News about Oracle's Solaris and Sun Hardware
System News
Feb 9th, 2015 — Feb 15th, 2015 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 204, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Database Insider
February 2015 issue now available
The February issue of the Database Insider newsletter is now available. Topics include:

  • News, Video, Webcasts, E-Book, Customer Buzz, Blogs, Find an Oracle Partner, Training, Events

(Full newsletter here).

New Oracle VM Templates for Oracle Database
Provides a framework that fully automates the creation of a Single Instance, Oracle Restart

Chris Kawalek blogs, "In last week's Oracle Virtualization Spotlight, Honglin Su discussed new Oracle VM Templates for Oracle Database. Here's an excerpt:

The Oracle VM Templates for Oracle Database provides a framework that fully automates the creation of a Single Instance, Oracle Restart (Single Instance/HA) or Oracle Real Application Clusters (RAC) configurations in an Oracle VM environment. In a matter of minutes the versatile and powerful Oracle VM Templates for Oracle Database can be cloned into any number of VMs which could be deployed as a Single Instance, Oracle Restart (Single Instance/HA) or Oracle RAC of any number of nodes.

Of course, this is the Oracle Linux blog, so why am I referencing new Oracle VM Templates? Because these templates of course run Oracle Linux! Here are the highlights of the new templates:..."

Mark Hurd: 40% of US workforce can retire in 8 years. Is your HR ready?
Oracle CEO Mark Hurd shares his thoughts on the ever-evolving digital landscape
"We all know that the demographic of the global workforce is changing but do you realize how fast? As Oracle CEO Mark Hurd points out, in an Oracle Profit Magazine interview this month, 'In the next eight years, 40 percent of everybody working in the US can retire. And the implications of that - swapping out 40 percent of the workforce - will shake up the workplace in some radical ways.'

That potential disruption could be as catastrophic as a bad line change in game 7 of the Stanley Cup Playoffs. It begs the question, is your HR department ready?..."

VIDEO: Oracle President Thomas Kurian
on Marketing & CX
"Perhaps no other business role has more to gain - and lose - in the ever-important world of customer experience (CX) than today's marketer. Customer centricity and CX have become the leading strategic focus across almost every business around the globe. And yet there's still no clear-cut winner on who owns customer experience. What is clear, however, is that marketing and its numerous customer touch points has the greatest opportunity to take the strategic wheel with today's empowered, digital, social and mobile consumer..."
    Oracle to Receive IEEE Milestone Award for SPARC RISC Architecture
    A History of Record Performance and Mission Critical Enterprise Capabilities
    Kevin Gee writes, "The SPARC Architecture IEEE Milestone Plaque unveiling recognizing the technological achievements of the SPARC RISC Architecture for innovation and excellence will be held on February 13, 2015 at 11:00 a.m. in the lobby of the Clock Tower on Oracle's Santa Clara Campus. The plaque unveiling will be preceded by a dedication ceremony in the Oracle Auditorium beginning at 10:00 a.m. Speakers will include IEEE 2015 President Howard Michel, John Fowler, Executive Vice President, Systems, Oracle, and Professor David Patterson along with others instrumental in shaping the success of this highly impactful technology..."
    Oracle Exadata Database Machine X5
    Everything you need to know
    Meghan Fritz writes, "There has been a lot of excitement since Larry Ellison's January announcement of Oracle Exadata Database Machine X5-2. With that excitement comes questions and comments, so we figured it'd be an opportune time to sit down with one of our knowledgeable executives.

    Below is an interview with Joel Borellis - Group Vice President of Partner Enablement at Oracle. We asked Joel a few questions surrounding the launch, and here is what he had to say..."

    Gartner research note regarding Exadata X5
    Gartner database analyst Donald Feinberg on Exadata X5
    Gartner database analyst, Donald Feinberg has released a new research note regarding Oracle's Exadata X5 January 2015 announcement.

    Quotes from the research note include:

    • "Exadata X5 contains technology upgrades of all components, and should be a big step forward in customer satisfaction regarding cost."
    • "Purchasing and IT management should re-evaluate Exadata."
    • "Exadata X5's most important changes are flexible, configurable hardware, capacity on demand (COD) pricing of the DBMS software and the availability of Oracle VM on Exadata"

    Oracle has purchased rights to the full report.

    Exploring the customer benefits of deploying Oracle Engineered Systems
    Ovum research note
    Ovum analyst Roy Illsley has published a research note exploring the customer benefits of deploying Oracle Engineered Systems:

    "The market in integrated, or converged, systems is becoming crowded as more and more vendors announce new offerings. Differentiation in this market is difficult to achieve as the integrated approach delivers broadly the same benefits: simplicity of use and deployment, workload-specific optimization, and better control over resources and ability to scale. However, Oracle has produced a range of systems that are unlike others in the integrated systems market, and the term 'engineered systems' describes this differentiation extremely well..."

    Oracle VM VirtualBox 4.3.22 Release
    maintenance release
    Oracle has just released Oracle VM VirtualBox 4.3.22, a maintenance release of VirtualBox 4.3 which improves stability and fixes regressions.

    You can see the Changelog for a complete list of changes. Binaries can be downloaded at

    For highlight information on Oracle VM VirtualBox, please see this Spotlight article.

    Oracle VM 3.3.2 Released
    maintenance update
    Oracle just released a maintenance update for Oracle VM 3.3 to bring new hardware support, improved stability, and to provide bug fixes. You can review the What's New wiki for the list of notable bug fixes.

    Oracle VM 3.3.2 updates are available for download from My Oracle Support. Oracle VM Server packages are also available from Oracle Unbreakable Linux Network (Oracle VM 3 Latest Channel - since 3.3 release - ovm3x_x86_64_latest). The patch updates include all the cumulative bug fixes that have been integrated since the 3.3.1 release...

    IT - Storage
    Shingled Drives for Re-roofing Your Storage?
    Enterprise Storage Forum, February 11th, 2015
    "In the last several years, there have been an increasing number of storage options. Initially we had just magnetic hard drives with a single rotational speed. Then they started to come in several varieties. Now we have a range of drive speeds starting at 15,000 rpm at the top end, followed by 10,000 rpm drives, then the ubiquitous 7,200 drives, and slower drives with speeds such as 5,900, 5,400, 4,500 and even variable speed drives..."
      15 Storage Standouts Spotted at VMware PEX 2015
      CRN, February 10th, 2015
      "The key to efficiently running and managing a virtualized or cloud environment is the ability to easily access and manage the storage on which such environments run. That becomes evident when walking the halls at the recently concluded VMware Partner Exchange conference, where VMware and its storage vendor partners showed new ways to increase the integration of virtualization and the cloud with storage.

