News about Oracle's Solaris and Sun Hardware
System News
Jan 19th, 2015 — Jan 25th, 2015 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 203, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

VIDEO: Oracle President Thomas Kurian
on Customer Experience
Oracle Social Cloud Group VP Meg Bear sat down with Oracle's newly appointed president of product development, Thomas Kurian, for a discussion on technology, today's empowered consumer and how a modern customer experience is transforming the way businesses must interact and engage with their customers.

'Customer Experience' or #CX has become a highly cited industry buzzword for good reason - it's the major competitive battleground for most every company. Digital, social, mobile and cloud has empowered consumers and completely turned the traditional business to consumer relationship on its head...

Top Five IoT Predictions for 2015 - Part I
By Meghan Fritz
Meghan writes, "You can seldom open a news website or newspaper today without seeing some mention of the 'Internet of Things' (IoT). According to Gartner, '4.9 billion connected things will be in use in 2015, up 30 percent from 2014, and will reach 25 billion by 2020.' From our refrigerators to our vehicles, soon everything will be interconnected and sharing data that will change the way we live and work. But with the promise of massive digital transformation through IoT comes the potential for logistical and security nightmares.

In this two part Q&A, Oracle's Scott Armour discusses the obstacles and opportunities he predicts for IoT in the coming year. Armour is Group Vice President at Oracle, responsible for global Java and IoT go-to-market strategy..."

Oracle Exadata wins the 2014 Innovation Leader Award given by IT professionals
for Converged Systems for Databases
Oracle Engineered Systems is pleased to announce that Oracle Exadata has received distinguished industry recognition. Oracle Exadata has won the 2014 Innovation Leader Award for Converged Systems for Databases, which was presented at the Open Server Summit 2014 in Santa Clara by IT Brand Pulse CEO Frank Berry. This award is especially exciting because the winner was selected by IT professionals, rather than industry analysts or an award committee. The Innovation Leader Award comes on top of Gartner naming Oracle Exadata as a leader in its Integrated Systems Magic Quadrant earlier this year.

Read the complete info here.

Enterprise Manager Ops Center - Ops Center EC/PC sizing
By Rodney Lindner
Rodney writes, "When designing a customer's Ops Center environment, one of the first questions I get asked is how many servers can an Enterprise Controller (EC) or a Proxy Controller (PC) support. Customers think of sizing, as being the number of servers, LDOMs, etc. and these are lumped together into a total number of assets. In the real world, the answer to the "How many assets can my Enterprise Controller /Proxy Controller support?" question is, "It Depends". How you place your Proxy Controllers in your network and what you manage from each Proxy Controller can impact the total number of assets that can be supported from an Enterprise Controller..."
Free: Virtual Technology Summit by Oracle Technology Network (Feb/March 2015)
By Geertjan Wielenga
Geertjan writes, "The Oracle Technology Network (OTN) is excited to invite you to the Virtual Technology Summit Series. Four times a year come and join us to learn first hand from Oracle ACEs, Java Champions, and Oracle product experts, as they share their insight and expertise on using Oracle technologies to meet today's IT challenges. Four main content areas covered will be Database, Java, Middleware and Systems..."
Oracle's Virtual Compute Appliance: Past Reflection and Future Vision
By Jeff Savit
Today's spotlight is a year in review of Oracle's Virtual Compute Appliance and a look to the future.

Virtual Compute Appliance is a converged infrastructure solution that combines preconfigured networking, servers, and storage into a convenient package that system administrators can easily deploy into an existing data center. Combined with the virtualization power of Oracle VM, the Virtual Compute Appliance provides the perfect general-purpose solution for a wide range of applications and operating systems. Customers around the world are using Virtual Compute Appliance systems for their virtualized environment of mixed workloads or private cloud.

IT - Storage
5 new guides for using OpenStack, January 16th, 2015
"Are you interested in creating an open source cloud using the latest and greatest that OpenStack has to offer? We're here to help. We have gathered some of the best howtos, guides, tutorials, and tips published over the past month into this easy-to-use collection. Check out the list, get ready to learn, and if you get tripped up, remember that the official documentation for OpenStack is there to help..."
Top 10 Important IT Strategy Considerations for 2015, January 19th, 2015
"At the end of the year, we looked ahead for our IT clients to predict the trends that would impact their 2015 information technology and storage management. Of all the trends, we chose ten that were the most important for them to consider what it means for an IT strategy..."
Java Technology
Heads Up on Java EE @ DevNexus 2015!
March 10-12, Atlanta, GA
Reza writes, "DevNexus 2015 will be held on March 10-12 in Atlanta. If you are a US based developer and do not know about DevNexus, you are definitely missing out. DevNexus was started a few years ago as an initiative by the Atlanta Java User Group (now one of the largest Java user groups in the world) and Burr Sutter (one of the earliest Java champions). Since then DevNexus has grown to become one of the largest Java leaning conferences in the US, perhaps second only to JavaOne. I've spoken at the conference a few times over the years. This year's roster is unsurprisingly impressive both in terms of speakers and content..."
Java and IoT: The Intelligent Platform for the Connected Vehicle
New Whitepaper
"A vehicle is typically the most expensive and complex consumer device that we own. We expect it to keep up with the rest of our devices that produce and consume a rapidly growing set of media and social data. We also expect vehicles to be 100 percent reliable and to keep us safe. Meeting all of these needs is a challenge for manufacturers that have a growing set of requirements themselves.

For instance, manufacturers need better data from their vehicles to increase reliability, manage the complex interactions between control systems and media/communication systems, anticipate problems, and enhance customer experience and safety. And by the way, data should increase profitability for the manufacturer and strengthen customer engagement..."

    Java Updates:
    SE 8 update 31, SE 7 and SE Embedded
    Oracle has released Java SE 8 Update 31 and Java SE 7 Update 75 and 76. Also available are new Java SE Embedded updates. Developers can download the JDKs and JREs for Java SE and Java SE Embedded at the Oracle Technology Network.
    IT - Technology
    Power up! The hunt is on to extend battery life for mobile devices
    ComputerWorld, January 19th, 2015
    "Smartphone and tablet makers are on a mission to make their mobile devices the epicenter of a user's professional and personal life. One major obstacle stands in their way, though: The device's battery life.

    The number of hours any given laptop or phone will stay powered on depends on the device itself, along with the number and types of applications being used at any given time. Location-based services such as Facebook are well-known battery drainers..."

    The Hottest 3D Printing Projects
    CIO, January 21th, 2015
    "In the past few months a number of super cool 3D printing projects have hit the market. We're talking about 3D printed cars for the masses and five-story buildings to name a couple interesting ventures. Take a look..."
    This Company Is Squeezing An Entire Computer Into A Mouse - All You Need Is A Monitor
    Business Insider, January 21st, 2015
    "A Polish tinkerer has created the ultimate compact PC - one that's small enough to fit inside a conventional mouse, MyBroadband reports.

