News about Oracle's Solaris and Sun Hardware
System News
Nov 24th, 2014 — Nov 30th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 201, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Synchronizing the switchover of multiple Oracle Solaris Cluster Geographic Edition Protection Groups
Enables two clusters to be linked in a Partnership

Geographic Edition is a management framework which adds Disaster Recovery (DR) functionality to the High Availability that Oracle Solaris Cluster already provides. It enables two clusters to be linked in a Partnership, within which many application protection groups (PGs) can be configured.

Each PG combines control of one or more Oracle Solaris Cluster resource groups (RGs) with control of a data replication mechanism. Switching a PG from one partner cluster to the other results in a controlled shutdown of the application(s) managed by the RGs, a reversal of the replication direction, and a restart of the application(s) at the other partner cluster (the Disaster Recovery site). If the primary cluster has become unavailable due to a disaster, the PG can simply be activated at the Disaster Recovery site to bring the service online there...

Over 10,000 Engineered Systems sold
From Profit Magazine
Oracle CEO Mark Hurd recently announced Oracle sold its 10,000th engineered system. How significant is that milestone? “It’s very significant because it means that you've crossed over from being an early adopter product to a mainstream product in people’s infrastructure,” says John Fowler, Oracle’s executive vice president of systems.

See Special Report: Engineered Systems in Oracle's Profit magazine for details.

Top Exastack ISV partner headlines: SAS
Video of Paul Kent, Vice President of Big Data at SAS
In this video, Paul Kent - Vice President of Big Data at SAS - discusses SAS strategy for Big Data analytics and how Oracle Engineered Systems simplify implementations for customers - Watch video.
Best Virtualization and Life Cycle Management for Private Clouds
Oracle's layered virtualization
Virtualization started as a means for server consolidation in order to obtain better efficiency in IT infrastructure. Cost savings came from increased system utilization and reduced server hardware needed to support multiple workloads. However, as private clouds were increasingly deployed in modern data centers, there has been a sharp increase in the number of Virtual Machines that are managed. Many of these clouds have been architected with a hypervisor model supporting many operating system copies. This model actually creates issues of poor efficiency and high management overhead. In other words, IT managers are back again looking at the issue of how to improve the efficiency in their clouds.

Oracle recognized these challenges early and addressed both efficiency and ease of management with virtualization technologies...

IT - Storage
Molecular Flash Memory could Store Massive Data
PCWorld, November 21st, 2014
"Novel molecules could help flash memory move beyond its storage limits, allowing for massive amounts of data to be recorded in small spaces, according to European scientists.

Metal-oxide clusters that can retain electrical charge and act as RAM could form a new basis for data cells used in flash memory, the researchers from the University of Glasgow's Schools of Chemistry and Engineering and Rovira i Virgili University in Spain wrote in a letter published in Nature.

The group of 13 researchers said that polyoxometalate (POM) molecules can act as storage nodes for MOS flash memory..."

HDDs Now Largely Beaten by SSDs in Term of Capacity
Storage Newsletter, November 25th, 2014
"Now you can find 2.5-inch SSD at 8TB, for example in a recent drive launched by US company Foremay and that brings R/W speeds up to 500MB/s, and random R/W IO/s up to 100,000. During a recent investor webcast last week, Rob Crooke, SVP and GM of Intel non-volatile memory group, said coming 3D MLC NAND drives will allow for 10TB SSDs in two years and even suggest the arrival of 2mm thick mobile units at 1TB..."
Want A 100TB Disk Drive? You'll Have To Wait 'Til 2025
ComputerWorld, November 25th, 2014
"An industry consortium today released a roadmap that new recording technologies could yield 100TB hard drives in about 10 years.

That density, 10 times the capacity of today's biggest hard drives, will be achieved through the use of up-and-coming techniques such as laser-assisted recording technology.

The roadmap, released by the Advanced Storage Technology Consortium (ASTC), indicates technologies such as Bit Patterned Media Recording (BPMR) and Heat-Assisted Magnetic Recording (HAMR) will result in up to 10-terabit-per-square-inch (Tbpsi) areal densities by 2025, compared with today's .86 Tbpsi areal densities..."

    Java Technology
    Java Update and Roadmap
    Java 8, Java 9 and Beyond
    What’s new in Java 8, and what's coming in Java 9? This presentation will cover new features in Java 8, like streams and lambda's, look at what's coming soon in Java 9 and talk about some new and upcoming capabilities in the Oracle Java implementation.

    Video featuring Henrik Stahl

    IT - Technology
    Forget Your Robot Overlords: Watch Out For Lethal Autonomous Systems That Make Mistakes
    Network World, November 22nd, 2014
    "Robot overlords! Pah! The biggest military danger in the near future will be hunter-killer autonomous robots. No, not far-future Terminator-type 'droids but small, cheap bots that will be able to challenge you, figure out if you're us or them, and, if you're not, kill you.

    We've already seen such devices though they've not been cheap nor really smart. For example, 8 years ago Samsung Techwin announced the all weather SGR-A1, 5.56 mm robotic machine gun with an optional grenade launcher for $200,000..."

