News about Oracle's Solaris and Sun Hardware
System News
Dec 1st, 2014 — Dec 7th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 202, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Introduces its Solution for Project-Driven Supply Chain to Help Customers Improve Project Performance and Profitability
New initiative helps project managers and planners enhance collaboration, decision-making, and execution throughout the project lifecycle

To meet the demands of today's complex business environment and enhance decision-making, organizations must overcome functional silos and communication gaps. This is especially true for project supply chains, where project managers often do not have access to modern supply chain management tools. To break down the barriers between departments and improve collaboration between project managers and supply chain planning, Oracle has introduced the Oracle solution for Project-Driven Supply Chain. The new solution integrates Oracle Value Chain Planning and Oracle's Primavera project portfolio management solutions to help organizations better align material planning, decision-making, and execution throughout the project lifecycle.

New Oracle Communications Unified Communications Suite Release
Delivers WebRTC-powered Enterprise Communications Experience
As enterprises move to all-IP networks and cloud-based applications, communications service providers (CSPs) - facing increased competition from over-the-top providers delivering content via the Internet and independently of CSPs - must be able to offer seamless cloud-based communication and collaboration solutions that can scale for small, midsize, and large enterprises, as well as public sector organizations, in order to keep and grow market share. The latest version of Oracle Communications Unified Communications Suite gives CSPs the capability to do just that. In addition, its integration with Oracle Communications WebRTC Session Controller enables CSPs to quickly and easily add integrated real-time and near real-time capabilities to their menu of secure, enterprise-grade services.
OTN Virtual Technology Summit: Hands-On Learning
With Oracle & Community Experts

OTN's successful Live day Virtual Technology Summit is now available OnDemand. Register now to view highly technical presentations, demonstrations, and hands-on-labs. Developers, Sysadmins, Architects, and DBA's take advantage of these presentations by Oracle Ace's, Java Champions, and Oracle product experts.

Tracks include technical dives in the following areas:

IBM WebSphere Application Server Excels on Oracle SPARC T5
2.7X better throughput than on Oracle's SPARC T4
This paper is intended for anyone considering running IBM WebSphere Application Server (WAS) on Oracle's SPARC T-Series servers. For IBM and Oracle customers, this includes systems administrators and system architects; we also encourage Oracle and IBM Sales and Support teams to consult this document.

The latest release of WAS is shown to perform exceptionally well on SPARC T-Series servers. Specifically:

  • SPARC T-Series servers provide a scalable, dependable, and performant platform for the deployment of WAS application instances.

-Application architects should have confidence in deploying WAS to multiple 'building blocks' consisting of one or more SPARC processors from Oracle; these building blocks may be instantiated as physical or virtualized resources.

  • WAS demonstrates 2.7X better throughput on Oracle's SPARC T5 processors than on Oracle's SPARC T4 processors, with improved response time.


Record Performance and Seamless Scalability in Core Banking
with Infosys Finacle and Oracle SuperCluster
Demonstrating extraordinary performance and scalability, an Infosys Finacle core banking solution version 10.2.13, running on an Oracle SuperCluster T5-8 system recently set a new global benchmark for the number of transactions processed across key banking functions. In a test that was audited and reviewed by a global business consulting and audit firm, the solution supported more than 1.9 billion bank accounts with near linear scalability. The test also saw Infosys Finacle processing 726 million effective transactions in four hours, or more than 50,000 average transactions per second. The press release was issued by Infosys a while back.

A new whitepaper describers the technical details behind the testing and results of this work and how it sets a new standard of scalability for core banking infrastructure.

Read the white paper for details.

Oracle VM 3.2.9
By Honglin Su
"We just released a maintenance update for Oracle VM 3.2 to bring new hardware support, improve stability, and provide bug fixes. You can review the What's New wiki for the list of notable bug fixes.

Oracle VM 3.2.9 updates are available for download from My Oracle Support. Oracle VM Server packages are also available from Oracle Unbreakable Linux Network (Oracle VM Sever 3.2.1 Patch Channel or Oracle VM 3 Latest Channel). The patch updates include all the accumulative bug fixes that have been integrated since 3.2.1 release..."

IT - Storage
The SSD Endurance Experiment
The Tech Report, December 4th, 2014
"MORE THAN A YEAR AGO, we drafted six SSDs for a suicide mission. We were curious about how many writes they could survive before burning out. We also wanted to track how each one's performance characteristics and health statistics changed as the writes accumulated. And, somewhat morbidly, we wanted to watch what happened when the drives finally expired.

Our SSD Endurance Experiment has left four casualties in its wake so far. Representatives from the Corsair Neutron Series GTX, Intel 335 Series, Kingston HyperX 3K, and Samsung 840 Series all perished to satisfy our curiosity. Each one absorbed far more damage than its official endurance specification promised - and far more than the vast majority of users are likely to inflict..."

Data Loss and Downtime Cost Enterprises $1.7 Trillion Per Year, December 4th, 2014
"EMC Corporation announced the findings of a data protection study that reveals that data loss and downtime cost enterprises $1.7 trillion in the last twelve months, or the equivalent of nearly 50% of Germany's GDP.

Data loss is up by 400% since 2012 while, surprisingly, 71% of organizations are still not fully confident in their ability to recover after a disruption.

EMC Global Data Protection Index, conducted by Vanson Bourne, surveyed 3,300 IT decision makers from mid-size to enterprise businesses across 24 countries..."

Hot data storage technologies for 2015
SearchStorage, December 5th, 2014
"These half-dozen storage techs are leading edge and poised to help transform your data center...

If you've been wondering what newfangled technology will show up in your data center in 2015, read on. For 12 years, Storage magazine has celebrated the rite of passage into a new year by highlighting the half-dozen or so hot storage technologies we think will have a real impact on data center operations in the coming year.

As in years past, our list veers sharply in the direction of practicality -- most of our hot techs are "newish" rather than brand-spanking new because we want to focus on those technologies that have attained a level of maturity that shows us they're proven and generally available...:

    Java Technology
    Evolving Java - How and why it matters
    Video of Brian Goetz, Oracle's Java Language Architect
    Terrence writes, "If you haven't watched a talk on language stewardship and evolution in a while - I would highly recommend this one.

    Brian Goetz, Oracle's Java Language Architect, makes a brilliant, witty, and passionate case for pragmatic evolution of programming languages and provides compelling reasons why Java not only remains relevant as the top programming language and platform of choice but - even after 20 years - continues to deliver innovation that matters to the entire IT software ecosystem, including 9 million Java developers and those building software with alternate languages on top of the Java runtime..."

    The Java 7 EE Tutorial
    The Java EE 7 Documentation page has been recently refreshed with an improved and cleaner layout. It should now be easier to locate, browse and read the Java EE API documentation, the Java EE SDK documentation and the Java EE Tutorials.

    It is sometime useful to remind about the availability of useful resources such the "Java EE Tutorial" ... even more when those resources a free! The Java EE Tutorial is one of those gems that is sometime overlooked. It covers Java EE 7 and is an invaluable set of resources for anyone wanting to learn Java EE but also for people already familiar with Java EE as it also covers some of the less known part of the Java EE platform such as JCA.

    IT - Technology
    Hardware 2.0 Holiday 2014 Ultimate Gift Guide
    ZDNet, December 2nd, 2014
    "This is a gift guide with a difference. Rather than pick gifts for you and yours, I'm looking at the best of the best when it comes to tech that I've had the pleasure of owning, using, and drooling over this year, from the big stuff like notebooks, tablets, and smartphones, to smaller stuff like storage devices and smart bulbs.

    There are also a few toys thrown in, along with a few things you didn't even know you wanted or needed, because I'm a big kid at heart!

    Along with each entry I'll give you a link, some idea of pricing, and a little bit about why I like it..."