      While VMware led the way with the introduction of Virtual SAN (VSAN) 6.0 and Virtual Volumes (VVOLs), its partners showed how they could take advantage of those technologies with their own offerings.

      Turn the page, and walk the VMware PEX show floor with CRN..."

      Leveraging Analytics for Smarter Storage Systems
      Storage-Switzerland, February 10th, 2015
      "Almost since their inception, storage systems have been keeping log files that track everything that is going on with that storage system. Over the years the type and granularity of data that is captured has increased, and today these systems are essentially a big data generator in their own right. The problem is that most of these storage systems don't provide any meaningful analysis of the data being captured, and the analysis that is reported on is isolated to a single system..."
      FLUX Presentation @ NSU - Oracle and Linux - Thursday February 19th
      Einstein's from 6:30PM to 7:30PM; Presentation at 7:30PM
      Ken Ellis, Principle Linux and Virtualization Consultant at Oracle Corporation, will provide an update on Oracle and Linux.

      His Oracle Linux discussions will include the following:

      • Linux Strategy
      • What is Oracle Linux?
      • Why Oracle Linux is better?
      • Support Options
      • Update on Oracle Linux 7
      • Features, Management and Options (filesystems, D-Trace, ksplice, etc.)
      • OL as guest running on (vmware, ovm, etc.)
      • Q&A

      We will have an informal meeting at the Einstein's Bagel cafe on the ground floor of the Carl DeSantis building from 6:30pm to 7:30pm. We'll move to the classroom for a 7:30pm to 9pm presentation.

      Directions on FLUX website.

      IT - Technology
      10 obscure technologies that could change the world
      CSO Online, February 12th, 2015
      "Technology breakthroughs that many people don't even know exist.

      In the world of tech, there is no shortage of well-known products that make our lives easier and more enjoyable. At the same time, there are also a number of fascinating and groundbreaking technologies and products that remain somewhat under the radar. Here are a few examples of cool products you might not have heard of..."

        Manufacturing and 3D Printing
        Business 2 Community, February 12th, 2015
        "The world of manufacturing is changing very quickly thanks to the rapid growth of an amazing technology. As you may know, 3D printing uses a few specific technologies to actually print out an object using various media including spooled plastic filaments, powders, and resins. You may also encounter 3D printers which print using metal powder via a technology called DMP or direct metal printing. Printers which can use fabric, ceramic material, wood and even glass are being developed..."
        Beauty Is In the Eye of the Bot Holder -- And Woe Be Unto the Rest Of Us
        InfoWorld, February 10th, 2015
        "This is how the world ends: The greatest minds of our generation have united to create the equivalent of a pageant judge, wrapped in a silicon shell

        Why isn't there a tire-changing robot? The thought stabbed me on a lonely shoulder off I-95 as slush from a two-foot snow bank seeped into my skivvies on the way home from the airport. My cab driver apparently hadn't noticed the Steinway-sized pothole, and the Lincoln's wheels apparently weren't designed to withstand an 11.5 jolt on the Richter scale. That's how my lug nuts and I ended up on the side of the road...."

          Over-The-Air (OTA) Software Coming Soon to a New Car Near You
          ComputerWorld, February 5th, 2015
          "sing a capability that is unique in the auto industry, Elon Musk last week tweeted that over-the-air (OTA) software upgrades would soon come to its P85D Model S sedans as the cars sat in garages and driveways around the world.

          While Tesla Motor's powertrain upgrade via OTA software may be a first, it's a feature that most automakers are hoping to adopt because it will improve customer satisfaction and slash costs..."

            10 Obscure Technologies that Could Change the World
            Network World, February 11th, 2015
            "In the world of tech, there is no shortage of well-known products that make our lives easier and more enjoyable. At the same time, there are also a number of fascinating and groundbreaking technologies and products that remain somewhat under the radar. Here are a few examples of cool products you might not have heard of..."
              IT - Bitcoin
              The AOL of Bitcoin Has Arrived: Coinbase Launches First True Global Bank
              Bitcoin Magazine, February 13th, 2015
              "The internet was a vague idea for most people, before AOL arrived and gave the world a usable, daily internet access tool. The recent launch of Coinbase Exchange will change Bitcoin no less spectacularly. If you need further evidence, compare the early user growth rates of AOL with those of Coinbase. Coinbase adoption rates are significantly outpacing those that AOL made history with back in the early 1990s.

              Here's how and why..."

              Survey: 8% of US Retailers Plan to Accept Bitcoin in the Next Year
              Coindesk, February 11th, 2015
              "An online survey has found that 8% of US retailers say they are planning to accept bitcoin within the next 12 months.

              The data, collected by Boston Retail Partners, after surveying 500 retailers across the US, showed that none of the businesses were currently accepting bitcoin, whilst 5% have plans to adopt it within three years..."

              SWIFT Event to Discuss Bitcoin's Impact on Banking
              Coindesk, February 10th, 2015
              "An event to be held by the Society for Worldwide Interbank Financial Telecommunication (SWIFT) in New York next month is set to include a panel of payments and cryptocurrency professionals.

              The Business Forum panel will discuss cryptographic protocols and their potential impact on correspondent banks, those that provide services to other financial entities..."

                What Is Bitcoin? Two Out Of Three Americans Don't Know
                Cryptocoin News, February 12th, 2015
                "An event to be held by the Society for Worldwide Interbank Financial Telecommunication (SWIFT) in New York next month is set to include a panel of payments and cryptocurrency professionals.

                The Business Forum panel will discuss cryptographic protocols and their potential impact on correspondent banks, those that provide services to other financial entities..."

                  Deploying MySQL over NFS using the Oracle ZFS Storage Appliance
                  Consolidating the storage of MySQL databases onto the Oracle ZFS Storage Appliance
                  Paulie blogs, "The Oracle ZFS Storage Appliance supports NFS, iSCSI, and Fibre Channel access to a MySQL database. By consolidating the storage of MySQL databases onto the Oracle ZFS Storage Appliance, the following goals can be achieved:

                  • Expand and contract storage space easily in a pooled environment.
                  • Focus high-end caching on the Oracle ZFS Storage Appliance to simplify provisioning.
                  • Eliminate network overhead by leveraging Infiniband and Fibre Channel connectivity.

                  This blog post will focus specifically on NFS. A followup post will discuss iSCSI and Fibre Channel..."

                  Cloud Computing
                  OpenWorld 2014 Round 3.Highlighting Oracle Java Cloud
                  By Ruma Sanyal

                  Ancy Dow, Oracle Tech Cloud Account Strategist, writes, "In this session, Anand Kothari, Product Manager for Oracle Java Cloud Service and Oracle JaaS, and Harshad Oak, Oracle ACE Director, demonstrate how you can transform your development experience with Oracle's Java Cloud. The ease and flexibility of developing in Java Cloud is unmatched, as customers can quickly build and deploy applications - be they existing Java applications, simple extensions to Oracle SaaS services, or new applications on-premise or in the cloud, using tools and techniques developers already use and love..."