    NASA Sets huge $5M Cubesat Competition
    Network World, November 25th, 2014
    "NASA this week opened what it called its largest ever prize purse - the Cube Quest Challenge which will offer a package worth $5 million for competitors to build unique propulsion and communications technologies for small, inexpensive satellite systems known as cubesats.

    When it first talked about offering a cubesat challenge in June, NASA said it wanted to focus on building better communications and propulsion technologies for the cube-shaped satellites are typically about four inches long, have a volume of about one quart and weigh about 3 pounds..."

      NASA Creates First 3D Printed Object in Space
      ComputerWorld, November 25th, 2014
      "Taking the first step in what NASA hopes will become a key part of future long-term space journeys, engineers have created the first 3D printed object in space.

      Using a 3D printer that was installed on the International Space Station on Nov. 17, NASA built a faceplate for the printer itself.

      Creating the faceplate, which was made of plastic, gives engineers hope that 3D printers can one day be used to build everything from spare parts to tools and even food onboard the space station, as well as on deep space flights to asteroids and Mars..."

        Here's Why Hydrogen-Fueled Cars aren't Little Hindenburgs
        ComputerWorld, November 26th, 2014
        "For all the volatility of a gas like hydrogen, which combusts with one-tenth the energy required for gasoline, hydrogen fuel cell vehicles are safer than cars with internal combustion engines, according to industry experts.

        At last week's Los Angeles Auto Show, several major car companies, including Audi, Honda, Hyundai and Toyota, announced the release of, or updated plans to release, hydrogen fuel cell vehicles this year or within the next two years..."

          You May Not Know It, but You Used A Supercomputer Today
          Data Center Knowledge, November 25th, 2014
          "Let's face it, supercomputers are cool. In a culture that's impressed by big numbers, they serve as poster children for our technological prowess, crunching data with mind-blowing speed and volume. These awesome machines seem to have little in common with the laptops and tablets we use for our everyday computing.

          In reality, say leaders of the high performance computing (HPC) community, supercomputers touch our daily lives in a wide variety of ways. The scientific advances enabled by these machines transform the way Americans receive everything from weather reports to medical testing and pharmaceuticals..."

          It's Alive! The 3D Printing of Living Tissues
          TechOnline India, November 26th, 2014
          "The world of 3D printing possibilities keeps expanding, from the purely ornamental to the truly useful. This technology has already made a difference in healthcare with prosthetics and replacements for bones, and even models of patients' hearts that improve the outcome of surgery. In the future, the 3D-printed heart may itself be alive, as researchers have now discovered how to print living tissue. A startup grows in Canada One company that has worked out how to use 3D printing technology to build living tissue from donor cells is Aspect Biosystems. I spoke with Tamer Mohamed, the company's cofounder and director of software engineering, to learn more about the background of the innovation and its applications..."
          IT - Bitcoin
          Uncoinventional Activist Journalist, Derrick Broze, Powered by Bitcoin
          Bitcoin Magazine, November 24th, 2014
          "Bitcoin has become a powerful tool for independent activist journalists. In the past, news writers and correspondents would compete for limited professional opportunities with large media networks. The message was highly centralized and filtered from the top.

          As technology has evolved, it has empowered mass coverage of anti-establishment opinions. The Internet has allowed anyone with a message to have a voice and Bitcoin has allowed anyone with a dream to fund it..."

          American Red Cross Now Accepts Bitcoin Donations
          CoindDesk, November 26th, 2014
          "The American Red Cross has announced that it will now accept bitcoin through a partnership with BitPay.

          Founded in 1881, the American Red Cross is the official US affiliate of the International Red Cross and Red Crescent movement. The humanitarian organisation provides disaster relief and emergency assistance in the US and posted total operating revenues and expenses of $3.4bn for its fiscal year 2013..."

          How Bitcoin Companies Keep Your Funds Safe
          CoindDesk, November 25th, 2014
          "When you store your bitcoins on an exchange, a gambling site, or in an investment site, you're placing a lot of trust in the company.

          Personal wallet security with a relatively small amount of coins is one thing, but these sites store many more bitcoins than the average user, and are therefore prime targets for attack. So how do they protect your money?

          Some, like the gambling site Seals With Clubs, use their own proprietary wallet technology, while others work with third-party services..."

          NCR Says Merchants Prefer Bitcoin To Apple Pay
          CryptoCoinsNews, November 24th, 2014
          In another positive development for bitcoin, POS solutions provider NCR Silver has declared that Bitcoin has been the most well-received alternate method of payment by merchants. That is according to product manager Reggie Kimble.

          Mr Kimble said that results show that their partnership with bitcoin payment processor Bitpay has so far attracted more attention from merchants that for all other comparable payment options such as Apple Pay and PayPal.

          The Paradox Of Privatized Decentralization
          CryptoCoinsNews, November 30th, 2014
          "Decentralization is at the heart of the Bitcoin revolution. One of the odd things about the actual Bitcoin world, though, is that many of the companies that have a lot of the power and clout -, Ripple, and so forth - are incredibly centralized.

          In order to do most anything in Bitcoin, one is often required to give up a bit of privacy by setting up a user account and a certain amount of control by handing over all the responsibility for the network activities to the authority in question..."