    Przemys&#322;aw Strzelczyk, a software engineer at Nokia Networks, calls his invention, "The Mouse-Box."...

      The ABC of Beacon Technology: What Is It and How Can It Benefit Retailers?
      Business 2 Community, January 22nd, 2015
      "Beacons are a low-cost piece of hardware - small enough to attach to a wall or countertop - that use battery-friendly, low-energy Bluetooth connections to transmit messages or prompts directly to a smartphone or tablet.' Business Insider

      How does it work? Shoppers need to have downloaded your app (or a third party app) to receive and respond to the beacon signal. You choose how wide you set the range.

      Apple is championing the way with its iBeacon implementation. Apple has built iBeacon into devices and operating systems. Many third party manufacturers have built beacons that can send iBeacon messages to Apple devices..."

        Good-bye, keyboard: The future of input devices is (almost) here
        InfoWorld, January 22nd, 2015
        "When Christopher Latham Sholes invented the modern QWERTY keyboard in the 1870s, could he have known that the essentials of his design would persist for 150 years, well into the Digital Age?

        It's remarkable. In a high-tech world where change is rapid and constant, the computer keyboard has been the undisputed monarch of input devices from the very beginning. We've seen a few pretenders to the throne, but for everyday computing, the keyboard is still king (with the mouse as court jester, I suppose)..."

          IT - Bitcoin
          How Bitcoin Compares to Fiat Currency.s House of Cards
          Bitcoin Magazine, January 23rd, 2015
          "Double standards are like mosquitoes to me: after hearing their buzz for a while, I want nothing more than to shine a flashlight their way and swat them down mercilessly. One such double standard is the harsh way in which economists and commentators criticize Bitcoin technology, while at the same time taking for granted the financial system that they live under every day..."
          Bitcoin Wins Over 2015 World Economic Forum In Davos
          CryptoCoinsNews, January 23rd, 2015
          "At last year's World Economic Forum in Davos, Bitcoin was only mentioned in scorn by the attending central banking elite. Major establishment players such as JP Morgan Chairman Jamie Dimon, and Treasury Secretary Jack Lew managed to say the word Bitcoin, only to speak of it through clenched teeth. In 2015, Bitcoin is getting the respect it deserves, at least from the event's organizers themselves. (I'm sure the acquisitions of Microsoft, PayPal and Dell since last year's event had something to do with it.)..."
          KPMG: Bitcoin a Threat and Opportunity for Retail Banks
          CoindDesk, January 19th, 2015
          "'Big four' auditing firm KPMG has published a report identifying bitcoin as both a threat and an opportunity to the banking sector.

          The report, titled The Changing World of Money, outlines the factors threatening established retail banks, whilst discussing the potential of cryptocurrencies as viable payment solutions..."

          SoleraTec Video Surveillance Management Software
          For Oracle Solaris 11 and SPARC
          "SoleraTec, a provider of innovative video lifecycle management and storage products, has released the PHOENIX RSM video surveillance management software solution for Oracle Solaris 11 operating system on the SPARC processor.

          Organizations that need a cost-effective integrated and professional video surveillance solution can look to SoleraTec's PHOENIX RSM, for Oracle Solaris 11..."

          Cloud Computing
          Oracle's 10-Point Plan To Be #1 In The Cloud
          Bob Evans in Forbes
          Bob Evans writes in Forbes, "Highlighting the accelerating growth of Oracle's $2 billion cloud business, founder Larry Ellison and CEO Mark Hurd recently shared their vision for why Oracle will surpass and Amazon to become the #1 player in the dynamic cloud market that's rapidly becoming the new model for enterprise computing.

          During Oracle's second-quarter earnings call on December 17, Ellison, Hurd, and CEO Safra Catz revealed some impressive accomplishments:

          • Total cloud revenue for the quarter of $519 million, up 47% from Q2 a year earlier.
          • Cloud revenue growth in EMEA of 80% during that same period.
          • 860 new SaaS customers during the quarter, with 230 of those subscribing to more than one set of apps.
          • In Customer Experience (CX), more than 460 new SaaS customers.
          • In ERP and EPM (Enterprise Performance Management), 250 new SaaS customers.
          • In Human Capital Management (HCM), 230 new customers.
          • For Oracle's Fusion products, triple-digit revenue growth, and triple-digit bookings growth.
          • For Oracle's four-month-old platform as a service (PaaS) business, 150 new customers in the quarter.
          • First-half bookings growth exceeded expectations, and the growth rate for Q3 bookings could reach 100%.


          End to End Data Integrity Using Oracle Linux, Fujitsu ETERNUS and QLogic HBA
          Fujitsu Whitepaper
          As demand for data protection has grown in recent years, ensuring the integrity of the customer's data is a very important task. To carry out this task, data protection is not only required for the storage system but the entire system.

          This White Paper explains how data protection can be implemented for the entire system using T10 Protection Information (T10 PI) that comes with the Oracle Linux with Unbreakable Enterprise Kernel (UEK), the ETERNUS DX S3 series, and QLogic HBA.

          Oracle Linux and The Next Generation of Oracle Engineered Systems
          Friday Spotlight
          Chris Kawalek writes, "This has been exciting week for the Oracle Linux and Oracle VM teams here at Oracle, with our products prominently featured in The Next Generation of Oracle Engineered Systems event on Wednesday. If you missed the live event, take some time to watch the videos in the archive.

          In addition to the Larry Ellison announcement video - which is highly recommended! - there is in-depth Oracle Linux content in two of the other videos. First, the panel discussion video (video #3 in the list on the archive page) features several Oracle executives, including Oracle Senior Vice President, Linux and Virtualization, Wim Coekaerts. And last, in the Go Deep section Wim goes into detail on Oracle Linux and how it can benefit your data center...."

          IT - Cloud
          Buy the right cloud hardware for your IT applications
          SearchDataCenter, January 19th, 2015
          "Data center managers must work with the applications team to ensure the right underlying hardware is purchased for cloud-based applications. This includes flexible scale-out clouds and demanding specialized use cases.

          When moving to a cloud architecture, install rack-based and largely identical servers. Tuning a set of hardware to application use cases is a matter of determining which pieces of standard hardware work best, and how to arrange them. For example, some applications will benefit from a simple re-racking of servers and storage.

          The move to commercial, off the shelf data center systems is now mainstream, and the IT department can choose from a spectrum of cloud hardware from various vendors..."

            IT just scratching surface of cloud computing technology
            SearchCloudComputing, January 23rd, 2015
            "With wide-ranging implications on apps, devices and more, cloud is more than an IT project or strategy. Are you prepared for IT's next big shift?

