News about Oracle's Solaris and Sun Hardware
System News
Dec 8th, 2014 — Dec 14th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 202, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Oracle
x
Database 12c 12.1.0.2 Certified With 12.1 On Oracle Solaris on x86-64
Oracle Solaris on x86-64 (64-bit) (10, 11)

Oracle Database 12cR1 Version 12.1.0.2 is now certified with Oracle E-Business Suite Release 12 for 12.1 on the following additional platform:

Release 12.1 (12.1.3 and higher):

  • Oracle Solaris on x86-64 (64-bit) (10, 11)

This is a 'database tier only' or 'split tier configuration' certification where the application tier must be on a fully certified E-Business Suite platform.

Features
x
Real-Time Decisions on Big Data
By Mike Hallett

Mike writes, "By continuously learning in real time, an adaptive solution can predict and optimize the outcome of each transaction, thereby improving the customer experience and maximising revenues. With increasing amounts and speeds of data acquisition, the solution needed for this must make many decisions automatically and very quickly (for example in less than a Tenth of a second for an effective eCommerce application) based on large amounts of data.

Many of our recent Big Data customer projects are driven by this need for high value real time decisions..."

Litmus Test: 86% of Large Enterprises See the Value of Business Transformation
Yet Nearly Half Are Not Fully Ready to Execute

Today, 'business as usual' simply does not, and will not, suffice for large enterprises seeking success. New competition is emerging, existing competitors are upping their game, and the legislative regulation is challenging organizations to reach new levels of transparency. The landscape is dynamic, and for those businesses that strive not simply to compete, but to win, the need for business transformation is urgent. However, while the majority of executives agree that business transformation is vital to maintain a competitive edge, nearly half (48%) are only somewhat or not at all prepared to successfully execute a business transformation today...

    Exadata
    x
    Exalogic Case Study - Oracle's Internal E-Business Suite R12 environment
    By Srini Chaval

    Srini writes, "As you may be aware, Oracle runs a world-class single instance of R12.1 E-Business Suite which is primarily used to process business transactions related to Financials, Human Resources, Order Management and Purchasing, supporting all of our internal global back-office operations in these functional areas. Details of this EBS instance, internally known as GSI, were presented in an OOW 2014 session and also on the EBS Technology Stack blog..."

    Virtualization
    x
    Which Oracle Solaris Virtualization?
    With Oracle Solaris there is good news...
    From time to time the product manager for Oracle Solaris Virtualization gets asked by customers which virtualization technology they should choose. This is probably because of two main reasons.

    • Choice: Oracle Solaris provides a choice of virtualization technologies so you can tailor your virtual infrastructure to best fit your application, not to have force (and hence compromise) your application to fit a single option
    • No way back: There is the perception, once you make your choice if you get it wrong there is no way back (or a very difficult way back), so it is really important to make the right choice

    Understandably there is occasionally a lot of angst around this decision but, as always, with Oracle Solaris there is good news...

    IT - Technology
    x
    Gigabit speeds over telephone wires? Yes, thanks to new G.fast standard
    ComputerWorld, December 8th, 2014
    "A technology that lets copper telephone wires compete with fiber has finally been standardized, opening the way for affordable, interoperable equipment running at up to 1Gbps.

    The technology that gives copper broadband a new lease on life is called G.fast. It offers speeds at up to 1Gbps at distances of up to 100 meters. As the distance increases, the speeds decreases to about 150Mbps over 250 meters, according to the International Telecommunication Union..."

      The 14 Most Exciting New Tech Products That Will Launch In 2015
      Business Insider, December 10th, 2014
      "We may be finished with new gadget launches for 2014, but there's plenty to look forward to next year.

      Here's a look at the biggest tech launches we're expecting to see in 2015.

      Click here to see the gadgets coming in 2015..."

        This New Li-ion Battery Charges In Just 30 Minutes!
        EFYTimes, December 8th, 2014
        "Researchers from Purdue University have come up with a new electrode design for Lithium-ion (Li-ion) batteries. Li-ion is a most commonly used battery type among all electronic devices. Researchers have designed the new electrode using tin-oxide (SnO2) nanoparticles network.

        Researchers have removed the traditional graphite electrode from the battery. The new anode has porous structure of interconnected SnO2 nanoparticles. This anode has 2X more charging capacity as compared to the capacity of graphite..."

          Free and Open Source S/W
          x
          Open Source Continues its March into the Enterprise
          By Joe McKendrick
          Joe McKendrick writes, "Recently, Microsoft - for years the sworn enemy of open source - announced that it was open sourcing it's .NET Framework, the underpinning of the vendor's tools and solutions for web services, SOA and cloud.

          Open source has become a ubiquitous part of the enterprise landscape. Once considered to have some degree of risk, even the most risk-averse industry on the planet - insurance - is embracing it in various ways.

          In one notable example, for instance, Progressive Insurance was reported in CIO as employing open-source data analytics software to measure customer response to its online advertising strategy..."

          IT - Bitcoin
          x
          Microsoft starts accepting Bitcoin payments
          CIO, December 11th, 2014
          "Opening up to new payment options, Microsoft has started accepting Bitcoin payments on its Windows, Windows Phone and Xbox stores.

          The cryptocurrency can be used to add money to a Microsoft account in order to buy apps, games and other digital content from its various online stores, Microsoft said on a help page detailing how to use Bitcoin..."

          6,000 Merchants in Romania Can Now 'Opt In' for Bitcoin Payments
          CoinDesk, December 9th, 2014
          "One of the biggest online payment processors in Romania is integrating a bitcoin option into its services for merchants.

          Netopia mobilPay said the move would provide more than 6,000 partner retailers with the ability to process bitcoin payments, with no additional development costs..."

          New York Declares Bitcoin 'Intangible Property'
          CryptoCoinsNews, December 10th, 2014
          "In a boon for Bitcoin, the state of New York has declared that Bitcoin will be treated as intangible property. This is according to a technical memorandum issued by the state’s department of taxation and finance. What this means is that sales that are done in Bitcoin or any other freely convertible virtual currency will not attract sales tax. In so doing New York has led the way, and shone a torch bigger than the one on Staten Island..."
          Mastering Bitcoin
          By Andreas M. Antonopoulos - O'Reilly, December 8th, 2014
          "Want to join the technological revolution that's taking the world of finance by storm? Mastering Bitcoin is your guide through the seemingly complex world of bitcoin, providing the requisite knowledge to help you participate in the internet of money. Whether you're building the next killer app, investing in a startup, or simply curious about the technology, this practical book is essential reading.

          Bitcoin, the first successful decentralized digital currency, is still in its infancy and it's already spawned a multi-billion dollar global economy..."

