is it to ensure data quality? Despite the desire for a simple solution, the answer to that question remains complex.

            Even in a constrained environment with only one method of inputting data and one channel for viewing that data, you could propose four alternatives: Make the data creator or supplier responsible for ensuring data inputs adhere to an organization's data quality rules before committing them to the target system; make the system owner responsible for ensuring data meets the quality rules once it has been loaded into the system; make the system owner responsible for ensuring the rules are observed before information based on the data is presented to end users; or make the users responsible for ensuring data complies with the rules before using the presented information..."

              Information Overload: Beyond Better Filters
              Business 2 Community, November 17th, 2014
              "Six years ago, NYU professor and author Clay Shirky, affirmed that 'the problem is filter failure, not information overload.' The problem of having more information around than what we can possibly process has been with us since ancient times. As long as we can have good filters to separate the good from the bad, having more information is better than its alternative: not having enough information.

              Many people disagreed with him, including Nathan Zeldes, who wrote a passionate piece back in 2010, entitled 'Yes it IS Information Overload, Clay Shirky, not only Filter Failure':...

                IT - CxO
                Enter the Digital Risk Officer (DRO)
                Dark Reading, November 10th, 2014
                "In the brave new world of digital risk management, a CISO would report up to a DRO who manages risk from a business perspective and works with peers in business ops, compliance, and IT security.

                The business processes in the enterprise and in government organizations have become "digital" at an accelerated pace in the past few years. In most industries, many functions that were conducted on premises or were paper-based are now being performed online via digital processes. While this trend has led to a dramatic improvement in productivity, it has also led to a new set of risk factors that extend beyond the familiar threats to traditional IT systems..."

                CMOs And CIOs: A Couple Still In Need Of Therapy To Reach Power Status
                Forrester, November 20th, 2014
                "A new pneumonia virus first infected a few people in China in November 2002. A scant seven months later, the virus known as SARS had infected more than 8,000 people in 26 countries and caused 774 deaths. The international medical community mobilized: Within one short month, it discovered the virus that caused SARS, completed its genetic sequencing, outlined its modes of transmission, and communicated guidance for managing the outbreak.

                How did this happen so fast? The power of collaboration. A network of 11 laboratories in nine countries came together and collaborated to identify the cause of SARS and how best to combat it..."

                  Adapt to the End of 'Imperial IT' or Risk Becoming Irrelevant
                  TechRepublic, November 18th, 2014
                  "With massive budgets and talk of "legacy" technologies, it's sometimes difficult to remember that corporate IT is still a relatively young business function. Workers nearing retirement age likely recall a time when IT did not exist, and the invention of the IT leader, in the guise of CIO or CTO, is even newer. There's still rigorous debate in IT leadership circles about who the CIO or CTO should report to, what their ultimate responsibility is, and if they're even needed at all..."
                  What CIOs Can Learn from the Biggest Data Breaches
                  CIO, November 12th, 2014
                  "We keep hearing about them in the news. The tallies are astounding: 145 million user accounts compromised here, 40 million credit cards stolen there. What isn't always as clear with the most high-profile data breaches is how they occurred in the first place and what you can do to prevent seeing your organization in a similar headline..."
                    4 Rounds of Interviews? It Shows how Screwed Up Your Hiring Process Is
                    TLNT, November 14th, 2014
                    "I had a client recently that was undecided about a candidate after the fourth (4th) round interview.

                    They were thinking that maybe a fifth round would make the difference. I told them that it wouldn't. In fact, it was a mistake to allow them to get to four.

                    Do you know what the fourth round interview says about your hiring process?

                    It says that your process is broken.

                    No one needs four rounds of interviews to decide if a candidate is the right candidate for your organization. A fifth round, or any number higher, is just adding insult to injury..."

                      What are the Keys to Effective Leadership?
                      Government Technology, November 18th, 2014
                      "Leadership implies authority, but I've always found that, in the long run, leadership that is effective comes from legitimacy. In other words, you have to deliver to your customers, to the team you lead, to the businesses you interface with. The authority that allows you to be an effective leader is the authority that people give you based on your legitimacy. People don't want to follow someone that they don't think has their interests at mind, whether they are your direct reports or your customers..."
                        Growing a Business: Double, Double, Toil and Trouble
                        ComputerWorld, November 18th, 2014
                        'Our plan is to double in the next year.'

                        'We are growing rapidly and looking to hire the best engineers.'

                        'We have funding and are poised for rapid growth.'