                  Oracle Linux Newsletter
                  February 2015
                  The February 2015 edition of the Oracle Linux newsletter is now available! In this issue, learn about:

                  • The Next Generation of Oracle's Engineered Systems launch
                  • Oracle Linux on the Docker Hub Registry
                  • Unbreakable Enterprise Kernel R3 Quarterly Update 4
                  • Oracle OpenStack for Oracle Linux architecture overview
                  • Several new customer stories
                  • And much more!

                  You can read the latest edition online right now.

                  IT - Cloud
                  What the Cloud Can Learn from the Data-Breach Epidemic
                  InfoWorld, February 10th, 2015
                  "Anthem joins the likes of Sony and Home Depot in the data-center hack parade, but cloud fans shouldn't get too smug

                  Last week, the second-largest U.S. health insurer, Anthem, announced that as many as 80 million customers had their account information stolen. Not much is known about which systems were hijacked, but Anthem said all of its businesses were affected, so it's easy to figure that the attack was far-reaching..."

                  Cloud Data Security Still Lacking Even as Enterprises Increase Use
                  eWeek, February 12th, 2015
                  "The average business is using more cloud services and 1 in 10 is sharing documents outside the company.

                  Corporate employees continue to expand their use of the cloud, an overall trend that simultaneously continues to increase risks to data security, according to a quarterly look at cloud usage published by Skyhigh Networks. In the fourth quarter of 2014, the average company used 897 cloud services, a 43 percent increase over the same quarter a year earlier. About 11 percent of all documents stored in the cloud were shared with people outside the company, while a fifth of those documents were shared with non-corporate email addresses..."

                  The 3 A's of Cloud Resource Utilization Management
                  Business 2 Community, February 12th, 2015
                  "Whether you are juggling multiple cloud providers or multiple services within one cloud provider, managing your use of cloud resources can quickly become complicated.

                  To streamline your processes, just remember the 3 A's of cloud resource utilization management:..."

                  Get Ready for the New Stack
                  InfoWorld, February 10th, 2015
                  "Virtualization may be the most successful technology ever to cross the threshold of the enterprise data center. Vastly better hardware utilization and the ability to spin up VMs on a dime has made virtualization an easy sell over the last decade, to the point where Gartner recently estimated that 70 percent of x86 workloads are virtualized..."
                  No End In Sight to the Growth of Cloud Analytics
                  PC World, February 10th, 2015
                  "It's no secret that cloud computing and data analytics are both rapidly growing areas of IT. Put them together, and you get a winning combination that's expected to grow by more than 26 percent annually over the next five years.

                  That's according to market-tracking firm Research and Markets, which on Friday released a new report on the global cloud analytics market.

                  Increased adoption of data analytics is one of the major drivers in this market, Research and Markets found. More specifically, many organizations are adopting data analytics in order to better understand consumption patterns, customer acquisition and various other factors believed to increase revenue, cut costs and boost customer loyalty..."

                  IT - CxO
                  Why Tech Distractions Make It Hard to Get Anything Done
                  eWeek, February 12th, 2015
                  "If you're like most professionals, you're struggling to get your work done. It's not your fault. Understanding this phenomenon starts with ecology.

                  Don't look now, but there's an acute attention shortage. It's becoming increasingly difficult to carve out time to focus and get real work done. It's happening to you. And it's happening to the people you work for and those work for you. Don't beat yourself up about it. It's not your fault.

                  If you want to understand both the problem and the solution, you need to look at it as an ecological phenomenon..."

                    10 Ways Workspaces Will Evolve During the Next 12 Months
                    eWeek, February 9th, 2015
                    "Global competition and quickly changing market conditions are driving enterprises to become more agile and mobile. At the same time, a war for talent is raging throughout the global economy. Attracting and retaining smart, innovative employees both inside and outside of IT while increasing the organization's ability to adapt to evolving markets is becoming one of businesses' most significant challenges.

                    Businesses must balance the demand for worker mobility and enterprise agility with the need to protect vital data and corporate resources from the ever-increasing threat of cyber-criminals. How will these sweeping trends transform the workplace in the coming year?..."

                      CIOs make the tough call on legacy systems
                      SearchCIO, February 10th, 2015
                      "After decades of building up their IT infrastructures, companies are faced with deciding which legacy systems to keep and which to cut. CIOs can attest there are no easy formulas.

                      Every time NSM Insurance Group acquires a company, CIO Brendan O'Malley must evaluate the IT systems that come along with it and decide what should stay and what must go.

                      For example, NSM last year acquired a company with a custom back-office system developed in COBOL in the 1990s. The legacy system did the work the acquired company needed, but it required a niche firm to maintain it at a significant cost and, moving forward, it couldn't handle NSM's business requirements. The system would have to go..."

                      The CMO is not replacing the CIO and here's why
                      GIGAOM, February 9th, 2015
                      "Three years ago, Gartner predicted that by 2017, the CMO (chief marketing officer) would spend more on IT than the CIO. This one prediction spurned a number of follow-up predictions pointing toward the end of the CIO. The bottom line that everyone wants to know: Is the CIO role indeed going away? Is another c-level function replacing the CIO? And if so, who will take over the IT function?..."
                      Surviving Disruptive Technology
                      Business 2 Community, February 10th, 2015
                      "As new technologies come along and threaten existing business models, those in leadership roles are often perplexed as to what actions they should take. One approach is to either ignore them or label them a fad and assume they will go away. Another is to assume a reordering of the business environment and that radical change is needed.

                      Unfortunately, the correct response is often more nuanced. As a result, the business landscape is full of companies who have failed to react in time or have failed to understand that shifting an organization's culture (e.g., social business) is not something that can be done overnight..."

                        10 Leadership Skills for Sustained Innovation
                        Government Technology, February 10th, 2015
                        "In the private sector, ongoing innovation is a way of life for most business enterprises. With the world changing so rapidly, companies that fail to come up with new products and services to meet shifting customer demands will soon fall behind.

                        But what about state and local governments?..."

                          Why Your Company Needs a Chief Privacy Officer
                          InfoWorld, February 10th, 2015
                          "Another week, another 70 million records compromised. Best way to not have a data breach? Don't have the data in the first place.

                          Yet if you had a person or team dedicated to protecting employee and customer privacy, your data exposure would already be far less than it is today. Does your company have a chief privacy officer or advocate? If not, it should..."