          How Cryptocurrency Could Change the Sharing Economy
          CoinDesk, December 13th, 2014
          "Grassroots efforts have defined much of recent technological history.

          Whether we're talking about file sharing via BitTorrent, disrupting money via bitcoin, or even the emergence of the web itself, innovation has often trickled up, rather than down. Even some of the companies that dominate today's Internet started small, and gained traction quickly.

          Could the next generation of sharing economy companies do the same, backed by cryptocurrency-like tokens?"

          Solaris
          x
          Provisioning Solaris 11
          By Jeff Victor
          Jeff writes, "Oracle Solaris 11 introduced the Image Package System, a new software packaging in which Solaris software components are delivered. It replaces the System V Release 4 ("SVR4") packaging system used by Solaris 2.0 through Solaris 10. If you are learning Solaris 11, learning about IPS is a must! The links below will take you to the documents, videos, blog entries, and other artifacts that I think are the most important ones to begin..."
          MySQL
          x
          MySQL Enterprise Monitor 2.3.19 has been released
          By Andy Bang
          MySQL Enterprise Monitor 2.3.19 is now available for download on the My Oracle Support (MOS) web site. This is a maintenance release that updates various third party components and fixes a bug. You can find more information on the contents of this release in the change log.

          You will find binaries for the new release on My Oracle Support. Choose the "Patches & Updates" tab, and then choose the "Product or Family (Advanced Search)" side tab in the "Patch Search" portlet.

          Cloud Computing
          x
          Oracle's New Cloud Development Center in Canada Reiterates Company's Commitment to Cloud Innovation
          HackerX Recruitment Event Sets the Stage for Toronto Office Unveiling
          Oracle has opened its latest, cutting-edge cloud development facility in Toronto's downtown tech center. The company aims to increase its Toronto cloud software development team by 30 percent, with a focus on advancing Oracle Marketing Cloud. The new center will debut with a HackerX recruitment event tailored for cloud developers to meet like-minded innovators and explore opportunities at Oracle.
          Linux
          x
          Are you boosting your OS Security this Holiday Season?
          By Meghan Fritz
          Meghan writes, "The National Retail Federation (NRF) forecasts holiday sales in November and December to increase by about 4 percent, with total projected sales of $616.9B. Online sales are expected to see up to 11 percent growth with sales projected to represent $105B. In addition, retailers are expected to hire between 725,000 and 800,000 seasonal workers.

          That's a lot of transactions, a lot of revenue and a lot of manpower. It's also an opportune time for OS security breaches..."

          IT - Cloud
          x
          9 Reasons Cloud Security Will Advance in 2015
          Wall Street & Technology, December 11th, 2014
          "In the past year, a growing number of organizations have come to realize that it's impossible to create a corporate environment hermetically sealed from the cloud. Still, many financial services companies may be surprised at the extent of cloud adoption: The average firm uses 844 cloud services. This march to the cloud has largely been led by employees, as opposed to IT, leading us to label 2014 'the year of the user.'"
            The Cloud Foundry Foundation: The Key Driver Of A Breakthrough In PaaS Adoption
            Forrester, December 10th, 2014
            "The rise of the DevOps role in the enterprise and the increasing requirements of agility beyond infrastructure and applications make the platform-as-a-service (PaaS) market one to watch for both CIOs and enterprise architecture professionals. On December 9, the membership of Cloud Foundry, a major PaaS open source project, announced the formation of the Cloud Foundry Foundation.

            In my view, this is as important as the establishment of OpenStack foundation in 2012, which was a game-changing move for the cloud industry. Here's why:..."

            Top 5 Things You.ll See In Cloud Platforms In 2015
            Business 2 Community, December 10th, 2014
            "While the public cloud wars continue to rage among Google, Amazon and Microsoft, in 2015 we're likely to see a quiet storm gathering around enterprises adopting cloud platforms.

            Cloud platforms are typically less understood architecture but serve as a growing greenfield for enterprise innovation, application creation and business agility. Why is the platform coming into its own? Look at these milestones around domain maturity and growth:..."

            More Companies Choose Hybrid Cloud Solutions
            CIO Insight, December 10th, 2014
            "Hybrid clouds are blowing into enterprise at a fast pace, according to a new survey of cloud and storage professionals. The respondents are building hybrid cloud solutions to leverage the advantages of the cloud without having to discard their current computing and storage infrastructures. Avere Systems, which provides enterprise storage for the hybrid cloud, conducted the survey of 205 technology professionals at the 2014 Amazon Web Services Summit and the Cloud Expo in New York City..."
            9 Reasons Cloud Security Will Advance in 2015
            Wall Street & Technology, December 12th, 2014
            "In the past year, a growing number of organizations have come to realize that it's impossible to create a corporate environment hermetically sealed from the cloud. Still, many financial services companies may be surprised at the extent of cloud adoption: The average firm uses 844 cloud services. This march to the cloud has largely been led by employees, as opposed to IT, leading us to label 2014 "the year of the user."

            Though there have been strong indicators of a maturing cloud economy, security controls still lag behind..."

            IT - CxO
            x
            The Anatomy of a Distributed Team
            Business 2 Community, December 8th, 2014
            "For over a decade I've been fortunate enough to work with some amazing people located across the planet. This world first opened up to me back in 1999 when we setup an office in London for our Cape Town based startup. And I quickly learned the value of consistent communication in a distributed team.

            Back then we didn't have video chat tools to keep in touch. In fact, I recall two wonderfully talented people from our team jumping over to join a startup called Skype.

            We did however have email, the Internet and telephones - those things with the buttons that used to sit on everybody's desk..."

              IT and End Users Are Far Apart on Critical Data Access
              CIO, December 11th, 2014
              "When it comes to protecting sensitive data, there's a big gap between what IT departments think is happening in their customers and what end users are actually doing, says a new study released Tuesday by the Ponemon Institute.

              For example, 32 percent of IT professionals surveyed said that end users sometimes have more access privileges than they need to do their jobs.

              Meanwhile, a whopping 71 percent of end users said that they have access to company data that they shouldn't be seeing..."

                What's the best way to assert security leadership?
                SearchSecurity, December 8th, 2014
                "Security leadership isn't always considered as important as it really is. Expert Joseph Granneman discusses how to assert the importance of information security leadership within the enterprise...

                It seems like many enterprises are putting more resources behind information security, but in my organization, business leaders have often "turned a deaf ear" to security. I want to make sure this doesn't continue to be the case by providing information security leadership. What can a CISO do to assert the importance of information security leadership in a culture that doesn't inherently value it?..."