                        "I hear statements like these all the time. Growth can be a wonderful thing. It means that someone likes your products or services. It means that money is coming in, or at least that investors are reasonably sure that money will be coming in. And if growth comes, it means that your team is strong. While there may be some tension, basically everyone is working well together..."

                          5 things that prepare the CIO for innovation
                          GIGAOM, November 17th, 2014
                          "Amazon held their annual re:Invent conference in Las Vegas. Gigaom's Barb Darrow summarized her Top-5 lessons learned from the conference here. Specifically for CIO's, there were a number of things coming from the conference that every CIO should take note of. One of those is to prepare for innovation. It is not a matter of if; it is a matter of when.

                          Innovation is not a destination, but rather a journey. The path is not always rosy and presents a number of challenges along the way. The upside is an outcome that positions the CIO, the IT organization and ultimately the company in a unique position among their competitors.

                          There are a number of core items that prepare the CIO for advancing down the innovation path:..."

                          How to Be the CIO of Tomorrow
                          CIO, November 18th, 2014
                          "The future of the CIO is perched precariously on the branch of relevance. In other words, the CIO can soar on the wings of massive transformation, helping companies become world-class digital businesses. Or CIOs can topple under this pressure and be "usurped" by a CIO capable of leading this transformation, says Forrester.

                          Today's CIO must be a natural leader, fast and agile, says CIO Kevin Griffin at GE Capital International. Technical skills and traditional IT services will take a back seat to emerging digital business technologies in social, mobile, analytics and the cloud..."

                          4 Ways Your Competitors are Stealing Your IT Talent
                          Network World, November 20th, 2014
                          "One of the best places for your competitors to find great talent is within the walls of your company. If your best and brightest have been jumping ship to work for your biggest rival, it's important to know how they're being recruited, why they are being targeted and what you can do to stop it. Here's how your competitors may be poaching your talent..."
                            6 Traits That Make a Great IT Candidate
                            Information Week, November 21st, 2014
                            "Most of IT candidates that make it to an interview are quite qualified, but the one who ultimately gets the job offer must be more than qualified. He or she will have to prove they go beyond expectations and have the right stuff to be an asset to the company. Every day I speak with IT hiring managers in a variety of industries, and regardless of the type of IT role or project, there are six traits that hiring managers routinely say make a great candidate..."
                              Is Rogue IT Really a Problem?
                              Dark Reading, November 17th, 2014
                              "Rogue IT may be a misnomer for the subtleties of IT security's involvement in cloud procurement.

                              As much as security vendors and others promote the idea of there being a massive problem of rogue IT in the enterprise, analysts with CompTIA argue that the way most organizations procure their cloud services is anything but rogue.

                              "Rogue IT has been a big topic, but in our data we don't see that many companies that have a line of business that's trying to avoid the IT department completely," says Seth Robinson, senior director of technology analysis at CompTIA and principal author of a report published recently that supports his argument, the "5th Annual Trends in Cloud Computing."

                              vBeers @ Miami - Biscayne Tavern - Wed Nov 26th
                              6pm - 9pm:
                              This will be not be a sponsored event so bring your wallet and get in the mood for Thanksgiving!

                              Please join us for this vBeers @ Miami and encourage your enterprise IT colleagues to attend as well.

                              Join us for an evening of creating connections and building your network in a relaxed and fun environment.

                              Networking is an essential aspect of your professional growth and development. Connect with an array of professionals while enjoying a drink or two. Who knows, you just may meet your next client, business partner, employer or employee.

                              • Location: Biscayne Tavern
                              • Address: 146 Biscayne Blvd, Miami, FL 33132
                              • Date: Wednesday, November 26th
                              • Time: 6pm to 8pm - arrive and depart any time
                              • Sponsors: This will not be a sponsored event


                              Join us for one of the three South Florida vBeers events. The South Florida vBeers events happen three times a month, once per county:...

                              IT - Networks
                              100 Gbps Headed for the Data Center
                              Network Computing, November 17th, 2014
                              "Growing demand for increased bandwidth in the data center will speed adoption of fast 100 gigabit-per-second interconnects.

                              Data centers across the globe are running at 10 gigabit-per-second (Gbps) speeds and moving to 40 Gbps or 56 Gbps, using InfiniBand or Ethernet interconnects. Although 10 Gbps speed has been in adoption for years and is sometimes viewed as "enough" by companies, the jump to 40 Gbs and 56 Gbs occurred much faster than the industry expected, signaling that 100 Gbps may be needed sooner rather than later..."

