News about Oracle's Solaris and Sun Hardware
System News
Jan 26th, 2015 — Feb 1st, 2015 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 203, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Is Your Company Prepared to Thrive or Merely Survive?
Download the Gatepoint Research White Paper
Read this white paper to find out what your peers reported as motivating factors to adopt integrated systems:

  • Business Performance: 67% say they require access to real-time, business-critical data
  • Adaptability: 62% indicated that they require smoother application upgrades, changes, and deployments
  • Security: 57% reported that security is paramount

You will learn how integrated solutions can streamline your business operations to implement new reporting systems, increase productivity, and reduce risk.

Top Five IoT Predictions for 2015
Part II
In part one of our blog post series, Oracle Group Vice President Scott Armour discussed the obstacles and opportunities he sees on the horizon for Internet of Things (IoT). Here is the second installment of the Q&A, outlining the effects of IoT on customers, how Oracle can address the concerns IoT and M2M service providers face, and the use of intelligent devices in specific verticals.
Software in Silicon Cloud Lets Partners and Customers Test Oracle's New SPARC Technology
by John Soat
"... The Software In Silicon Cloud functions as a beta test site. As with most beta programs, participants agree to certain conditions in order to use it. The site provides the hardware (M7), the operating system (Solaris), and the tools needed to test Software in Silicon. The site also allows you to create virtual machines that are pre populated with Oracle Database, Oracle WebLogic, Oracle Solaris Studio, and other software. Customers can test the processor's capabilities by testing their existing SPARC application, or developing an application on the site, or by using 'non-native' applications written in Java, says Angelo Rajadurai, Oracle principal software engineer and lead architect of the Software in Silicon Cloud..."
Agilent, Ross, 7-Eleven, and SriLankan Airlines Among Customers Choosing Oracle Exalogic
To Move to the Cloud and Grow Their Businesses

Companies cite benefits from faster application deployment and response times to accelerated business processes and improved IT staff productivity

Spotlighting the strong growth and business value of Oracle engineered systems, Oracle today announced customers across 52 industries in 22 countries are using Oracle Exalogic to reduce cost and complexity and move to the cloud. Recent customers include Agilent, Autoridade Tributária e Aduaneira (AT), Bottomline Technologies, Celcom, Claro, ECI, Grupo Farmocos Especializados, Reliance Commercial Finance, Ross, 7-Eleven, and SriLankan Airlines...

Powering a Demanding Enterprise Operation with Oracle VM
Learn how Oracle product development uses more than 310,000 virtual machines

"Much like Oracle's customer base (some 400,000 companies in 145 countries), Oracle deploys Oracle database, middleware, and application products to support its day-to-day business operations. By virtualizing enterprise applications using Oracle VM, Oracle's IT organizations realize greater flexibility and lower infrastructure costs.

Instead of implementing physical machines for each required operating system version and application release, virtualization using Oracle VM consolidates servers and provides efficiencies that help to decrease capital (CAPEX) and operating expenses (OPEX). At the same time Oracle VM helps IT deploy services more rapidly, allowing administrators to provision new applications quickly to meet emerging requirements and shifts in application demand..."

IT - Storage
10 Expert Tips for Better Data Storage
Enterprise Storage Forum, January 29th, 2015
"Better data storage means different things to different people. For some it is all about speed, for others cost is the primary factor. For many it is about coping with soaring data volumes while for some, simplicity and ease of install/use are top-of mind elements.

Whatever your opinion of what better data storage is, here are a few tips on how to improve storage in the coming year..."

    2015 Trends in Storage and Archiving
    Storage Newsletter, January 27th, 2015
    "As predicted at the end of last year by the Active Archive Alliance, active archives became a more mainstream best practice in 2014.

    Businesses and organizations are recognizing the value of active archives in addressing their overall long-term storage needs.

    As we begin 2015, Active Archive Alliance members shared their predictions for storage as it relates to active archives in the coming year..."

      What is Shingled Magnetic Recording (SMR)?, January 29th, 2015
      "In the simplest terms, Shingled Magnetic Recording (SMR) is a new hard drive technology that allows the tracks on a platter to be layered on top of each other, just like roof shingles on a house, to increase platter density or tracks per inch (TPI). Current technology, Perpendicular Magnetic Recording (PMR), uses a parallel track layout. By increasing TPI with SMR technology and decreasing the space between tracks, SMR offers tremendous potential for overall hard drive capacity gains. The end product physically looks and feels like a standard PMR drive, with higher capacity in the same physical footprint. However, the architecture change means the user experience from a performance perspective will be dramatically different..."
      Java Technology
      Core Java for the Impatient
      by Cay Horstmann
      The release of Java SE 8 introduced significant enhancements that impact the Core Java technologies and APIs at the heart of the Java platform. Many old Java idioms are no longer required and new features like lambda expressions will increase programmer productivity, but navigating these changes can be challenging.

      "Core Java for the Impatient" is a complete but concise guide to Java SE 8. Written by Cay Horstmann - the author of Java SE 8 for the Really Impatient and Core Java, the classic, two-volume introduction to the Java language - this indispensable new tutorial offers a faster, easier pathway for learning the language and libraries. Given the size of the language and the scope of the new features introduced in Java SE 8, there's plenty of material to cover, but it's presented in small chunks organized for quick access and easy understanding.

      IT - Technology
      Augmented Reality: Not Just a Game, But a Game Changer
      GCN, January 23rd, 2015
      "The announcement of the OnSight application jointly developed by NASA and Microsoft is just the latest experiment by government to harness augmented reality to advance agency missions.

      The augmented reality headset HoloLens is the brainchild of Alex Kipman, the creator of the Kinect. Like the game controller, HoloLens weaves computer generated images into the real world where the user can interact with them.

      But the government has been using Kinect technology with some success for several years..."

      Nanobots Used Inside Animals For First Time
      Business 2 Community, January 27th, 2015
      "In what used to be something only seen in science fiction movies, scientists have successfully used nanobots in a living animal for the first time in history. The research was performed by a group of scientists at the University of California, and was recently published in the journal ACS Nano. The project led by Professors Liangfang Zhang and Joseph Wang involved having the tiny devices delivering nano-particles into the stomach lining of a mouse..."
        NASA Tests Robotic Helicopter that Would Act as Mars Scout
        ComputerWorld, January 23rd, 2015
        "The robotic rovers driving across the surface of Mars are limited by what their onboard cameras can see.

        If they could see further ahead, they might be able to travel three times as far in a single Martian day, enabling them to better find sites to explore and gather more information, faster, than they can today.

        To speed up the rovers' work, NASA is considering sending a robotic helicopter to Mars that could act as a scout for their explorations..."

          Now, Even Artificial Intelligence Gurus Fret That AI Will Steal Our Jobs
          Forbes, January 31st, 2015
          "It's easy to find lots of people who worry that artificial intelligence will create machines so smart that they will destroy a huge swath of jobs currently done by humans. As computers and robots become more adept at everything from driving to writing, say even some technology optimists such as venture capitalist Vinod Khosla, skilled jobs will quickly vanish, widening the income gap even amid unprecedented abundance..."
            Scientists say AI fears unfounded, could hinder tech advances
            ComputerWorld, January 29th, 2015
            "Artificial intelligence research - for at least the foreseeable future - is going to help humans, not harm them.