                15 Corporate IT Trends For 2015
                TechZone360, December 8th, 2014
                "To shepherd in the New Year I've created a list of 15 corporate IT trends for 2015. They're in no particular order, and most are not new - they're just more relevant in 2015 given the long lead time for mass corporate adoption of new technologies, practices, and thinking..."
                  The CIO's Top 3 Priorities for 2015
                  CIO, December 8th, 2014
                  "I often hear how the emergence and rapid proliferation of new technologies makes a CIO's list of priorities longer every year. In 2015 the biggest trend is the continuing digitization of the enterprise - the transformation of physical processes and business models into digital. This trend is driven by the rapid digitization of consumer habits and behaviors. For example, 65 percent of consumers today use their phones to research products while in stores, according to one study..."
                  CIO Priorities: Strategic Architecture vs Quick Project Wins
                  Information Management, December 10th, 2014
                  "Enterprise architecture sounds like a good idea. But in the real world of gotta-get-it-done IT projects, it can often seem like an annoying obstacle rather than a strategic asset. Here's how CIOs can prioritize.

                  The challenge: Line-of-business leaders want IT to fulfill their specific near-term objectives successfully, quickly and under budget. So an enterprise architect who starts asking questions and insisting things be done a certain way can be perceived as merely slowing things down and generating scope-creep - alienating Line-of-business leaders, IT project teams and technology vendors alike..."

                    The biggest challenges faced by CIOs/CISOs heading into 2015
                    CSO Online, December 11th, 2014
                    "As the year winds to a close, CIOs and CISOs are faced with a number of challenges heading into 2015. CSO recently heard from several experts about the topic, each offering their opinion on what they feel would be the most important item in the security sandbox next year..."
                    Getting out from under the information deluge
                    GIGAOM, December 8th, 2014
                    "Today's workplace is filled with all manner of stress, from chemical or biological agents, environmental conditions, external stimuli, or events that cause stress to an organism. Another one of these is the explosion of information that is drowning workers because of mobile connectivity, email, and documents.

                    A recent Deloitte study shows that despite checking their mobile devices up to 150 times per day and being always on, 72 percent of employees can't find the information they need in corporate information systems..."

                      CIOs Losing Control of Information, Communications Tech Spending
                      eWeek, December 8th, 2014
                      "Chief information officers (CIOs) are becoming increasingly aware that line-of-business executives wield greater influence over IT purchasing decisions and are actively re-shaping IT departments as internal service providers in response, according to a report from managed services provider Logicalis.

                      More than half of CIOs agree that, by 2016, 80 percent of IT budgets will be based on providing service integration for a broad portfolio of internally and externally sourced IT and business services, while just over three-fourths (76 percent) of CIOs already believe that the IT function in their organization is services focused rather than technically focused..."

                        The CFO's Revised Job Description
                        Business 2 Community, December 8th, 2014
                        "Tradition dictates that a CFO is someone tasked with managing all finance and accounting functions. I remember not too long ago that one often had to be a Certified Public Accountant to be considered for the job. That has all changed in the last 15 or so years.

                        The CFO position, which still stands for 'Chief Financial Officer' (although I have heard references to 'Chief Future Officer' and a couple more I can't remember) has a different scope and meaning these days..."

                          Shadow IT: Not The Risk You Think
                          Dark Reading, December 12th, 2014
                          "As we near the end of 2014, a multitude of indisputable data points to a simple fact that every security dollar dedicated to reining in Shadow IT through preventative policies or controls is a dollar wasted. In fact, the exact opposite is true: Shadow IT adoption by business units helps to increase IT savvy through a shared focus on innovation as a differentiator..."
                          vBeers-SF
                          x
                          vBeers @ Boca - Biergarten - Wed Dec 17th
                          6pm - 9pm: Last event of 2014
                          Join us for vBeers @ Boca. We meet on the 3rd Wednesday of each month in Boca Raton, FL. The next meeting will be at Biergarten Boca, which is located in on US 1, just South of Palmetto Park and East of I-95.

                          Biergarten Boca Raton

                          • 309 Via De Palmas #90
                          • Boca Raton, FL 33432

                          Please Register.

                          Join us for one of the three South Florida vBeers events. The South Florida vBeers events happen three times a month, once per county:

                          • vBeers @ Boca 3rd Wednesday of Month

                          • vBeers @ Miami 4th Wednesday of Month

                          • vBeers @ Broward 2nd Wednesday of Month

                          Details posted to vBeers South Florida LinkedIN Group.

                          IT - DR
                          x
                          The Disaster Recovery Blame Game
                          CIO Insight, December 10th, 2014
                          "Backup and disaster recovery are crucial for small and midsize businesses (SMBs), and, if not implemented correctly, it can lead to finger-pointing if critical data is wiped out. A new report, "The State of IT Recovery for SMBs," finds that mid-level IT staff members are most likely to be held responsible for recovery problems and lost data.

                          According to the report, "The majority of individuals [69%] reported that mid-level IT staff such as IT directors or other IT team managers would be held responsible for lost data. Mid-level IT staff were considered to be held responsible much more than the CIO or other IT executives (41%), or admins and other front-line IT staff (33%)."

                          Why disaster recovery planning can save lives
                          CIO, December 11th, 2014
                          "From Katrina to Sandy, tornadoes in the planes, flooding in the south, wildfires throughout the West, natural disasters threaten our world with destruction every year. The cost to rebuild and recover is phenomenal, so companies across the globe are investing in disaster recovery solutions to mitigate their losses and protect their data from these cataclysmic events..."
                          Preparing for Disaster... Recovery
                          Data Center Knowledge, December 11th, 2014
                          "Lately I've been hearing people state that they need their file system or storage solution to have disaster recovery capability. I've just been listening and haven't really participated in the discussion, but I have noticed one thing: the general theme is "we need DR."

                          However, when you start asking questions such as "What do you mean by disaster recovery?" or "What data should be recovered?" or my favorite, "What kinds of disasters?" you find that the emperor is not wearing any clothes..."