            If you're an IT manager or executive, you've probably started your cloud journey. You've likely migrated applications to the cloud, or deployed cloud as your primary hosting environment. And now, you think you're a cloud veteran. Well, you're just getting started. Few users have discovered the full impact of cloud -- but every business could benefit by doing so.

            First, the cloud isn't an IT strategy ..."

              New Paper: Security Best Practices for Amazon Web Services
              Securosis, January 20th, 2015
              "I could probably write a book on AWS security at this point, except I don't have the time, and most of you don't have time to read it. So I wrote a concise paper on the key essentials to get you started - including the top four things to do in the first five minutes with a new AWS account.

              Here is an excerpt:..."

              Cloud SLAs: Improvements Still Needed
              Information Week, January 22nd, 2015
              "There's been a slight improvement in cloud SLAs as leading service providers like HP, Amazon, and Google guarantee 99.95% uptime by the month, not year. But performance issues remain.

              Cloud service level agreements (SLAs) remain a sore spot among customers of cloud computing services. Not only are SLAs rife with ill-defined terms and vendors' self-serving phrases such as "at our discretion," but they also tend to use only one metric: service uptime..."

              Federal IT Leaders Want Cloud Vendors to Provide Clarity
              CIO, January 23rd, 2015
              "FedRAMP director says industry needs to do more to document security protocols in cloud services as agencies look to broaden adoption of the program across government...

              Federal agencies are actively shopping for new cloud computing technologies, but vendors will help their cause by packaging their services to be more readily implemented in a government environment that is highly security conscious and almost preternaturally cautious about rolling out new IT systems..."

              Understanding Cloud Storage Models
              InfoWorld, January 20th, 2015
              "The roles of instance, volume, and object storage in the modern, virtualized data center...

              Who would have thought that storing bits could get so incredibly complicated? Storage has always contained a plethora of protocols, from Fibre Channel to iSCSI to SMB in all its variations, but the arrival of flash and the continual growth of virtualization have turned an already dense topic into a tangled jungle of acronyms, protocols, and abstractions..."

              IT - CxO
              Why IT Leaders Need to Innovate in Customer Service and How
              CIO & Leader, January 19th, 2015
              "No rallying principle in the enterprise matters more than the creation of superior customer engagement and IT leaders will need to innovate in engaging customers on all channels, says Gartner...

              "Marketing may fill the sales funnel, and the sales department can close a deal, yet it is the overall impression of the enterprise generated by the quality of customer service that differentiates one enterprise from another," said Michael Maoz, vice president and distinguished analyst at Gartner. Gartner has made a number of predictions about mobile customer service, including: ..."

              CIO's Guide to Becoming a Business Strategist
              CIO, January 8th, 2015
              "You're a CIO, so you're already an IT strategist. You've got the email and the data center under control, you've wrestled with the ERP beast, and you're trying to keep the hackers out. So why do you need to also be a business strategist? Isn't that the CEO's job?

              Yes, but the CEO needs help. A PricewaterhouseCoopers survey of CEOs found that they view 'technological advances' as the No. 1 trend transforming their business over the next five years. (Dirty little secret: The CEO and the board of directors are really, really afraid of being on the wrong end of digital disruption on their watch.)..."

              6 Biggest Business Security Risks and How You Can Fight Back
              CIO, January 20th, 2015
              "Security breaches again made big news in 2014. Yet despite years of headline stories about security leaks and distributed denial-of-service (DDoS) attacks and repeated admonishments from security professionals that businesses (and individuals) needed to do a better job protecting sensitive data, many businesses are still unprepared or not properly protected from a variety of security threats.

              Indeed, according to Trustwave's recent 2014 State of Risk Report, which surveyed 476 IT professionals about security weaknesses, a majority of businesses had no or only a partial system in place for controlling and tracking sensitive data..."

              The Trillion-Dollar Cost of Downtime and Data Loss
              CIO Insight, January 20th, 2015
              "Data loss and downtime amount to a $1.7 trillion burden for enterprises worldwide-the equivalent of nearly one-half of Germany's gross domestic product, according to a recent survey from EMC. The report, titled 'EMC Global Data Protection Index,' reveals that most organizations recognize data protection is mission-critical to their success. But that isn't preventing major disruptions in the form of data loss and/or downtime for the vast majority of them..."
              What's driving executive turnover for CISOs?
              SearchSecurity, January 22nd, 2015
              "A number of experienced CISOs have left their positions recently. Expert Joe Granneman looks at where they are going, and what's behind the trend...

              I read recently that a number of seasoned CISOs are leaving their positions and moving to the vendor side of security. What is driving this trend, especially in a time when the industry already has a shortage of qualified information security professionals?

              The demand for experienced leaders in information security has increased dramatically over the last few years..."

              Changing the CIO conversation from technology to business
              GIGAOM, January 19th, 2015
              "For many years, traditional IT thinking has served the IT function well. Companies have prospered from both the technological advances and consequent business improvements. Historically, the conversation typically centered on some form of technology. It could have been about infrastructure (data centers, servers, storage, network) or applications (language, platform, architectures) or both.

              Today, we are seeing a marked shift in the conversations happening with the CIO. Instead of talking about the latest bell-and-whistle, it is increasingly more apt to involve topics about business enablement and growth..."

              Ten CIO Resolutions for 2015
              Forbes, January 21st, 2015
              "In 2015, CIOs are expected to drive more digital business innovation. In order to achieve this, they must gradually elevate their role, and that of the IT organization, to reposition themselves more as an agenda setter. CIOs can't elevate and educate without strong credibility in leading innovation for the company. In other words, it's time to take some measured public risks to visibly improve the technology-related business innovation capability of the enterprise..."
                Why 2015 might be the year of the CIO
                TechRepublic, January 20th, 2015
                "The past several years have marked a significant evolution in how corporate IT is procured, deployed, and managed. A long recession cut many IT budgets to the bare minimum, forcing IT leaders to maintain critical systems and services rather than focusing on end-user "nice to haves."

                While struggling to keep the lights on, cloud-based software and services simultaneously commoditized many expensive IT functions, and lowered the price of entry for everything from email to Customer Relationship Management (CRM) from months of implementation time and heavy IT involvement to a few minutes and a credit card..."

                9 CIO Tech Priorities For 2015
                Information Week, January 20th, 2015
                "Data security risks, privacy concerns, big data, and innovation. These were among the hot topics at last week's NRF Big Show 2015 in New York. It's the biggest show in retail, but these are priorities that suppliers, manufacturers, distributors, and service firms should consider as well.

                This slide show sums up priorities and pointers shared by top executives during NRF educational sessions and 'Big Ideas' customer panel discussions sponsored by Alteryx, SAP, and SAS. Here's a sampling of what we learned..."

                vBeers @ Miami - Biscayne Tavern - Wed Jan 28th
                6pm - 9pm
                Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida. Register today so you can be a part of this great monthly event! Feel free to invite all of your friends and co workers who work in the IT industry!