            However, fears about artificial intelligence (AI) and the development of smart robots that have made headlines recently could slow research into an important technology.

            That's the thinking from AI researchers and industry analysts attending the AAAI-15 conference in Austin, Texas..."

              Self-Driving Vehicles May not Be So Safe
              Government Technology, January 26th, 2015
              "Self-driving vehicles are a bastion of hope for many. The thought of stepping into an autonomous vehicle and being whisked away at high speed to one's destination without fear of injury or death is often portrayed as a scenario of the near-future. A new report, however - called Road Safety with Self-Driving Vehicles (PDF) - released this month by researchers at the University of Michigan Transportation Research Institute concludes that safety will remain an issue as long as conventional and self-driven vehicles share the road..."
                IT - Bitcoin
                IBM's Richard Gendal Brown: Bitcoin is Opening Minds
                CoindDesk, January 26th, 2015
                "One of bitcoin's most important historic legacies may be the way it merges disparate fields of study to find unexpected solutions to old problems, according to one of the space's key thinkers.

                CoinDesk spoke to IBM UK's executive architect for innovation in banking and financial markets, Richard Gendal Brown, to get his overview of what this disruptive new technology might hold in store for the future.

                A far better-educated class of graduates is now emerging from universities thanks to bitcoin's existence..."

                Virtual Currencies Hit the World Stage: Bitcoin's Ever-Evolving Legal Status
                Bitcoin Magazine, January 26th, 2015
                "Congratulations, virtual currency world - New York wants to expressly regulate you! That's how important Bitcoin and other digital currencies have become in recent years. And as we know, what happens in New York's financial world often has implications for the wider world. All the recent attention New York has paid to virtual currency is raising many important legal questions, with potentially profound implications. This article will offer a brief survey of just some of them..."
                Bitcoin: Perhaps the Most Promising Investment Opportunity of Our Age
                Bitcoin Magazine, January 30th, 2015
                "A technology is called 'disruptive' if it creates a new market that first disturbs and then displaces an earlier technology. Bitcoin is potentially such a technology and much more. The fact that it can disrupt the largest and most interconnected marketplace in the world - money, banking, and finance - makes it perhaps the most promising investment opportunity of our age.

                Unlike our current increasingly unstable and unpredictable financial system, Bitcoin has 21st century technologies at its very core. The digital currency and clearing network is open source, mobile, peer-to-peer, cryptographically protected, privacy oriented and native to the Internet..."

                Volatility, Deflation and Manipulation: A Response to Bitcoin's Critics
                CoindDesk, January 26th, 2015
                "Bitcoin has its share of critics and skeptics, and opposition to the emerging technology - especially among the intelligentsia - shows no sign of abating.

                Notable commentators on the topic range from author Jeffrey Robinson to finance blogger Karl Denninger, Boston University professor Mark Williams, rabid Keynesian Paul Krugman, Austrian economist Gary North and FT Alphaville's Izabella Kaminska..."

                Bitcoin is done with its 'tumultuous teen' years
                CNBC, January 26th, 2015
                "Today, bitcoin grew up: Bitcoin wallet service Coinbase launched the first U.S.-licensed bitcoin exchange ... and it's backed by the granddaddy of exchanges, the NYSE.

                While 2014 may be remembered as the tumultuous teenage phase - with the implosion of Mt. Gox, multiple exchanges hacks and an outright price crash - 2015 marks bitcoin's ascendance into adulthood. This announcement will mark the emergence of a new asset class; one that is uncorrelated to other financial markets and will be similar to investing in the Internet in 1994..."

                Bitcoin-Friendly University Offers Free Course on Future of Money
                CoindDesk, January 28th, 2015
                "The University of Cumbria has announced the launch of a free online Masters-level course that will look at the future of money.

                The month long 'Money and Society' MOOC (massive open online course) will be targeted at "monetary innovators and activists from any political persuasion", and look into "the essence of money and how it has been interpreted and misinterpreted over the last three millennia", according to the university..."

                  Cautionary Tales on Bitcoin Security
                  Bitcoin Magazine, January 28th, 2015
                  "The Bitcoin ecosystem has many different types of platforms such as exchanges, payment service providers, reporting platforms and an array of other supporting services. Every time you create a new account your online profile expands, increasing the risk of breach with one or all of your accounts. Private keys and passphrases should be managed as securely as possible, and the same for login credentials.

                  The following tales are filled with valuable lessons for stepping up your game with digital identity management...:

                  10 at 10
                  By Larry Wake
                  Larry Wake writes, "Can it have been so long already? Today is the 10th anniversary of the first release of Solaris 10. This was a breakthrough release for Solaris, Sun, and really, the industry -- it breathed new life into a class of systems software that some companies had written off long before. How did it do that? By including a wealth of groundbreaking new features that raised the bar for what an enterprise operating system should be. To use one of my favorite phrases: innovation matters, and the operating system is too critical a place in the application delivery stack not to innovate..."
                  MySQL Enterprise Monitor 3.0.19 has been released
                  Available for download on the My Oracle Support (MOS) web site

                  Andy Bang blogs, "We are pleased to announce that MySQL Enterprise Monitor 3.0.19 is now available for download on the My Oracle Support (MOS) web site. It will also be available via the Oracle Software Delivery Cloud in a few weeks. This is a maintenance release that includes a few new features and fixes a number of bugs. You can find more information on the contents of this release in the change log..."

                  It's A New Year - Take Advantage of What MySQL Has To Offer
                  by Diana Gray, Senior Principal Curriculum Product Manager
                  If you've been thinking about migrating to the cloud in this year, here's another area Oracle has worked to simplify - making it even easier to get up to speed!

                  Now is the time to develop the skills you need.

                  Cloud Computing
                  Oracle CEO Hurd: Company Will Grow Its Cloud Market Share
                  eWeek, January 31st, 2015
                  Jeffrey Burt writes in eWeek that "Oracle CEO Mark Hurd is warning competitors like and SAP that the software giant plans to increase its share of the booming cloud computing market.

                  In an interview on CNBC's Squawk on the Street Jan. 29, Hurd noted Oracle's growth in cloud revenues in recent quarters, pointing to the company's efforts in sales, R&D and engineering over the past six to seven years as the drivers for its success in making the transition to the cloud..."

                  "I think Oracle's in a position where we have a fantastic product portfolio," the CEO said. "We're in a marvelous competitive position. We think we're in a position to take market share ... Make no mistake about it, we are laser-focused on taking share. We're focused on growing. We're focused on driving the company forward."

                  Oracle Enterprise Resource Planning Cloud and Oracle Enterprise Performance Management Cloud
                  Platforms of Choice for CFOs Worldwide

                  In Q2 FY2015, quarterly sales for Oracle Enterprise Resource Planning Cloud (Oracle ERP Cloud) and Oracle Enterprise Performance Management Cloud (Oracle EPM Cloud) increased by 80 percent. This growth reiterates customers' confidence that Oracle is best positioned to offer CFOs a complete, integrated suite of financial management, procurement, projects, and performance management cloud services, all designed to work seamlessly and securely together.

                  More than 600 enterprise and midsize companies worldwide have selected Oracle ERP Cloud and Oracle EPM Cloud to drive finance innovation and growth.