                          IT - PM
                          x
                          All You Really Need to Know About Project Deadlines
                          Business 2 Community, December 13th, 2014
                          "Ask 3 different people and you could get 3 different definitions of a project deadline. Is it something that must be respected? Should be respected? Or rather an option to be exercised if you feel like it? To make deadlines work properly for you in project management, it's important to have a clear notion of what they are and how to handle them. Project management apps can then help you set, track, manage and update them..."
                          6 Guerilla Project Management Tips to Let SMBs Take Control
                          Business 2 Community, December 12th, 2014
                          "Project management might have started years ago with large construction companies and big IT developments. Now however, it's available to any enterprise, whatever its size. Project management software lets SMBs in on the act too. The difference is in the approach. Large corporations can afford dedicated project and program managers, and a team for running their dedicated project management offices. SMBs on the other hand may well find it difficult to allocate even one person fulltime to project management activities. Compared to the project management armies of the Fortune 500 companies, SMBs may do better with some good guerilla tactics...."
                          Events
                          x
                          Rethink Mobile: Beyond Mobile First with Oracle
                          Wednesday, December 17, 2014
                          December 17, 2014 - Mark your calendars to get an update on Oracle's mobile strategy: Rethink Mobile: Beyond Mobile First with Oracle. We will be available to answer your questions via live chats. The Oracle guest lineup includes: Suhas Uliyar, Vice President, Mobile Strategy, Product Management, Laurent Pacalin, Group Vice President, Product Management, Jeanne Lowell, Vice President, E-Business Suite, and Rimi Bewtra, Sr. Director of Product Marketing...

                          • Date: Wednesday, December 17, 2014
                          • Time: 10:00 AM PT / 1:00 PM ET

                          Among today's enterprises, 87 percent have a formal mobility strategy at the enterprise or unit level, yet 7 in 10 are struggling to keep pace with new mobile devices and systems. As an industry we have learned a great deal in the past decade -- in fact today enterprises are recognizing the true importance of having a more holistic strategy around mobility.&#8232;

                          OTN Virtual Technology Summit - Replay
                          By Yolande Poirier
                          The Oracle Technology Network (OTN) is excited to invite you to watch the Virtual Technology Summit on demand. VTS is a great way to keep up with Java. Learn from Java Champions and Oracle experts as they share their insight and expertise.

                          In this second edition, you will get code-laden training on how to:&#8232;

                          • Implement solutions using the latest Java EE features
                          • Use lambdas and the new streams library API
                          • Tune your Java applications for high performance

                          Watch the sessions now! Register with your email to access all the content for free.

                          IT - Operations
                          x
                          Data loss and downtime costs enterprises $1.7 trillion
                          Help Net Security, December 9th, 2014
                          "Data loss and downtime cost enterprises $1.7 trillion in the last twelve months, or the equivalent of nearly 50% of Germany's GDP. Data loss is up by 400% since 2012 while, surprisingly, 71% of organizations are still not fully confident in their ability to recover after a disruption, according to EMC Corporation..."
                          Report: Most companies fail at keeping track of patches, sensitive data
                          CSO Online, December 9th, 2014
                          "The majority of businesses don't have a solid system for tracking sensitive data, or a mature patch management process, according to new survey of IT professionals released by Trustwave.

                          In 19 percent of companies there was no control or tracking of sensitive data at all, said respondents to the 2014 State of Risk survey, which was conducted by a third-party on behalf of the Chicago-based security firm. And 63 percent said their process for managing this data was not fully mature..."

                          10 Things Data Center Operators Should Do Before a Storm
                          Data Center Knowledge, December 10th, 2014
                          "Chris Yetman, senior vice president of operations at Vantage Data Centers, which has a massive campus in Santa Clara, has put together a list of steps every data center operator should take to maintain data center uptime and staff safety when they know a particularly bad storm is coming.

                          'This should be a living list that you walk through even with no storm on the horizon, and that you can add to from what you've learned during prior events for future planning,' he said.

                          Here it is, Chris Yetman's list of things to do if you are data center operator and you know a bad storm is coming:..."

                            IT - Security
                            x
                            Aligning Technology, People & Processes for Data Security
                            Bank Systems and Technology, December 8th, 2014
                            "Combating today's hackers will take the right mix of technology, people, and processes.

                            It's been a year now since the Target breach, and the frequency of data breaches continues to quicken while the stakes are getting higher and higher for banks.

                            'If you look at fraudsters, the pool of activities they are perpetrating is getting bigger and bigger, and it's getting close to commercial banking,' David O'Connell, senior analyst at Aite Group's wholesale banking team, said during a panel discussion yesterday hosted by InformationWeek Financial Services and sponsored by Dell Financial Services..."

                            The Four Horsemen of Cyber Security in 2014
                            Dark Reading, December 9th, 2014
                            "The only thing more depressing than the increasing frequency and growing scale of the cyber attacks in this year's headlines was the consistency of key attributes across so many of the events. From the retailer breaches of late 2013, to the almost regular cyber events of 2014, the 'four horsemen' of the headlines included phishing tactics, the prominence of 'pay-to-prey' threats, the curse of outmatched Internet trust standards, and the high cost of slow time-to-detection..."
                              Cyber attacks now longer than ever
                              Help Net Security, December 9th, 2014
                              "Cyber attacks have reached a tipping point in terms of quantity, length, complexity and targets. As cyber threats are growing and expanding to new targets, 52% of respondents to a report by Radware, reveal they can effectively fight an around-the-clock campaign for only a day or less..."
                                5 Information Security Trends That Will Dominate 2015
                                CIO, December 10th, 2014
                                "Cybercriminals are becoming more sophisticated and collaborative with every coming year. To combat the threat in 2015, information security professionals must understand these five trends...

                                In information security circles, 2014 has been a year of what seems like a never-ending stream of cyberthreats and data breaches, affecting retailers, banks, gaming networks, governments and more.

                                The calendar year may be drawing to a close, but we can expect that the size, severity and complexity of cyber threats to continue increasing, says Steve Durbin, managing director of the Information Security Forum (ISF), a nonprofit association that assesses security and risk management issues on behalf of its members..."

                                Executive Viewpoint 2015 Prediction: HOB - Top Five Security Trend Predictions
                                Virtual-Strategy Magazine, December 9th, 2014
                                • Larger Mobile Workforce, Bigger Security Threats
                                • Prevalence of BYOD Continues
                                • Uptick in Business Continuity and Disaster Recovery Planning
                                • Increased Focus on Government IT Security
                                • A Shift to Private Cloud Infrastructure

                                Read on for details.

                                3 Steps To Solidifying Air-Gap Security
                                Dark Reading, December 8th, 2014
                                "The past year has challenged security assumptions about the almighty air gap, as several researchers have lately shown new and creative ways to facilitate attacks on systems and networks completely isolated from the Internet. Often viewed as the ultimate defense for the most sensitive systems, air-gap isolation is a way to make it much harder for attackers to communicate with machines, even if they still manage to infect it. But the technique may not be good enough protection in its own right..."
                                Internet Of Things: 3 Holiday Gifts That Will Keep CISOs Up At Night
                                Dark Reading, December 9th, 2014
                                "If you think BYOD policies will protect your infrastructure from the January influx of mobile hotspots, fitness trackers, and Bluetooth, think again. The Internet of Things (IoT), a term that was first coined back in 1999, has become a mainstream buzzword, and there is no sign of slowing in terms of most hyped technology (Gartner) and sales, which IDC predicts will grow from $1.3 trillion in 2013 to $3.04 trillion in 2020 -- and a whopping 30 billion devices..."
                                Why You Need to Go Above & Beyond PCI Compliance
                                Bank Systems and Technology, December 8th, 2014
                                "Security isn't just about meeting standards, as this past year's string of data breaches has shown.