          Oracle Solaris 11 - Beginners Guide
          From UnixArena
          Lingeswaran writes, "If you are working as a Sun Solaris system administrator, you know that how rapidly Solaris operating system is changing from version to version. There were a lot difference between Solaris 9 and Solaris 10. But people were able to grab the changes quickly in the past when it was transformed from Solaris 8/9 to Solaris 10. ZFS and Zones were not utilized potentially on Solaris 10 and this could be the reason why the system administrators couldn't find any difficulties. But now most of the people are asking that how and where to start for oracle Solaris 11..."
          Events where you can find MySQL in December 2014 & January 2015
          list of events
          Please find below list of events where you can find MySQL in the next few months:

          December 2014:

          • PHP Brazil, Osasco, Sao Paulo, Brazil (December 4-7, 1014)
          • UK OUG/Tech 14, Liverpool, UK (December 8-10, 2014)
          • OpenSource Enterprise, Tokyo, Japan (December 12, 2014)

          January 2015:

          • FOSDEM, Brussels, Belgium (January 31-February 1, 2015)

          read on for details.

          Cloud Computing
          Cloud Computing
          From Profit Magazine
          Cloud computing, social media, mobility, and big data are transforming how business gets done. In this special report, learn about how you can attend one of the final three Oracle CloudWorld events to explore modern business strategies and practices.

          Plus, get expert insight on cloud computing—and Oracle’s strategy—from Oracle executives, including Larry Ellison and Mark Hurd. And, hear from customers who are using Oracle’s cloud solutions to take their businesses to new heights.

          Cloud Computing in Oracle Profit.

          Oracle Managed Cloud Services Wins the Frost & Sullivan 2014 North American Customer Value Leadership Award
          for Managed Cloud
          The 2014 Frost & Sullivan Best Practice Award - North America Managed Cloud Customer Value Leadership Award, rated Oracle Managed Cloud Services as the clear leader versus other providers; Managed Cloud received an "exceptional" rating in 9 of 10 evaluation categories. The research report is an excellent look at our industry and what is valued by cloud customers looking for a managed solution.

          View this video to learn more about the Frost & Sullivan 2014 North American Customer Value leadership Award for Managed Cloud Services and to see Steve McMillan, SVP Oracle Managed Cloud Services, accept the award on Oracle's behalf.

          Oracle Linux Docker Base Image on Ubuntu 14.10
          Oracle Linux Docker Base Images for OL6 and OL7
          Bruno Borges writes, "Oracle Linux team has been working hard to provide Docker support. You will be glad to see that they, since August, are releasing Docker binaries in Oracle Linux YUM repositories. Now recently they are also publishing the Oracle Linux Docker Base Images for OL6 and OL7!

          The documentation of Oracle Linux (OL6 and OL7) and Docker is also well advanced and explanatory. Keep track of everything about Docker and Oracle Linux from this yum page..."

          IT - Cloud
          In a Cloud Outage, No One Can Hear You Scream
          InfoWorld, November 21st, 2014
          "Nothing is certain but death and taxes … and cloud outages. Microsoft's own chief reliability strategist, David Bills, has written that cloud service failure is "inevitable," and events this week proved him right -- again -- as Microsoft Azure suffered a widespread outage that disrupted services across the United States, Europe, and parts of Asia. Given that inevitability, why are cloud providers often inadequate at providing customers with information during an event?..."
          Buyer Beware: The Cloud Is Not A Magic Button
          Business 2 Community, November 21st, 2014
          "In fact, only 60% of companies atop the Fortune 500 in 2000 remained there in 2010. By contrast, the 1960s saw fewer than 10 new businesses move from the top spots each year. A rough measure for sure, but it illuminates the current pace of change; and with only 7% of Gen Y'ers working for Fortune 500 companies, we can expect this trend to intensify over time.

          Fortune 500 Turnover? - A study conducted in June of 2012 concludes that scale (more than size, changing antitrust policies, IPOs, etc.) is a major factor in turnover. Big isn't necessarily bad, small isn't always good, yet scale is an undeniable advantage toward innovation and a key to success..."

            IT - CxO
            Don't Wrap Your Organization too Tight with Metrics
            Insurance Networking News, November 20th, 2014
            "There is no shortage of advice coming from analysts, consultants, vendors and everyone else these days - no enterprise effort should go forward without being measured. Key performance indicators help identify how the business is performing, and operational metrics determine how systems are performing.

            All is helpful, of course. But sometimes, managers can go overboard with the metrics, ignoring common-sense management..."

            How CSOs Can Help CIOs Talk Security to the Board
            CIO, November 21st, 2014
            "Most CIOs are not security experts, but in the board room they need to be. Thanks to the CSO, they don't have to go it alone. Behind the scenes, they can help prepare the CIO, offering advice on how to interpret the company's threat levels, boiling down the most relevant information and communicating it, early and often, so the C-suite will pay attention..."
            Hiring Wisdom: The Worst Hiring Decision You could Ever Make
            TLNT, November 24th, 2014
            "You are probably familiar with the old saying: 'The road to hell is paved with good intentions.'

            Well, the worst hiring decision you could ever make is down that very road. You may have even taken it yourself more than once already.