      11 open source tools to make the most of machine learning
      InfoWorld, December 4th, 2014
      "Spam filtering, face recognition, recommendation engines -- when you have a large data set on which you'd like to perform predictive analysis or pattern recognition, machine learning is the way to go. This science, in which computers are trained to learn from, analyze, and act on data without being explicitly programmed, has surged in interest of late outside of its original cloister of academic and high-end programming circles.

      This rise in popularity is due not only to hardware growing cheaper and more powerful, but also the proliferation of free software that makes machine learning easier to implement both on single machines and at scale. The diversity of machine learning libraries means there's likely to be an option available regardless of what language or environment you prefer.

      These 11 machine learning tools provide functionality for individual apps or whole frameworks, such as Hadoop. Some are more polyglot than others: Scikit, for instance, is exclusively for Python, while Shogun sports interfaces to many languages, from general-purpose to domain-specific..."

        Hot technologies: Looking ahead to 2015
        EDN Network, December 2nd, 2014
        "It seems like 2014 flew by in the blink of an eye, and in that blink engineers made some tremendous gains. From faceless test instruments to GaN and other newer semiconductor materials, to embedded security, wearables, 3D printing in space, and smart lights and cars, 2014 moved the era of tech forward to new heights.

        As we head toward 2015, we look forward to more innovation and advances. Here, EDN and EE Times editors explore some of the hot technologies in 2015 that will shape next year's technology trends and beyond. Each article offers the opportunity for you, members of the engineering community, to share your own thoughts about the technologies and devices presented, as well as on other hot technologies you see on the horizon.

        Click through the below hot technologies articles and be sure to share your thoughts as we look ahead to 2015..."

        GSA's short list of emerging technologies
        Federal Computer Week, December 4th, 2014
        "WHAT: A General Services Administration request for information and vendor survey on a list of developing technologies that could be incorporated into GSA's Alliant I and Alliant II government-wide acquisition contracts.

        WHY: The GSA wants to know how much experience vendors have with emerging technologies like big data, autonomic computing, three-D design, predictive analytics and 14 other newer technologies. The agency's Alliant II GWAC Acquisition Team developed the list of 18 Leading Edge Technologies (LETs) it is considering including in evaluations of vendors' past performance and relevant experience -- and perhaps as part of the scope of the new Alliant contract.

        The 18 LETs included in the survey are:.."

        Fujitsu develops compact RFID for wearables, metal
        CIO, December 4th, 2014
        "Fujitsu Laboratories has developed a compact RFID tag that works on surfaces such as metal, which can otherwise impede radio waves.

        The tag, 30mm long, 25mm wide and 0.5mm thick, can be attached to any material including plastic cards, wearables and metal objects. Despite its small size, it still has a communication range of about 2 meters.

        Fujitsu Labs says its tag is more compact than typical metal-compatible RFID tags. The new tags could be used in a variety of applications such as keeping track of machine parts and as a component in ID cards used to access buildings..."

        Software can now identify DNA from viruses and speed up diagnoses
        ComputerWorld, December 2nd, 2014
        "Los Alamos National Laboratory (LANL) announced this week that bioinformatics software it created can now identify DNA from fungi, bacteria, viruses and other pathogens, slashing the time it takes to diagnose some illnesses from weeks to hours.

        The software can also speed the analysis of cancerous tumor genetics for chemotherapy options and prognosis.

        The LANL's new version of its Sequedex software recognizes patterns in short DNA sequences and then associates those sequences with phylogeny -- the genetic evolution of an organism. It examines a collection of DNA fragment sequences "in a similar fashion to doing a search in a web browser," Los Alamos said in a statement..."

          IT - Bitcoin
          Bitcoin Is The Most Disruptive Technology Of Our Age
          CryptoCoinsNews, December 1st, 2014
          In a guest post on Virgin Entrepreneur Dominic Frisby - the author of 'Bitcoin: the Future of Money?' - argues that Bitcoin is the most disruptive technology of our age.

          'This internet money system which involves neither banks nor government will do to finance what email did to the postal service and what the internet did to publishing. It will disrupt aging monopolies and open up new opportunities.'

          A Conversation About Bitcoin Exchanges
          Wall Street and Technology, December 1st, 2014
          "Virtual currency startups are attracting a lot of media attention and interest from VCs and private equity firms. In October, AlphaPoint, a white-label financial technology platform that powers global digital currency exchanges, received $1.35 million in funding from several investors including Ben Franklin Technology Partners.

          Bitcoin's massive growth has created a need for infrastructure that is scalable and reliable, says AlphaPoint. The company says it's leveraging high-frequency trading expertise from the development of fintech solutions used by UBS and Deutsche bank to deliver a secure solution. The platform can process more than 1 million transactions per second and get up and running in 20 days, according to the latest release. Bitfinex is using the exchange platform in beta phase for buying and selling of Bitcoin and Litecoin..."

          Evolution, Not Revolution: How to Sell Bitcoin to Regulators
          CoindDesk, December 6th, 2014
          "Amor Sexton is a consultant and lawyer at Adroit Lawyers, Australia's first specialist digital currency legal practice. She advises digital currency businesses and has worked with bitcoin industry bodies to clarify the regulatory framework in Australia.

          In a recent article, Jon Matonis stated that "bitcoin requires forceful and aggressive legal defense, not complicity with governments in crafting policy and regulations".

          The current global political climate has resulted in the development of laws that are increasingly pervasive and intrusive on the rights of private individuals. In many countries, forceful and aggressive legal advocacy is necessary to protect civil rights and civil liberties against draconian laws..."

          LibertyX Brings Bitcoin Buying to 2,500 US Retail Stores
          CoindDesk, December 3rd, 2014
          "Liberty Teller, the bitcoin ATM operator that manages machines in high-profile locations near US universities like Harvard and MIT, has officially rebranded as LibertyX, expanding its network with 2,500 new bitcoin buying locations in 33 US states.

          The announcement marks a dramatic expansion for the Boston-based company, which has partnered with transaction processing specialist Qpay to launch cash-for-bitcoin buying services at mobile phone and convenience stores around the country. LibertyX manages four ATM machines, but sees this new partnership as a way to expand and innovate its business..."

          Counterparty Implements Multisignature Addresses And Free Numeric Tokens
          CryptoCoinsNews, December 5th, 2014
          "Counterparty, the open source, community-driven, peer-to-peer financial platform built on top of the Bitcoin blockchain, announced that its developers have successfully implemented Bitcoin multisignature address handling.

          Multisignature addresses are addresses associated with more than one private key and require m of n keys in order to spend funds. This enables enhanced security, since private keys can be stored on separate machines, as well as advanced features, such as sharing an address and its funds with team members, family or company management..."

          Proposed US Law Calls For Five-Year Moratorium on Bitcoin Regulation
          CoindDesk, December 4th, 2014
          "HR 5777, a new bill submitted to Congress by US Representative Steve Stockman (R-TX), calls for a five-year moratorium on digital currency regulation within the US.

          The bill, titled the Cryptocurrency Protocol Protection and Moratorium Act, would hold off any 'statutory restrictions or regulations' for the five-year period after 15th June 2015. The bill was submitted on 1st December and has since been referred to both the House Committee on Ways and Means and the House Committee on Financial Services.

          The draft law also calls for virtual currencies to be classified as traditional currencies under US tax regulations. Currently, the IRS taxes bitcoin holdings as though they were a type of property. Stockman filed a bill earlier this year looking to classify digital currencies similarly to foreign currency..."

          Bitcrypt: Encrypted Messages In The Blockchain
          CryptoCoinsNews, December 1st, 2014
          "The Bitcoin blockchain has been the scene of quite a bit of innovation beyond its currency application. There are passports, applications for fiat currency banking, and there is even talk of artificial intelligence based on the technology.

          Yesterday Bitcrypt, another attempt at innovation using the blockchain, was announced in a small Reddit thread. The idea is that you can write encrypted messages to owners of Bitcoin addresses. A tipster indicated that the author of this tool is credible, so I was dispatched to investigate further..."