                  Cloud Computing Definition & Architecture for Cloud Service Brokers
                  foundation for cloud computing including definition and concepts
                  Juergen writes, "the launch of the Oracle Cloud PaaS Platforms we will make the SOA & BPM Partner Community cloud ready. In this article series we will lay the foundation for cloud computing including definition and concepts.


                  • Cloud Computing Hype Introduction
                  • Cloud Computing Definition and Criteria
                  • Concepts in Cloud Computing
                  • Industry focus & use case Cloud Computing Providers & Consumers
                  • Differences between Cloud Definitions
                  • NIST Cloud Computing Reference Architecture
                  • Cloud Broker
                  • Types Cloud Broker
                  • Challenges Cloud Broker

                  Read on...

                  Is Your PaaS Delivering the Agility Your Users Demand?
                  On-demand Online Forum with keynote featuring Oracle and IDC
                  View the on-demand Online Forum with keynote featuring Oracle experts and IDC analyst Robert Mahowald. Watch all the sessions to learn how to rapidly build, deploy, manage, and secure rich applications and enable business collaboration and innovation using an integrated cloud platform built on the industry's #1 Database and Application Server.

                  • Access highly engaging content specifically designed for:
                  • Java and Database developers
                  • Database managers and administrators
                  • IT operations managers
                  • Lines of business managers

                  Read on for details.

                  Partners Announce Support for Oracle Linux
                  Independent software vendors support Oracle Linux
                  Zeynep notes that, "Scores of leading technology partners -independent software vendors, hardware vendors, and system integrators- support Oracle Linux and Oracle VM.

                  Several independent software vendors and SIs recently announced their support for Oracle Linux:

                  • SAS for SAS 9.4 TS1M2 (9.4 M2) application platform
                  • Symantec for its Endpoint Protection 12.1.5 client for Linux
                  • Symantec Storage Foundation and High Availability 6.2 product suite
                  • Capgemini has certified its OCommerce solution on Oracle Linux and Oracle VM

                  Read on to see a full list.

                  IT - Cloud
                  5 Cloud Contract Traps to Avoid
                  Information Week, January 27th, 2015
                  "A cloud contract is just that, a contract. As such, it carries with it all of the normal pitfalls of a contractual relationship -- and a few specialized ones. Here's how to identify and avoid the risks.

                  Going to the cloud makes things easier, right?

                  Then why is it so complicated?..."

                    Cloud Confusion? Tackling 7 Financing Challenges Head On
                    CRN, January 23rd 2015
                    "Companies that make the jump to the cloud are also jumping into a new way of doing business, putting aside the high-dollar, cash-up-front contracts that came with hardware-intensive capital expenditure deals and embracing a software-focused operational expenditure model that works more like a lease agreement...

                    For some, these changes are in the bag. They've planned, they've prepared, and they're equipped to be successful using an op-ex model. Those who haven't prepared, though, are in danger of running headlong into trouble and out of business if they don't fully consider the dollars and cents of the new IT.

                    Here are some of the biggest financing concerns that come along with adoption of the cloud..."

                      Hyperscale Public Clouds: If You Can't Beat 'Em, Join 'Em
                      Forrester, January 29th, 2015
                      "With Amazon Web Services and Microsoft Azure now on greater than $2 billion annual run rates and expanding their application services nearly weekly, it's starting to look tougher than ever for traditional hosters, enterprise cloud players and managed service providers to compete against them. When you just can't see how to win, the better option might just be not to try..."
                      Survey: One-Third of Cloud Users's Clouds are Private, Heavily OpenStack
                      Data Center Knowledge, January 30th, 2015
                      "While public cloud services continue to grow - as this week's Amazon Web Services and Microsoft Azure earnings reports illustrated - private cloud still enjoys a higher adoption rate.

                      A recent survey, conducted by GigaOm and funded by Canonical, found that more than one-third of cloud users use private clouds, and more than half of those are OpenStack clouds. Hybrid cloud and multi-cloud adoption is on the rise, since it's a strategy that offers the best of both worlds..."

                      The Three Fundamental Security Benefits of Cloud-Based Commerce Solutions
                      Business 2 Community, January 23th, 2015
                      "As cyber security becomes a larger focal point in the media and minds of online shoppers, consumers understandably have increasing concerns when it comes to what protections are offered by retailers. Across channels, only 55% of shoppers think retailers use security systems that adequately protect their data, and not surprisingly so.

                      In fact, Trustwave reports that data breaches increased by 53.6% from 2012 to 2013, with more than half of those breaches targeting ecommerce sites. Of special concern is highly sensitive data, including credit card numbers and personally identifiable information. But with customer expectations on the rise and IT budgets commonly on the fall, how can retailers meet the security needs of today's digital environment? For many organizations, turning to cloud-based commerce solutions helps fill the gap..."

                      IT - CxO
                      Here's Why Most Managers Really Suck
                      TLNT, January 26th, 2015
                      "If you've read any significant amount of literature on management, you've likely come across the Peter Principle - that people will get promoted to their own level of incompetence.

                      The idea is that people are promoted to management positions because they've proven to be successful at the core function of their current job, not because they've been successful at the core function of their new job - managing a team of people.

                      There are a lot of things that can happen when people who aren't very good at managing people assume management positions. Today, we'll look at just three:..."

                      How IT Managers Can Get Close to Policyholders
                      Insurance Networking News, January 27th, 2015
                      "By now, if you have been in the business for any appreciable length of time, you have heard the message repeatedly: stay close to the customer.

                      By 'customers' in this context, let's talking about the policyholders at the end of the food chain, versus internal customers within the enterprise, such as your HR department. Sure, it's vital to understand the needs and aspirations of policyholders, but if you are running an IT shop within an insurance company, your time is more likely to be consumed with planning meetings with other managers, meetings with current and prospective vendors to discuss the latest solutions and pricing, and worrying about uptime and security. The ability for a busy IT manager to get out and directly talk to customers is a luxury that few can afford..."

                      Insurance CFOs Lack Faith in Data: EY Survey
                      Insurance Networking News, January 27th, 2015
                      "Financial and actuarial executives at insurance companies report their technology needs are not being met, according to the latest EY Global Insurance CFO Survey.

                      The poll of 35 senior level finance executives at global insurance organizations reveals that these departments are challenged to get data at the quality and granularity required to do their jobs most effectively, and that the platforms on which they are expected to perform their functions are out of date..."

                        10 Ways CIOs Can Invest Like a CFO, Manage Like a CEO
                        eWeek, January 30th, 2015
                        "There's no question that over the last decade, the CIO's job has morphed more than any other high-level corporate position. Once it was a leadership position with responsibility for all of a company's data, computer systems and security. Now, thanks to cloud services, bring- your-own-device (BYOD) and other trends, many of those duties have been carved up and allotted to others. As IT innovation continues, the CIO's role must also continue to evolve. Every C-level executive now has a bigger stake in the CIO's decisions. Using new data sources and technologies, CIOs are expected to demonstrate in new ways how their work affects the bottom line..."
                        5 Team-Building Tips for IT
                        CIO, January 31st, 2015
                        "Team dynamics can mean the difference between a healthy work environment and a toxic one...

                        IT talent can be hard to find and even harder to keep - which means there's plenty of incentive to make the workplace attractive to technology pros. Culture is paramount, and focusing on organizational development can lead to more satisfied and productive workers..."