            So you don't miss the 'danger' and 'caution' signs before you head that way again. They look something like this …"

              3 Lessons Hawaii Learned from Gamifying Government
              Government Technology, November 21st, 2014
              "'A no-fun, no-thrill zone for consumers' - that's a common perception of government. And at times, it may be accurate. When I became Hawaii's first CIO in 2011, for instance, the state's 30- to 40-year legacy technology definitely needed an energetic boost. Limited numbers of government services were online, use of online services was in some cases low, the consumer experience was lacking and, in general, the state's technology was way behind the times.

              Gov. Neil Abercrombie hired me to modernize and make Hawaii's government technology the best in the nation..."

              The Seven Mega Shifts: Government 2020
              Government Technology, November 21st, 2014
              "In the United States and elsewhere, trust in government is at an all-time low, citizen expectations are rising, and government finances are under stress. The result: the gap between citizen expectations and government's ability to meet them has never been greater. Book after book, study after study - from both the right and the left - argue that our current industrial age model of government needs to change radically.

              But how? What are the main features of a government better suited for our times? What forces will most significantly change government, and which of them have the greatest potential to make a positive difference?..."

                CISO Role is Gaining Traction: Survey
                IT World Canada, November 24th, 2014
                "A recent survey indicates that senior management is beginning to trust the CISO more

                Chief Information Security Officers (CISO) may be starting to make an impact in North American companies, according to a recent survey by an anti-virus software vendor which also found that cyber security professionals tend to be very confident of their ability to handle data breaches in 2015..."

                Corporate IT's Darwinian Challenge
                Information Week, November 25th, 2014
                "IT organizations face a gradual erosion, and possible extinction, if they don't address the dangers within. We hear a lot of talk about the death of IT, or more commonly the 'death of the IT service desk.' But how informed are these opinions, and do they ultimately drive the right type of response?

                The talk of extinction, in my experience, usually imagines a 'death of the dinosaurs'-type ending for internal IT organizations, with a sudden fatal event -- like the assumed, dinosaur-killing meteor -- rather than a gradual, Darwinian-like "survival of the fittest" decline..."

                  Half of Employees Don't Feel Respected by Their Bosses
                  Harvard Business Review, November 19th, 2014
                  "When it comes to garnering commitment and engagement from employees, there is one thing that leaders need to demonstrate: Respect. That's what we saw in a study of nearly 20,000 employees around the world (conducted with HBR and Tony Schwartz).

                  In fact, no other leader behavior had a bigger effect on employees across the outcomes we measured..."

                    vBeers @ ITPalooza After Dark
                    December Schedule
                    Regular vBeers attendees from all three South Florida counties are invited to ITPalooza 2014, especially the IT networking and holiday party.

                    Normally, the South Florida vBeers events happen three times a month, once per county. This December there will be just twp meetings. We will not be hosting vBeer@Miami as it falls on Christmas Eve,

                    Wednesday December 4th

                    Wednesday December 10th

                    Wednesday December 17th

                    Details will be posted to the vBeers South Florida LinkedIN Group and

                    IT - PM
                    Health IT Success Hinges on CIO-Business Collaboration
                    CIO, November 24th, 2014
                    "CIOs in all industries can face challenges aligning their work with the business units of the enterprise, but in the healthcare industry, perhaps more than most, it is critical to win the support of the executives and front-line workers in the operation, a panel of experts said at a recent health IT conference.

                    Brian Drozdowicz, vice president of population health at Caradigm, a joint venture of Microsoft and GE Healthcare, recalls the failings of several health IT initiatives that he has been involved with, a shortfall he traces back to the commanding role of the tech department at the exclusion of the doctors, clinicians and other end users..."

                    IT - Networks
                    The Internet of Things Far Bigger Than Anyone Realizes - Part 1
                    Business 2 Community, November 21st, 2014
                    "When people talk about 'the next big thing,' they're never thinking big enough. It's not a lack of imagination; it's a lack of observation. I've maintained that the future is always within sight, and you don't need to imagine what's already there.

                    Case in point: The buzz surrounding the Internet of Things..."

                      The Internet of Things Far Bigger Than Anyone Realizes - Part 2
                      Business 2 Community, November 21st, 2014
                      "Last week I talked about how people are thinking too small when they think about the Internet of Things. When we truly consider the ramifications of connecting a vast array of data-gathering sensors, devices, and machines together, what's important to realize is that information will be translated into action at a rate that we have never seen before. We are closing in on a world with infinitesimal reaction times, immediate responses to changing conditions, and unparalleled control in managing assets and resources.The Internet of Things Far Bigger Than Anyone Realizes - Part 2 image trans..."
                        Net Neutrality: Too Much Spin, Not Enough Facts
                        Information Week, November 24th, 2014
                        "The latest spate of arguments around net neutrality reveals that the blind partisanship and BS bias are escalating. The comic strip site The Oatmeal saying that net neutrality is about 'freedom' is just as mindless as the infamous tweet by Sen. Ted Cruz (R-TX) comparing net neutrality to Obamacare.

                        If we truly want broadband innovation, we need to start digging into the facts and opening ourselves to modern ways of doing things, instead of posturing and trying to squeeze today's Internet into a 1996 regulatory framework by classifying it as a Title II utility service. Let's review three facts:..."