          Cloud Computing
          The Best Infrastructure for Your Private Clouds
          Virtualization Done Right Avoids Overprovisioning and Overhead

          In the beginning, we ran applications on one server. But our businesses grew, we needed to run more applications and process more data. That single main server was extremely expensive. We discovered that new, smaller servers were much less expensive. We started to buy smaller servers and run a few applications on each. Eventually computing became so cheap that we could run each application on a single server. To run more applications, we bought more servers. There used to be a time when we only ran a single application on a single box. All was working, it seemed.

          But then we did more and more of that. Over time, we faced acres of servers sprawling out in data centers running out of power and space, yet with vastly under-utilized computing capacity. Those were the bad old days, the days Before Cloud (BC)....

            Simplify Cloud and Mobile Integration
            Webcast Replay

            Simplify Cloud and Mobile Integration

            Learn how to simplify integration for your cloud, mobile, and Internet of Things at this online launch event. Get the latest update on major new enhancements in Oracle SOA Suite 12c including new Cloud integration support, mobile service enablement, and productivity enhancements. Hear success stories directly from Oracle customers Dell, JDSU, and Keste and why they are excited about using Oracle SOA Suite 12c to simplify and differentiate their business.

            Join the webcast and learn:

            • How to unify integration across Cloud, Mobile and the Internet of Things
            • The business value of breaking down the divide between cloud applications and on-premises systems
            • Best practices for mobile enablement within your existing IT environment

            The webcast closes with a live demo on SOA 12c new capabilities presented by the Oracle SOA Specialized Partner AMIS Holding B.V.

            Friday Spotlight: Tips on Managing and Designing Your Deployments
            Two recent webcasts

            Over the last couple of weeks, we've done two fantastic live webcasts giving you tips on how to better manage your Oracle Linux environments. We discussed using Docker, Linux Containers, OpenStack, Spacewalk, and more. If you're looking to get a primer on how these technologies can help you, have a listen to the following on demand versions at your convenience.

            Building the Modern Cloud-Enabled Data Center

            Spacewalk and Ksplice: Keeping Oracle Linux Systems Up to Date and Secure

            Have a great week...

            IT - Cloud
            Cloud Gains Traction In Healthcare
            Information Week, December 1st, 2014
            "Healthcare providers are increasingly recognizing that the cloud empowers them to reduce costs, enhance agility, and improve insights. And many now are investing more heavily and expanding their cloud initiatives.

            By 2020, 80% of healthcare data will "pass through the cloud at some point in its lifetime, as providers seek to leverage cloud-based technologies and infrastructure for data collection, aggregation, analytics and decision-making," ..."

            Monitoring the Hybrid Cloud: Technical Considerations
            Securosis, December 1st, 2014
            "New platforms for hybrid cloud monitoring bring both new capabilities and new challenges. We have already discussed some differences between monitoring the different cloud models, and some of the different deployment options available. This post will dive into some technical considerations for these new hybrid platforms, highlighting potential benefits and issues for data security, privacy, scalability, security analytics, and data governance.

            As cool as a 'CloudSOC' sounds, there are technical nuances which need to be factored into your decision and selection processes. There are also data privacy issues because some types of information fall under compliance and jurisdictional regimes. Cloud computing and service providers can provide an opportunity to control infrastructure costs more effectively, but service models costs are calculated differently that on-premise systems, so you need to understand the computing and storage characteristics of the SOC platform in detail to understand where you are spending money.

            Let's jump into some key areas where you need to focus..."

            Your new legacy system: The public cloud
            ComputerWorld, December 5th, 2014
            "Legacy systems have a checkered rep, and for very good reasons. In some cases, they remain vital to a business - supporting key data and critical processes, and are subject to regular updates and improvements by innovative vendors. But other legacy systems would make terrific boat anchors if they didn't contain ancient applications and data that remain important to a company's day to day functioning.

            You know the type I'm talking about - usually archaic RISC or mainframe systems chugging away a corner that admins regard with the same quiet horror they would a co-worker sporting a hockey mask and a machete seven months before Halloween..."

              Security Best Practices for Amazon Web Services
              Securosis, December 4th, 2014
              "This is a short series on where to start with AWS security. We plan to release it as a concise white paper soon. It doesn't cover everything but is designed to kickstart and prioritize your cloud security program on Amazon. We do plan to write a much deeper paper next year, but we received several requests for something covering the fundamentals, so here you go ...

              Building on a Secure Foundation

              Amazon Web Services is one of the most secure public cloud platforms available, with deep datacenter security and many user-accessible security features. Building your own secure services on AWS requires properly using what AWS offers, and adding additional controls to fill the gaps..."

              Advice for CIOs on cloud computing risk management
              SearchCIO, December 6th, 2014
              "Cloud technology expert Stephen Braat of IT service provider CDW shared his views on cloud computing risk management with CIOs at SIMposium 2014.

              At SIMposium 2014, the annual CIO event hosted by the Society for Information Management, Stephen Braat of IT service provider CDW gave CIOs some insight into where he and his clients have found points of risk in their cloud operations.

              Security, privacy and data protection loom large, of course, said Braat, a vice president of cloud and managed solutions at the Vernon Hills, Illinois CDW. Unfortunately, one of the first missteps CIOs make is to rely on the vendor contract to address their concerns..."

              Cloud Storage: 8 Ways You're Wasting Money
              Information Week, December 3rd, 2014
              "Don't fall into the "cheap" and "easy" cloud trap. Know how you're spending your money -- and why.

              There's a litany of platforms and applications out there under the great "cloud" umbrella. Storage, one part of the broad category, epitomizes this trait of cloud computing as a whole: an almost overwhelming array of choices.

              The crowded storage field ranges from consumer champions like Dropbox, which have recently pushed to appeal to business customers, to tech titans such as Microsoft, which have long held sway with IT but are now trying to be all things to all people. Microsoft alone offers a menu of backup and storage options across its OneDrive and Azure platforms..."

              Cloud Storage Is Inevitable, So Plan For It
              Information Week, December 4th, 2014
              "Simply buying more on-premises data storage without evaluating cloud-based storage alternatives could be a costly mistake.

              With nearly every enterprise's IT department under pressure to cut costs and improve responsiveness, one of the easiest and most basic moves is to use the current IT footprint more efficiently. But that is easier said than done. Or is it? Companies around the world are quickly recognizing the cost benefits of storing some types of corporate data in the cloud instead of taking up valuable floor space in the corporate data center..."

                IT - CxO
                InformationWeek's 2014 Chief of the Year Cathy Bessant: What I Believe
                Information Week, December 1st, 2014
                "InformationWeek's 2014 Chief of the Year shares what being a cancer survivor taught her, why she dislikes rock-star CIOs, and more.

                On not coming up through the technology ranks:

                "If I was a classically trained technologist, I would be great at Cobol. And I probably would have come up through the technology side of the company during that period of time when technology and the business really were separate, when technology was thought of as the black box, when the budgets weren't integrated and understood. All kinds of preparation can work for sitting in the kind of job that I sit in today. But now, five years later, I look at the alternative and I feel very fortunate to have come at it from this direction."

                How I Became a CISO
                Dark Reading, December 1st, 2014
                "Technology was more of a hobby than a career choice for Jonathan Trull, but protecting people was always job number one.

                Jonathan Trull, chief information security officer for Qualys, says he was always in the protection industry. Like many CISOs, Trull did not set out for a career in infosec, but rather stumbled into it in a happy accident. While some CISOs began their journeys as far afield as physics, law, auto repair, and liberal arts, Trull from the beginning was doing security -- just a rather different sort.

                Trull got his Bachelor's degree in criminal justice (and later a Master's in public administration) and proceeded to become a correctional officer. He was an intelligence officer in the US Navy Reserves for eight years..."