                                Behind the cracks and attacks exposed in the mounting data breaches of the last year, reams of compliance measures and regulatory standards were introduced to keep such disasters from happening in the first place. Even as Home Depot began to own up to one of the largest data breaches in recent memory, the PCI Security Standards Council was meeting to hash out new recommendations that probably wouldn't have done much to stop that breach..."

                                5 ways to prepare for Internet of Things security threats
                                CSO Online, December 8th, 2014
                                "For businesses and consumers alike, the Internet of Things is helping create smarter, more efficient devices. For enterprise IT and security professionals, it's also creating a headache.

                                Many businesses are eager to deploy smart devices and the Internet of Things (IoT) to capitalize on the many benefits. That excitement, however, may be clouding their judgment when it comes to the security risks. A recent survey of both IT executives and professionals published by cybersecurity company Tripwire found that 63% of C-level executives said they were likely to adopt the IoT to increase productivity and efficiency, while just 27% reported being 'very concerned' about the security risks..."

                                Insider threats 101: The threat within
                                Help Net Security, December 12th, 2014
                                "Recent events - both in the United States and in Japan - have forced IT administrators everywhere to reevaluate the possibility of insider threats. Because of their very nature, it can be difficult to handle these problems, particularly because the mindset needed to handle them can vary.

                                The insider threat can be broken down into three issues: ..."

                                  IT - Careers
                                  x
                                  4 Ways Building a Better Brand Attracts Better IT Talent
                                  CIO, December 9th, 2014
                                  "Without a positive brand as an employer, you'll be hard-pressed to attract and retain the quality talent your business needs to stay competitive. To build a positive employer brand, you must shift your thinking to focus on your single greatest asset -- your employees -- and improve employee engagement..."

                                  Emily He, CMO at Saba Software, has seen a major shift in the way companies approach their own branding as they work to build a culture and image that will appeal to elite talent. "Without a positive employer brand, you're not going to attract good talent. We see a tremendous focus on employer branding; a major shift in the conversation to focus on how culture and employee engagement can positively impact a company's brand," says He...

                                    3 Common Interview Questions That Are Completely Pointless
                                    Business Insider, December 8th, 2014
                                    "Anyone who has ever applied for a job has been asked a multitude of questions, writes former recruiter Stephan Tjaden in a recent LinkedIn post. "Most of the questions carry a legitimate purpose, but some of them are simply there to 'wean you out' and a waste of both the interviewers time and the candidates."

                                    Here are a few of those questions:.."

                                      The 10 Commandments of Reducing Stress at Work
                                      Business 2 Community, December 10th, 2014
                                      "The present day professional is a hard worker who devotes extra hours to work and is busy chasing success. He is interrupted six-seven times an hour and remains distracted for up to two hours in a day. He may have a prestigious job in a big corporate house but tends to undergo stress in situations like corporate restructuring, where he faces uncertainty about the future. This leads to stress..."
                                        10 Ways To Improve Your Personal Brand
                                        Information Week, December 9th, 2014
                                        "What is your personal brand? Amazon CEO and founder Jeff Bezos once said, "Your brand is what people say about you when you are not in the room." Of course, you'll never be able to control what people say about you behind your back, but there are steps you can take, mostly online, that can enhance their perception of your professional skills..."
                                        4 Resume Tricks That Will Definitely Backfire
                                        Forbes, December 8th, 2014
                                        "Bad job search advice. It's everywhere.

                                        Don't shoot the messenger (even though she's also a purveyor of job search advice).

                                        It's everywhere for a number of reasons, including:

                                        • Those delivering it often have a bias that affects the nature of the counsel (e.g., husbands, parents, BFFs).
                                        • There are no licenses or certifications that career coaches are required to carry (which results in a mixed bag of talent in the world of 'experts').
                                        • Textbook advice - the kind that many of us have the most ready access to during our formative years - can be severely old school (or worse).

                                        Unfortunately, if you don't use care in choosing trusted sources for job search advice, you may run into resume advice that teaches you how to 'trick' the applicant tracking system (ATS) or hiring managers..."

                                          Debunking The Myth Of Why Workers Need Managers
                                          Forbes, December 9th, 2014
                                          "Frederic Laloux's Reinventing Organizations(Nelson Parker, Mar 2014) recounts the success story of energy company AES in its early decades as a shining example of self-managing organizations. Dennis Bakke and Roger Sant started consulting firm Applied Energy Services (AES) in 1981, in Arlington, Virginia, in a very classic and heavily industrial line of business. AES built and operated thermal and hydroelectric power generation systems, as well as electrical grids. Within ten years, the company had built power plants in 29 countries, joined the Fortune 200, and grown their employee base from 1400 to 50,000..."
                                            5 Myths and 5 Mistakes Job-Hunting Coders Must Know About
                                            CIO, December 9th, 2014
                                            "Thanks to strong demand and high median annual wages, more and more people have pursued careers as computer programmers over the past few years. If you are looking to break into the industry (or to move into a new position by augmenting your skills), you need to be aware of these five myths and five mistakes that can keep you from getting that job offer. Read on as Coding Dojo founder Michael Choi puts you on the road to the job you want. Good luck!..."
                                              4 Reasons Working From Home Isn't All It's Cracked Up To Be
                                              Business Insider, December 8th, 2014
                                              "For many office workers, telecommuting is a dream opportunity, one they believe will offer them increased flexibility and allow them to skip the morning commute.

                                              But despite the appearance of freedom, working from home might not be the right option for you..."

                                                Employee Recognition: Keep it Simple
                                                BrandonHall Group, December 8th, 2014
                                                "Why do companies have such a difficult time saying 'thank you' to their employees? It sounds pretty basic (especially around Thanksgiving!), but many companies do not have a culture where saying thanks and showing recognition is commonplace. That's surprising because more than 80% of organizations that responded to Brandon Hall Group's just-completed 2014 Employee Engagement Study cited recognition as a valuable tool for driving engagement..."
                                                  Cybersecurity Skills Shortage Panic in 2015?
                                                  ESG, December 8th, 2014
                                                  "As part of its annual IT spending intentions research, ESG asks IT professionals around the world to identify areas where they have a problematic shortage of IT skills. Over the past three years, information security skills topped this list. In 2014, 25% of all surveyed organizations said they had a problematic shortage of infosec skills.