                          Pressure Mounts in Europe for Strict Net Neutrality
                          TechWorld, November 27th, 2014
                          "Members of the European Parliament, along with civil society groups, have urged European member states to stick with strict net neutrality rules.

                          They did so the day before a meeting of telecommunications ministers in the EU Council, who will discuss an Italian proposal that would water down net neutrality.

                          Italy, which currently holds the rotating presidency of the Council, has proposed removing the very definition of net neutrality and allowing differential charging for services, according to preparatory documents for the meeting..."

                            Getting Started with Power-Line Networking
                            IT Web, November 24th, 2014
                            "Back in 2001, when I first moved to Asheville, NC I had a 3,500 square foot house and my wife and I both had offices on different floors. Wi-Fi just wasn't cutting it, and while I used 10Base2 (a.k.a. thinnet) to connect routers and switches between floors there was no way to make it look good. So I started experimenting with power-line networking, and I haven't looked back..."
                            The Ultimate Life-Hack: Start Your own SDN Hackathon
                            SearchSDN, November 24th, 2014
                            "Sometimes it takes an Apollo project to change the world -- hundreds of thousands of engineers, machinists and experts from every industry, working together in an accelerated program with a tight deadline and massive funding.

                            Fortunately, pushing into SDN does not require so much. All the metallurgy, software and technology are being developed by vendors that are increasingly eager to get you on board. The only Apollo components you need to emulate are a tight deadline, a room full of smart people and a few experts. We have a simple name for that in the programming biz: a Hackathon..."

                            What is Generic Ethernet Access?
                            SearchNetworking, November 24th, 2014
                            "The interest in generic Ethernet access (GEA) is growing within the United Kingdom as availability becomes more prevalent. However, there is still a fair amount of confusion surrounding the product's capability and its available speeds and associated costs.

                            In a nutshell, GEA uses fiber to the cabinet (FTTC) and fiber to the premises (FTTP) last-mile infrastructure to transmit data at speeds from 2 Mbps to 30 Mbps. Service-level agreements are tailored at 99.95%, and provisioning occurs with 39 working days. Costs average around $475 (U.S.) per month, depending upon location. While this is several times higher than a broadband circuit, businesses enjoy better uptime and symmetric bandwidth..."

                            SDN Networking Followed by SDN Security
                            Network World, November 25th, 2014
                            "Earlier this year, ESG published a research report titled, Network Security Trends In the Era of Cloud and Mobile Computing (note: I am an ESG employee). As part of this report, ESG surveyed 321 security professionals working at enterprise organizations (i.e. more than 1,000 employees) about their networking and network security strategies..."
                            Network Provisioning Finally Joins the Automation Game
                            SearchDataCenter, November 27th, 2014
                            "The last five years ushered in significant changes to the data center network: exponentially faster link speeds, 10 gigabit connectivity at the access layer, oversubscription catching up to port density and line-rate forwarding in switches.

                            Data center network switch configuration, however, hasn't changed since the advent of the Ethernet switch.

                            The command-line interface still reigns as king of network device configuration. Some vendor-created alternatives -- Web-based graphical interfaces or device managers -- attempt to handle the network from one central control point, but none excel..."

                            Leveraging Network Intelligence and Deep Packet Inspection
                            Help Net Security, November 26th, 2014
                            "Tomer Saban is the CEO of WireX Systems, a provider of network intelligence solutions. In this interview he talks about how deep packet inspection helps with identifying emerging threats, the role of network intelligence, and illustrates what the information security industry needs to in the next 5 years to combat highly targeted attacks.

                            What's the role of network intelligence in today's complex security architecture?..."

                            IT - Operations
                            Converged vs Hyperconverged Infrastructure
                            Storage Switzerland, November 26th, 2014
                            "IT organizations are increasingly coming under pressure to deliver business application services with the same speed and agility as their public cloud counterparts. The bottom line is if IT can't be responsive to the needs of the business, they may attempt to supplant internal IT with external providers. A situation that is probably not in the best interest to the organization as a whole and to IT specifically..."
                              How Do You Define Data Center Size, Density?
                              SearchDataCenter, November 27th, 2014
                              "There are plenty of metrics to measure data center footprint and power and cooling needs. AFCOM, the data center managers' association, thinks it's time to pare that down.

                              "You'll hear people say 'I have a very dense data center' or 'We have a small data center' and that doesn't really mean anything or relate to specific numbers," said Tom Roberts, AFCOM president.

                              The association's Data Center Institute think tank worked with data center designers, operators and vendors to qualify the terms for data center size and density, presented in the free paper, Data Center Standards. Read an excerpt from the paper here.

                              AFCOM describes data center size by compute space, and density by measured peak kilowatt (kW) load..."

                                IT - Security
                                Lessons from MBIA: When Breaches Go Viral
                                Risk Management Monitor, November 21th, 2014
                                "We can add another breached company to the ever-growing list: the Municipal Bond Insurance Association (MBIA). While not necessarily unique from other breaches we've seen lately, the MBIA incident brought another aspect of breach fallout into the public eye, and that's the potential for data exposures to go viral. These viral breaches generate tendrils of compromised information that reach far and wide, creating a nightmare for containment - and public relations..."
                                  NSA Chief Says Cyberattacks on Industrial Systems are His Top Concern
                                  PCWorld, November 20th, 2014
                                  "Multiple nation-states are investing in their capabilities to hack critical U.S. infrastructure, making defense of those networks a top priority, U.S. National Security Agency chief Admiral Mike Rogers said Thursday.