                              DARPA Wants to Toughen-Up WAN Edge Networking, Security
                              Network World, November 14th, 2014
                              "Researchers at DARPA will in December detail a new program it expects will strengthen technologies used to support networking and security technologies at the WAN edge.

                              Details of what exactly DARPA is looking add under the new program, known as EDICT or Edge-Directed Cyber Technologies for Reliable Mission Communication, are skimpy but the agency provided the following description: 'The objective of the EDICT program is to bolster the resilience of communication over IP networks solely by instantiating new capabilities in computing devices within user enclaves at the WAN edge. It is envisioned that systems developed within this program will combine real- time network analytics, holistic decision systems, and dynamically configurable protocol stacks to mitigate WAN failures and attacks on the fly, in a mission-aware fashion. Protocols in scope for this program include those at the network, transport, and application layers of the five-layer protocol reference model.'

                              Why We Must Move to IPv6
                              Information Week, November 17th, 2014
                              "Facts are facts: The number of IPv4 addresses available in North America will reach zero soon. In a recent InformationWeek commentary headlined The IPv4 Sky Really Isn't Falling, Lawrence Garvin writes: "We've been hearing for years that we're running out of IPv4 addresses. But we're not running out -- they're not all in use." Garvin asserts that the depletion in IPv4 addresses is artificial.

                              That's simply not true, and I'm here to tell you why..."

                                'Twisted Light' Beamed across Vienna
                                BBC, November 12th, 2014
                                "Physicists have sent a beam of twisted light 3km through the air above Vienna.

                                It is the first time that information has been transmitted outdoors using the "twist" of a visible light beam.

                                This twisting property could allow very fast communication because light with different amounts of twist, encoding separate channels of information, could be sent simultaneously.

                                Reported in the New Journal of Physics, the technique was tested by sending three images of famous Austrians..."

                                  IT - Operations
                                  Room to Grow: Tips for Data Center Capacity Planning
                                  ComputerWorld, November 13th, 2014
                                  "Capacity planning needs to provide answers to two questions: What are you going to need to buy in the coming year? And when are you going to need to buy it?

                                  To answer those questions, you need to know the following information:..."

                                    Are Converged Systems Right for You?
                                    Network Computing, November 12th, 2014
                                    "Converged infrastructure streamlines integration and provides better TCO than traditional systems. However, more economic and flexible converged solutions may be on the horizon.

                                    As we move to commodity - class COTS gear in the data center, the question of who integrates the hardware together comes up. For the enterprise, this can be a daunting proposition, as the current buying mode tends to leave that question to system vendors or third-party contractors.

                                    Most of the large system vendors now offer an alternative: converged infrastructure, which is another way of saying that they deliver all of the hardware -- servers, storage and networks -- pre-integrated. The units can be delivered in a rack ready to go, or built up into containers for more avant-garde customers..."

                                    Tech Hygiene: 10 Bad Habits to Break
                                    Information Week, November 18th, 2014
                                    "Many of us take care of our digital devices -- smartphones, tablets, and PCs -- the way we take care of our bodies, and that's not always a good thing. Like that gym membership, the daily backup utility goes unused. We scarf down burgers and donuts (or your junk food of choice) just as we load up our PCs with performance-crushing bloatware..."
                                    8 Ways to Reduce Unauthorized Software
                                    GCN, November 17th, 2014
                                    "Attackers looking to gain access to government systems and networks are constantly scanning targets for vulnerable software and initiating campaigns to trick users into downloading and executing malicious files.

                                    Unauthorized software increases the attack surface for adversaries, because any software that is not authorized is likely unmanaged, without proper patching, updates and configurations. Moreover, IT managers with incomplete knowledge of their agency’s software cannot fully secure their assets. Unfortunately, preventing and identifying unauthorized software in large government networks is often a formidable challenge..."

                                      IT - Security
                                      Five Security Developments We can Be Thankful for in 2014
                                      CSO Online, November 18th, 2014
                                      "The end of the year usually brings with it the annual tradition of consulting the InfoSec "crystal ball" to create a list of prognostications of doom for the coming year. Let's start a new tradition of looking back at the things that brought improvements in the past year.

                                      It's not often that we take a moment to think about what we in security are grateful for. And as we approach the time of year when all the security gurus bring out their crystal balls and prognosticate what the Big Bad of the coming year will be, I would like to take a moment to think about things that have happened in the past year that have been improvements. As I found so much news from this year to be grateful for, this represents my top five security-specific developments:..."