                            Five Tips to Prep for a Sarbanes-Oxley Audit
                            Search Data Center, February 12th, 2015
                            "For IT organizations in public U.S.-operating companies, SOX audits are a fact of life. Look forward to a compliance audit with these immediate and long-term preparations.

                            All data centers benefit from log collection and monitoring -- they make troubleshooting and performance optimization easier. But public organizations in the U.S. require that these logs and organizational standards pass muster -- or face legal reprecussions..."

                            vBeers @ Delray Beach (Wed, February 18th, 2015)
                            6pm - 9pm - Saltwater Brewery - Sponsored
                            This month we have a field trip to the Saltwater Brewery in Delray Beach. Saltwater is functional brewery - not a traditional bar. They have a regular rotation of food trucks that camp out there (Cuban, American, Mexican food). We will have some food delivered (wings and pizza).

                            Event participants will be treated to a private tour of the brewery by the Brewmaster and be given a commemorative Saltwater Brewery growler should they wish to take some home after the tasting and networking event.

                            The Saltwater Brewery is 300 yards WEST of 95 on Atlantic Blvd in Delray Beach on the north side of the road. They have recently celebrated their 1-year anniversary and offer an assortment of locally brewed beers. Flights and growlers are also available.

                            Bring your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community.

                            Please share this invitation with your IT colleagues and encourage them to attend!

                            Please RSVP via

                            IT - DR
                            Why Schools Fail at IT Disaster Recovery Efforts
                            CIO Insight, February 13th, 2015
                            "Educational institutions lag behind commercial businesses in preparedness for major IT disasters, according to a new study. Only 26 percent of IT professionals surveyed said they feel very prepared for such an event. One-third of IT professionals said their organization suffered a major incident requiring disaster recovery procedures, according to the report. Of those, 11 percent had permanent IT losses. Evolve IP, a cloud services company, produced the report, titled "The 2015 Disaster Recovery and Business Continuity Survey."

                            The Web-based survey was conducted in December with a sample size of 2,084 IT professionals. "When disaster hits, it hits hard, typically taking over a day to recover and causing financial as well as data losses," said Tim Allen, chief sales officer at Evolve IP. "Deploying disaster recovery as a service, which is easier to deploy and typically costs less, improves disaster recovery results when compared to efficient methods used by most organizations."...

                            IT - PM
                            11 Communication Skills of Effective Project Leaders
                            CIO, February 10th, 2015
                            "Project managers abound, but highly effective project leaders are much harder to find. The latter are shaped not only by their technical knowledge and capabilities, but by how effectively they communicate with others at all levels.

                            Great project leaders are objective, trustworthy, focused and confident. They lead by example, foster an energetic environment and are expert in managing the expectations of key stakeholders. Here's a deeper look at these characteristics and more - plus the role communication plays in project leaders' success..."

                              IT - Networks
                              Facebook Reveals Open Source, Modular Switch for Datacenters
                              Enterprise Systems Journal, February 12th, 2015
                              "This week Facebook Inc. unveiled the "6 pack" -- a new "open hardware," modular network switch, which the company is calling the first of its kind.

                              Facebook had previously created a network switch called "Wedge," which it says is serving as the base building block for the new 6-pack.

                              The 6-pack offers companies "12 independent switching elements. Each independent element can switch 1.28Tbps."..."

                              Net Neutrality Forever? Not If the Lawyers Can Stop It
                              InfoWorld, February 10th, 2015
                              "FCC proposes no regulation of rates, no new tariffs, and no unbundling; telecoms are horrified by the burdensome regulation...

                              After waffling for months on the question of Net neutrality, who would have guessed that former telecom lobbyist Tom Wheeler would argue such a strong case for reclassifying broadband as a Title II common carrier? Though the FCC steered clear of onerous regulation, the reaction from telecoms has been largely a howl of distress..."

                              How Not to Get Slammed by the FCC for Wi-Fi Blocking
                              Network World, February 10th, 2015
                              "Rick Hampton, the wireless communications manager for Boston-based Partners Healthcare, has seen the dialogue among network professionals heating up in the wake of the FCC's sternly-worded enforcement warning about illegal Wi-Fi blocking and says it's no wonder the commission is fired up.

                              He contends that the way in which many organizations have set up their wireless networks, based on overhyped products that have led them to believe anything goes, just won't fly in a world where people increasingly are using personal Wi-Fi hotspots to get safe and easy Internet connectivity over unlicensed airwaves wherever they happen to be. After all, the FCC was created by Congress back in the 1930s to put the kibosh on just such intentional interference of radio devices..."

                              How Network Admins can Survive SDN
                              Netw, February 10th, 2015
                              "With the advent of SDN, there's been a lot of speculation about the future of the network administrator.

                              Some doomsayers predict the network admin will be obsolete as network virtualization becomes the responsibility of the server or systems admin already in charge of server virtualization. Or that as SDN applications take on more network intelligence in order to program what network resources they need, the application developers might take over the role of network admin..."

                              Upgrading to 802.11ac WiFi: 4 Coping Strategies
                              NetworkComputing, February 10th, 2015
                              "The latest version of WiFi, 802.11ac, is still making its way into the enterprise, in the lull before Wave 2 products arrive. Follow these tips to make the upgrade process less painful.

                              Employees in all types of businesses around the world use wireless devices in their workplaces. Most connect multiple mobile devices to the corporate WiFi network simultaneously. The latest devices available on the market, whether smartphone, tablet or laptop, take advantage of the latest WiFi standard, 802.11ac, which offers data transfer speeds three times faster than before. By the end of 2015, 70% of all WiFi devices will support the 802.11ac standard, according to ABI Research..."

                                IPv6 Attack Attempts and How to Mitigate Them
                                Search Networking, February 12th, 2015
                                "Compartmentalizing traffic and employing static entries can help enterprises block neighbor discovery-based attacks in their IPv6 networks.

                                Editor's note: IPv6 neighbor discovery (ND) is a core part of the IPv6 protocol suite. It is employed for IPv6 address resolution and IPv6 stateless address autoconfiguration, among other things. This article, the fourth in a series of tips about IPv6 network management, explores some additional mitigation techniques for ND-based attacks..."

                                Named Data Networking Project Wants to Retire TCP/IP
                                Search Networking, February 10th, 2015
                                "TCP/IP is buckling under the demands of today's Internet, according to researchers who want to replace it with a new Internet protocol stack. Their solution: Named Data Networking...

                                The Internet was not built to support Netflix. And for a long time, that was perfectly OK.

                                When the architects of the Internet started interconnecting communications networks, the types of applications they needed to support were simple by today's standards: remote login, email, file transfers and, later, Web access. What became known as the Internet protocol suite, TCP/IP, was well suited for the task..."