                                                  So where are information security skills shortages most acute? When we asked security professionals this question a few years ago, the results showed shortages across the board:..."

                                                  9 Reasons Good Employees Leave -- and How You Can Prevent It
                                                  CIO, December 12th, 2014
                                                  "The average tenure for IT workers is less than 3.8 years, according to Payscale. And while you’ll never eliminate employee turnover, these strategies can help you motivate and ultimately retain your best talent...

                                                  At the end of 2013, CareerBuilder polled more than 3,000 workers to see what they thought were the major pain points in their career. Here is a look at the some of the highlights:..."

                                                    What to Do When Your Top-Performer Goes Remote
                                                    Business 2 Community, December 10th, 2014
                                                    "What would you do if one of your best performing employees decides to move to Hawaii?

                                                    Would you give a pat on the shoulder and kindly show the door? Or would you freak out, back up your things and ask if you could join?

                                                    Wait, there's a third option..."

                                                      IT - Social Media
                                                      x
                                                      10 Ways Social Media Can Help You Recruit
                                                      Business 2 Community, December 8th, 2014
                                                      "Social media presents businesses large and small with many opportunities. Many companies may simply approach Facebook and Twitter as marketing and sales platforms, but these sites can prove equally valuable for customer service and recruiting. In this post, we will look at 10 ways social media can help your company recruit top employees..."
                                                      10 Ways to Increase Online Community Engagement
                                                      Business 2 Community, December 10th, 2014
                                                      "When companies start planning for an online community, their number one question is 'how do I increase engagement?' Not only do we get that question all that time, but also hundreds of companies we recently surveyed said that community engagement was their top challenge.

                                                      So how do companies foster a vibrant, active community? What actually makes a community a place where customers will

                                                      • return with regularity and contribute to conversations?
                                                      • get questions answered, help others, and share ideas and common interests?
                                                      • feel a meaningful connection with your company and with other customers?

                                                      Setting up an online community is table stakes in today's digital world for companies that want to reduce support costs, build credibility, get product ideas, sell and more..."

                                                        5 Ways To Boost Your Social Lead Generation
                                                        Business 2 Community, December 10th, 2014
                                                        "Many of us tap into the millions of reviews and comments on social media to find influencers, resolve customer complaints, buzz monitoring and the like. But one use that is often overlooked is the hunt for prospects.

                                                        Using social lead generation or listening tools, you can find the exact kind of people that might be interested in purchasing your products. And not just masses of unqualified leads, but real leads with real needs..."

                                                        Your Business Blog Sucks. Here Are 6 Reasons Why.
                                                        Business 2 Community, December 8th, 2014
                                                        'Content is king!'

                                                        'Content is the new SEO!'

                                                        'Content is the new PR!'

                                                        "What isn't content these days? You hear about it all the time, you know you have to do it, you might even be doing it. But, are you doing it right? Just because you've started a business blog, doesn't mean you're a content marketer. Don't worry, though, I'm here with a few reasons why your blog might suck and some tips to change that..."

                                                          6 Obvious Reasons You Should NEVER Blog Again
                                                          Business 2 Community, December 8th, 2014
                                                          "Blogging has become almost standard procedure for just about anyone with a website. Whether your business is connected with international banking, software development or organic farming, starting a blog is usually among the top 'tips' website gurus insist on as a Must Have Item.

                                                          While some people love blogging and turn blogs into ways to connect with their audience developing the income stream, others simply never get on with it. The truth is, blogging doesn't suit everyone and is not a universal magic tool to boost your online business or website. What if you are wasting your time on blogging? Maybe you should give it up and try something more effective? Here are the top obvious reasons why you should consider to cut down on blogging right now..."

                                                            IT - Virtualization
                                                            x
                                                            How to Virtualize Your Data Center
                                                            Business 2 Community, December 10th, 2014
                                                            "Virtualization has been incredibly popular in business over the last decade. Data center virtualization in particular offers several key benefits that include reduced costs, better disaster recovery, easier migration to the cloud and less heat build-up to name just a few.

                                                            If you'd like to virtualize the data centers that you use for your business then there are certain key factors that you must take into consideration. These include ..."

                                                            IT - Mobile
                                                            x
                                                            Forrester: Wearables Interest Businesses More Than Consumers
                                                            Information Week, December 10th, 2014
                                                            "Companies see wearables as tools to improve operational efficiency and enhance the customer experience, Forrester report says.

                                                            People actually want wearable devices, but businesses want them more.

                                                            According to a report by Forrester Research issued Tuesday, interest in wearable devices among individuals and organizations is rising. And while the firm expects many of these devices to fail, it anticipates overall market growth..."

                                                            You Can.t Afford To Ignore Mobile
                                                            Business 2 Community, December 8th, 2014
                                                            "My mother-in-law just got an iPhone (this is huge by the way). My 7-year-old daughter has a tablet. Everyone seems to have a mobile device of one flavor or another.

                                                            Mobile is no longer a novelty, it's the new normal.

                                                            Now, consider your target audience. Are they using tablets and smartphones to find out more about you? I'll just say it - yes, yes they are!..."

                                                              For The First Time, A Majority Of US Online Banking Customers Access Their Accounts On Smartphones And Tablets
                                                              Business Insider, December 8th, 2014
                                                              "Mobile banking has overtaken desktop-only digital banking at three top banks in the US - Wells Fargo, Bank of America and JPMorgan Chase.

                                                              • Mobile banking customers were 53% of the size of total online banking customers at three banks.
                                                              • Desktop-only customers - those that only accessed their accounts on desktop and laptop computers and never on mobile - were 47% of online banking customers during the same time period.
                                                              • We assume that all, or nearly all, mobile banking customers also use desktop banking. But if there are many mobile-only online banking customers, then mobile is an even more important banking channel than the above chart suggests..."

                                                              Read on for details.

                                                                Striking a balance with mobile device security
                                                                Federal Computer Week, December 8th, 2014
                                                                "Agencies face a delicate balancing act when it comes to providing mobile security.

                                                                On the one hand, IT departments seek to extend endpoint security to a growing population of mobile devices. It's easy to see why: Smartphones can go missing along with agency data, and mobile devices in general can introduce malware to enterprise networks. On the other hand, employees want the ease of use of consumer technology, and agency managers covet the potential productivity boost...."

                                                                Growing reliance seen on smartphones and tablets over laptops and PCs
                                                                ComputerWorld, December 8th, 2014
                                                                "There's a persistent debate going on in the IT industry over whether smartphones and tablets will replace laptops and desktops in coming years, especially in the workplace.