                How to 'Fail Better' on IT Projects
                CIO Insight, December 5th, 2014
                "Playwright Samuel Beckett famously wrote, "Try again. Fail again. Fail better." Such advice would greatly benefit modern IT teams, given that 17 percent of projects fail completely, and two-thirds fall short of expectations, according to the Project Management Institute. In the recent book, Fail Better: Design Smart Mistakes and Succeed Sooner (Harvard Business Review Press/available now), authors Anjali Sastry and Kara Penn provide in-depth perspectives about how such experiences can ultimately benefit professionals in terms of accumulated wisdom through trial and error. After all, Henry Ford went broke five times before he started the Ford Motor Co. Bill Gates and Paul Allen launched the disappointing Traf-O-Data before they came up with Microsoft. And remember that Christopher Columbus discovered America by mistake. All of which signifies a simple message: Failure can often serve as the beginning of great achievements, rather than the end of anything worthwhile..."
                Why the CIO-CMO Relationship Is Like Reality TV
                CIO, December 3rd, 2014
                "CMOs and CIOs are probably sick of overanalyzing their relationship. The reality is that it's time to move past the trust and respect issues and get down to business...

                In the world of business technology, the relationship between CIOs and CMOs is the equivalent of the American public's fascination with the Justin Bieber and Selena Gomez on-again, off-again relationship.

                OK. That may be a stretch. CIOs, however, probably do feel like tabloid fodder these days. While they aren't forced to push their way through the paparazzi, CIOs have probably had their fill of people talking about not only their roles and responsibilities, but also their future in the enterprise..."

                  The Millennium Falcon And Breach Responsibility
                  Forrester, December 4th, 2014
                  "Do you remember the scene from The Empire Strikes Back where the Millennium Falcon is trying to escape an Imperial Star Destroyer? Han Solo says, 'Let's get out of here, ready for light-speed? One - two - three!' Han pulls back on the hyperspace throttle and nothing happens. He then says, 'It's not fair! It's not my fault! It's not my fault!'

                  Later in the movie when Lando and Leia are trying to escape Bespin, the hyperdrive fails yet again. Lando exclaimed, 'They told me they fixed it. I trusted them to fix it. It's not my fault!' In first case transfer circuits were damaged, and in the second case, stormtroopers disabled the hyperdrive..."

                    CIOs urged to take risks, or risk being Uberized
                    SearchCIO, December 5th, 2014
                    "The pushback against Uber offers a lesson in risk-taking for CIOs. Also in Searchlight: Black Friday loses sales steam, but Cyber Monday is stronger than ever, especially for smartphone users...

                    Uber, the mobile app-based ridesharing service and industry disruptor par excellence, was once again in the media crosshairs, this time over flouting city transportation licensing and regulations. Here in Boston, executives from Uber and its rival Lyft appeared before the Boston City Council for a six-hour-long public discussion on the role of ridesharing services in the city's transportation industry.

                    The upshot? Not much in the way of constructive action..."

                      CIO Checklist: Ready For The Disrupted, Digital World?
                      Information Week, December 2nd, 2014
                      "IT leaders can take these steps today to stay relevant. Just don't confuse "checklist" with a simple fix. Disruptive digital technologies are creating a new application-driven economy that is changing the way CIOs need to approach their jobs.

                      The evidence is all around us, as new technology drives disruption in industries like transportation (Lyft, Uber), hospitality (AirBnB, HomeAway), payments (Square, Google Wallet), and more. In this disrupted, digital world, software is eating the world and applications are fundamentally changing your business..."

                      New IT Outsourcing Model Boosts Bottom Line
                      CIO, December 5th, 2014
                      "Spinoffs, buyouts, divestitures and focused acquisitions improve operating margins and bolster the bottom line for IT service providers -- and their customers.

                      Faced with increased competition and pricing pressure, global service providers have been increasing their focus on their most lucrative business segments in recent years. And that restructuring is beginning to bolster their bottom lines. During the second quarter of 2014, IT outsourcing providers saw the highest growth in their operating margins in five years, according to outsourcing consultancy Everest Group..."

                      CIOs Bedeviled by IT Services Access, App Downtime
                      eWeek, December 2nd, 2014
                      "While businesses are already calling for greater availability, IT departments are missing the recovery time objective (RTO) their businesses demand.

                      The vast majority (82 percent) of CIOs admit that they are unable to meet their businessÂ’ need for immediate, always-on access to IT services, according to a global survey by Veeam Software.

                      This availability gap has immediate costs, as application failure costs enterprises more than $2 million a year in lost revenue, productivity, opportunities and data irretrievably lost through backups failing to recover..."

                        vBeers @ Broward - Funky Buddha - Wed December, 10th
                        6pm - 9pm
                        Join us for vBeers @ Broward. We meet on the 2nd Wednesday of each month in Broward. The meetings will be at Funky Buddha which is 5 minutes east of I95.

                        This event will be a non-sponsored event so bring your wallet, your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community (including YOU!).

                        • Funky Buddha Brewery
                        • 1201 NE 38th St
                        • Oakland Park, FL 33334

                        Please Register.

                        Join us for one of the three South Florida vBeers events. The South Florida vBeers events happen three times a month, once per county:

                        IT - DR
                        Firms losing millions through avoidable IT outages
              , December 2nd, 2014
                        "Organisations are still taking a financial hit from IT service outages, as disaster recovery remains a low priority for under-resourced IT teams, and the situation is likely to get worse as businesses increasingly operate on a 24x7 basis.

                        The findings come from the Veeam Data Center Availability Report 2014, which is based on responses from 760 IT chiefs at organisations with more than 1,000 employees in countries including the UK, US, Germany, France, and Australia and Singapore. Veeam found that many IT leaders are well aware of the significant costs associated with downtime in services, reporting an average 13 application failure incidents a year costing as much as $2m a year in some cases..."

                        IT - Networks
                        Net neutrality: Five myths, and the real facts
                        PCWorld, December 1st, 2014
                        "Regardless of where you stand on the net neutrality debate, one thing doesn't help: misleading or confusing statements. Unfortunately there are plenty of them.

                        Net neutrality is an Internet ideal that will become possible If the Federal Communications Commission decides to reclassify Internet service providers from information services to telecommunications services. If the FCC reclassifies ISPs, it will be able to regulate them - and that could affect a push by ISPs to provide faster Internet service to Web companies willing to pay for the privilege.

                        Data-hungry Web companies like Netflix want the speed, and the ISPs want the money. Others, however, fear a pay-to-play scheme could put cash-strapped startup sites at a disadvantage.

                        Add the pro- and anti-regulation forces to this mix, and the rhetoric's flying in all directions on social media as well as in the news. We've teased out the facts behind five net neutrality myths. It won't resolve the debate, but it'll help you understand what's really going on..."

                        SDN tools increase WAN efficiency
                        Network World, December 1st, 2014
                        "Configuring, maintaining and changing WAN infrastructure can be a nightmare given the distributed nature of the beast and all the remote touch points, but emerging Software Defined Networking (SDN) tools promise to make these operations more efficient.

                        Usually touted as a data center tool, SDN can be used to automate and manage WAN operations, says Zeus Kerravala, principal of ZK Research. WAN issues are hard to address because of the dispersed nature of the resources, he says. 'There's no perfect way of making changes to the WAN,' but 'SDN brings automation and orchestration from a centralized location and allows you to react faster.'

                        Showdown coming on Ethernet standard for faster Wi-Fi
                        ComputerWorld, December 2nd, 2014
                        "There's a standard in the works for Ethernet gear to feed faster Wi-Fi access points, but with rival industry groups pushing two different specifications, it might take a while to finish.

                        Wi-Fi is getting fast enough that Gigabit Ethernet can't keep up with the most advanced access points, which use 802.11ac Wave 2 technology. Users could go to 10-Gigabit Ethernet, but for most that would require installing more advanced cable. So the search is on for something in between that works on the most common kinds of cable over at least 100 meters..."