                                  Attackers are seeking detailed information on how industrial control systems work, including obtaining engineering schematics and information on how such systems are configured, said Rogers, who spoke before the U.S. House of Representatives Permanent Select Committee on Intelligence.

                                  Such information could allow hackers to shut down 'very segmented, very tailored' parts of networks, such as turning off power turbines, Rogers said..."

                                  Thinking of Buying a Security Camera? Read this First
                                  InfoWorld, November 25th, 2014
                                  "I live in a fairly safe area. I haven't heard about any crimes in my neighborhood since I've lived here. But like you, I read about crime every day online, and it seems that about half the time a security camera is used to identify and arrest the suspect. To be safe, I decided to select a security camera for my home.

                                  I spent months researching security cameras online. I bought and tried several models, all designed to be accessed over the Internet, ranging from the cheap ones you can buy at Target to the high-end variety..."

                                  10 Ways Security Gurus Give Thanks
                                  Dark Reading, November 25th, 2014
                                  "From board-level awareness to bug bounty programs and everything in between, the security world's maturation offers security practitioners something to be thankful for.

                                  So much of IT security coverage can be pretty dismal and cynical. But amongst all the security incidents and records lost, there are silver-lining stories that give security practitioners, researchers, and consultants a reason to smile. In honor of the holiday this week, Dark Reading reached out to the security community to hear about all the big and little things they're thankful for in their professional lives..."

                                  Top Reasons for CSOs to Give Thanks
                                  CSO Online, November 26th, 2014
                                  "The job of a Chief Security Officer (CSO) is one of constant pressure. As they are reminded daily, they can be successful in defending their organization 99 percent of the time, and that won't be enough. For the bad guys, being successful 1 percent of the time is good - and profitable - enough.

                                  Still, amid all that pressure, several of those in charge of keeping their organizations paused this week to give reasons to give thanks.

                                  And it is worth a pause from those they protect to give thanks to them..."

                                  Don't Get Skunked in a Data Breach
                                  Business 2 Community, November 26th, 2014
                                  "Rumination #11 - When a data breach occurs, communicate with your customers early and often

                                  Recovering from a data breach is like recovering from a skunk attack. No matter where or when you go in the house the stink still clings.

                                  Consider Sony's Playstation data breach in 2011. It took until July 2014 for the dust to start to settle on this one. That's when Sony offered a $15 million court settlement to U.S. users of its PlayStation Network (PSN). When the network was hacked three years before, the personal account information of 77 million users was exposed in one of the largest data breaches on record. It didn't help that it took months after the incident for all PSN gamers to get back to blasting bad guys and obliterating ogres. In the meanwhile, Sony took a heavy financial hit...:

                                    IT - Careers
                                    11 Job Search Mistakes that Can Kill Your Chances
                                    CIO, November 24th, 2014
                                    "Even the savviest job seeker is bound to make a mistake here and there, but in a highly competitive talent market, a small mistake could cost you the job of your dreams.

                                    "It is easy for even the savviest of job seekers to make mistakes. By learning how to navigate potential pitfalls from the outset, your job search will be more productive and yield more positive results," says Ford R. Myers, career coach, speaker and author of 'Get The Job You Want, Even When No One's Hiring.' Here are the top 10 mistakes job seekers make and our experts' tips on how to avoid them..."

                                      Engineering and Technology Industries Face a Scrap Over Digital Skills
                            , November 27th, 2014
                                      "The growth of technology and robotics in engineering sectors is forcing firms to poach people from the IT industry as competition for skilled workers heats up, according to the Institution of Engineering and Technology (IET).

                                      The organisation's Ones to Watch report identified five sectors - food, space, additive manufacturing, cyber security and robotics - that require an influx of engineering and IT skills if they are to flourish in the coming years..."

                                      IT - Compliance
                                      The Impact of Collaboration in Cyber Risk Insurance
                                      Risk Management Monitor, November 25th, 2014
                                      "Former FBI Director Robert Mueller once said, 'There are only two types of companies: those that have been hacked and those that will be. Even that is merging into one category: those that have been hacked and will be again.' This is the environment in which risk managers must protect their businesses, and it isn't easy.

                                      Cyber risk is not an IT issue; it's a business problem..."

                                        User Flexibility Without the Risk
                                        The Register, November 27th, 2014
                                        "Most organisations are seeing users and business groups starting to make their own technology decisions to some degree or another. On the one hand this provides those in the business with the freedom and flexibility they often crave, but unilateral adoption of equipment, software and services can create ambiguity over who is responsible for what. Action therefore needs to be taken to ensure that costs and risks do not escalate out of control..."
                                          IT - Mobile
                                          US Mobile Payments Market $142B By 2019
                                          Information Management, November 24th, 2014
                                          "The media frenzy around mobile payments - most recently Apple Pay - has reached fever pitch and led some industry spectators to conclude that a payments revolution is at hand. Not so. The adoption of mobile payments is an evolution - not a revolution - and the evolution is well underway.