                          7 Mindful Changes CIOs Can Make in 2015
                          CIO, January 28th, 2015
                          "How does the business view your role as CIO? The traditional definition is one who manages information to ensure that his or her organization is technologically operational.

                          That's the key word - 'operational.' Since CIOs are often viewed as those who keep the systems up and running, they are frequently classified in the 'operations' category, and not seen as strategic partners..."

                          First Rule of Management: Everyone Doesn'tt Have to Know Everything
                          TLNT, January 22nd, 2015
                          "In an article from Psychology Today titled, Help - My Boss Is Incompetent!, Beverly D. Flaxington writes:

                          'They [incompetent managers] may not know which information to impart, which to hold back, and which to hold as confidential.'

                          I couldn't agree more. Upon reading Flaxington's observations, what immediately came to my mind was all the managers from my past without the good sense to keep some nonsense to themselves instead of passing it on as worthwhile news.

                          These folks had not yet learned an important but oft overlooked function of management - shielding your staff from stupid stuff..."

                          Is the Term 'IT Department' on Its Way Out?
                          CIO Insight, January 26th, 2015
                          "In response to a shift in the balance of power toward line-of-business executives, CIOs are reshaping their departments as internal service providers, according to a recent survey. And one-half of surveyed CIOs believe the term 'IT department' is out of date and will be renamed within two years, according to the Logicalis-conducted survey titled "Establishing the Internal Service Provider."

                          "The CIO's role must change from that of a technology provider to one that is laser-focused on delivering services that meet LOB users' needs," said Mike Martin, senior vice president of Solutions and Services at Logicalis US..."

                          Small Changes can Make a Big Difference in Tech Diversity
                          Dark Reading, January 28th, 2015
                          "There's no doubt that many employers feel most comfortable hiring people like themselves. But in InfoSec, this approach can lead to stagnation.

                          Whenever the lack of diversity in tech is discussed, you can always count on it sparking a debate over whether it is due to a 'pipeline' problem or a 'culture' problem. In other words, are there too few 'minorities' interested in studying tech, or are they being repelled for some reason?

                          If you ask me, that's a fruitless discussion that can never be proven one way or another, and it's time to look at things differently..."

                            The Benefits of Software-Defined Technology
                            CIO Insight, January 27th, 2015
                            "Organizations can gain flexibility through these latest storage, networking and data center initiatives that utilize software-defined technology.

                            You've likely heard the term 'software defined' increasingly being discussed these days, as a growing number of vendors use it to describe storage, networking and other products focused on the data center.

                            And it's a term that's gaining buzz for good reason, as software-defined products provide organizations flexibility, added speed and a way in which to keep up with innovation.

                            Software-defined storage, networking and data centers have the potential to make a positive impact on the enterprise, although experts believe the technology is still in its early stages, and a relatively small number of companies have actually deployed these products..."

                              The Oil Price Drop Won't Impact these IT Spend Items
                              IT World Canada, January 26th, 2015
                              "Information Technology decision makers need to prepare for substantial information and communication technology (ICT) budget cuts due to the falling oil prices, but some item will fare better than others, according to a recent report from the analyst firm International Data Corp (IDC) Canada.

                              Canadian energy firms are bearing the brunt of the continued decline of oil prices and this will have very serious effects on corporate expenditures on ICT figures from a new report from IDC Canada entitled: The Impact of Declining Oil Prices on the Canadian ICT Market. But this doesn't mean that a speeding freeze will affect all areas of IT, said Nigel Wallis, research director for vertical markets and new initiatives at IDC Canada..."

                              The Other Golden Rule
                              Business 2 Community, January 28th, 2015
                              "We often hear customer experience professionals talk about the fact that there's a great emphasis to - and a greater return if we - focus our efforts on the customer experience for B2C companies. There's this notion that it's not as important for B2B companies, that it can't be impacted, or that it doesn't matter because B2B is just a different beast.

                              I disagree..."

                                vBeers @ Broward - Funky Buddha - Wed February 11
                                6pm - 9pm
                                Please join us for the next vBeers @ Broward. We meet on the 2nd Wednesday of each month in Broward County, Florida, USA.

                                The next Broward meeting will be at the Funky Buddha Brewery, which is located in Oakland Park, just a few minutes East of I-95.

                                Bring your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community. Please encourage to IT friends and colleagues to attend!

                                • Funky Buddha Brewery
                                • 1201 NE 38th St
                                • Oakland Park, FL 33334

                                Please RSVP at the vBeers South Florida page for this meetup.

                                Join us for one of the three South Florida vBeers events. The South Florida vBeers events happen three times a month, once per county:

                                IT - DR
                                10 Ways to Make Sure Your IT is Blizzard-Ready Before the Storm
                                CRN, January 26th, 2015
                                "As the Northeast bundles up and braces for a major blizzard, businesses are using technology to stay up and running despite predictions of more than two feet of snow in some areas. Solution providers said the key to facing blizzard conditions with ease is to plan ahead, with key technologies, policies and procedures in place before the storm hits.

                                Take a look at 10 recommendations from solution providers who are helping their clients get ready for Tuesday's big storm..."

                                  IT - PM
                                  7 Ways Project Managers Can Anticipate, Avoid and Mitigate Problems
                                  CSO Online, January 28th, 2015
                                  "Experts identify the most common (and frustrating) issues project managers must constantly tackle and what steps they can take to avoid or minimize these problems.

                                  What separates the good, or the great, project managers (PM) from the just so-so? The answer: How they handle problems when they arise and they prevent them from derailing deadlines and the budget.

                                  Her are seven of the biggest (or most common) problems that PMs face, and what good ones can do to anticipate, avoid or mitigate them..."

                                    IT - Networks
                                    8 Wi-Fi mistakes to avoid
                                    Network World, January 26th, 2015
                                    "Wi-Fi is great when it works right - and when it's secure. Although setting up Wi-Fi can seem straightforward, there are many complexities. For example, not performing proper surveys, design work, and maintenance or ignoring security issues can cause major problems.

                                    Here are some of the biggest Wi-Fi mistakes to avoid..."

                                    Avoiding The Pitfalls Of Virtual Network Functions (VNF) Takes Planning
                                    SearchSDN, January 26th, 2015
                                    "Network functions virtualization (NFV) is a framework for building network services from pieces of software-hosted functionality. These individual "feature pieces" are called virtual network functions, or VNFs, and one of the hottest issues in NFV today is to determine which VNFs are most important in the near term. Operators that pick the correct VNFs may enjoy early success and build a foundation that permits them to build new services easily as the market evolves. Those operators that pick the wrong ones could face failure, and in the process, possibly compromise the whole NFV value proposition..."
                                      How Not to Waste Your Money On the Second Wave of 802.11ac Wireless Gear
                                      Network World, January 27th, 2015
                                      "The best way to avoid wasting your money on Wave 2 of 802.11ac access points is to not buy them right away, and the second-best is to not overreact to their presence on your network.

                                      Wave 2 APs have been on the market for about a year, dating back to last January's release of the Asus RT-AC87U, but the technology hasn't yet become commonplace among enterprise users.

                                      The central difference between the two waves of 802.11ac technology is the use of multi-user MIMO - essentially, a system of multiple antennae that allows Wave 2 hardware to use a given piece of spectrum for more than one client at the same time, increasing throughput..."