                        Full Speed Ahead for 802.11ac Gigabit Wi-Fi
                        CIO, December 4th, 2014
                        "Last December customers were peppering wireless LAN vendors with questions about whether to upgrade to the pre-standard-but-certified 802.11ac products flooding the market or hold off until 2015, when more powerful 'Wave 2' Gigabit Wifi gear was expected to become prevalent.

                        A year later, even though Wave 2 products have begun trickling into the market, many IT shops seem less preoccupied with Wave 2 and more focused on installing the Wave 1 11ac routers, access points and other products at hand. After all, this first wave of 11ac is at least a couple times faster than last generation 11n, plus has more range, boasts better power efficiency and is more secure. And even Apple's new iPhone 6 and 6 Plus support it..."

                          150M passenger cars will be connected to the Internet by 2020
                          ComputerWorld, December 1st, 2014
                          "In just five years, most cars and trucks will be connected to the Internet, according to a report from Gartner Inc.

                          By 2020, about 150 million vehicles will be connected via Wi-Fi, and 60% to 75% of them will be capable of consuming, creating and sharing Web-based data, the report states.

                          The added connectivity will let carmakers change their business model from pure hardware to tech innovators that draw income from mobile apps. To do that, however, vehicle manufacturers will need to team up with companies such as Google, Apple and Samsung..."

                          IT - Operations
                          New data center ratings system challenges Uptime, TIA
                          SearchDataCenter, December 1st, 2014
                          "The IDCA Infinity Paradigm challenges Uptime's Tier ratings with a pyramid system that ranks data centers based on service availability and quality.

                          Every so often, someone comes along and challenges the status quo in the interest of modernization.

                          The International Data Center Authority (IDCA) wants to fill gaps in the established data center ratings for resiliency and uptime, with a departure from some of the Uptime Institute's Tiers and ASHRAE 9.9, TIA-942, BICSI and IEEE standards and guidelines.

                          "The existing [focus on just power and cooling] doesn't reflect what we need today, and in the future," said Mehdi Paryavi, Chairman of IDCA, a research and education organization headquartered in Washington, D.C..."

                          Study: 58 percent of businesses do not have complete patch management strategy
                          SC Magazine, December 5th, 2014
                          "Although major vulnerabilities, such as Heartbleed and ShellShock, were discovered this year, and data breaches dominated headlines, IT security professionals are continuing to delay the creation of thorough security plans and patching schedules, a new study found.

                          Sixty-three percent of businesses do not have a fully mature method to control and track sensitive data, and 19 percent do not have one at all, according to Trustwave's '2014 State of Risk Report.'

                          Speaking out in support of legacy systems and solutions
                          ZDNet, December 5th, 2014
                          Summary:Vendors often rely on the tactic to attack legacy systems and solutions in the hopes of replacing them with their own technology. Should enterprise decision makers listen to them?...

                          I've come here today to support legacy systems and software not to condemn it. I know that many vendors would say that this is heresy, but in this time of cost cutting and outsourcing, it is something that just needs to be said again..."

                          Can vendors go unescorted in a secure colocation center?
                          SearchDataCenter, December 4th, 2014
                          "You've sentenced your production servers to five-to-life lockdown in a secure colocation cage. Who's allowed to visit them?

                          Unescorted access to colocation facilities is a big NO.

                          That engineer coming in from ABC123 Computer Equipment Inc. to patch your cables is just like any other employee of any company. Can you personally vouch for him? Has ABC123 or its partners vetted the person's background to the extent that the colocation provider would have -- or to the same degree to which you vet employees?..."

                          Log analysis tools join data center management arsenal
                          SearchDataCenter, December 3rd, 2014
                          "The humble log file, produced by nearly everything in your data center, holds the key to complex troubleshooting, convincing capacity plans and revved up performance.

                          A new breed of management tools is gaining traction in IT organizations. Rather than imposing strenuous new tests or metrics, these emerging tools look at perhaps the most mundane aspect of systems and applications: the log files..."

                          IT - Security
                          10 good security habits for keeping your organization secure
                          SearchSecurity, December 5th, 2014
                          "Enterprises that succeed in information security share a number of good security habits. Expert Steven Weil reviews the top ten best practices that are essential to success.

                          During my 18-year career providing information security services to a wide variety of organizations, I've seen many that do information security well -- by correctly identifying and prioritizing risks, appropriately protecting critical data and promptly mitigating security gaps -- and many that do not..."

                          Endpoint Security Makes Quantum Shift
                          Information Week, December 3rd, 2014
                          "We can't stop every attack, so we need a new mantra: Detect and respond. Here are the essential tools, skills, and processes.

                          Rest in peace, antivirus. You had a good run for a security technology -- 1987 to 2014.

                          In case you missed it, in May, Symantec called time of death for antivirus software. It did so not because AV technologies suddenly became less effective. Rather, the company finally acknowledged that it's not a matter of if, but when, an organization will be targeted and that antivirus products will stop only some attacks. Plenty of security bloggers and pundits reacted with glee, given that antivirus software reportedly represents 40% of Symantec's revenue..."

                          DevOps a natural fit for cloud security
                          ZDNet, December 5th, 2014
                          "DevOps is pretty much the work of the devil. Why on earth would you let developers -- people who tinker and fiddle and crash things as they struggle to get complex software to work properly -- anywhere near productions systems that need to maintain a bunch of nines of reliability? This fad must die.

                          At least, that was the core of my thinking, as someone influenced by old-school notions of reliable systems and network administration, until a recent conversation with Dr Nataraj (Raj) Nagaratnam, chief technology officer for IBM's Security Solutions division..."

                          Information Security 2014: Shifts ahead after a watershed year
                          SearchSecurity, December 6th, 2014
                          "As another year ends, we look back to try to figure out what we can take away from the security blunders and breakthroughs in 2014. It was a year of ongoing mass surveillance and game-changing data breaches. Was a tipping point finally reached?

                          In a perfect storm of hemorrhaging credit card info, one retailer after another in 2014 had their point-of-sale (PoS) systems fleeced by way of sloppy defenses and rampant malware. Target Corp., as patient zero, replaced all its card-swipe machines with chip-and-PIN equipment while, at Black Hat in early August, Ross Anderson (once again) reminded us that chip-and-PIN is broken several times over and in ways that he was happy to show proof-of-concept videos to illustrate..."

                          Ranum Q&A: Security strategy with Richard Bejtlich
                          SearchSecurity, December 6th, 2014
                          "Keeping up to speed on new adversaries may require a change in tactics.

                          Richard Bejtlich, who began his digital security career as an Air Force intelligence officer, says many security people remind him of fighter pilots.

                          "They concentrate on their tools and how to use them in direct confrontation with an adversary," he says. "It's more work to step back and consider if fighting a tactical skirmish contributes to the campaign or winning the big picture."

                          High-Bandwidth DDoS Attacks Becoming More Commonplace
                          eWeek, December 1st, 2014
                          "Distributed denial-of-service (DDoS) attacks continue to be a growing trend in 2014, according to the third-quarter 2014 Verisign Distributed Denial of Service Trends Report. Some of the trends in the third quarter were continuations of ones observed in Verisign's second-quarter DDoS trends report, in addition to some new variations in attack vectors and targets. The latest report, which covers the period of July 1 to Sept. 30, 2014, found that high-bandwidth attacks of 10G bps and higher grew by 38 percent from the second quarter and now represent 20 percent of all attacks..."
                            Information Security 2014: Shifts ahead after a watershed year
                            SearchSecurity, December 5th, 2014
                            "Editorial Director Robert Richardson looks at the year in review and offers his take on the security blunders and breakthroughs and some lessons learned.