                                IT - Linux
                                Linux 3.19 released for your computing pleasure
                                The Register, February 9th, 2015
                                "Version 3.19 of the Linux kernel has been signed off by Linus Torvalds.

                                News of the release emerged in a typically economical Sunday evening post to the Linux Kernel Mailing List, in which Torvalds noted there are still a couple of bugs in this release but they were pretty obscure so '... while I was tempted a couple of times to do an rc8, there really wasn't any reason for it.'

                                New in this release is improved support for Intel and AMD graphics, plus support for LZ4 compression in the SquasFS which should make for better Linux performance on Live CDs..."

                                Best Linux Software of All Time
                                Datamation, February 9th, 2015
                                "Over the years, there have been a number of claims that the Linux desktop is lacking in terms of good, highly useful software. Today, I'm aiming to put this myth to bed once and for all. Continue reading for my list of the top ten best applications for Linux..."
                                Master Linux service management on System V and systemd
                                SearchDataCenter, February 13th, 2015
                                "Managing services on Linux is an essential task for administrators. Learn to work with either System V or systemd.

                                If you're a Windows administrator with a few Linux servers, or a new administrator starting out on Linux, you need to learn how to start, stop and check services. Recent changes have made Linux service management more complicated.

                                Several items used on Linux were invented in the old days of Unix. One of these is the System V procedure for starting services, which has been the dominant Linux service management method until recently..."

                                IT - Operations
                                Power and cooling checklist for a better data center PUE
                                SearchDataCenter, February 11th, 2015
                                "Data center power consumption eats up a large portion of operating costs. These cooling and power changes can help cut back energy use without lessening IT performance.

                                Power is an expensive commodity that's getting even more costly, so it makes fiscal and environmental sense to conserve it in data centers.

                                Even the most efficient Energy Star-rated servers require power. While you will never eliminate data center power consumption, you can increase energy efficiency, reduce computing hardware and cooling energy needs, and get your company a green reputation..."

                                What Is an MSP and How Do I Choose One?
                                Business 2 Community, February 6th, 2015
                                "A Managed Service Provider is a team of experts (in this case Linux systems management experts) who provide defined services to an enterprise whilst overall accountability of your service remains with the enterprise's own team.

                                MSPs are often used to provide expertise in new technologies or when an enterprise needs to change its hardware, software or methods whilst maintaining business continuity.

                                Using an MSP is not the same as outsourcing your entire IT function, though the range of services they provide can be very wide..."

                                7 Crazy Cool Data Centers
                                InformationWeek, February 10th, 2015
                                "All data centers share a few commonalities: They generate massive amounts of heat while draining equally large amounts of energy. However, some businesses are getting creative with how and where they store data.

                                Data centers are more than just massive facilities packed with overheating servers and air conditioners. Most contain the best hardware and software available in modern technology, with the capacity to send and receive millions of pieces of data per second, which is especially important as cloud computing matures and more companies invest in moving apps and data to the cloud..."

                                IT - Security
                                Anthem: How Does a Breach Like This Happen?
                                CSO Online, February 10th, 2015
                                "Remove all the hype, all the sensationalism, and Anthem's security dilemma is no different from one that any other large organization would face. Was this attack truly sophisticated, or could anyone have pulled it off?

                                On December 10, 2014, someone compromised a database owned by Anthem Inc., the nation's second largest health insurer.

                                The compromise wasn't discovered until January 27, 2015, after a database administrator discovered his credentials being used to run a questionable query – a query he didn't initiate..."

                                Pirates in the Cloud: Security Issues, Threats, and Trends in Cloud Computing
                                ISSA South Florida Security Conference - March 20, 2015 @ The Signature Grand, Davie, FL
                                March 20, 2015 @ The Signature Grand, Davie, FL

                                We will look at all aspects of cloud computing, not just storage. Please have expertise on, Platform, Infrastructure, Software-as-as-Service, public/private/hybrid clouds, various new cloud providers and services. Issues of security should include privacy and trust as well.

                                The conference will have three tracks focusing on Cloud Computing Security:

                                • Management track - This track will focus on what is important for managers: policy, cost, budget, strategic solutions, hiring, retention, security programs, risk management, interacting with senior management, etc.
                                • Technical - This track will focus on everything technical from attack to defense and everything in between.
                                • Legal & Compliance - This track will address specific issues related to compliance and regulations such as PCI, HIPAA, IT governance, audit, etc.

                                All presentations are educational in nature - No vendor or sales talks!

                                Which kind of security professional are you?
                                Help Net Security, February 9th, 2015
                                "Much has been said and written about the arrogance prevalent in the computer industry, especially that of gamers and security professionals.

                                A well-known female gamer recently felt compelled to launch an anti-harassment support network after being harassed online, being subjected to doxing and bullying, and receiving death threats over the internet. Other women have withdrawn from the gaming industry altogether..."

                                4 Lessons from Health Insurer Anthem?s Massive Security Breach
                                Business 2 Community, February 6th, 2015
                                "Anthem, the country's second-biggest health insurer, reported earlier this week that sophisticated hackers broke into a database containing personal information for about 80 million of its customers and employees in what is likely to be the largest data breach disclosed by a health-care company. Investigators are still determining the extent of the incursion, which was discovered last week, and Anthem said it is likely that 'tens of millions' of records were stolen, according to the Wall Street Journal and numerous leading news agencies..."
                                Awareness on the Cheap
                                ComputerWorld, February 12th, 2015
                                "You don't have to spend a lot of money on some information security initiatives. Take security awareness, for example. You can get huge returns with small investments.

                                Sure, you can spend big bucks on packaged awareness programs and learning management platforms that can help you deploy and manage your training efforts and then report on compliance. Like most of you, though, I have a limited budget, and I'd rather devote it to things we desperately need but can't get on the cheap, like modernization of our security event monitoring, advanced malware detection and intrusion prevention..."

                                Office Complex Implants RFID Chips in Employees' Hands
                                ComputerWorld, February 10th, 2015
                                "The corporate tenants of a Swedish high-tech office complex are having RFID chips implanted in their hands, enabling access through security doors, as well as services such as copy machines, all without PIN codes or swipe cards.

                                The employees working at Epicenter, a 15,000-square-foot building in Stockholm, can even pay for lunch using their implants -- just as they would with the swipe of a credit card..."

                                Five Sneaky Ways Companies are Changing Employees' Security Behavior
                                CSO Online, February 11th, 2015
                                "Like precocious teenagers, some employees don't want to be told what to do when it comes to cyber security. Too many rules about what they can and cannot do with technology can lead to bad decisions that inadvertently put company data at risk. Instead, a more subtle approach is required to help them make better decisions on their own..."
                                Health Data Breaches Could be Expensive and Deadly
                                CSO Online, February 10th, 2015
                                "Healthcare-related data breaches could not only be expensive, but also life-threatening, experts say, and traditional credit monitoring provides little protection.