                This will be a Sponsored event so beers are on us. Join us for an evening of creating connections and building your network in a relaxed and fun environment.

                There is absolutely NO SALES PITCH, just FREE ice cold beers and tech talk!

                "Meet-Ups" are an essential aspect of your professional growth and development. Connect with an array of professionals while enjoying a drink or two.

                • Location: Biscayne Tavern
                • Address: 146 Biscayne Blvd, Miami, FL 33132
                • Date: Wednesday, January 28th
                • Time: 6pm to 8pm - arrive and depart any time

                Join us for one of the three South Florida vBeers events. The South Florida vBeers events happen three times a month, once per county:

                Please register at EventBrite.

                Details posted to vBeers South Florida LinkedIN Group.

                IT - DR
                Virtualization makes DR in the cloud an attractive option, but caution is advised
                SearchDisasterRecovery, January 20th, 2015
                "Disaster recovery (DR) is a dedicated process that's designed to bring critical applications back online after an unexpected outage. DR methods can range from simply carrying backup tapes or disk drives home in a backpack to maintaining those applications in a dedicated secondary data center. And, the "cloud" has become a popular alternative to this secondary data center. The big differentiators between DR options (assuming the backpack isn't appropriate) are how fast the DR system can provide recovery after a disaster and cost..."
                Cloud Platform Online Forum J
                January 28th, 2015 10:00am PST/1:00pm
                Is Your PaaS Delivering the Agility Your Users Demand?

                Join Oracle at the keynote as they kick off the online forum with IDC analyst Robert Mahowald. Learn how to rapidly build, deploy, manage, and secure rich applications using an integrated platform built on the industry's #1 Database and Application Server.

                You will learn how to:

                • Access development and test environments faster
                • Consolidate and standardize on a cloud platform for enterprise workloads
                • Deliver a superior user experience
                • Review the full agenda in the right hand nav to gain insight to all of the sessions pertaining to your interest.

                For details please visit the registration page.

                IT - Networks
                5 Key Challenges Facing the Industrial Internet of Things
                CIO, January 21st, 2015
                "The Industrial Internet of Things shows every indication of rapidly transforming everything from agriculture to municipal management to energy generation and manufacturing, but it faces five potential obstacles.

                To many people, the phrase "Internet of Things" conjures images of consumer gadgets like wearable fitness monitors, Google Glass or maybe even self-driving cars. But some of the most exciting and practical applications are happening in the Industrial Internet of Things (IIoT): smart agriculture, smart cities, smart factories and the smart grid..."

                Eight Big Benefits of Software-Defined Networking
                ServerWatch, January 20th, 2015
                "If you are a cloud service provider and want to ensure customers/tenants can move their virtualized workloads without requiring much planning, Software-Defined Networking (SDN) may be the answer to your prayers.

                SDN not only reduces the complexity seen in today's networks, but also helps Cloud service providers host millions of virtual networks without the need for common separation isolation methods such as VLAN. SDN also enables network administrators to manage network services from a central management tool by virtualizing physical network connectivity into logical network connectivity..."

                As WLANs Grow, So Does Need for Secure Wireless Networks
                SearchNetworking, January 19th, 2015
                "The trusty Ethernet wall jack has seen better days. Although hard-wired connections offer better speeds and greater reliability than wireless networks, users increasingly favor Wi-Fi as the connectivity medium of choice.

                Access point (AP) shipments were up 14% in the third quarter of 2014 compared to the previous year, reported Infonetics Research. Meanwhile, wireless devices are expected to account for 61% of IP traffic by 2018 -- according to Cisco's "2014 Visual Networking Index" -- while wired devices will make up 39% of traffic. As recently as 2013, wired devices still accounted for the majority of traffic at 56%..."

                IT - Linux
                SUSE Linux 12 Challenges Red Hat
                CIO, January 21st, 2015
                "It's been more than five years since SUSE delivered a full release of its Enterprise Linux software, and a lot has happened to the company during that time. But in our testing we find that SUSE 12 has been worth the wait.

                SUSE 12 is a set of Linux distributions ranging from desktop through enterprise level. We tested several instances and found them quite ready for enterprise use, be they persistent or randomly instantiated as virtual machines..."

                Get on the Linux job train with a new system administration class
                ZDNet, January 19th, 2015
                "Want a good job in tech? Then learning Linux is well worth your time. In 2013, the tech job site Dice reported that senior Linux administrators were making $90,853. Last year, Dice stated that Linux jobs were more in demand than ever and that salaries and bonuses were going up.

                So, what do you need to get some of this sweet cash? Well, you need to learn Linux. The basics are easy: Just download a distribution and start playing with it. But, to really go places you need to prove your mad Linux skills with a certification..."

                Secret to Desktop Linux Adoption
                Datamation, January 20th, 2015
                "Every few months, new articles roll out proclaiming "this year" to be the year of the Linux Desktop. A wide selection of reasons are cited, explanations given, and various acts of patting we Linux users on the backs takes place.

                I'd be first to admit that it's worth celebrating each time something is made more secure or easier. But we're still a long ways off from the average person trying out any Linux distributions on their own.

                In this article, I'll discuss an untapped resource that can be used to get desktop Linux into the homes of casual users and finally jump start Linux adoption outside schools, governments and geek circles..."

                IT - Operations
                Avoid growing pains with infrastructure capacity planning
                SearchDataCenter, January 19th, 2015
                "It's an impossible task, but it has to be done: predicting future data center space, power and cooling requirements. It has never been easy, but the advent of cloud computing has made infrastructure capacity planning even more difficult.

                Data centers are expensive to build, and renovating, upgrading or expanding is disruptive and potentially dangerous.

                Space is always hard to come by, so you don't want to ask for more than you can justify. That goes for power and cooling, too..."

                Are you ready for the next OS migration?
                GCN, January 22nd, 2015
                "More than nine months have passed since Microsoft terminated all support for Windows XP. Even though many government agencies successfully made the transition to Windows 7, it's already time for IT managers to start planning for the next operating system migration, as mainstream support for Windows 7 just ended on Jan. 13.

                Even though Microsoft will continue to provide security patches until Jan. 14, 2020, there's no time like the present to start planning ahead to protect your infrastructure..."

                How DevOps Can Cut Innovation-Crushing Technical Debt
                Information Week, January 21st, 2015
                "These five elements can reduce the technical debt that builds up when rotten code and bad practices get into your systems.