                            As another year ends, we look back to try to figure out what we can take away from the security blunders and breakthroughs in 2014. It was a year of ongoing mass surveillance and game-changing data breaches. Was a tipping point finally reached?

                            In a perfect storm of hemorrhaging credit card info, one retailer after another in 2014 had their point-of-sale (PoS) systems fleeced by way of sloppy defenses and rampant malware. Target Corp., as patient zero, replaced all its card-swipe machines with chip-and-PIN equipment while, at Black Hat in early August, Ross Anderson (once again) reminded us that chip-and-PIN is broken several times over and in ways that he was happy to show proof-of-concept videos to illustrate..."

                            Moving Beyond 2-Factor Authentication With 'Context'
                            Dark Reading, December 5th, 2014
                            "What's the best way to protect your proprietary business secrets or financial data? One common recommendation is to implement two-factor authentication. As you undoubtedly know, two-factor authentication limits the usefulness of any credentials that attackers may have acquired or created, restricting their ability to move laterally within the organization or access your VPN to log back in remotely and attempt to gain ever more powerful credentials.

                            Unfortunately, two-factor authentication isn't cheap -- in more ways than one (or even two)..."

                            Best Defense Against a Cyber-Attack Is to Know Your Adversary
                            eWeek, December 7th, 2014
                            "NEWS ANALYSIS: One significant reason why you don't hear about military computer systems being hacked is because the military doesn't approach cyber-security the same way you do.

                            Tom Chapman likes to quote the ancient Chinese general and military philosopher Sun Tzu when he's talking about cyber-security. "If you know your enemies and know yourself, you will not be imperiled in a hundred battles," Chapman quotes from Chapter 3 of "The Art of War." Chapman, who is director of cyber operations at EdgeWave Security, believes that if enterprises looked at security the way the military does and used military-grade practices, few network breaches would succeed. Chapman gets his military slant because he was in charge of part of the U.S. Navy's cyber-war operations..."

                            IT - Careers
                            6 IT Job Hunting Dos & Don'ts
                            Information Week, December 4th, 2014
                            "Jobs in IT have been a relative bright spot in the recovering US economy.

                            US employment numbers for October 2014 by the Bureau of Labor Statistics (BLS) reveals a net increase of 12,900 IT jobs across four industry job segments commonly associated with technology professionals, according to an analysis earlier this month by Foote Partners.

                            The October result, although significantly lower than the 22,700 jobs added in September, was still "greater than the 11,392 average monthly gain for year-to-date 2014 and the 10,708 average monthly IT job growth for calendar year 2013," Foote noted..."

                              The Best IT Resume Tips of 2014
                              CIO, December 2nd, 2014
                              "Over the last year, our resume experts and career consultants have helped numerous IT professionals put their best foot forward. Here's a quick look at some of the top resume tips from 2014's IT Resume Makeover series.

                              For a deeper dive on resume tips with expert commentary..."

                                Expanding your cloud repertoire? Check out these certifications
                                ZDNet, November 29th, 2014
                                "As mentioned in previous posts, certifications and accreditations are huge pluses for careers. They offer highly focused, lower-cost alternatives to formal continuing education from universities and colleges, and help resumes stand out. Plus, surveys show credentialed professionals often draw higher incomes than their non-credentialed counterparts. For managers and professionals in the fast-changing digital and tech economy, certifications may be the only way to keep skills current and relevant..."
                                  The best programming languages every beginner should learn
                                  VentureBeat, December 6th, 2014
                                  "Computer science is a booming industry in the US - and it pays extremely well. There's always demand for sharp, talented engineers, which is why learning how to code can seem like an attractive option.

                                  But, as is the case with any new skill, it can be difficult to know where to start. Here are a few steps you should take early on, and programming languages that are best-suited for beginners..."

                                    The Next 'Sea Change' in Recruiting: Mobile
                                    CIO, December 5th, 2014
                                    "The way today's tech talent looks for work is changing. Prospective employees are using their mobile devices to connect with employers more than ever and this trend is expected to continue. Does your organization have a mobile recruiting strategy?...

                                    Successful recruiting is about making connections with candidates on their own terms -- if those terms include being able to search for and apply to open positions on their mobile device, you'd better have a mobile presence or candidates will pass you by..."

                                      IT - Social Media
                                      3 Ways to Use Social Media to Recruit Better Tech Talent
                                      CIO, December 4th, 2014
                                      "Is your company using social media to its full potential when it comes to finding new employees? Your competition probably is.

                                      A whopping 93 percent of the 1,855 recruiting pros surveyed in Jobvite's 2014 Social Recruiting Survey use or plan to use social media in their recruiting efforts.

                                      The reason why is simple and powerful. According to respondents, leveraging social media improves candidate quality by 44 percent over those using only "traditional" recruiting techniques like phone screenings and filtering resumes based solely on skills and experience..."

                                        Oracle's New Two-Socket x86 Servers with Oracle's Unique NVM Express Design
                                        By Josh Rosen
                                        Josh writes, "Oracle announced the new Oracle Server X5-2 and Oracle Server X5-2L, based on the latest processors from the Intel® Xeon® E5-2600 v3 processor family, also known as the Intel Haswell-EP processors. These are the most powerful two-socket servers we've ever made, and we are excited to share our most recent innovations. Both of these servers have been designed from the ground up for one purpose - to be the best two-socket servers for running Oracle software.

                                        We have optimized the two servers for different Oracle workloads..."

                                        Oracle Server X5-2 and Oracle Server X5-2L
                                        Available now
                                        Oracle announced the new Oracle Server X5-2 and Oracle Server X5-2L, based on the latest processors from the Intel Xeon E5-2600 v3 processor family, also known as the Intel Haswell-EP processors. At the same time, Oracle has announced support for high bandwidth NVM Express (NVMe) flash drives on both new servers. These servers are available immediately for quoting, ordering and shipping.
                                        IT - Virtualization
                                        Are your virtualization security tools up to the job?
                                        SearchSecurity, December 3rd, 2014
                                        "With many organizations, there is a gap between the security implemented within the physical realm and the controls and policies used in the virtual environment. Why do IT teams fall behind when it comes to virtualization security tools?

                                        Sometimes, this may be the result of immature technology that doesn't work as well as advertised in the virtual data center. In other cases, a lack of maturity in implementing processes and procedures could be at fault, says Dave Shackleford, founder and principal consultant at Roswell, Ga.-based Voodoo Security..."

                                        Introduction to Docker
                                        O'Reilly, December 1st, 2014
                                        "Get started with Docker and learn how to deploy your software applications as portable, self-sufficient containers that can run on almost any server. As a platform for preparing and running distributed software applications, Docker is often compared to configuration management tools like Puppet or Ansible, or virtualization tools like VirtualBox or VMware, but Docker is actually in a category of its own, offering new ways to run software applications.

                                        If you're familiar with deploying and managing software applications in production, this video tutorial provides the knowledge you need to 'Dockerize' an application and deploy it to the cloud using containers, images, and Dockerfiles..."

                                        How to get more out of your virtualized and cloud environments
                                        Network World, December 1st, 2014
                                        "After Dammions Darden arrived as the new senior systems administrator for the city of Garland, Texas, he knew that the 50 to 60 physical hosts for this 234,000-person city outside of Dallas were not running nearly as efficiently as they could be. Some had excess capacity, others were running way too hot.

                                        Traditionally if apps are slow and virtual machines need more memory the easy answer is an unfortunate one: Throw more hardware at the problem. But Darden wasn't satisfied with that. While roaming the expo floor at VMworld two years ago he stumbled across VMTurbo, a company that specializes in analyzing virtual environments..."

                                          Scream Safely! Introducing ZFS Storage ZS4-4 and OS8.3
                                          Turbocharged storage!!!
                                          Bob Handlin writes, "That's the best way to describe our Oracle ZFS Storage ZS4-4 (released today). It's our 4th generation high-end Oracle ZFS Storage Appliance, and it comes with our just-released OS8.3 software. This new platform uses the latest hardware technology, and combined with OS8.3, doubles the performance of the record-setting previous generation, and also offers new innovations in security and Oracle Database 12c analytics.