                                      Getting Your Board.s Buy-In on Cybersecurity
                                      ComputerWorld, November 18th, 2014
                                      "You don't want your first discussion about cybersecurity with your company's board to happen post-breach...

                                      High-profile data breaches continue to make news, and you can bet that your board of directors has noticed. Breaches can result in huge remediation costs, litigation and lost revenues resulting from a damaged reputation. Board members pay attention to those things..."

                                        After This Judge's Ruling, Do You Finally See Value in Passwords?
                                        CSO Online, November 14th, 2014
                                        "Judge rules authorities can use your fingerprint to unlock your smartphone. What that means for authentication and the future of passwords...

                                        Did you know the US legal system makes a distinction between something you have and something you know?

                                        If you lock a safe with a key, the authorities can obtain authorization to take the key (something you have) and open it. However, if you locked the safe using a combination (something you know), that information is protected under your Fifth Amendment right to avoid self-incrimination.

                                        What that means is thats something you have, a key, can be taken and used against you. While something you know, a combination, can ultimately be compelled by a judge. Even then, you have rights -- and a decision -- to comply or not..."

                                          Rethinking Security with a System of 'Checks & Balances'
                                          Dark Reading, November 14th, 2014
                                          "For too long, enterprises have given power to one branch of security governance -- prevention -- at the expense of the other two: detection and response. Now that the midterm election season is over in the US, I've been thinking about how security teams could benefit from their own checks-and-balances model. For more than two centuries, this approach has worked successfully in government. Why not use checks and balances to ensure that all the pieces of a security program work in concert to improve a company's overall defense posture..."
                                          How to Lose Customers with Excessive Security
                                          InfoWorld, November 18th, 2014
                                          "I fired my bank last week because I got tired of getting entangled in security systems that ensured I would be unable to access my online banking for days at a time, especially when I was traveling. My local branch manager said I was hardly alone in leaving the bank, and it's a good object lesson for what happens when security becomes overkill..."
                                          The Top Infosec Issues of 2014
                                          CSO Online, November 17th, 2014
                                          "There is still time for any list of the 'top information security issues of 2014' to be rendered obsolete. The holiday shopping season is just getting into high gear, after all, and everybody knows it was from late November to mid-December last year when the catastrophic Target breach occurred.

                                          But this list is about more than attacks and breaches - it is about broader infosec issues or trends that are likely to shape the future of the industry..."

                                          IT - Careers
                                          IT's 10 Fastest-Growing Paychecks
                                          Information Week, November 17th, 2014
                                          "Mobile, security, and big data will continue to drive IT hiring -- and the highest IT job salary increases -- in 2015, according to a new report from Robert Half Technology.

                                          Its 2015 Salary Guide for Technology Professionals looked at starting salaries for more than 70 tech positions in the United States. Robert Half expects base compensation for IT professionals to jump 5.7% overall, a slight increase over tech salaries last year.

                                          CIO raises, however, fall below the national average, increasing just 4.9% year-over-year, according to the report. John Reed, executive director at Robert Half Technology, said the report methodology does not account for bonuses, which is likely partially responsible. The other reason: budding hybrid roles..."

                                          Holiday Gift Guide 2014: 25 Gadgets that Make Great Gifts
                                          CRN, November 13th, 2014
                                          "With the holidays fast approaching, it's time to figure out the perfect gift to get for friends, colleagues and, of course, members of the family. Tech devices always make great gifts, as there are always new gizmos and gadgets out there that can suit someone you're buying for.

                                          This year, there were many new mobile devices released with great accessories to go with them, in addition to some unique, competitively priced items that would make great gifts and great stocking stuffers.

                                          These days, people love tech, and we got a list of 25 great gadgets and accessories to help you find the best ones to give as gifts for the holidays..."

                                            6 Ways to Nail the Job Interview
                                            CIO, November 19th, 2014
                                            "When Doug Mitchell took over as CEO of direct-sales company Argenta Field Solutions in 2011, he noticed something surprising. He noticed that most Gen-Y candidates, though tech savvy and digitally plugged-in, didn't seem to have a clue about how to dress for, prepare for or conduct themselves in an interview, making his job and the job of his hiring managers difficult..."
                                            Good Leaders Need to Have Good Manners, Too
                                            TLNT, November 19th, 2014
                                            "We are at our best with those random acts of kindness to strangers.