                                                                Market research firm Gartner on Monday issued a bold prediction that by 2018, more than half of all users will use a tablet or smartphone first -- instead of a laptop or desktop -- for all online activities.

                                                                Gartner said all online activities, which seems a bit of a stretch when it comes to the workplace, where many complex tasks, including the use of graphics and spreadsheets, are done with desktops, sometimes coupled with oversized monitors..."

                                                                Why The Third Generation Of Enterprise Mobile Is Designed For Digital Transformation
                                                                Software Insider, December 8th, 2014
                                                                Mobile initiatives provide an entry point into digital. Mobile first is more than a mantra. Why? By applying design thinking to solving specific and purposeful tasks and processes, organizations can rethink the digital journey with mobile projects. More importantly, mobile enables organizations to break the silos of existing systems from mainframes to on-premises systems and bring new life to legacy applications usage. Many market leaders and fast followers have mobilized their mainframe, legacy apps, and enabled users to access data and information with minimal additional cost with a transformed user experience. Others have used mobile as an opportunity to break down functional fiefdoms and process silos in their digital transformation efforts.
                                                                  Smartphones Get Headlines, But Lax USB Security Is Just As Risky
                                                                  Dark Reading, December 10th, 2014
                                                                  "Most companies use no software to detect or secure sensitive data when it is moved to a USB flash drive, or even check USB drives for viruses or malware.

                                                                  While more expensive (and, OK, exciting) mobile devices like smartphones and tablets receive the lion's share of data security scrutiny, organizations would be wise not to overlook the profound and costly damage a company can suffer due to those simple, unsecured USB flash drives. They are small, they are cheap, and they could be easily forgotten -- if not for the fact they usually contain a ton of sensitive company data..."

                                                                  Mobile Payments Won't Replace Cards And Cash Anytime Soon
                                                                  Information Week, December 10th, 2014
                                                                  "Diners Club introduced the idea of the modern plastic credit card in 1951. Paper as a currency goes back to the 7th century when the first banknotes were issued in China during the Tang Dynasty. With each of these ideas, it took time and changes to the original form to achieve today's wide acceptance.

                                                                  The digital revolution that vanquished the old ways of doing so many things now has mobile payments as its champion. Will mobile payments truly change the way the world pays for stuff?..."

                                                                    IT - Big Data
                                                                    x
                                                                    Negotiating privacy in the age of Big Data
                                                                    Help Net Security, December 9th, 2014
                                                                    "The promise of the Big Data revolution is all around us - improving our quality of life and providing us with new insights in culture, science, economics, and healthcare. We can now use data to help us in various, diverse ways - including better predicting and preparing for the spread of infectious disease, saving premature babies by fine-tuning infant care, empowering consumers with a more transparent marketplace for airfare, and introducing the Moneyball theory to professional baseball..."
                                                                    Big Data analytics to the rescue
                                                                    Help Net Security, December 11th, 2014
                                                                    "In the battle against cyber criminals, the good guys have suffered some heavy losses. We've all heard the horror stories about major retailers losing tens of millions of credit records or criminal organizations accumulating billions of passwords. As consumers, we can look at a handful of friends at a cocktail party and assume that most, if not all, of them have already been affected.

                                                                    So how can an IT security organization ensure they are not the next target (excuse the pun)?..."

                                                                    Top 5 Big Data Trends Of 2014
                                                                    Information Week, December 8th, 2014
                                                                    "As companies move beyond bleeding-edge experiments into production deployments, these trends point to real-world progress in big data analysis.

                                                                    The era of big data analysis is here to stay. Take your pick of 2014 proof points.

                                                                    Tech watchers might cite the more than $200 million in venture capital raised by the top three NoSQL database vendors, or the $1 billion raised by the top-three Hadoop software distributors. Many took note of the recent declaration by Forrester Research that 'Hadoop is no longer optional' for large enterprises, thanks to compelling 'Hadooponomics' that make it a must for high-scale storage and data processing..."

                                                                    Big data is not just a job, it's an adventure
                                                                    Federal Computer Week, December 8th, 2014
                                                                    "For federal agencies, making data accessible is a bit like parenting: No matter how much you do, there's always more to be done.

                                                                    During a Dec. 11 AFCEA-sponsored panel discussion in Bethesda, Md., on how to use big data effectively, data officers from several large federal agencies said the amount of data they make available for outside consumption is increasing, while the complexity and the challenges presented by the data shift constantly..."

                                                                    The 5 Worst Big Data Privacy Risks (and How to Guard Against Them)
                                                                    CIO, December 8th, 2014
                                                                    "There are enormous benefits from Big Data analytics, but also massive potential for exposure that could result in anything from embarrassment to outright discrimination. Here's what to look out for - and how to protect yourself and your employees...

                                                                    The collection and manipulation of Big Data, as its proponents have been saying for several years now, can result in real-world benefits: Advertisements focused on what you actually want to buy; smart cars that can call for an ambulance if you're in an accident; wearable or implantable devices that can monitor your health and notify your doctor if something is going wrong..."

                                                                    10 Myths About Predictive Analytics
                                                                    Business 2 Community, December 12th, 2014
                                                                    "Business is tough and competition can be brutal. With many economies still sluggish after the financial Armageddon that caused a mortgage meltdown and the stock market to experience the biggest losses since the Great Depression, it's never been harder to make a buck. Businesses trying to gain whatever competitive edge they can turned to big data and predictive analytics hoping to 'exploit new opportunities and gain the upper hand over competitors' according to TechRadar. In their interview with James Fisher, SAP's VP of Marketing and Analytics, Fisher talks about the importance of predictive analytics for driving business success:..."
                                                                    IT - BYOD
                                                                    x
                                                                    Why businesses should not be scared of BYOD
                                                                    Enterprise AppsTech, December 9th, 2014
                                                                    "Simply mentioning the idea of bring your own device (BYOD) is enough to make some business owners tremble. Sure, there are many touted benefits to having employees use their own devices at work (greater productivity, more job satisfaction, reduced costs, etc.), but even all those advantages are not enough to convince some companies to adopt it..."
                                                                    5 Common Misconceptions About BYOD
                                                                    Wall Street and Technology, December 8th, 2014
                                                                    "Bring your own device (BYOD) is a concept most organizations have already embraced. From the employee perspective, permission to bring personal smartphones and tablets to work and connect to corporate networks is no longer considered a perk, it is expected.

                                                                    Yet many financial firms are still holding back on BYOD because decision makers are caught up in endless concerns about employee privacy and securing corporate data. These are legitimate worries, but these are not the only barriers to adoption, and unfortunately some of the most common concerns vendors are hearing are based on little more than speculation.