                                        How to avoid IPv6 neighbor discovery threats
                                        SearchNetworking, January 26th, 2015
                                        "IPv6 neighbor discovery is a core part of the IPv6 protocol suite. It is employed, among other things, for IPv6 address resolution and IPv6 stateless address autoconfiguration. This article, the first in a series of tips about IPv6 networks, explores a number of ND-based attacks and illustrates how an open source IPv6 toolkit can enable an IT administrator to assess the effectiveness of any security device meant to mitigate these issues.

                                        IPv6 neighbor discovery (ND), a critical component of the IPv6 protocol suite, is employed by IPv6 nodes for a number of functions:.."

                                        Sad State of U.S. Broadband as Cable Industry Balks at FCC's 25Mbps Definition
                                        Network World, January 26th, 2015
                                        "Right now, the FCC defines broadband as 4Mbps down and 1Mbps up. Since FCC Chairman Tom Wheeler called those speeds 'yesterday's broadband' and proposed that, in the FCC's Section 706 report, broadband should be defined as 25Mbps down and 3Mbps up, interested parties have been submitting comments on that proposal.

                                        It's no surprise that cable companies are among those parties interested in keeping the slow status quo. Ars Technica reported that the National Cable & Telecommunications Association (NCTA) told the FCC that normal folks don't need speeds of 25Mbps..."

                                        How SDN LTE Could Simplify Network Management
                                        SearchSDN, January 28th, 2015
                                        "LTE is growing fast, but so are the network management challenges that come along with it. SDN LTE could be the game changer, bringing centralized control for a simpler network.

                                        The insatiable demand for high speed LTE mobile networks presents incredible opportunity to operators, but it also introduces significant challenges. Beyond the need for scale and bandwidth, the move to LTE poses a slew of operational and management issues that SDN and network virtualization may be able to resolve..."

                                        Our Bullet-Proof LAN Failed. Here's What we Learned
                                        Network World, January 26th, 2015
                                        "In my organization we manage almost all IT in-house, including the LAN, which is highly redundant. We have 35 Floor Wiring Concentrators around campus, each with around 300 active ports, and the concentrators have dual Gigabit uplinks to network cores in two data centers that are 300 meters apart. The data centers are linked by multiple 10Gb links, and each is connected to the Internet via two trunks that follow different paths.

                                        That should be just about bullet-proof, right?..."

                                          IT - Operations
                                          Five Innovations that Are Key to the Future of Data Centers
                                          TechRepublic, January 27th, 2015
                                          "If people are the heart of an organization, then the data center could be considered its brain, and maybe even its mouth. Quality storage and handling are key to an organization's success.

                                          The technologies and processes that power our data centers have grown at an exponential rate. What was once considered state of the art is now considered a relic, and the IT skills needed to manage these new data centers are changing as well.

                                          As we move further in 2015, it's important to take a look at some of the hotly debated trends and technologies and see how they might affect your organization in the future. Here are five innovations that will impact the future of the data center..."

                                            How DevOps Helps Grease the Gears of the Application Economy
                                            eWeek, January 27th, 2015
                                            CA Technologies recently released a study titled 'DevOps: The Worst-Kept Secret to Winning in the Application Economy,' showing that having a DevOps strategy helps drive tangible business benefits to enterprises. The survey included input from 1,425 senior IT and business leaders worldwide and found that 88 percent of them already have or plan to adopt a DevOps strategy. According to the study, DevOps adopters have experienced anywhere from a 15 to 21 percent improvement in business in the form of increased numbers of customers, faster time to market, and improved quality and performance of applications.... This eWEEK slide show takes a look at the CA study..."
                                            One Container Technology Does not Fit All Enterprises
                                            InfoWorld, January 23rd, 2015
                                            "Container technology is the most recent trend in cloud computing. Last month, CoreOS announced Rocket, its new container. Rocket competes with the megahyped Docker, which is adding a container management service called Swarm. Don't forget that Google, Amazon Web Services, and Microsoft have their own container strategies, as does pretty much every startup jumping onto this bandwagon..."
                                            IT - Security
                                            6 Ways the Blackhat Movie Got Security Wrong (and 4 Things it Got Right)
                                            IT World, January 28th, 2015
                                            "Released in mid-January, the movie Blackhat centers on several cyber-attacks perpetuated against a Chinese nuclear facility and the stock market, and the hunt for the perpetrator of the attacks by Chinese and American law enforcement agencies. As with many movies centering on hackers and cyber security, expectations for accuracy were fairly low among experts in the field. We at SecureState decided to watch the movie and note any of the ridiculous inaccuracies here. Be forewarned, there are some minor spoilers ahead..."
                                            9 Common Security Awareness Mistakes (and How to Fix Them)
                                            CIO, January 29th, 2015
                                            "To err is human, but to err in cyber security can cause major damage to an organization. It will never be possible to be perfect, but major improvement is possible, just by being aware of some of the most common mistakes and their consequences

                                            Every recent study of security vulnerabilities has come to the same conclusion: The human factor is a greater risk to organizations than flaws in technology..."

                                            Be Prepared for the Breach That's Headed Your Way
                                            ComputerWorld, January 26th, 2015
                                            "If we learned anything in 2014, it was that no one is immune to a massive data breach. If one hits you this year, are you going to have the visibility that will let you tell the executive team what they need to know?

                                            January 2015 is already winding down, but it's not too late to think about the lessons of 2014. For anyone in information security, 2014 was a year marked by spectacular breaches. It ended with Sony Pictures Entertainment getting its clock cleaned by hackers, quite possibly from North Korea. Wouldn't it be great if 2015 doesn't include the same sort of clock cleaning at your company?..."

                                            BYON is a Bigger Threat to the Enterprise Than BYOD
                                            TechRepublic, January 27th, 2015
                                            "Bring your own network (BYON) is "the ability of end users to create or access alternative networks when the available options are not satisfactory for their purposes." This sounds great if you're an end user or a vendor selling mobile access, but it's not so great if you're in charge of corporate security.

                                            From an enterprise perspective, BYON is seen as a derivative of the bring your own device (BYOD) movement. Since we're dealing with employee-created, unauthorized networks, however, data that travels via BYOD channels can't be monitored, which is a glaring data security risk that can introduce cyberthreats, such as malware, into a company's digital assets..."

                                            Cybersecurity Utilities - The Future of Managed Security Services
                                            Forrester, January 29th, 2015
                                            "Cloud Will Transform Managed Security Services

                                            The movement to cloud is fast changing the method companies will deploy and consume security services. The number one issue that drives the adoption of managed security services (MSS) and the business of managed security service providers (MSSPs) is complexity reduction. As companies replace premise-based data centers with virtual cloud data centers, the expectations of these customers will change as well, they look for elastic ways to purchase security services, as well as, methods that allow for the active defense of both cloud, and premise based workloads. Consider the following:..."

                                            DDOS Attack Size Up 50-Fold Over Past Decade
                                            CSO Online, January 28th, 2015
                                            "The size of the largest DDOS attack was fifty times larger last year than ten years ago, according to a new survey of Internet service and hosting providers, and attacks are also increasing in numbers and in sophistication.