                                          Although the landscape of mobile payment providers is in an ongoing state of flux, the ecosystem and mobile capabilities are maturing and consumer and merchant adoption is accelerating. Over the next five years, US mobile payments will grow from $52 billion in 2014 to $142 billion by 2019 with both national brands and local merchants. Over the next five years, we can expect: ..."

                                            Your Business Customers Want You To Deliver Great Mobile Moments
                                            Forrester, November 24th, 2014
                                            "Mobile is now becoming a mission-critical service for all businesses. CIOs must support mobile moments, which Forrester defines as points in time and space when someone pulls out a mobile device to get what they want in their immediate context. Mobile moments have spread well beyond consumer scenarios:

                                            • Your business customers are demanding them
                                            • Your partners and suppliers are working on adjusting their business processes
                                            • Your competitors are exploiting the opportunities that mobility offers

                                            Read on for details.

                                            IT - Big Data
                                            Network Security Needs Big Data
                                            ComputerWorld, November 24th, 2014
                                            "There are two types of organization now: those that have been breached, and those that just don't know it yet.

                                            A big part of the problem is that the traditional approach to network security, relying on perimeter-centric strategies, is failing. According to the 2014 Cyberthreat Defense Report, more than 60% of organizations fell victim to one or more successful cyberattacks last year. But it is the following statistic that shows the ineffectiveness of perimeter defenses: Studies have shown that between 66% and 90% of data breaches are identified, not by the organizations that are breached, but by third parties..."

                                            Context is Next Big Data Challenge
                                            Data Center Knowledge, November 25th, 2014
                                            "The value driver for big data is not volume, but velocity, or time to value. In the past year the focus has shifted from simply capturing the data to putting that data in context, according to a recent IBM report. The report also notes a growing disparity between the haves and have-nots when it comes to big data analytics, with three quarters of the population doing little or next to nothing.

                                            A CFO study, also by IBM, backs these claims, revealing that over five years, the CFO now spends 250 percent more time integrating data just to do basic reporting. The ability to store data is beyond many companies' ability to sift through and identify what they're trying to solve..."

                                            Data Gravity: Charting the Future of Your Organization's Critical Information
                                            Business 2 Community, November 23rd, 2014
                                            "Enterprise organizations already struggle with the mass of data they need to manage and everyone knows that - 'big data' buzzwords notwithstanding - it's only going to get worse. As it turns out, a physics analogy may help you visualize the data problem and approach better solutions.

                                            Some large enterprise organizations are caught off guard by the pace at which data is being generated internally and externally. Without proper planning, IT teams can find themselves painted into a corner with limited options. They need to get a handle on what can be done with growing data sets, as well as to deal with the severe limitations on using and deploying new and existing applications that rely on the data being in close proximity..."

                                            The Longer You Delay, the More the Data Decay
                                            Business 2 Community, November 23rd, 2014
                                            "According to research, between 50 and 75 percent of the success of a B2B marketing campaign is down to the accuracy of the data available. Businesses also rely increasingly on Customer Relationship Management (CRM) systems - software that retains every lead, every sales opportunity and every contact record. But software is only as useful as the data it contains, and good quality, up to date information is the key. Businesses invest thousands of pounds in obtaining leads that allow them to generate profit. But what happens a year later, when it's time to sell something new?..."
                                            Data Management vs. Data Loss Prevention: Vive La Difference!
                                            Dark Reading, November 25th, 2014
                                            "A sensitive data management strategy can include the use of DLP technology, but it also involves a comprehensive understanding of where your data is and what specifically is at risk.

                                            Cyber criminals have grabbed headlines for many highly publicized data breaches in recent years. However, the greatest source of blame for many of these incidents should be placed on the shoulders of organizations that don't properly manage sensitive data. The obvious reason: Criminals harvesting personally identifiable information expend far less effort in companies where insufficient security controls expose mass amounts of data..."

                                            IT - BYOD
                                            Will security concerns scupper your BYOD policy?
                                            The Register, November 29th, 2014
                                            "Almost everyone involved in IT fears BYOD to some extent. That’s largely because they are terrified of careless colleagues costing the business a shed load of money.

                                            But small to medium sized businesses who lack the budget and resources to do security well fear BYOD more than most. Just this week, Hugh Boyes from the Institution of Engineering and Technology (IET), on the government launch of cyber assistance programme Do More Online, said: 'The cyber security of most small business is woefully inadequate as they do not have the time, experience or resources to develop the knowledge and skills to protect their presence online'..."

                                            The 5 Hottest BYOD Trends to Watch for in 2015
                                            TechZone360, November 25th, 2014
                                            "Enterprise Mobility continued to make the headlines in 2014, with more innovative mobile devices and security threats and vulnerabilities than ever before. The fallout from many of these events offer valuable lessons learned, and how BYOD organizations adapt their priorities accordingly will have a huge impact on the industry going forward. Here are five of the most significant developments you can expect to see play out in 2015..."
                                            4 Security Tips for a Successful BYOD Policy
                                            Business News Daily, November 24th, 2014
                                            "Having the right technology is often the key to a successful business, but not every company has the means to provide its employees with devices like laptops, smartphones and tablets. For this reason, BYOD (bring your own device) policies are becoming increasingly popular.