                                          In short, it's a beast..."

                                          Oracle Unveils Flagship Oracle ZFS Storage ZS4-4 NAS System
                                          with Extreme Performance and Innovations for Oracle Database 12c
                                          Oracle's latest-generation NAS storage system, Oracle ZFS Storage ZS4-4, enables customers to significantly accelerate application performance and dramatically improve operational efficiencies. Co-engineered with Oracle Database 12c, Oracle ZFS Storage ZS4-4 is the industry's only storage system with analytics for pluggable databases. It doubles previous generation performance to enable faster time to actionable intelligence and smarter, more competitive business decisions. Oracle ZFS Storage ZS4-4 also provides high-level protection against security breaches with its fine-grained, simple, cost-efficient encryption capabilities...
                                          IT - Backup
                                          Survey finds data protection problematic even in modern data centers
                                          SearchDataBackup, December 5th, 2014
                                          "Companies still find it difficult to achieve data protection goals, and downtime costs keep growing, according to a trio of vendor-sponsored surveys.

                                          There are more products, services and technologies for protecting data than ever before. Still, several recent surveys show organizations fail to achieve the level of data protection they require and that data loss costs them money.

                                          Three surveys came out this week that focused on the challenges IT departments face in minimizing data loss and reducing downtime costs. EMC Corp.'s Global Data Protection Index survey found that data loss and downtime cost enterprises $1.7 trillion in the last 12 months or the equivalent of nearly 50% of Germany's GDP..."

                                          IT - Mobile
                                          10 Implications of Tablet Sales Slowdown
                                          eWeek, December 1st, 2014
                                          "Tablet manufacturers will be paying closer attention than usual to holiday sales to see if they provide yet more evidence of a disturbing trend revealed in a recent market study by research firm IDC. Not only did the tablet market experience what IDC called a "massive deceleration" so far this year, but the prospects for a tablet sales recovery are looking poor beyond the usual holiday season surge. Apple expects to report a year-to-year decline in iPad sales for the first time while notebooks sales have rebounded. There other hints in the IDC study that suggest the market is changing at a rapid pace. Tablet makers that fail to react correctly to those changes could face a rash of problems in the coming months. This eWEEK slide show highlights some of the more interesting points from the IDC study, which examines worldwide tablet shipment forecasts through the end of this year and into 2018. Read on to learn more about the worldwide tablet market and why some manufacturers are likely a bit anxious about the future..."
                                          Don't Lose Potential Mobile Moments By Neglecting Information Workers
                                          Forrester, December 5th, 2014
                                          "With evolving bring-your-own-device (BYOD) trends and the prevalence of consumer mobility captured by the Mobile Mind Shift Index, the lines between personal and work mobility have blurred. I see this every day that I take the train to work, watching information workers seamlessly shift from Candy Crush Saga to their work email on their mobile devices.

                                          For years, Forrester has measured consumers' use of technology in their personal lives and their work through its Consumer and Business Technographics® surveys. This year, we began to address the intersection of these spheres, comparing a worker's relative mobility at home with their mobility at work. Specifically, we analyzed the extent to which information workers across 10 countries use mobile devices at work and at home, leading to four segments based on their relative mobility in each sphere:.."

                                          Why It's (Finally) Time to Embrace Thin Client Technology
                                          CIO, December 5th, 2014
                                          "When you look at the power of today's smartphones and cloud services, there are clear reasons to think thin clients may rise, writes Rob Enderle.

                                          Earlier this week, I was at Dell's analyst update on its thin client business and it got me thinking about how thin clients were supposed to replace personal computers. An experience that was instant on/off, that embodied simplicity and reliability and that not only had the performance of a PC but could be updated without any user impact was a compelling idea.

                                          Unfortunately, the compromises were initially far too great. Today technologies like NVIDIA Grid, MU-MIMO, and hosted services like Mainframe 2 have largely removed the impediments to making the change (they still lack and likely will continue to lack on airplanes), but I think the market is waiting for a trigger. Let me explain..."

                                          Mobile Commerce to Hit Nearly 200 Billion Transactions by 2019
                                          eWeek, December 1st, 2014
                                          "Rather than focusing purely on payments, stakeholders need to emphasize synergies between mobile payment and loyalty to persuade retailers to engage.

                                          Mobile phone and tablet users will make 195 billion mobile commerce transactions annually by 2019, up from 72 billion this year, according to a report from Juniper Research. The study indicated the highest growth rates are expected in the near-field communications (NFC) sector, a form of short-range wireless communication that can be used for contactless payment systems.

                                          Here, usage is expected to be buoyed by the launch of Apple Pay, which has major retailers like Walmart and Target in the fold, together with a host of anticipated deployments by banks using solutions based on Host Card Emulation (HCE) technology..."

                                            Google Chromebook Overtakes Apple iPad in Educational Sales
                                            TechZone360, December 5th, 2014
                                            Google has finally overtaken Apple in sales to U.S. schools, with the Chromebook inching ahead of the iPad after a long-standing lead. Google sold 715,500 of its low-end laptops in the third quarter of 2014, with Apple only selling 702,000 iPad tablets, according to a recent report from the market research firm IDC. "Chromebooks are really gaining traction," said Rajani Singh, an analyst with IDC. "The growth of Chromebook is a major concern for Apple's iPad."
                                            IT - Big Data
                                            Big Data Market Projected to Reach $76 Billion by 2020
                                            Information Management, December 4th, 2014
                                            "As data continues to proliferate exponentially, businesses of all kinds are finding it more and more worthwhile to analyze that data so they can better pinpoint market opportunities, deliver greater value to their customers and improve the efficiency of their operations.

                                            But businesses need a lot of help gathering, integrating, analyzing and monetizing data on an increasingly massive scale. That's why technology vendors offering big data solutions are raking in an estimated $30 billion worldwide. And that revenue is projected to grow 17 percent annually to reach $76 billion by 2020, said the authors of 'The Big Data Market 2014-2020: Opportunities, Challenges, Strategies, Industry Verticals and Forecasts,' a new report from SNS Research..."

                                            NSA returns to open source
                                            Federal Computer Week, December 1st, 2014
                                            "The agency usually known for its devotion to secrecy has again jumped into the world of public open-source coding.

                                            In a Nov. 25 announcement, National Security Agency officials said they were making their tool Niagarafiles, or NiFi, publicly available in the hope that industry would modify it to handle commercial big-data needs.

                                            The technology helps automate high-volume data flows among multiple computer networks, even if those networks use different formats and protocols. NSA said the private sector could use the technology in various ways to control, manage and analyze information from geographically dispersed sites to create comprehensive situational awareness..."

                                            How UPS uses analytics to drive down costs
                                            Network World, December 1st, 2014
                                            "When you have an organization the size of UPS - with 99,000 vehicles and 424,000 employees - every single little bit of efficiency that can be squeezed out of daily operations translates into a big deal. UPS has been using analytics to do just that for a long time now, and keeps getting better and better at it. Network World Editor in Chief John Dix caught up with UPS Senior Director of Process Management Jack Levis for an update on their latest achievements..."
                                            What Does Big Data Mean for Marketers?
                                            Business 2 Community, December 1st, 2014
                                            "Big Data is the next big thing. You probably hear that a lot lately. What Does Big Data Mean for Marketers? For marketers, Big Data means big strides, big success, and big money. But like all significant technological breakthroughs, Big Data must be introduced in bite-sized morsels.

                                            The name itself is scary - Big Data - and conjures up images of trillion-dollar Big Tobacco and Big Government. It seems like some mythical corporate beast with room-sized 1960s IBM computer banks and a basement full of punch cards.