                                            The largest reported attack last year was 400 gigabits per second, compared to just 8 Gbps in 2004 -- and 100 Gpbs in 2010..."

                                              Detection vs. Prevention: Ponemon Report Points to Controversial Trend
                                              SearchSecurity, January 23rd, 2015
                                              "The Ponemon Institute has surveyed hundreds of IT security practitioners to determine the most pressing risks to endpoint security, and in the process has uncovered what soon may be a controversial new trend in malware detection vs protection.

                                              The Traverse City, Mich.-based research firm this week released its 2015 State of Endpoint Report to study the risks facing the myriad endpoint devices that inhabit the average enterprise network. As has been uncovered in other studies, the Ponemon research shows that IT security practitioners believe negligent or careless employees are the biggest threat to endpoint security..."

                                              Social engineering attacks from the front lines
                                              CSO Online, January 29th, 2015
                                              "It's always amazing how little attention social engineering attacks get when discussing enterprise information security risks. After all, it's usually easier to get an unsuspecting employee to click on a link than it is to find an exploitable vulnerability on a reasonably hardened webserver. Social engineering attacks come from many different angles: from targeted e-mails, phone call pretexting, or acting like a service technician or other innocuous person to obtain access to the IT resources and data they seek..."
                                              The Impact of New EU Security Legislation
                                              Help Net Security, January 27th, 2015
                                              "Based on a survey of organizations from the UK, France and Germany, FireEye found that many organizations in Europe are unprepared for and challenged by cost and complexity of compliance with new European Union (EU) security legislation.

                                              The report assesses respondentsÂ’ understanding and expectations of the proposed Network and Information Security (NIS) and General Data Protection Regulation (GDPR) legislation. The GDPR is currently set to be finalized in early 2015, with compliance becoming mandatory in 2017..."

                                              When Terrorists Attack Online, is Cyber-Insurance Enough?
                                              Government Technology, January 26th, 2015
                                              "(TNS) The November attack on Sony Pictures Entertainment drew around-the-clock media attention, but far from Hollywood's studio lights is a growing legal debate in the starchy insurance industry about whether most cyber-policies cover such a breach.

                                              The U.S. government blames North Korea for the attack on Sony. If true, the data heist could be in a major gray area between cyber risk and terrorism..."

                                                Why Insider Threat is Thriving
                                                Help Net Security, January 22nd, 2015
                                                "In the past few years, rapid growth in the volume of sensitive information combined with new technologies has chipped away at the effectiveness of traditional endpoint protections and network perimeter security. In tandem come warranted concerns about the number and types of employees who have access to sensitive data. Simply by having access, privileged insiders may unwittingly put data at risk - or be used by an outside actor as a conduit for siphoning data..."
                                                Will Millennials Be the Death of Data Security?
                                                Dark Reading, January 27th, 2015
                                                "Millennials, notoriously promiscuous with data and devices, this year will become the largest generation in the workforce. Is your security team prepared?

                                                As the 51 million members of Generation X begin turning 50 this year and start thinking about retirement, the Millennials (also known as Generation C for 'Connected') will be entering the workforce en masse with fresh ideas, optimismÂ…and millions of unprotected connected devices..."

                                                Will the U.S. Be Ready With Secure Chip Cards and Payment Terminals?
                                                CIO, January 27th, 2015
                                                "Adoption is either 'impressive' or 'so behind,' depending on whom you ask ...

                                                Only about half of the 12 million merchant payment terminals in the U.S. will be converted to accept more secure smart credit and debit cards and NFC-ready smartphones by the end of 2015, according to financial officials working to support the conversion..."

                                                  IT - Careers
                                                  How to Stick It to Craigslist Scammers
                                                  InfoWorld, January 27th, 2015
                                                  "Mark, one of my good friends, is best described as a fun-loving, good-natured, South African pirate. Like cult hero Captain Ron, he has few enemies and is loved by nearly everyone -- except for Craigslist scammers.

                                                  Mark is a deal-maker, a buyer and seller of many objects, quite often on Craigslist. I paid $1,000 for my used kayak; he bought three great-looking kayaks for $200. When he offers an item for sale, almost always the first people to reply are scammers. Even if they aren't first, they're always the most aggressive..."

                                                    How to Write a Great Cover Letter
                                                    CIO, January 26th, 2015
                                                    "Recruiters, hiring managers and other hiring decision makers, not to mention job seekers themselves, have debated for years: is a cover letter really necessary? The answer is a resounding 'Yes,' even if no one reads it.

                                                    A cover letter is a great way for job seekers to focus on what is truly important to them in their career, and to address that in a conversational tone that is personalized to the specific job they're applying to, says Caitlin Sampson, Certified Professional Resume Writer and career consultant with Regal Resumes..."

                                                      IT hiring: 4 things you're doing wrong (and how to fix them)
                                                      ComputerWorld, January 28th, 2015
                                                      "Hiring 60 new Java programmers in a year is a challenge for almost any IT organization, but it's a near Herculean task when your company is based in the Midwest rather than the heart of Silicon Valley.

                                                      Undeterred, Orbitz, the travel site, tried out-of-the-box methods such as attending and hosting Meetup events and deploying talent-sourcing software to help meet its ambitious recruitment targets..."

                                                      The Key to Consulting Happiness: Become Batman
                                                      IT World, January 27th, 2015
                                                      "Whether you own or work at a development firm / agency, the primary factor in determining your happiness is going to be learning when and when not to care. In my younger days, I cared entirely too much about entirely too many things. Even today I find myself being overly concerned with the wrong things. It's a recipe for frustration and anxiety which can end up poisoning your business..."
                                                        Next Generation Engineered Systems Launch Recap
                                                        Key assets from the X5 engineered systems announcement on Jan. 21
                                                        Here's a quick summary of key assets generated by last week's X5 engineered systems launch:

                                                        • Launch Webcasts & Presentations
                                                        • theCube Videos
                                                        • Awareness & Product videos
                                                        • Thought Leadership Content

                                                        Read on for details.

                                                          IT - Email
                                                          5 Things to Do Immediately After Your Email Gets Hacked
                                                          CIO, January 23rd, 2015
                                                          "Unfortunately, there's a very good chance your email account will be compromised at some point. These five steps can help you quickly recover and kill any associated bugs that may have laid claim to your computer...

                                                          'Hey you! Your mail has been hacked, and you're sending spam to all your friends.'

                                                          You have very likely received an email similar to this one from a friend of colleague at some point. Or you will receive one. Email accounts get hacked very often, but lots of us have no idea what to do when an evil bot takes over and starts spewing spam (maybe even malware) across cyberspace. In most cases, recovering from this sort of attack is not terribly difficult. Here's what you should do as soon as you learn that your email has been hacked -- and right after..."

                                                            How the Internet of Things Impacts Enterprise Security
                                                            Help Net Security, January 26th, 2015
                                                            "A new study conducted by Atomik Research examined the impact that emerging security threats connected with the Internet of Things (IoT) have on enterprise security. Study respondents included 404 IT professionals and 302 executives from retail, energy and financial services organizations in the U.S. and U.K.

                                                            Key findings:..."