                A good friend of mine is an awesome coder, but lousy with personal finances. Some years ago I remember him being hounded by creditors after he'd racked up a fairly sizeable credit card bill. It got so bad that he'd turn off his cell phone to avoid calls. Not good, you say? True, but at least these debt collectors weren't in the 'pay up or we'll organize a hospital visit for you' type of game..."

                  Explore DCIM vendors thoroughly before deploying a tool
                  SearchDataCenter, January 21st, 2015
                  "Vendor growing pains and changing business needs pose serious problems for some DCIM adopters.

                  Data center infrastructure management (DCIM) increases IT operations efficiency and performance. It is also an entire class of software that spans a wide range of features and capabilities. DCIM tools combine server management and physical asset tracking with facilities monitoring and management, unifying activities like load balancing and cooling for different densities.

                  If you're in the market for a toolset, thoroughly research DCIM vendors' product development, strategic alliances and even business stability, as well as evaluating your own needs and roadmap. Without information on DCIM vendors and their offerings, you could undermine the value of this significant investment..."

                  The Data Center Is Dead. Are You Wringing Your Hands Or Shifting Your Business?
                  CRN, January 20th, 2015
                  "The era of the corporate data center will shortly give way to the era of the mega data center, a move with the potential to disrupt that part of the channel whose very life depends on building data center infrastructures.

                  But it's not a doomsday type of disruption for solution providers. Even as the number of data centers peaks in the near future and then starts dropping, solution providers are busy preparing alternative ways to put their infrastructure skills to good use in solving customers' IT requirements..."

                  IT - Security
                  Report: More than 90% of 2014 data breaches could have been prevented
                  SearchSecurity, January 21st, 2015
                  "The Online Trust Alliance (OTA) has analyzed more than 1,000 data breaches from 2014 and concluded that as many as 90% of them could have been easily prevented.

                  The OTA studied data breaches from 2014 that involved the loss of personally identifiable information (PII) and found that those breaches could be attributed to one of four causes: 40% by external intrusions; 29% by employees, either accidentally or maliciously; 18% by lost or stolen devices or documents; and 11% by social engineering or fraud..."

                    Worst cyber attacks of 2014 could (should) have been avoided
                    CSO Online, January 19th, 2015
                    "2014 was riddled with major data breaches. Retailers, banks and financial institutions, government agencies, and military assets were all victimized by cyber attacks. According to a new report from CyActive titled Cyber Security's Infamous Five of 2014, though, most of these attacks relied on known malware components that organizations should have been able to detect and avoid..."
                    Data breaches can be prevented with one simple solution
                    PCWorld, January 19th, 2015
                    "There have been so many major data breaches over the past year or two that it's hardly even news anymore when millions of customer accounts are compromised. We've become jaded, and just expect that attackers will find a way to penetrate our networks and steal our data. The reality, however, is that there is one simple thing companies - and individuals - can do that will prevent the vast majority of data breaches: two-factor authentication..."
                      The best computer security advice you'll get
                      InfoWorld, January 20th, 2015
                      "The world is awash in bad security advice that distracts from addressing the real threats. Here's what you really need to know

                      I couldn't put my finger on what was nagging at me the last few months. When I finally sorted it out, it was the realization that most computer security advice is an absolute waste of time -- and most of what isn't is barely useful.

                      Even I'm guilty. Statements I've spouted in the past, like using long and complex passwords or hardening your computer system, don't really deliver much value. Disable weak password hashes? That was good advice 15 years ago. Use an up-to-date antivirus program? If that worked, we would have solved the problem decades ago..."

                      ISACA: Majority of enterprises report cybersecurity workforce shortage
                      SearchSecurity, January 22nd, 2015
                      "In its new 2015 Global Cybersecurity Status Report, ISACA finds that most organizations are aware of cyberattack risk, but few believe they have the capability to thwart a sophisticated attack.

                      Research from a prominent information technology association indicates that a majority of global enterprises see cyberattacks as a top business threat, but are unable to fend off sophisticated attacks, in part due to the shortage of skilled information security professionals.

                      Today ISACA, a Rolling Meadows, Ill.-based IT consortium, released its 2015 Global Cybersecurity Status Report, based on a survey of more than 3,400 business and IT professionals in nearly 130 countries, though approximately 43% of respondents live in North America..."

                      Has the time come to give up penetration testing?
                      Help Net Security, January 19th, 2015
                      "By carrying out 'white hat' attacks to identify potential entry points in the externally facing parts of an organization's IT network, such as its firewalls, email-servers or web-servers, pen testing can bring to light any existing security weaknesses. These potentially vulnerable external facing aspects, however, are rapidly increasing in number.

                      Phenomena, such as BYOD, the cloud, and shadow IT, have seen more and more different devices being added to an organization's infrastructure, each using an increasing number of applications for both business and personal purposes..."

                      6 biggest business security risks and how you can fight back
                      CSO Online, January 20th, 2015
                      "Security breaches again made big news in 2014. Yet despite years of headline stories about security leaks and distributed denial-of-service (DDoS) attacks and repeated admonishments from security professionals that businesses (and individuals) needed to do a better job protecting sensitive data, many businesses are still unprepared or not properly protected from a variety of security threats.

                      Indeed, according to Trustwave's recent 2014 State of Risk Report, which surveyed 476 IT professionals about security weaknesses, a majority of businesses had no or only a partial system in place for controlling and tracking sensitive data..."

                      NSA Report: How To Defend Against Destructive Malware
                      Dark Reading, January 22nd, 2015
                      "In the wake of the Sony breach, spy agency's Information Assurance Directorate (IAD) arm provides best practices to mitigate damage of data annihilation attacks.

                      Prevent, detect, and contain: Those are the key overarching strategies for combating data-destroying malware attacks, according to a new report issued this month by the National Security Agency..."

                      Why 2015 is set to be a record year for data breaches . and how to prepare
                      Information Age, January 19th, 2015
                      "You don't need to be a big company to have sensitive data - every company is at risk, and reputational damage can be more painful than the fine that follows

                      When it comes to the number of data breaches and how much they cost, the trend is only going one way in 2015: and that's up.

                      We can be pretty certain that 2014 was a record year for high-profile breaches and that 2015 will beat it, especially with the EU General Data Regulation on the horizon as businesses welcome in the New Year..."

                        IT - Careers
                        The Best Tech Skills To Have On Your Resume In 2015
                        Business Insider, January 22nd, 2015
                        "There's no better time to get into the software engineering industry.

                        Salaries hit an all-time high in the US last year, and there are plenty of free online classes and workshops to help you develop your skills.

                        Although it's a fairly lucrative industry in general, there are some skills that pay off more than others. Whether you're just starting out or already have experience, here are a few skills tech employers will likely be looking for in 2015..."

                          Employment in 2025: What will you do when computers do your job better and cheaper than you?
                          Information Age, January 19th, 2015
                          "Many of today's jobs won't be here tomorrow. In fact, they'll disappear to the tune of over 100 million by 2025, according to McKinsey reports.