                                            Co-workers and family members don't fare so well. The reasons vary: We take them for granted and think they'll love us anyway. Or maybe familiarity breeds irritability.

                                            Whatever the cause, rudeness has ruined family relationships. And otherwise competent business leaders are disliked and dissed by their staff and peers because they fail to understand that manners matter.

                                            The revival of respect and kindness could revolutionize employee engagement..."

                                              10 Security Mistakes that Will get You Fired
                                              InfoWorld, November 17th, 2014
                                              "From killing critical business systems to ignoring a critical security event, these colossal slip-ups will get your career in deep water quick...

                                              Getting fired from an IT security job is a rare event, but there are certainly ways to ensure or accelerate your own unemployment. I'm not talking about garden-variety mistakes here. After all, most IT workers create or live with lots of little mistakes every day. That's the nature of complex, rewarding work..."

                                              IT - Social Media
                                              How Mature Is Your Social Marketing?
                                              Forrester, November 20th, 2014
                                              "Social marketing is reaching maturity. It is moving past the awkward adolescent stage and is trying to become a responsible adult. But similar to similar to those awkward adolescent years, a social marketing program can take one step forward and one step back. Marketing leaders tell us that developing their social marketing capabilities is frustrating because they make progress in some areas and fall short on some others. And even best-in-class social marketing programs are not immune to development challenges..."
                                                Privacy Is the New Killer App
                                                ComputerWorld, November 14th, 2014
                                                "A funny thing is happening in the wake of the Edward Snowden NSA revelations, the infamous iCloud hack of celebrity nude photos, and the hit parade of customer data breaches at Target, Home Depot and the U.S. Postal Service. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.

                                                But there's a silver lining to the cloud: ..."

                                                  Five Big Social Media Red Flags to Avoid From Potential Hires
                                                  TLNT, November 18th, 2014
                                                  "Does your company use social media screening as part of the recruiting process? If not, consider it.

                                                  Social media can be a useful tool for screening, as detailed in a June TLNT article about candidates rejected based on their public profiles. Only 20 percent of employers examine candidates' social media profiles for screening, according to a survey by the Society for Human Resource Management.

                                                  Of the recruiters that screen via social media, 69 percent rejected applicants based on the content on those profiles..."

                                                  IT - Virtualization
                                                  The Seven Flavors of Virtualization
                                                  Insurance Networking News, November 17th, 2014
                                                  "What exactly is virtualization? Many talk about it in terms of servers, and being able to run multiple operating systems on a single server. Others talk about cloud computing as a form of virtualization. And, lately, there’s been talk about data virtualization, to make it easier to get at information. Virtualization is a broad topic. If you really want to get technical, you could argue that an operating system such as Windows itself is essentially a form of virtualization, since it employs a logical layer to abstract away a lot of underlying commands and connections within your PC or laptop..."
                                                  IT - Email
                                                  Net Neutrality: It's Regulation for the Public Good, Not Government Takeover
                                                  Network World, November 19th, 2014
                                                  "My good friend Chuck Papageorgiou recently wrote a post on his blog he titled Net Neutrality - Policies or Politics in which he argued:

                                                  ... as a capitalist and free-marketer, I have a hard time reconciling the notion that the Government should just take over privately deployed and owned assets without fairly compensating the TelCo's and their shareholders for the investment they have made, and continue to make, in internet infrastructure.

                                                  Despite the fact that yesterday was Chuck's birthday I'm going to disagree strongly with my friend..."

                                                  IT - Mobile
                                                  US Mobile Payments Will Reach $142B By 2019
                                                  Forrester, November 17th, 2014
                                                  "The media frenzy around mobile payments - most recently Apple Pay - has reached fever pitch and led some industry spectators to conclude that a payments revolution is at hand. Not so. The adoption of mobile payments is an evolution - not a revolution - and the evolution is well underway. Although the landscape of mobile payment providers is in an ongoing state of flux, the ecosystem and mobile capabilities are maturing and consumer and merchant adoption is accelerating. Over the next five years, US mobile payments will grow from $52 billion in 2014 to $142 billion by 2019 with both national brands and local merchants. Over the next five years, we can expect: ..."
                                                    Consumers Warming to Alternative Payments
                                                    Bank Systems and Technology, November 17th, 2014
                                                    "But there are still concerns about security, a new survey finds.