                                                                    So how can CIOs be sure what is a myth and what is factual when researching best mobile practices and BYOD?..."

                                                                    Top10
                                                                    x
                                                                    Top Ten Articles for last few Issues
                                                                    Vol 202 Issue 1; Vol 201 Issues 1, 2, 3 and 4; Vol 200 Issues 2, 3,4 and 5
                                                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                                    • ZFS Performance boosts since 2010
                                                                    • Oracle Unveils Flagship Oracle ZFS Storage ZS4-4 NAS System
                                                                    • Oracle's New Two-Socket x86 Servers with Oracle's Unique NVM Express Design
                                                                    • Oracle Server X5-2 and Oracle Server X5-2L
                                                                    • The Java 7 EE Tutorial
                                                                    • reARC - a major re-architecture of the code that manages ZFS in-memory cache
                                                                    • IBM WebSphere Application Server Excels on Oracle SPARC T5
                                                                    • Evolving Java - How and why it matters
                                                                    • The Best Infrastructure for Your Private Clouds
                                                                    • Oracle Introduces its Solution for Project-Driven Supply Chain

                                                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                                                      IT - Encryption
                                                                      x
                                                                      Open Source Encryption Must Get Smarter
                                                                      Dark Reading, December 8th, 2014
                                                                      "When it comes to cryptography, there are quite a few myths in the age-old debate about proprietary versus open source application security.

                                                                      Utter the words 'open source' in an organization's tech circles, and you're just as likely to hear an application developer gush as to curse. The term is divisive, a rival sports team debate for the geeky set, but one that usually pushes developers and architects to be creative. When it comes to the debate about open source security development, however, there are more than a few myths and definite room for improvement, especially with respect to encryption..."

                                                                      IT - Server
                                                                      x
                                                                      15 Essential Open Source Tools for Windows Admins
                                                                      CIO, December 8th, 2014
                                                                      "Microsoft admins seeking solid server-side tools know the mothership offers a mother lode of solutions for supporting Windows Server, Exchange Server, SQL Server, SharePoint, and so on. But for those with an eye on the bottom line or looking to branch out in supporting their Microsoft-based server room, plenty of free, open source tools from both Microsoft, via CodePlex, and third-party providers are available...

                                                                      Following is a roundup of open source tools every Windows admin should be aware of. We last surveyed this territory three years ago, and while some tools have cemented their place in the Windows admin arsenal, Microsoft's shift in focus toward the cloud is giving rise to a new set of essentials..."

                                                                      IT - Tape
                                                                      x
                                                                      Data Storage Tape Update V2014, Its Still Alive
                                                                      StorageIOblog, December 10th, 2014
                                                                      "A year or so ago I did a piece tape is still alive, or at least in conversations and discussions. Despite being declared dead for decades, and will probably stay being declared dead for years to come, magnetic tape is in fact still alive being used by some organizations, granted its role is changing while the technology still evolves.

                                                                      Here is the memo I received today from the PR folks of the Tape Storage Council (e.g. tape vendors marketing consortium) and for simplicity (mine), I'm posting it here for you to read in its entirety vs. possibly in pieces elsewhere..."

                                                                      Developer
                                                                      x
                                                                      Python in NetBeans IDE 8.0.2
                                                                      By Geertjan Wielenga
                                                                      Let's get started with Python in NetBeans IDE 8.0.2.

                                                                      Take the following steps:

                                                                      • Prepare. Watch this YouTube movie:
                                                                      • Make Sure You're Prepared.
                                                                      • Get the Correct Version of NetBeans IDE
                                                                      • Get the Python Plugin for NetBeans IDE 8.0.2.
                                                                      • Go to the Plugin Manager in NetBeans IDE
                                                                      • Install the Python Plugin
                                                                      • Go to the New Project Dialog
                                                                      • Get Started Creating a Python Application
                                                                      • Step Through the Wizard
                                                                      • Run the Python Application.

                                                                      Read on for details.

                                                                      SQL Developer 4.1
                                                                      Instance Viewer
                                                                      The SQL Developer team has been steadily adding features tailored to the DBA since the version 3.0 release. This steady march continues with version 4.1, which was released as an Early Adopter yesterday.

                                                                      The DBA feature I want to talk about today is the Instance Viewer. Well, technically the window is labeled as the 'DB Instance.'

                                                                      Nexenta News
                                                                      x
                                                                      Global Unified Communications and Collaboration Service Provider Selects Nexenta Software-Defined Storage
                                                                      to Meet Challenges of Growing Software Defined Data Center Requirements
                                                                      Nexenta announced it has been chosen by Arkadin to meet its rapidly expanding enterprise storage requirements. The NTT Communications Company is one of the world's largest and fastest growing providers of Collaboration and Unified Communications services. After collaborating with partner Actualis, Arkadin selected the Nexenta solution to meet its rapidly expanding enterprise storage requirements.

                                                                      Founded in France in 2001, Arkadin offers a complete range of integrated audio, web, video conferencing and Unified Communications solutions via a network of 53 offices in 32 countries across the globe, delivering its business solutions using a software as a service (SaaS) model that provides customers with fast, scalable deployments with a high ROI.

                                                                      Leading Big Data Cloud Service Provider Relies on Nexenta Software-Defined Storage Solutions in Its Software Defined Data Center
                                                                      EngineRoom.io
                                                                      Nexenta announced the deployment and case study for EngineRoom.io. Based in Sydney, Australia, EngineRoom.io is a leading Secure Private Cloud Service for Big Data, offering not only compute cycles, but also a full range of tuning and other services for Big Data and High Performance Computing (HPC) workloads.

                                                                      Businesses from all industries come to EngineRoom.io, because it enables them to derive insight and revenue from their data by giving them the capacity to aggregate structured and unstructured data, to handle high-velocity streaming data, and to process large data sets at scale; the end result is a 500x improvement in 'time to insight'.

                                                                      Level3 News
                                                                      x
                                                                      Finding Success in the New TV World
                                                                      By Jennifer Baisch
                                                                      Jennifer writes, "Are we disrupted yet? Recent movements from the industry's biggest content providers, distributors and even the FCC, signal a definitive shift into high gear in this long quest for premium content on all devices.

                                                                      While some industry analysts assume that the market incumbents will not find a profitable balance between their current pay TV model and the new world of Over The Top (OTT) distribution, I think there's a green field opportunity for any provider, incumbents and new entrants, to create new models and experiences that will delight viewers. The key will be a provider's ability to rapidly iterate and experiment to find the right balance of the core ingredients in a new offering..."

                                                                      Trending in
                                                                      Vol 234, Issue 2
                                                                      Trending IT Articles