                                                            The Internet of Robotic Things: Secure, Harmless Helpers or Vulnerable, Vicious Foes?
                                                            CSO Online, January 23rd, 2015
                                                            "Experts say robots will be commonplace in 10 years. 'Many respondents see advances in [artificial intelligence] and robotics pervading nearly every aspect of daily life by the year 2025 - from distant manufacturing processes to the most mundane household activities,' says Aaron Smith, senior researcher, The Pew Research Center's Internet Project, speaking of the several experts quoted in his 'Predictions for the State of AI and Robotics in 2025'.

                                                            People are increasingly connecting the broadening array of robots to the Internet and IoT devices, including sensors..."

                                                            The Internet of Things Requires the Internet of Everywhere
                                                            Network World, January 28th, 2015
                                                            "The City of Milan is not only the host city for Cisco Live, but also for the World Expo in 2015 when the city will show off its evolution to a smart city. Milan is just the latest city to leverage the power of IoT to transform itself. We've clearly entered the era of IoT, as examples can now be found in any region or any vertical - in other words, everywhere.

                                                            However, the rapid acceleration of IoT does raise the question - is the infrastructure, most notably the cloud, really ready for IoT? ..."

                                                            Sequential Resilvering
                                                            By Roch Bourbonnais
                                                            Roch writes, "In the initial days of ZFS some pointed out that ZFS resilvering was metadata driven and was therefore super fast : after all we only had to resilver data that was in-use compared to traditional storage that has to resilver entire disk even if there is no actual data stored. And indeed on newly created pools ZFS was super fast for resilvering.

                                                            But of course storage pools rarely stay empty. So what happened when pools grew to store large quantities of data ? Well we basically had to resilver most blocks present on a failed disk. So the advantage of only resilvering what is actually present is not much of a advantage, in real life, for ZFS..."

                                                            ZFS Data Encryption
                                                            Secure, Flexible and Cost-Effective
                                                            Part 2: How to Prevent the Next Data Breach with Oracle ZFS Storage Appliance Encryption and Key Management

                                                            John Szlendak blogs, "As we discussed in Part 1, storage system (or data-at-rest) encryption provides the best level of protection against data breaches and theft as it secures all your stored data independent of the network or the application environment. The Oracle ZFS Storage Appliance Encryption is one of the best storage encryption solutions out there. It provides highly secure, most flexible and cost-effective storage encryption and key management on the market. Here are some highlights..."

                                                            IT - Backup
                                                            Cloud Backups - Purpose Built vs. Public Cloud
                                                            Storage Switzerland, January 26th, 2015
                                                            "Leveraging the cloud as part of the data protection process is increasing in popularity, and with that popularity come a lot of options for IT planners to sift through. One area of consideration is the cloud destination. There is a tendency to assume that all clouds are created equal and that as long as the destination is some type of cloud, then all is fine. In reality, all clouds are not created equal. Many IT professionals would be surprised to learn that the type of cloud chosen can specifically impact backup and recovery performance..."
                                                            IT - Mobile
                                                            7 Smartphone Rules Changed This Week
                                                            CIO, January 31st, 2015
                                                            "Federal regulators have been throwing their weight around lately, and mostly to good effect for consumers and users of mobile technology.

                                                            The net effect of their recent activism adds up to a whole new set of rules and protections for all of us.

                                                            Here are the ramifications of seven new rules..."

                                                              79% Of Professionals Do Business on Personal Devices
                                                              Help Net Security, January 22nd, 2015
                                                              "As employees increasingly demand a more mobile and social workplace, the pressure is on for enterprises to deliver the same technology experience employees have in their personal lives to their work lives. With an emphasis on intuitive collaboration and enhanced productivity, initiatives such as BYOD encourage this sort of working behavior. From a security perspective however, it also heightens the level of risk in a company..."
                                                              Five Myths About Mobile Apps
                                                              Forrester, January 30th, 2015
                                                              "Time spent on mobile is skyrocketing. Since about 80% of that time is spent on apps, many marketing leaders have quickly jumped to the conclusion that the only way to reach and engage their customers is through their own branded apps. Wrong! Here are five - often ignored - good reasons for marketing leaders to broaden their mobile approach beyond their own apps:.."
                                                                Gartner foresees 250M connected vehicles on the road by 2020
                                                                ComputerWorld, January 26th, 2015
                                                                "If you buy a car during the next five years, there's a good chance it will have a wireless network connection that will enable a myriad of mobile services.

                                                                That's the prediction market research firm Gartner made today, when it released a report predicting that there will be about 250 million "connected" cars on the road by 2020.

                                                                Early last year, Gartner had predicted 150 million connected cars by that time; its latest report markedly ups that number..."

                                                                NIST Offers Guidance on Mobile App Security
                                                                eWeek, January 30th, 2015
                                                                "A new publication released by the National Institute of Standards and Technology (NIST), an agency of the U.S. Department of Commerce, provides guidance for organizations looking to improve security as employees move to mobile devices such as smartphones and tablets for their work and their applications.

                                                                The guide, 'Vetting the Security of Mobile Applications,' provides organizations, including health care groups, with information they need to assess the security and privacy risks associated with mobile apps, whether developed in-house or downloaded from mobile app marketplaces..."

                                                                Stadiums Race to Digitize
                                                                TechRepublic, January 28th, 2015
                                                                "Imagine walking into a stadium and your smartphone immediately pings you that a $30 premium seat upgrade is available for purchase on your mobile device. As soon as you settle in to enjoy that awesome view of the game, you use your smartphone to order a pulled pork sandwich and imported beer delivered right to your seat. Then, when your favorite player scores a touchdown, you use the team's app to watch an instant replay at multiple angles and a stadium-exclusive video feed of the players on the sideline. Later on, when nature calls, the app directs you to the closest restroom with no wait time..."
                                                                  IT - Big Data
                                                                  10 Best Paying Big Data Career Skills
                                                                  Information Management, January 26th, 2015
                                                                  "Big data and cloud experts earned the best U.S. technology paychecks in 2014, according to's 2014 salary survey results. But which 10 technology skill sets deliver those big salaries? Here are the top 10..."

                                                                  • Hadoop
                                                                  • Flume
                                                                  • Chef
                                                                  • ABAP
                                                                  • Pig
                                                                  • HBase
                                                                  • Cloudera
                                                                  • MapReduce
                                                                  • Cassandra
                                                                  • PaaS

                                                                  Read on for details.

                                                                  10 Steps to Big Data Success
                                                                  Information Management, January 27th, 2015
                                                                  "Without effective data governance and data management, big data can mean big problems for many organizations already struggling with more data than they can handle. That 'lake' they are building can very easily become a 'cesspool' without appropriate data management practices that are adapted to this new platform. The solution? Firms need to actively adapt their data governance and data management capabilities - from implementing to ongoing maintenance.

                                                                  Here are 10 steps to follow on that data journey to smarter, faster business decisions and results that big data can empower..."

                                                                  Big Data Analytics Leaders Face Big Misgivings
                                                                  CIO Insight, January 26th, 2015
                                                                  "A majority of companies are falling short of expectations in deploying big data analytics, according to a recent survey from Platfora. The report, titled "Big Data Analytics Status, Opportunities and Pain Points," indicates that BDA leaders struggle to link existing, traditional databases (such as enterprise data warehouses) with new technologies which are needed to support these efforts (such as Hadoop).

                                                                  It doesn't help that available tools out there are frequently billed as big-data worthy but are really only capable of working with small data. Or that a notable share of BDA leaders openly question whether their initiatives actually support a viable business function..."