                                "Credit monitoring for a breach of your identity data, medical or not, is like handing out umbrellas in a tornado," said Alisdair Faulkner, chief products officer at San Jose, Calif.-based ThreatMetrix..."

                                Anthem Breach Should Convince Healthcare to Double Down on Security
                                Dark Reading, February 6th, 2015
                                "Mega breach brings focus back on inadequacies of healthcare security.

                                As the fallout continues to emerge around a breach of tens of millions of records held by Anthem, security pundits hope it'll shine a spotlight on the weaknesses in healthcare cybersecurity. They believe this mega breach is just the start of a trend of increasingly larger healthcare breaches as attackers move from harder-to-attack financial targets to still-lucrative lower-hanging fruit. And with so many stores of valuable patient information, an industry based in information-sharing among large and small businesses and a culture that doesn't prioritize IT security, healthcare is a very juicy piece of fruit..."

                                6 Security Tasks All Businesses Should Be Doing (Half are Often Overlooked)
                                Information Age, February 6th, 2015
                                "The six-point security check that every organisation must keep on top of to minimise vulnerabilities

                                Factors such as growing network structures and a mobile workforce mean businesses are challenged with many systems that need to be secured against a growing range of security threats.

                                Understandably, many companies feel overwhelmed with the burden of covering all aspects of IT security. So what are the security tasks that should be prioritised by businesses to ensure that they are safe?..."

                                IT - Careers
                                How To Negotiate Your Salary
                                Forbes, February 13th, 2015
                                "I mentioned to an advertising honcho friend of mine that I was thinking of writing a story on how to negotiate for the best salary when applying for a job. My friend, who is in his 50s-we'll call him Don-was inspired to write me a 10-point memo on how he's done it in the past. Don likes to play hardball..."
                                  T resume makeover: Emphasize your 'X factor'
                                  ComputerWorld, February 13th, 2015
                                  "After a 17-year climb through the IT ranks at a major financial firm, this month's resume makeover candidate found herself unemployed and with a mundane resume. Here's how expert Donald Burns uncovered her 'wow factor.'..."
                                    Lazy Training Puts Your Company at Risk
                                    InfoWorld, February 11th, 2015
                                    "Assessments to ensure you had competent workers used to be an absolute. Before working for a company, you would have to pass typing tests and demonstrate the veracity of your résumé's stated skills with an in-house, supervised assessment.

                                    Likewise, training used to be mandatory, especially when the latest version of a system was deployed. But times have changed, and the quality of work has as well -- but not for the better..."

                                      IT - Social Media
                                      7 Things You Should Never Do on Twitter
                                      CIO, February 10th, 2015
                                      "Twitter can be both surprisingly useful and mind-numbingly wasteful, and there's a thin line between the two. In the second installment of our four-part Social Media Rules of Engagement series,'s Matt Kapko shares tips and advice on how to get the most out of Twitter and build a faithful following..."
                                      IT - Virtualization
                                      Guide to Virtualization Hypervisors
                                      NetworkComputing, February 10th, 2015
                                      "Virtualization is at the core of many of today's enterprise IT environments -- with at least 70% of x86 server workloads virtualized, according to Gartner -- so the hypervisor plays an important role. And while most hypervisors look similar at first glance, the details can make a significant difference. Learning where and when each hypervisor is the best choice can provide your organization with increased efficiency and cost savings...."
                                      Why would You Need Huge Virtual Disk Files?
                                      Search Server Virtualization, February 10th, 2015
                                      "As more enterprises look to virtualize top-tier applications, many are seeing a growing need for huge virtual disk files.

                                      Logical disk sizes have long been limited to 2 terabytes (TB) through the common use of logical block addressing where a 32-bit address accesses 512 byte sectors. This translates into 4,294,967,296 possible sectors at 512 bytes per sector; or (2^32 * 512) 2,199,023,255,552 bytes -- or simply 2.19 TB -- of addressable space on the logical disk. Although 2 TB of disk space is still plenty for many workloads, top-tier enterprise applications are gradually demanding more computing resources, and some virtual disk file sizes can eventually run up against the 2 TB limit..."

                                        When it comes to VM size, start small and grow as needed
                                        Search Server Virtualization, February 10th, 2015
                                        "Don't fall into the trap of over-provisioning your VMs. It's easy to add resources if the workload demands more.

                                        In the world of computers, bigger is often better. More CPUs and more memory is the common solution for the challenges posed by today's bigger applications. The trend of bigger is better is so ingrained into how we approach things that we often don't even notice it any more..."

                                          Four Virtual Machine Myths and How to Learn from Them To Optimize Disaster Recovery ROI
                                          Virtual-Strategy Magazine, February 13th, 2015
                                          "The notion that agentless host-level VMware backup is a magic elixir for every disaster recovery (DR) plan is a modern IT myth. Nonetheless, demystification of the fables about virtual machine (VM) backup teaches important lessons about the power of virtualization and how leveraging the dynamics of virtualization within a data protection scheme can impact IT capital and operating costs in quite unsuspected ways.

                                          With that in mind, here are four VM fables that exist today, along with insight into how IT teams can address them:.."

                                          IT - Email
                                          Beneath the 21st Century Document: The Threat of Hidden Data
                                          Business 2 Community, February 12th, 2015
                                          "In a modern-day business environment, documents travel from inbox to inbox, evolving as multiple parties inside and outside of the organization offer feedback, edits and comments. Once a static entity, the 21st Century document has become an ever-developing and changing 'living document.'

                                          As a result, documents gather hidden information throughout their lifecycle, known as metadata, which is easily discoverable for those who chose to delve deeper. Although document metadata can be useful, the reality is that many knowledge workers are completely unaware that often a business' most critical information exists within it - let alone the risks associated with inadvertently sharing this information externally..."

                                            The Security Implications Of IoT: A Roundtable Discussion with Four Experts
                                            , February 10th, 2015
                                            "The Internet of Things (IoT) will usher in a new era of network intelligence and automation, but its arrival raises a host of serious security questions. Network World Editor in Chief John Dix explores the topic in depth with four experts:..

                                            Security is obviously critical for IoT, but just how big a problem is it?..."

                                            Thin Cloning of PDBs is a Snap with Oracle Storage
                                            By Bryce Cracco
                                            Bryce Cracco writes, "I thought I'd bring up another integration point between Oracle ZFS Storage Appliance and Oracle Database 12c with Oracle Multitenant. Specifically, I want to discuss how we integrate our ZFS snapshot technology with Oracle Multitenant to reduce database storage footprint and speed database provisioning straight from the SQL Plus command line.