                                                    US consumers are still somewhat leery, but also more open than in the past, to using alternative methods of payment, according to a new survey conducted by digital security vendor Gemalto and Kelton Research..."

                                                    Guide to the Top Mobile Payments Options
                                                    Network World, November 12th, 2014
                                                    "The launch of Apple Pay last month jump-started the mobile payments business, with several companies pushing hard to become your preferred payment method in stores. Even more competitors are on the horizon, promising to bring a lot more security and convenience compared to today's plastic payment cards.

                                                    The magnetic-stripe cards currently used in the U.S. are simply not very secure. Your name, card number and expiration date are all encoded on the stripe without protection, and hackers have been targeting payment terminals to steal that data, jeopardizing the security of tens of millions of card holders.

                                                    Banks are racing to introduce more secure, chip-based cards by October 2015, but phone-based systems like Apple Pay and Google Wallet are here now and offer a good deal of convenience and security. But not all mobile payment systems are equal. Here's a look at the major systems out there and how they work:..."

                                                    IT - Big Data
                                                    Enterprises Moving Big Data Workloads to Public Cloud
                                                    ComputerWorld, November 17th, 2014
                                                    "More than half of large enterprises are either already using public cloud resources for their big data analytic needs or plan to do so, according to a report by Gigaom Research...

                                                    It's no secret that many IT professionals in large enterprises look down at public clouds - they don't consider them reliable, secure or safe. But that perception may be shifting, at least when it comes to big data workloads.

                                                    A new report released this week by Gigaom Research finds that 53 percent of large enterprises are either already leveraging public cloud resources for enterprise big data analytic needs (28 percent) or are planning to do so (25 percent). Only 13 percent of respondents say they would only use private data centers for all analytic processes..."

                                                    Bank CEOs Fear Data-Driven Decisions
                                                    Information Management, November 20th, 2014
                                                    "A recent study found that analytics are underused at banks and that senior executives are cold to the technology: a scant 20% said that if it were up to them their organization would be highly data driven.

                                                    The findings come at a time when, oddly enough, banks are investing heavily in analytics software. In an online survey conducted by American Banker/SourceMedia Research, 36% of bankers said they are looking for a new analytics-solutions provider. This was the third-largest category of new spending, just behind regulatory compliance and customer experience..."

                                                    4 Habits of Highly Effective Open Data Portals
                                                    GCN, November 20th, 2014
                                                    "Having a data portal is no longer an option for government agencies: the DATA Act is making it a necessity.

                                                    Fortunately, agencies can take a cue from the business world, which has increasingly adopted data analysis software and other business intelligence tools that allow everyone to be data analysts, rather than letting analysis remain the province of IT specialists. The timing couldn't be better: just as the people (and legislation) are demanding the opening up of data, the technology is there to make it happen.

                                                    Of course, technology can't work wonders on its own. For those working with new data analysis software, here are four characteristics that can help make your agency's data compelling and transparent, while saving time and budget dollars too..."

                                                      Analytics in Sports Gets Growing Front-Office Role
                                                      SearchBusinessAnalytics, November 20th, 2014
                                                      "The trend of using analytics in sports to improve on-the-field performance is continuing to grow, but it's not stopping there. Taking a cue from coaches, managers and trainers, the front-office staffs of some teams are adopting analytics tools to help improve business operations, an application that they believe will provide big off-the-field wins.

                                                      For example, the New York Mets baseball team recently launched an initiative based on technology from SAS Institute Inc. to analyze fan data in order to optimize customer engagement efforts. The team is gathering fan data from its own merchandise website, other team and league sites, and social media channels in an effort to develop a deeper understanding of what fans care about and how to engage them more effectively..."

                                                      Nine Steps to Unlock Big Data's Hidden Value
                                                      Information Management, November 17th, 2014
                                                      "No matter where you look, the numbers on big data are staggering. Among estimates of its potential benefits are productivity-led savings: $300 billion a year for the US healthcare industry; e250 billion for the European public sector; a 60 percent potential increase in retailers' operating margins; and $600 billion in economic surplus for services enabled by personal-location data. However, these are just the early calculations coming in from a few sectors; they could well go higher.

                                                      So, What Exactly Is Big Data?..."

                                                      IT - BYOD
                                                      You're doing BYOD Wrong: These Numbers Prove It
                                                      Dark Reading, November 20th, 2014
                                                      "Almost 40% of users who connect personal mobile devices to corporate networks have no lock-screen mechanism set in place. Just days before National Cyber Security Awareness Month, Bitdefender carried out a study on a representative chunk of Internet users living in the United States to evaluate their attitudes and behaviors related to data security at work.