                          It's an alarming statistic. And, like many of you, I find myself unsettled. In light of information like that, I can't help but wonder: What will the jobs of the future be like? What will we be doing? What will our kids be doing? But before we think forward, think backward.

                          The job market is a recycling machine - creating new jobs, sometimes stemming from the destruction of the old ones. Word processors, typists, telephone operators, and proofreaders are largely a thing of the past now..."

                            15 programming languages you need to know in 2015
                            Mashable, January 19th, 2015
                            "If you're a programmer, these are good times. Jobs in the segment are projected to grow 8% over the next seven years, according to the U.S. Bureau of Labor Statistics. If you're a hotshot coder, you can make up to $300 an hour or more.

                            Those at the high end of the pay scale have mastered the languages that are most in demand. Which are those? We asked Doug Winnie, director of content for online learning platform Lynda. Here's his assessment:.."

                              IT - Social Media
                              Why IT Should be Skeptical of 'Facebook at Work'
                              CIO, January 21st, 2015
                              "When Facebook burst onto the scene nearly 11 years ago, it was battling for a position in the new Internet medium called social networking. All it had to do was beat MySpace and a few other lesser-knowns at their own games, and it did so quickly and effectively.

                              With Facebook at Work, a new version of the platform limited to internal corporate communications and released to a small group of partners last week, the company is trying to break into the close-knit, old boys club that is the enterprise. Unlike the consumer social media market, the business sector isn't dominated by fly-by-night organizations funded by venture capitalists that are focused on daily active users..."

                              Exalogic Elastic Cloud 12c Software and X5-2 Hardware Launch
                              by Oracle Product Manager Kelly Goetsch
                              "We're excited to announce the release of the first of two fundamental innovations in Oracle Exalogic - our planned 12c Exalogic Elastic Cloud Software and our new X5-2 hardware, the latter of which is available immediately.

                              Beginning with software, we're seeing a massive shift from traditional pure virtualization to cloud. In our 12c release, Exalogic is aligning with Oracle's public cloud to offer the same IaaS and PaaS layers, with Java Cloud Service being offered as our first PaaS solution..."

                              IT - Virtualization
                              How to evaluate free application virtualization software
                              SearchVirtualDesktop, January 23rd, 2015
                              "Free app virtualization software might sound great, but it can come with complications, and without features you might need. Ask yourself these six questions before choosing a product.

                              Organizations considering application virtualization have a number of different options available to choose from, including free tools.

                              It is naturally tempting to consider a free product, and it's possible that there is free application virtualization software on the market that meets all your needs. But before you dive in, there are six important questions that you should consider:.."

                              Myths persist about virtualizing high performance computers
                              SearchServerVirtualization, January 21st, 2015
                              "With high-performance computers being very expensive, anything that increases their effective usage is a real benefit. Virtualization seems an obvious approach to increasing utilization, but this has been generally resisted by organizations using high performance computers.

                              There are a number of factors involved that create a barrier to virtualization. High performance computers (HPCs) are highly tuned in both hardware and software, and a general-purpose approach based on a hypervisor would be expected to reduce performance, or at least users' ability to tune the system..."

                              IT - Email
                              The importance of email encryption software in the enterprise
                              SearchSecurity, January 23rd, 2015
                              "Expert Karen Scarfone explains how email encryption software protects messages and attachments from malfeasance...

                              Email encryption software products are a specialized security technology for protecting the confidentiality and integrity of email messages and attachments while in transit or in storage. Although the technology has been around for decades, the tools available have made the usability of email encryption better than ever before.

                              Email encryption software attempts to thwart risks posed by network eavesdroppers..."

                              DMARC: The time is right for email authentication
                              Help Net Security, January 23rd, 2015
                              "It is a rare thing to be given the opportunity to right a historic wrong. The root of essentially every Internet security issue in history is the same - architects try to build fundamentally sound concepts, engineers try to strip out complexity, and developers just try to get their code to compile. Security is and always will be a secondary concern to primary functionality. This is not an editorial about how security should be 'baked in'. There is only so much time in the day, so much room in the specification, so much code you can write before you have to ship..."
                              The never-ending quest to dethrone email
                              InfoWorld, January 20th, 2015
                              "Build a better mousetrap, as the cliché has it, and the world will beat a path to your door. That line of thinking has even been applied to the most rudimentary corners of the technology world: standards and protocols that have stuck around for decades, yet viewed as creaky and badly in need of replacement. But few old-guard standards have seen as many pretenders to the throne as the SMTP/POP3/IMAP email triumvirate has. If only someone could come up with an alternative that did everything email did but better, more securely, and with less hassle, wouldn't it be worth it?..."
                              Using the Right Tool for the Job
                              By Rob Giltrap
                              Rob writes, "You wouldn't hammer a screw or screw a nail, you would use the right tool for the job. That's the elegance of the ZFS Storage Appliance, it simply uses the right tools for the jobs it needs to do.

                              The Hybrid Storage Pool within the ZFS Storage Appliance has three different caches, using three different technologies to perform three different jobs. I'll explain each in a little detail below:..."

                              (ZFS) Sequential Resilvering
                              By Roch Bourbonnais

                              Roch writes, "In the initial days of ZFS some pointed out that ZFS resilvering was metadata driven and was therefore super fast : after all we only had to resilver data that was in-use compared to traditional storage that has to resilver entire disk even if there is no actual data stored. And indeed on newly created pools ZFS was super fast for resilvering.

                              But of course storage pools rarely stay empty. So what happened when pools grew to store large quantities of data? Well we basically had to resilver most blocks present on a failed disk. So the advantage of only resilvering what is actually present is not much of a advantage, in real life, for ZFS..."

                              IT - Mobile
                              The Mobile Revolution Has Only Just Begun
                              Forbes, January 19th, 2015
                              "Finally, there’s a number that says something useful about the mobile revolution. A newly released global survey finds that an average consumer puts an implied value of $6,000 on their smartphone. That single number explains all the other engineering-centric statistics that are thrown around about this domain, from the rapidity of adoption to megabytes of wireless bandwidth to exabytes of traffic and billions of connected people..."
                                Workers Hit the Streets with Mobile Devices
                                StateTech, January 20th, 2015
                                "Caseworkers from the Massachusetts Department of Children & Families are always on the go. Charged with protecting more than 100,000 children each year, they spend their days and nights traveling between homes, courtrooms, hospitals and prisons. When their phones ring at 2 a.m., they're off, investigating allegations of child abuse. And until recently, they had to drive back to the office after a long day to transcribe their notes into an enterprise case management system...."
                                Virtual desktops don't replace EMM
                                GIGAOM, January 18th, 2015
                                "A few weeks ago, a Gigaom Research client told me she was 'sick of BYOD' and wanted out. She asked me if I thought she could 'dump everything and just have employees remote into their desktops when they need to work from the road.'