                                            Oracle Multitenant option for Oracle Database 12c introduces the concept of the pluggable database (PDB), which exist within a container database (CDB). This is the basic construct that is used to facilitate database creation in multitenant environments from either 'seed' PDBs (essentially a template) or a 'source' PDB (an existing, running, full database). In either case, a simple SQL Plus command 'create pluggable database' is used to easily create the new PDB. Under the covers, the way this normally works is by duplicating the relevant files associated with the source or seed PDB, copying them to a new location to support the new PDB..."

                                            IT - Database
                                            10 In-Memory Database Options Power Speedy Performance
                                            InformationWeek, February 9th, 2015
                                            "Yes, the death of the conventional disk drive has been greatly exaggerated, but Moore's Law has brought down the cost of RAM so dramatically that in-memory technology is getting to be downright pervasive.

                                            With its Hana platform, SAP has been the biggest champion of in-memory technology over the last five years. The latest chapter from SAP is S/4Hana, a rewrite of the company ERP suite launched in early February and designed to take full advantage of Hana's in-memory power. The platform eliminates aggregates, indexes, and even the need for a separate data warehouse, replacing all of that with virtual views of live, transactional data held in memory..."

                                            IT - Mobile
                                            New rules: How to unlock your smartphone
                                            ComputerWorld, February 13th, 2015
                                            "Until recently, if you wanted to unlock your phone in order to switch carriers, there was a good chance that you'd have to do it without the cooperation of the carrier you were with. You could search online for the codes that might unlock your device -- or try to hack it in other ways. But what you usually couldn't do was call your carrier and ask how to do it..."
                                              How About a Chromebook on Steroids?
                                              FOSS Force, February 9th, 2015
                                              "There's been a lot of interesting Linux news of late. Not just GNU/Linux, but all types of Linux, Android, Chrome OS, Firefox OS, embedded (IoT), cloud computing, cars, TVs, just about anything you can think of. But truth be told, I'd like to see more Linux on the desktop - just as Linus Torvalds said he would like to see.

                                              The recent purchase of a Chromebook for my son got me thinking about a new opportunity for Linux on the desktop. This is not an idea for getting a standard GNU/Linux desktop to automagically replace all existing Windows desktops, but to leverage the cloud computing paradigm with a bulked-up Chromebook-like system that would be workable for 80 to 90 percent of personal, school, and business needs.

                                              Let me explain..."

                                              IT - Big Data
                                              Predictive Analytics or Data Science?
                                              Information Management, February 9th, 2015
                                              "I caught up with an old grad school friend a few weeks back. He's a top-notch statistician who's built a successful career working in quants departments of large insurance and health care companies. With little simplification, I'd characterize his role over the last 20 years as a predictive modeling expert. His work is primarily 'big iron' -- revolving on Teradata, Oracle and SAS. Besides being a senior statistician, he's also a more-than-capable data integration and statistical programmer..."
                                              Chicago Fights Food Poisoning with Predictive Analytics
                                              Government Technology, February 11th, 2015
                                              "For years, cities have relied on official food inspections as their primary defense against shady restaurants and questionable dishes. But the city of Chicago is raising the stakes through predictive analytics, which not only helps officials catalog offenders, but also identifies high-risk restaurants for citizens and inspectors.

                                              Chicago CIO Brenna Berman and Chief Data Officer Tom Schenk completed a pilot program this month that takes data sets from the more than 15,000 restaurants in Chicago and its surrounding neighborhoods, and estimates which eatery is most susceptible to health issues..."

                                              Seven Secrets to Big Data Project Success
                                              Search CIO, February 10th, 2015
                                              "Are there traits that spell big data success? Are there big data pitfalls that can spell disaster? The answer is an emphatic 'yes,' according to three experts...

                                              Many businesses now have an understanding of what constitutes big data; making a success of big data is another matter. Just ask Doug Laney, an analyst with Gartner Inc.; Mike Gualtieri, an analyst with Forrester Research Inc.; and Robert Morison, lead faculty member at the International Institute for Analytics -- three big data experts whose work gives them a view into how companies are using big data. Here are the factors they see as contributing to big data success -- and the ones that can spell big data failure..."

                                              Big Data: How to Know it When You See It
                                              GCN, February 10th, 2015
                                              "Information from sensors, video, satellites, genetic codes, social media and web tracking is contributing to a big data soup that web-connected devices are serving up. The vast amount of data now available, not to mention the storage and analytics technology that makes analysis of that data possible, is making 'big data' look like the answer to every question.

                                              But what is big data really?..."

                                              It's Not Your Grandfather's Open Source BI Market Any Longer
                                              Forrester, February 13th, 2015
                                              "There's never been a question on the advantages of open source software. Crowdsourcing, vendor independence, ability to see and in some cases control the source code, and lower costs are just a few benefits of open source software (OSS) and business model. Linux and Apache Hadoop are prime examples of successful OSS projects. It's a different story, however, when it comes to OSS BI. For years, OSS BI vendors struggled with growth because of:.."
                                              IT - BYOD
                                              How to make BYOD work
                                              ZD Net, February 13th, 2015
                                              "BYOD -- or bring your own device -- is a buzzword that's sweeping IT departments. While on the whole it can be considered a good thing, as with most things in life there are pitfalls that both employers and employees need to bear in mind when embarking down this avenue.

                                              By 2017, it is estimated that 50 percent of firms will demand that employees make use of BYOD. So if you think it's big now, just wait a few years.

                                              But is BYOD right for you? Whether you are an employee, the employer or the IT admin who has to keep everything working, there are potential pitfalls to BYOD that need careful consideration..."

                                              Top Ten Articles for last few Issues
                                              Vol 204 Issue 1; Vol 203 Issues 1, 2, 3 and 4; Vol 202 Issues 3, 4 and 5
                                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                              • ZFS: Doing It Right
                                              • Tape Storage Elevator Pitch
                                              • Oracle VM VirtualBox
                                              • Join the Oracle ZFS Storage User Group (OZUG)
                                              • Five best practices for PaaS [Platform as a Service]
                                              • Getting to know Docker
                                              • Data Encryption ... Software vs Hardware
                                              • Whats new in GlassFish 4.1? by C2B2
                                              • Java Magazine
                                              • Oracle Announces Oracle Marketing Cloud's New Life Sciences Consumer and Patient Solution

                                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                                IT - Server
                                                Real pros and cons in the COTS server decision
                                                SearchDataCenter, February 9th, 2015
                                                "Weed out the truth about COTS servers and legacy hardware and see why fear of change in the data center is a major hurdle to overcome.