                                                      This may sound like a quote from Captain Obvious if you work in infosec, but for the sake of the wider readership, I'll still say it: We did not have great expectations on the consumer side, as it is prone to error and to trading security for convenience..."

                                                      Top Ten Articles for last few Issues
                                                      Vol 201 Issues 1 and 2; Vol 200 Issues 1, 2, 3,4 and 5; Vol 199 Issues 3 and 4
                                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                      Top Ten Articles for Vol 201 Issue 2

                                                      • Oracle OpenWorld 2014 Solaris Presentations Now Available
                                                      • Oracle's Java 8 set to shake up the M2M and IoT markets
                                                      • Oracle Linux images for Docker released
                                                      • Compare and Contrast (and mix-n-match) Oracle's SPARC V12N choices
                                                      • Oracle Solaris Studio 12.4
                                                      • A New Look for Oracle Documentation
                                                      • Murex Looks to SPARC Solaris Systems to Provide Value
                                                      • Oracle Sales Cloud Wins Big!
                                                      • SAS Big Data Analytics
                                                      • Developing with Oracle WebLogic Server 12.1.3"

                                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                                        IT - Encryption
                                                        Encrypt Everything, Urges Internet Architecture Board
                                                        Network World, November 17th, 2014
                                                        "The Internet Architecture Board (IAB) has issued a sweeping directive 'for protocol designers, developers, and operators to make encryption the norm for Internet traffic ,' even while acknowledging that such an approach will create major obstacles for some network operations.

                                                        The statement also leaves unaddressed what will be inevitable howls of protest from the law enforcement and national security sectors, whose surveillance activities have long motivated those pushing for ubiquitous encryption..."

                                                        Time to Secure the Web? EFF Says HTTPS Can Soon Be the Norm
                                                        InfoWorld, November 19th, 2014
                                                        "The Electronic Frontier Foundation on Tuesday announced a certificate authority effort to clear roadblocks in transitioning the Web from the HTTP protocol to the more secure HTTPS.

                                                        The initiative, called Let's Encrypt, was assembled by EFF along with Mozilla, Cisco, Akamai, IdenTrust, and researchers at the University of Michigan, said Peter Eckersley, technology projects director at EFF, in a blog post. Plans call for launching Let's Encrypt next summer, with the authority automatically issuing and managing free certificates for any website needing them..."

                                                        IT - Tape
                                                        Will the "Tape is Dead" Folks Please Sit Down?
                                                        Enterprise Storage Forum, November 17th, 2014
                                                        "A storage newsletter that shall go unnamed (we all make mistakes) discussed the dwindling of tape in 2012. Their opinion was that tape was on its way out. They pointed out that backup was moving to VTLs and that this change would be the death knell of tape.

                                                        The article granted archiving as a use case but questioned tape's reliability over disk, and questioned tape's slower access numbers over disk. Finally, the article reported that the only tape maker that was sharing numbers was SpectraLogic because news at other tape vendors was not good.

                                                        Everyone can have a bad day. From the perspective of 2014 here is why the article was largely wrong..."

                                                        New Performance Analyzer Overview screen
                                                        By Darryl Gove
                                                        Darryl Gove writes, "I love using the Performance Analyzer, but the question I often get when I show it to people, is "Where do I start?". So one of the improvements in Solaris Studio 12.4 is an Overview screen to help people get started with the tool...

                                                        The reason this is important, is that many applications spend time in various place - like waiting on disk, or in user locks - and it's not always obvious where is going to be the most effective place to look for performance gains.

                                                        The Overview screen is meant to be the "one-stop" place where people can find out what their application is doing. When we put it back into the product I expected it to be the screen that I glanced at then never went back to. I was most surprised when this turned out not to be the case..."