                                It's a compelling question, and timely, too..."

                                50 Open Source Mobile Tools
                                Datamation, January 20th, 2015
                                "In a relatively short period of time, mobile devices have become ubiquitous in the workplace. A recent survey of enterprise and small business workers found that just 3 percent of organizations ban their employees from using personal iPads or iPhones for business use, and only 7 percent ban Android devices. In fact, 40 percent of organizations provide iPhones for more than a quarter of employees, and 25 percent provide Android-based smartphones..."
                                  IT - Big Data
                                  Big Data and mobile analytics: Ready to rule 2015
                                  VentureBeat, January 22nd, 2015
                                  "2014 was a big year for big data, a term that gradually gained momentum to become one of the most talked-about subjects in the tech world. With 2015 fast approaching, prepare for big data's total domination, as it, along with the Internet of Things, is set to be the focus of web and mobile.

                                  It will become standard for businesses to try and benefit from it by analyzing as much as possible.

                                  But what it actually is and what it does isn't always clear to app publishers..."

                                  The Big Data Challenge Isn't The Needle In The Haystack -- It's The Haystack
                                  Forbes, January 20th, 2015
                                  "A lot of the buzz around big data, analytics and insights has been focused on finding the proverbial needle in the haystack. You figure out what you want to know, and you analyze the data available to you to find the answer.

                                  There's only one problem. How do you know you're asking the right question?..."

                                  Big data initiatives not quite delivering yet, survey shows
                                  ZDNet, January 20th, 2015
                                  "Big data is seen as the ticket to competitiveness for today and the years ahead in an intensely competitive global economy. The ability to capture data on transactions, customer preferences, and product adoption, and then be able to predict where things are going, will help organizations lead the way within their industry groups.

                                  Or so it would seem, reading all the reports..."

                                  Big Data: Ready to Fill Your Data Lake?
                                  Datamation, January 22nd, 2015
                                  "If there's a product or concept, there's probably a buzzword around it. The latest term to rise out of the Big Data trend is "Data Lake," which is more of a concept than a product. In essence, it might be your way to go from processing old data to real-time data analytics.

                                  A Data Lake is simply an unstructured store where you can put any kind of data coming in from your many data streams and sources to do some form of processing on it later, rather than when it comes in..."

                                  Six ways Big Data could damage your business
                                  CSO Online, January 21st, 2015
                                  "The prospect of knowing more about customers' lives, habits, and desires than ever before is understandably exciting. But amid all the excitement, it should not be forgotten that few businesspeople - even C-level executives - truly understand what a revolutionary force Big Data is, or the disruptive threat it represents for businesses of all kinds.

                                  While you are preparing to take maximum advantage of all the glorious opportunities Big Data offers, keep in mind that the devil in Big Data could be in these overlooked details:..."

                                  How Bitcoin Could Shake Up B2B Payments
                                  CoindDesk, January 24th, 2015
                                  "Bitcoin has made some big gains over the last year in business-to-consumer transactions, with many large retailers such as Microsoft, Dell and Overstock now accepting it as a means of payment.

                                  However, the digital currency hasn't made that kind of splash in the business-to-business (B2B) world.

                                  Late last year, core developer Jeff Garzik tweeted, musing that it would be nice if someone could put a bit of research into the subject..."

                                  10 Big Data Trends Apt to Influence Enterprises in 2015
                                  eWeek, January 19th, 2015
                                  "Enterprises that know their customers and potential customers will know success. The more they collect and analyze information to determine customers' wants, needs and preferences for a particular product or service, the more efficient the business can operate. This science is called big data analytics, and it's a market that IDC has forecast will surge from $3.2 billion in 2010 to $17 billion in 2015. Ideally, big data toolsets provide scalable, high-performance analytics at the lowest cost and in near-real time to the increasing numbers of business users demanding access to such information..."
                                  Three trends to watch in businesses' big data programs
                                  SearchBusinessAnalytics, January 22nd, 2015
                                  "Although the main trends in big data for 2015 may not be a huge departure from the previous year, businesses should still understand what's coming their way...

                                  Instead of a shift in big data developments for the coming year, expect variations on ideas that garnered interest in 2014.

                                  With so many organizations still trying to get their big data projects up to speed, it's worth looking at trends that will impact this technology space. In an interview with John Lucker, principal and leader of Deloitte's global advanced analytics and modeling market, we got the details on what businesses should expect..."

                                  World record set for 100 TB sort by open source and public cloud team
                        , January 23rd, 2015
                                  "In October 2014, Databricks participated in the Sort Benchmark and set a new world record for sorting 100 terabytes (TB) of data, or 1 trillion 100-byte records. The team used Apache Spark on 207 EC2 virtual machines and sorted 100 TB of data in 23 minutes.

                                  In comparison, the previous world record set by Hadoop MapReduce used 2100 machines in a private data center and took 72 minutes. This entry tied with a UCSD research team building high performance systems and we jointly set a new world record..."

                                  IT - BYOD
                                  Could Multiple Virtual Environments Be the Next Frontier for BYOD?
                                  Business 2 Community, January 19th, 2015
                                  "There are two primary solutions for the debate surrounding employees' use of mobile devices in the workplace. Companies that want to let employees access email and information on mobile devices can either give employees company-issued devices, or let employees bring their personal devices. These options have been coined 'choose your own device' (CYOD) and 'bring your own device' (BYOD), respectively. And each has their own sets of benefits and challenges, which have been covered in-depth on our own blog and many others..."
                                  79% of professionals do business on personal devices
                                  Help Net Security, January 22nd, 2015
                                  "As employees increasingly demand a more mobile and social workplace, the pressure is on for enterprises to deliver the same technology experience employees have in their personal lives to their work lives. With an emphasis on intuitive collaboration and enhanced productivity, initiatives such as BYOD encourage this sort of working behavior. From a security perspective however, it also heightens the level of risk in a company..."
                                  Getting a Better Handle on BYOD Management
                                  Business 2 Community, January 21st, 2015
                                  "The rise in popularity of BYOD mobile devices has been both a blessing and a curse for IT departments.

                                  BYOD has been transformative in allowing many companies to leverage employee resources for maximum efficiency and impact. Work tasks need not be confined to the corporate computer anymore; they can now be accessed at any time, on any device. Employees love the sharing and overall freedom that BYOD devices, file sync and share, and public cloud usage all bring to their work environment..."