                                                                  Big Data or Big Disappointment? Experts Debate Hype Versus Reality
                                                                  eWeek, January 29th, 2015
                                                                  "The promise of big data is that IT and C-suite executives will gain profit-driving business insights from the latest analytics tools that sift through gigabytes and terabytes of corporate data.

                                                                  From customers' buying habits to medical research, companies and institutions have far more data on what people are buying, searching for and chatting about online than at any time in history..."

                                                                  Big Data's Disconnect: CXO vs Employee Views
                                                                  Information Management, January 26th, 2015
                                                                  "There's an apparent disconnect between how CEOs see the current status and benefits of data initiatives and how lower-level managers see them, according to a new study by Economist Intelligence Unit that was sponsored by Teradata.

                                                                  This and other disparities impede success of big data projects and imperil the competitive advantage companies hope to realize, the report notes..."

                                                                  Bringing Predictive Analytics into Your CRM Program
                                                                  Business 2 Community, January 27th, 2015
                                                                  "Predictive Analytics isn't all math; some of its basic concepts can deliver huge gains from any Customer Relationship Management program.

                                                                  Growth-focused SMEs, without enterprise-scale budgets, want one thing from their CRM: conversions. Performance metrics revolve around making the next call, setting the next appointment, closing that last-day-of-the-quarter sale.

                                                                  And they're suspicious of anything that gets in the way - including buzzwords like Predictive Analytics.

                                                                  Should they be?..."

                                                                  Data Analytics: Are We there Yet?
                                                                  ComputerWorld, January 26th, 2015
                                                                  "Remember what travel was like before GPS? You could usually manage if you were traveling along familiar roads, but go on a long trip and it could get exciting. Which exit were we looking for? Had we passed the red barn? Did the gas station attendant say to turn after three lights or four?

                                                                  And let's not forget the kids in the back seat asking, 'When will we get there?' Okay, that part hasn't changed, although the good news is that they can usually see the GPS screen too and answer their own questions..."

                                                                    How three small credit card transactions could reveal your identity
                                                                    CSO Online, January 30th, 2015
                                                                    "Just three small clues -- receipts for a pizza, a coffee and a pair of jeans -- are enough information to identify a person's credit card transactions from among those of a million people, according to a new study.

                                                                    The findings, published in the journal Science, add to other research showing that seemingly anonymous data sets may not protect people's privacy under rigorous analysis..."

                                                                      Prepare for the IoT Data Tsunami
                                                                      TechRepublic, January 26th, 2015
                                                                      "Sensor technology drives 30% of all data from Internet of Things (IoT) devices, said Andy Souders, SVP of Products & Strategy at Savi Technology, in a recent email Q&A. For him, IoT sensor technology is about 'using the data to uncover new information and correlations that were previously unknown.'

                                                                      There's a 'data tsunami' on its way, he explained, and 'companies will therefore need to look for new ways to manage it by innovating their capabilities in collecting, storing, and analyzing business-critical information,' adding that 'it will not be long before sensor data surpasses enterprise data in volume..."

                                                                      Top Ten Articles for last few Issues
                                                                      Vol 203 Issues 1, 2 and 3; Vol 202 Issues 1, 2, 3, 4 and 5
                                                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                                      • 6 excellent open source network monitoring tools
                                                                      • Join Larry Ellison announcing the Next Generation of Oracle Engineered Systems
                                                                      • Java 8 Parallel Streams on SPARC T5
                                                                      • kernel zones vs. fs resources
                                                                      • Friday Spotlight: Xen 4.5 Released
                                                                      • How Cloud Computing Is Revolutionizing Business
                                                                      • Friday Spotlight:Incredibly Simple Conversion from RHEL to Oracle Linux
                                                                      • WebLogic with Docker in the Cloud
                                                                      • Five Signs Cloud Is Mainstream At Your Company
                                                                      • Webcast: Zero to Manageability in One Hour - Jan 21st 10am PST

                                                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                                                        IT - Encryption
                                                                        Data Encryption on the Rise
                                                                        Network Computing, January 23rd, 2015
                                                                        "With corporate demand for data security growing, full data encryption is becoming a default feature in the mobile space.

                                                                        Because of hacking scandals and government snooping, many companies are starting to encrypt all their data. Both Apple and Google have committed to help users encrypt data in their devices and in all communications. Some experts project that more that 20% of Internet traffic will be encrypted by the end of this year..."

                                                                        The Importance of Email Encryption Software In the Enterprise
                                                                        SearchSecurity, January 27th, 2015
                                                                        "Email encryption software products are a specialized security technology for protecting the confidentiality and integrity of email messages and attachments while in transit or in storage. Although the technology has been around for decades, the tools available have made the usability of email encryption better than ever before.

                                                                        Email encryption software attempts to thwart risks posed by network eavesdroppers. By default, email is generally unprotected by protocols such as SSL/TLS, and it is transmitted in plain text across local networks and the Internet. As a result, the contents of email messages, as well as their attachments, can be intercepted and read by an attacker en route..."

                                                                        LibreOffice 4.4
                                                                        The Most Beautiful LibreOffice Ever
                                                                        The Document Foundation is pleased to announce LibreOffice 4.4, the ninth major release of the free office suite, with a significant number of design and user experience improvements:

                                                                        • The user interface has been improved in a significant way
                                                                        • Interoperability with OOXML file formats has been extended
                                                                        • Improved source code quality based on Coverity Scan analysis

                                                                        Read on for details.

                                                                        Solaris Studio 12.4
                                                                        The new release comes with sharper tools
                                                                        Oracle has released version 12.4 of its Solaris Studio development environment. The release promises improved analysis tools and supports C++ 2011 and OpenMP 4.0.

                                                                        The newly designed Oracle Solaris Studio Performance Analyzer now includes features such as an intuitive data organization, timeline views and code navigation that can be called in at the click of a mouse.

                                                                        Data Encryption ... Be Safe or Be Sorry
                                                                        How to Prevent the Next Data Breach with Encryption (Part 1)

                                                                        John Szlendak writes, "Another day, another costly data breach headline. This time, it was Sony Pictures as the victim of a devastating cyber attack. Newspapers report that North Korean hackers broke into Sony's computer systems stealing and exposing a trove of sensitive documents. The studio's reputation is in tatters as embarrassing revelations spill from tens of thousands of leaked emails, private documents and other company sensitive materials. Millions of dollars in lawsuits are expected from ex-employees over leaked Social Security number and other personal information.

                                                                        Sony is not alone..."

                                                                        Nexenta News
                                                                        New website to replace
                                                                        As Nexenta continues down the path to be more involved with our customers, we have given the community new life! The community has been a large part of our history and a driving force behind many of the relationships we have in both the open source and enterprise worlds.

                                                                        With that we have just launched a new website to replace


                                                                        This new website is based on the Jive platform allowing it to be much more robust and support our entire portfolio of software-defined solutions. This new platform will be able to support beta releases and forums along with our traditional Community edition, as well as Enterprise customers. This new effort to revitalize the community including having a dedicated community manager, Christina Adams.

                                                                        Please join us in activating your account and becoming an advocate in the Nexenta community.

                                                                        Trending in
                                                                        Vol 234, Issue 2
                                                                        Trending IT Articles