                                            It might be easier to live with if we called it Big Daddy because it facilitates data collection, storage, and analysis, allowing enough information to merge from separate spheres to provide real-time traffic maps, patient monitoring in intensive care units, and highly-targeted marketing strategies based on a customer's ever-changing needs..."

                                            7 Key Big Data Research Findings
                                            Information Management, December 5th, 2014
                                            "Big Data is more than market hype, and will have the ability to reshape entire markets and shift competitive landscapes, according to recent research from General Electric and Accenture.

                                            "Executives across the industrial and healthcare sectors see the enormous potential of the Industrial Internet - the combination of Big Data analytics with the Internet of Things," according to the research findings. "The Industrial Internet enables companies to use sensors, software, machine-to-machine learning and other technologies to gather and analyze data from physical objects or other large data streams - and then use those analyses to manage operations and in some cases to offer new, valued-added services."

                                            Among the survey highlights:..."

                                            The Digital Trends for Data-Driven Markets in 2015 & Beyond
                                            Wall Street and Technology, December 3rd, 2014
                                            "Top marketing trends for social, mobile, advertising, and digital analytics, according to Teradata's Michael Lummus

                                            Digital channels represent 25% of today's total marketing budgets, and with the adoption of smartphones, digital commerce, and growth of social networks, digital marketing spend is expected to grow to one third by 2017, says Michael Lummus, director of digital marketing solutions at Teradata.

                                            Big data will represent $50 billion in spending in the US alone, with a lot of the use cases driven by marketing and digital. Teradata's international survey of 400 enterprise digital marketers found an upward trend in digital marketing budgets, and a slight decrease in more traditional offline channels..."

                                            IT - BYOD
                                            BYOD Brings Corporate Contradictions
                                            CIO, December 1st, 2014
                                            "During a roundtable discussion on the Bring Your Own Device (BYOD) trend, a tech leader candidly offered this bit of real-world insight: "My wife is a nurse. There is no BYOD policy at the hospital. But all of the nurses communicate with each other via SMS, because that's the most efficient way to do their job."

                                            It's a good bet that those text messages, which are practically impossible for IT to monitor and record, are out of compliance with healthcare regulations. It's an even better bet that this kind of BYOD-related breach is happening en masse across the country, in virtually every industry..."

                                            Around the World With BYOD
                                            CIO, December 2nd, 2014
                                            "More than half of employees across the global bring a mobile device to work. However, when you look at individual countries, the results vary wildly in terms of ownership and adoption -- surprisingly, some tech-loving countries are lagging behind.

                                            Unlike most technology trends, the Bring Your Own Device (BYOD) phenomenon is tied closely to culture and norms. As a result, BYOD adoption varies widely country by country, as a recent Dell study on global workforce trends shows.

                                            Dell, Intel, TNS and Cascade Insights collectively interviewed 20 workforce experts in a dozen countries. The study found that more than half of employees globally are doing some form of BYOD, either on their own or under a company initiative. Yet some countries such as China and UAE are BYOD hotspots, while Brazil and Germany are not. What gives? ..."

                                            Top Ten Articles for last few Issues
                                            Vol 201 Issues 1, 2, 3 and 4; Vol 200 Issues 1, 2, 3,4 and 5
                                            We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                            • Oracle Solaris 11 - Beginners Guide
                                            • vBeers @ ITPalooza After Dark
                                            • Oracle High Scores on GigaOm Research - Sector Roadmap
                                            • Over 10,000 Engineered Systems sold
                                            • Java Update and Roadmap
                                            • Oracle Linux Docker Base Image on Ubuntu 14.10
                                            • Best Virtualization and Life Cycle Management for Private Clouds
                                            • Oracle Managed Cloud Services Wins the Frost & Sullivan 2014 North American Customer Value Leadership Award
                                            • Cloud Computing
                                            • Events where you can find MySQL in December 2014 & January 2015

                                            The longer version of this article has list of top ten articles for the last 8 weeks.

                                              IT - Server
                                              Enterprise Linux growing at Windows' expense
                                              ZDNet, December 3rd, 2014
                                              "Summary: According to a new report from The Linux Foundation, Linux is leading Windows on both the cloud and in enterprise application deployments.

                                              Sure, Windows still rules the desktop, but Linux kicks rump and takes names on enterprise servers and the cloud, according to the 2014 Enterprise End User Trends Report from The Linux Foundation and the Yeoman Technology Group.

                                              Specifically, they found that enterprise server applications are being deployed at the expense of Windows and Unix over the last four years. Linux application deployments have risen during this period, from 65 percent to 79 percent, while Windows deployment has fallen from 45 percent to 36 percent..."

                                              Running mission-critical applications on Enterprise Linux servers
                                              ZDNet, December 4th, 2014
                                              "Summary:In the modern, global landscape, it is almost certain that users will need to access mission-critical business applications at any time of day, from any time zone. Is your datacenter ready?

                                              At the core of any organisation are important IT systems that are vital for continued successful operation. Mission-critical applications, such as ERP, CRM, business intelligence, data warehousing, and analytics, advance and support business in many fundamental ways. In the modern, global corporate landscape, it is almost certain that users will need to access these systems at any time of day, demanding around-the-clock, 24/7 availability. Any outage of mission-critical server infrastructure directly impacts revenue and profitability, so downtime must be avoided..."

                                              IT - Tape
                                              IBM and Dell dominate tape storage systems user ratings survey
                                              SearchDataBackup, December 5th, 2014
                                              "Perennially a strong competitor, IBM earns the top spot among enterprise tape libraries for the second time, while Dell snares its first midrange win...

                                              Of all the storage technologies one might find in a modern data center, tape probably gets the least respect. But the media is still appreciated by the hundreds of respondents to our annual Quality Awards for tape libraries who took time to provide feedback on the libraries they use.

                                              The inevitable pronouncements of tape's demise are unerringly premature, as tape storage systems continue to be the most convenient and cost-effective way to get backup data off-site and tucked away securely. Although many backup mavens tout cloud storage as a tape replacement, tape is still likely to have a price advantage over cloud storage..."

                                              Nexenta News
                                              Nexenta Implements Software-Defined Storage (SDS) Platform for Leading Cloud Infrastructure Provider
                                              Nexenta, the global leader in Software-Defined Storage (SDS) announced the deployment and case study for ServerCentral. Recognized by Inc. Magazine as one of the fastest-growing companies in America for five consecutive years, Chicago-based ServerCentral is an established provider of IT infrastructure solutions.

                                              Working with a number of other storage solutions, ServerCentral has a great deal of experience in this area. The growing demand for elastic, highly scalable storage presented the perfect opportunity for ServerCentral to add SDS to their toolkit.

                                              Having a scalable solution in place to handle dynamic storage demands was one of the main benefits to deploying NexentaStor.

                                              Storage Management Product of the Year
                                              Nexenta's Software-Defined Storage Solution Wins 2014 SVC Awards
                                              Nexenta has won 'Storage Management Product of the Year' at the Storage, Virtualization and Cloud (SVC) Awards. The winning product, NexentaStor, allows customers to experience a high performance enterprise grade solution without the vendor lock-in and high TCO associated with legacy vendors.

                                              The SVC Awards reward the products, projects and services as well as companies and teams operating in the cloud, virtualization and storage sectors. The SVC Awards recognize the achievements of end-users, channel partners and vendors alike.

                                              NexentaStor 4.0 is the leading commercial-grade SDS platform and a key component of the mounting shift towards the Software-Defined Data Centre (SDDC). It delivers high performance, ultra-scalable cloud and virtualization optimized solutions for data centre environments. The solution runs on industry standard hardware providing open, unified storage management at a fraction of the cost of legacy systems, eliminating the vendor lock-in and aging technologies of legacy storage.

                                              Trending in
                                              Vol 234, Issue 3
                                              Trending IT Articles