                                  Top Ten Articles for last few Issues
                                  Vol 203 Issues 1 and 2; Vol 202 Issues 1, 2, 3, 4 and 5; Vol 201 Issue 4
                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                  • 6 excellent open source network monitoring tools
                                  • Join Larry Ellison announcing the Next Generation of Oracle Engineered Systems
                                  • Java 8 Parallel Streams on SPARC T5
                                  • kernel zones vs. fs resources
                                  • Friday Spotlight: Xen 4.5 Released
                                  • WebLogic with Docker in the Cloud
                                  • Friday Spotlight:Incredibly Simple Conversion from RHEL to Oracle Linux
                                  • How Cloud Computing Is Revolutionizing Business
                                  • Five Signs Cloud Is Mainstream At Your Company
                                  • Webcast: Zero to Manageability in One Hour - Jan 21st 10am PST

                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                    IT - Server
                                    FreeBSD Gains Ground With Small Cloud Providers
                                    Information Week, January 19th, 2015
                                    "Can this 30-year-old version of Unix help DigitalOcean and other cloud startups compete with the likes of Amazon? DigitalOcean has started offering FreeBSD, an open source version of Unix, as an option on its cloud infrastructure. It is the second cloud supplier to do so, staking a spot in which smaller services can compete against Amazon and other giant cloud providers for customers, particularly developers.

                                    FreeBSD is having a moment in the spotlight in certain circles, in part, because a few developers noticed that it's used to run the backend of WhatsApp, a mobile services platform acquired by Facebook in October 2014 at a final price that topped $21.8 billion..."

                                    LibreOffice Viewer (Beta) Now Available For Android
                                    Access Open Document Format (ODF) files
                                    The Document Foundation (TDF) is happy to see the LibreOffice Viewer (Beta) for Android released in the Google Play Store, allowing mobile users to access Open Document Format (ODF) files from devices such as tablets and smartphones.

                                    The application, created by Collabora, is available from the following link.

                                    The first release of LibreOffice Viewer handles text documents and basic presentations. Support for spreadsheets have been included in an early form, while support for more complex presentations is planned for a future release. Users are invited to download and test the application, although care is advised for production environments.

                                    The Easiest Way to Enable Oracle Database Application Development on Mac OS X
                                    Run Oracle Database in a VirtualBox VM
                                    CJ writes, "Your OS X applications can connect to Oracle Database as if it was running natively on OS X if you simply run Oracle Database in a VirtualBox VM with port forwarding enabled (easy).

                                    To work backwards through the installation process: in the Network window of the VirtualBox GUI, I enable a NAT Network adapter..."

                                    Hands On Labs for C, C++, Fortran (and Java) Developers
                                    With Oracle Solaris Studio
                                    Rick Ramsey, "I've always been a fan of Oracle Solaris Studio because it's the tool of choice for bad.ass developers. Java developers are ubiquitous, Database developers get more attention here at Oracle, and marketing apps generate a lot of buzz nowadays. But Fortran, C, and C++ developers bend big iron to their will. So I'm pumped that OTN's upcoming Virtual Tech Summit (VTS) will feature two 90-minute hands-on labs proctored by members of the Oracle Solaris Studio engineering team...."
                                    January 2015 Critical Patch Update Released
                                    By Eric P. Maurice

                                    Eric writes that Oracle "released the January 2015 Critical Patch Update. This Critical Patch Update provides 169 new fixes for security issues across a wide range of product families including: Oracle Database, Oracle Fusion Middleware, Oracle Enterprise Manager, Oracle E-Business Suite, Oracle Supply Chain Suite, Oracle PeopleSoft Enterprise, Oracle JDEdwards EnterpriseOne, Oracle Siebel CRM, Oracle iLearning, Oracle Java SE, Oracle Sun Systems Products Suite, Oracle Linux and Virtualization, and Oracle MySQL..."

                                    Why Customers Should Upgrade Directory Server Enterprise Edition (DSEE) to Oracle Unified Directory (OUD)
                                    By Forest Yin
                                    Forest Yin writes, "Lightweight Directory Access Protocol (LDAP) is the foundation of Identity Management. LDAP directories are designed to store identity and policy information and provide runtime access to that information. Oracle's Directory Server Enterprise Edition (DSEE) is the most widely deployed directory in the industry with thousands of production deployments. Some customer deployments include hundreds of millions of entries and even over a billion entries for a single deployment..."
                                    Nexenta News
                                    Nexenta Collaborates with SYNNEX Corporation to Scale its North American Footprint
                                    Exclusive Agreement between Software-Defined Storage Leader and IT Distribution Giant to Impact Storage Market
                                    Nexenta (@Nexenta), the global leader of Software-Defined Storage (SDS) (#softwaredefinedstorage) solutions, announced the signing of an exclusive distribution agreement with SYNNEX Corporation (NYSE: SNX), a leading distributor of IT products and services. The agreement provides North American solution providers with access to SDS solutions that provide innovative enterprise features at a significantly lower total cost than legacy systems.
                                    Nexenta and Leading Analyst Firm 451 Research Host '2015 Storage Predictions and Trends' Webinar
                                    Replay Available
                                    Join Nexenta's CEO, Tarkan Maner (@TarkanManer) and 451 Research Storage VP, Simon Robinson (@simonrob451) to discuss what to expect from the Software-Defined Storage market in 2015

                                    Nexenta hosted a live webinar in collaboration with 451 Research on Wednesday, January 21st to discuss Software-Defined Storage predictions and trends for 2015.

                                    Join Nexenta's CEO, Tarkan Maner and 451 Research's Storage VP, Simon Robinson for an engaging and educational discussion on what to expect from the fast-paced, exciting Software-Defined Storage market. Gain industry-leading insight on questions, such as:

                                    • What does your CIO think about Open Source/SDx?
                                    • How do hyper-convergence and other SDS deployment models deliver business benefits?
                                    • Does Flash deliver on its promise in 2015?
                                    • Why and where will object storage matter?


                                    Level3 News
                                    Level 3 to Enhance Networking Capabilities and Resilience in Singapore
                                    To Serve The Growing Connectivity, Network Redundancy And Cloud Access Demand Of Its Enterprise Customers
                                    Level 3 Communications, Inc. has launched two additional points-of-presence (PoPs) in Singapore to address the growing demand for enhanced network and cloud connectivity within the Southeast Asian business hub. The PoPs feature access to Level 3's global network and extensive portfolio of Internet protocol (IP), virtual private network (VPN), content delivery network (CDN), broadcast (Vyvx), cloud and collaboration solutions.

                                    The Level 3 PoPs are co-located with leading data center provider facilities, Equinix SG1 20 Ayer Rajah Crescent and Global Switch 2 Tai Seng Avenue. These PoPs will provide enterprise customers additional diversity in Singapore to increase resilience and deliver high-availability network solutions needed to run mission-critical applications on a local to global basis.

                                    Trending in
                                    Vol 234, Issue 2
                                    Trending IT Articles