                                            But these policies can get complicated, as employees using their personal devices for work can be a major security issue. For a successful (and safe!) BYOD program, businesses need to make sure they take proper security measures..."

                                            Texas court ruling shows employers without BYOD policy are skating on thin ice
                                            Enterprise AppsTech, November 24th, 2014
                                            "A federal judge in Texas has ruled an employer who wiped a fired employee's personal device did not violate his privacy rights.

                                            The ruling against Saman Rajaee, who was employed by Houston-based construction firm Design Tech until February 2013, sounds a warning to employers who don't have a BYOD policy in place, according to legal experts.

                                            Design Tech did not have a personal device policy; instead Rajaee, who had been working in residential construction for over a decade, had to connect his iPhone to the work's Microsoft server to access his email and contacts..."

                                            Top Ten Articles for last few Issues
                                            Vol 201 Issues 1, 2 and 3; Vol 200 Issues 1, 2, 3,4 and 5; Vol 199 Issue 4
                                            We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                            • SPARC M7 - Security in Silicon (SIS)
                                            • Java Magazine: The Internet of Things
                                            • And Two Become One
                                            • Oracle VM VirtualBox 4.3.20 Released
                                            • Are Two HPs Better Than One?
                                            • New Performance Analyzer Overview screen
                                            • GlassFish Server Open Source Edition 4.1 Released
                                            • Siemens Teamcenter Optimized with Oracle SuperCluster
                                            • Oracle CEO Mark Hurd: Make HR A Real-Time Application
                                            • Advanced Registration Now Open for new Oracle Mobile Security Primer eBook

                                            The longer version of this article has list of top ten articles for the last 8 weeks.

                                              IT - Encryption
                                              ENISA Guidelines on Cryptographic Solutions
                                              Help Net Security, November 24th, 2014
                                              "ENISA launched two reports. 'Algorithms, key size and parameters' is a reference document providing a set of guidelines to decision makers, in particular specialists designing and implementing cryptographic solutions for personal data protection.

                                              The 'Study on cryptographic protocols' provides an implementation perspective, covering guidelines regarding protocols required to protect commercial online communications containing personal data..."

                                                IT - Server
                                                14 Go-To Tools for Mac SysAdmins
                                                Network World, November 24th, 2014
                                                "Former Apple employee Gerard Allen shared some of his favorite tools during JAMF Software's user conference. Based in Ireland, Allen built his career helping companies integrate Macs into their IT environments. He worked for Apple for eight years during the 1990s, then started providing technical support and training to businesses. His consultancy, Stream Solutions, was recently acquired by Apple reseller iConnect. Today Allen is chief technologist and general manager at iConnect..."
                                                  IT - Tape
                                                  Follow the Money: Picking Technology Winners and Losers
                                                  Enterprise Storage Forum, November 24th, 2014
                                                  "After 12 years of writing a monthly column for Enterprise Storage Forum, it's time to move on...

                                                  I want to leave you with a single thought about our industry and how to consistently pick technology winners and losers. This is one of the biggest lessons I've learned in my 34 years in the IT industry: follow the money..."

                                                    Oracle High Scores on GigaOm Research - Sector Roadmap
                                                    cross-platform mobile development
                                                    GigaOm analysts Rich Morrow recently covered cross platform mobile development, a hot topic given the effort it takes to develop enterprise apps that fulfill the needs in a BYOD world, and Oracle is helping to fulfill the needs end-to-end needs for enterprise mobile development.

                                                    Areas covered include:

                                                    • Write once, deploy to several native codebases
                                                    • Tight integrations to back-ends or middleware
                                                    • A focus on specific use cases
                                                    • Consistent “app identity.”
                                                    • Support for popular coding environments.
                                                    • Native device support

                                                    There's some great information covered in the report. Get the whole story here.

                                                    Oracle and Pluribus Ally on Software Defined Networking
                                                    Video with Sunay Tripathi, CTO
                                                    Sunay Tripathi, CTO, Pluribus Networks, describes how running Oracle Solaris 11 on Pluribus Networks’ switches means that virtual networking services can be dynamically re-provisioned from compute nodes to networking to help maximize performance.

                                                    Video interview

                                                    NetBeans Podcast 72
                                                    Podcast Guests: Mark Stephens, Sylwia Kedzia, Nilay Yener, Emily Hall, Bruno Souza, Luke Mayell, and Adam Bien
                                                    • 00:00 / Opening Chat with Mark Stephens from IDR Solutions
                                                    • 03:25 / Sylwia K&#281;dzia - Conversation with Nilay Yener, Co-organizer of GDG Istanbul
                                                    • 14:25 / Emily Hall - Conversation with Bruno Souza, Open Source Advocate
                                                    • 24:35 / Luke Mayell - Conversation with Adam Bien, Java EE Champion

                                                    Download mp3: 29 minutes (20 mb)

                                                    Trending in
                                                    Vol 234, Issue 2
                                                    Trending IT Articles