                                                The debate over COTS server versus legacy hardware is sometimes acrimonious and almost always blurred by myths, half-truths and good old-fashioned FUD.

                                                The debate started by mainframe versus Unix servers is three decades old. Fundamentally, the issue reflects the useful life of existing legacy hardware and software against the opportunity of low-cost commercial/commodity off-the-shelf (COTS) servers and storage based on Intel, AMD or ARM processors..."

                                                A Winning Strategy: Must Patch, Should Patch, Can't Patch
                                                Dark Reading, February 11th, 2015
                                                "The best way to have a significant impact on your company's security posture is to develop an organized effort for patching vulnerabilities.

                                                If you could design a silver bullet to help win the fight against the cyberthreat, what would you do? My silver bullet idea is always the creation of a "magic button" that automatically patches every operating system, plug-in and application in an environment via a method that does not break our business processes, applications, databases and has no customer impact..."

                                                Why Flash Belongs On the Server
                                                InfoWorld, February 10th, 2015
                                                "Mainstream use of flash-based storage is one of the most significant developments in modern data center design. Today, most enterprises run multiple workloads on storage solutions that utilize flash technology. Indeed, all-flash devices are increasingly popular for certain classes of applications. That said, why should flash be merely a component within an existing storage array? Shouldn't it be designed directly into the server architecture where it's closer to the applications it serves?..."
                                                Debunking the Myths about Scale-Up Architectures
                                                Network World, February 9th, 2015
                                                "Given the rapid pace of server design innovation, earlier concerns about scale-up servers no longer hold water

                                                When growing capacity and power in the data center, the architectural trade-offs between server scale-up vs. scale-out continue to be debated. Both approaches are valid: scale-out adds multiple, smaller servers running in a distributed computing model, while scale-up adds fewer, more powerful servers that are capable of running larger workloads.

                                                Today, much of the buzz is around scale-out architectures, which have been made popular by companies like Facebook and Google, because this architecture is commonly viewed as more cost-effective and 'infinitely' scalable..."

                                                How to Build a Software Defined Network
                                                with Oracle Solaris 11
                                                "Software Defined Networking is the equivalent of doing your homework the week before it's due. I mean, who does that? Well, the Solaris engineers at Oracle do, for starters. Talk about annoying! They started this trend back in the early days of Oracle Solaris 11. Instead of visiting Rufus in the basement server room, they designed this infrastructure that makes it possible for them to put dibs on networking resources from the comfort of the local Starbucks.

                                                In other words, instead of Rufus yanking cables out of one box and hooking them up to another, you can simply change the cable routing by keyboard, so to speak. And assign them to virtual compute nodes. And configure all kinds of aspects about each network, including Service Level Agreements, an implement of Trotskyist-Leninist Totalitarianism if there ever was one. All without waking Rufus..."

                                                Extending the JavaScript Editor in NetBeans
                                                By Geertjan Wielenga
                                                Geertjan writes, "Just about every other week, it seems like there's a new JavaScript framework out there. Each comes with their own idioms and constructs. When it comes to tools, the only logical way to be able to support the innovation in the JavaScript space is to have a modular, pluggable solution. When you look at the sources of NetBeans, you'll see that its top level structure implies a modular design:..."
                                                Nexenta News
                                                Industry-veteran Sam Greenblatt Joins Nexenta
                                                As Chief Technologist in Residence
                                                Sam Greenblatt, recent General Manager and Chief Technology Officer of the Enterprise Solutions Group at Dell, has joined Nexenta's advisory board as Chief Technologist in Residence, acting as Chief Advisor and Technology Evangelist.

                                                Sam brings deep expertise and relationships in helping organizations to evolve their technology vision and to leverage strategic technology partnerships, alliances and collaboration opportunities. As the newest addition to Nexenta Advisory Board, Greenblatt will advise the company as it continues to grow and demonstrate leadership in the open source, Software-Defined Storage market.


                                                Not all Snapshots are the same - Storage Switzerland
                                                Feb 19 2015 8:00 am PST
                                                In an upcoming webinar, Storage Switzerland will make the case for using snapshots as a primary component of data protection. For this strategy to work several things are needed from the storage infrastructure. First, it must be able to keep an almost unlimited number of snapshots; second, it needs to have a replication process that can transfer those snapshot deltas (the changed blocks of data) to a safe place; and third, the entire storage infrastructure has to be very cost effective. In this column we will look at that first requirement, the ability to create and store a large amount of snapshots without impacting performance...


                                                Leading Transportation Company Deploys Nexenta Software-Defined Storage for the Private Cloud
                                                Budd Van Lines Improves Storage Performance by Nearly 300%
                                                Leading Transportation Company Deploys Nexenta Software-Defined Storage for the Private Cloud Less

                                                Budd Van Lines Improves Storage Performance by Nearly 300%; Improves Business Continuity and Disaster Recovery on Commodity Hardware

                                                Nexenta (@Nexenta), the global leader in Software-Defined Storage (SDS) (#softwaredefinedstorage), announced the deployment and case study for Budd Van Lines. Headquartered in Somerset, New Jersey, Budd Van Lines is a nationwide independent household goods carrier specializing in relocating corporate executives. Budd Van Lines is an independent nationwide carrier. Each and every relocation provides a highly personalized, superior moving experience.

                                                Budd Van Lines experienced a dramatic surge in data storage demand as a result of the company's switch to 1080p security cameras. While company growth is a net positive, the ongoing accumulation of both corporate data and video surveillance was overwhelming the company's data storage infrastructure. More information was being captured and retained for longer periods of time. The cameras helped to improve freight security and employee safety, but the existing SAN was incapable of functioning at this level without a complete upgrade and the NAS was similarly overburdened.


                                                Nexenta, Global Leader in Software-Defined Storage, Named to CRN Data Center 100
                                                Annual list recognizes technology vendors that power, support and protect todayÂs data centers through channel partners
                                                Nexenta (@Nexenta), the global leader in Software-Defined Storage (#softwaredefinedstorage) (SDS), announced that it has been recognized in The Channel Company's annual CRN Data Center 100 list, featuring technology vendors whose solutions are vital to today's data centers. Selected by the CRN editorial staff after months of in-depth research and nominations from solution providers, each vendor on the Data Center 100 list is recognized for providing channel partners with an opportunity to grow their business by offering cutting-edge products and services to their customers.

                                                The companies included in CRN's Data Center 100 list were chosen based on a variety of criteria, including the types of technology and services they make available to partners as well as their overall impact on the market and the channel. This year's list honors vendors in five data center technology categories: Infrastructure Providers, Tool Providers, Virtualization Vendors, Service Providers, and Designers and Builders.

                                                Trending in
                                                Vol 234, Issue 3
                                                Trending IT Articles