                                                        NetBeans Podcast 71
                                                        Guests: Mark Stephens, Ernest Duodu, Dorine Flies, Emily Hall, Ken Fogel, John Ceccarelli, Luke Mayell, and Johannes Weigend
                                                        • 00:00 / Opening Chat with Mark Stephens from IDR Solutions
                                                        • 02:47 / Ernest Duodu - Conversation with Dorine Flies, Co-ordinator of EPIK
                                                        • 12:45 / Emily Hall - Conversation with Ken Fogel, Software Development Teacher in Canada
                                                        • 16:50 / Emily Hall - Conversation with John Ceccarelli, Director of NetBeans Engineering
                                                        • 23:40 / Luke Mayell - Conversation with Johannes Weigend, Software Architect at QAWare, Munich

                                                        Download mp3: 28 minutes - 22 mb

                                                        Mobile Security - A Fine Balance Between Usability & Security
                                                        Oracle Mobile Security Suite
                                                        Carlos Chang writes, "Mobile is a new channel that any IT team needs to consider carefully. Enterprise IT teams are familiar with securing access from the Web browser from desktops and laptops within the firewall, and remotely via VPN. But access from mobile devices is relatively new. Especially when its from mobile apps, not just a web browser. An app that in theory is a trusted app. And the smartphones are no longer an IT provisioned mobile device (e.g. the standard Blackberry). Like it or not, it's a bring your own device (BYOD) world.

                                                        You could try to install something that locks down the entire device. And if the device is ever lost or stolen, remotely wipe the device and everything in it. A bit heavy handed perhaps?..."

                                                        Advanced Registration Now Open for new Oracle Mobile Security Primer eBook
                                                        Will provide a deeper understanding of the complex issues related to mobile security
                                                        Eric Renaud writes, "Today, just as organizations are starting to understand the first wave of the mobile revolution, there are now numerous demands being placed on IT to support the second wave as new generation devices and applications are coming online to take advantage of these new capabilities in today's corporate environment...

                                                        The Oracle Mobile Security Primer will provide a deeper understanding of not only the fundamentals, but also the complex issues related to mobile security in today's corporate mobility environment. If you maintain the role of a mobility planner, security architect, CISO, security director, IT director, operations manager or just simply want to stay up on the latest trends around mobile security, then pre-register for this new eBook: Oracle Mobile Security Primer..."

                                                        Nexenta News
                                                        CRN Names Nexenta as an IT Industry Tech Innovator
                                                        Winner in Storage and Virtualization
                                                        Nexenta announced that it has been named one of the industry's leading tech innovators by CRN.

                                                        The Tech Innovator Awards recognize companies and products use innovation to advance technology, increase productivity, and reduce cost and complexity in ways that provide value to the channel. These awards guide solution providers toward today's biggest technology breakthroughs so they can incorporate them into advanced solutions for their customers.

                                                        Nexenta won in two categories: NexentaStor was the overall Storage category winner and NexentaConnect 3.0 for VMware Horizon View and Citrix XenDesktop took top honors in the Virtualization category.

                                                        Each year, CRN honors the high-tech companies that have delivered outstanding innovation in hardware and software solutions over the past 12 months. CRN Test Center editors reviewed hundreds of products across 18 hardware and software categories to determine the winners and those worthy of honorable mention.

                                                        Innovative Software-Defined Storage Solution for VMware Virtual SAN
                                                        Hyper-converged storage solution managed through VMware vCenter on Virtual SAN deployments
                                                        Nexenta announced the availability (GA) of its NexentaConnect for VMware Virtual SAN. The solution, which simplifies and streamlines the provisioning and management of file services on top of VMware Virtual SAN, allows users to create a hyper-converged solution without the need for costly external storage arrays.

                                                        Designed for VMware vSphere environments, VMware Virtual SAN is the first policy-driven storage product that automates manual storage tasks, delivering a more efficient and cost-effective operational model. Taking advantage of the VM-level storage policies, NexentaConnect for VMware Virtual SAN, sits on top of the Virtual SAN automatically and dynamically matching the systems requirements with the correct storage.

                                                        Level3 News
                                                        ProSiebenSat.1 Media AG Selects Level 3
                                                        To Enhance Security and Content Delivery Performance
                                                        Level 3 announced that it has been awarded additional business with the Germany-based media group ProSiebenSat.1. Level 3 will now provide services to the group across four business units: ProSiebenSat.1 Digital, ProSiebenSat.1 Games, ProSiebenSat.1 Produktion and maxdome GmbH.

                                                        The use of Level 3's content delivery network (CDN) and security services supports the ProSiebenSat.1 group in achieving the diversification of revenue streams beyond TV advertising, which is one of its key strategic goals. With fast content delivery to any device and multi-layer security throughout its gaming platforms, the group aims to simultaneously optimise the user experience, protect its key assets and drive revenues.

                                                        Level 3 is providing the following services to these ProSiebenSat.1 business units:...

                                                        Trending in
                                                        Vol 234, Issue 2
                                                        Trending IT Articles