News about Oracle's Solaris and Sun Hardware
System News
Feb 16th, 2015 — Feb 22nd, 2015 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 204, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


IT - CxO
x
How to Keep Meetings From Eating Into Your Bottom Line
CIO February 13, 2015
"No business wants to admit that it's inefficient, lacks clear direction or wastes tens of thousands of dollars. And yet businesses everywhere are doing just that by holding unnecessary, unproductive and unpopular meetings. Shifting your company culture away from meetings can make your businesses more productive and employees more engaged and efficient. Here's how..."
    8 Areas Where CSOs And CIOs Will Converge In 2015
    CSO Online February 16, 2015
    "In recent years, CIOs and CSOs have been closer together than ever before, and for good reason - to remain cohesive, effective and to maximize resources and ROI on business-focused efforts. As physical security is increasingly running on corporate IT infrastructure, these departments are no longer siloed, and their integrations extend further than just cybersecurity and into all realms of business, from business intelligence and company strategy, to HR and BYOD decisions. Here's a look at some of the areas where the gap will be bridged in 2015..."
    How to Find the Best Passive (or Not Looking) Job Candidates
    TLNT February 19, 2015
    "Last week, I discussed why using the term 'passive candidate' or 'passive job seeker' was inappropriate and I proposed a more accurate name - 'not-looking top prospects.'

    In this article I highlight the best sourcing approaches that can be used to identify and eventually attract the highly desirable 'not-looking top prospects.'

      Friends with Benefits
      IT News February 19, 2015
      "AGL's CIO is wedded to his favourite suppliers and not ashamed to admit it. Owen Coppage likes to be first.

      Energy provider AGL's long-time CIO can't help but get his hands on the newest technology in the market and have it up and running before anyone else..."

      'I'm curious about how things work,' he told iTnews.

      North Carolina CIO Sees Restructuring as Key to Success
      Government Technology February 18, 2015
      "CIO Chris Estes addresses some of the weaknesses highlighted in a recent state auditor's report that found 74 percent of IT projects were being delivered a year late and over budget....

      A Feb. 3, 2015, report by the Office of North Carolina State Auditor Beth Wood found several weaknesses in contract practices and IT procurement processes. For instance, 'the State Board of Elections paid a vendor nearly $1 million to replace the State's Campaign Finance System and received nothing in return,' the report stated. In his Feb. 4 State of the State address, Gov. Pat McCrory called for a new cabinet-level Department of Information Technology to address many of the issues highlighted in the audit..."

      Why Improving Emotional IQs Makes for Better IT Leaders
      CIO February 17, 2015
      "Hiring and retaining talent is becoming a priority as CIOs struggle to find and retain top talent. Raising the emotional IQ of your IT leaders is one big step towards creating a culture where people want to work.

      In 1995, author Daniel Goleman released his best-selling book, "Emotional Intelligence." In it he argued that noncognitive skills could be as, or more, important than IQ. Additional research confirmed that people with the highest IQs outperform those with average IQs a only 20 percent of the time..."

        10 Chief Data Officer (CDO) Trends
        Information Management February 18, 2015
        "Why are chief data officers (CDOs) in high demand - and how might their roles evolve within large enterprises worldwide? Some intriguing answers surfaced in 'Dawn of the Chief Data Officer (CDO)' - a survey and research report from Experian. The survey involved 254 CIOs worldwide. Here are 10 key takeaways...."
        Low-Balling a Candidate: Worth a Pat on the Back, or a Boot in the Butt?
        TLNT February 18, 2015
        "Picture the scene: Your company is seeking to employ a Department Manager, and the leading candidate is currently 'in transition.'

        Human Resources has pegged the market value of the job at $75,000, but you suspect that the preferred candidate (Bob) will accept $65,000.

        A seasoned and experienced professional, Bob was previously paid $77,000 by his last employer, but was caught up in a restructuring staff reduction. He's been out of work for almost a year and is getting desperate, worried about feeding his family and paying the mortgage..."

          How to Stop 5 Catastrophic Corporate Practices
          CIO February 13, 2015
          Companies regularly make these five mistakes with the false belief that they are best practices when they are, in fact, anything but best, writes Rob Enderle.

          "All too often I have seen businesses repeat catastrophic mistakes when implementing strategic initiatives. Here are the five most common mistakes that companies regularly make thinking they are best practices..."

            Oracle
            x
            Why Oracle Big Data SQL is different
            (and better!)
            Peter Jeffcock writes, "We announced an update to Oracle Big Data SQL 1.1 as part of our news for Hadoop World this month. The product has been out for a while now and here I want to focus on a common question: why is Oracle Big Data SQL different from those other "SQL on Hadoop" solutions out there. Or, if you prefer, what's the big deal about Big Data SQL?

            The thing that gets missed is that Big Data SQL is not just a "SQL on Hadoop" solution. It's a "SQL on Hadoop and NoSQL and Oracle Database" solution. It doesn't matter where the data is, you use the same SQL query to access it all transparently. That's why we say "one fast query for all your data" rather than "at least two different queries, with different flavors of SQL, which you'll have to optimize yourself, just as soon as you figure out where all the data is and what it looks like". A much less attractive tagline, you'll agree..."

            Features
            x
            How Big Data in Business Will Evolve in 2015
            seven key areas offer a wealth of opportunity
            Mike Hallett writes, "Where should you focus your attention in 2015? According to Oracle's data experts, there are seven key areas that offer a wealth of opportunity this year. These are the strategies, capabilities, and approaches that will put the benefits of big data more in reach for enterprises that are prepared to take the advantage.

            • Corporate boardrooms will talk about data capital, not big data
            • Big data management will grow up
            • Companies will demand an SQL for all seasons.
            • Just-in-time transformation will transform extract, transform, and load (ETL).
            • Self-service discovery and visualization tools will come to big data.
            • Security and governance will increase big data innovation.
            • Production workloads will blend cloud and on-premise capabilities.

            For a look at Proven Business Value from Big Data Case Studies and how companies are using big data to improve operations and enhance customer experience, check out these stories..."

            SPARC
            x
            Oracle Continues to Grow Hardware Business 5 Years After Sun Deal
            eWeek
            Jeffrey Burt writes in eWeek, "It was five years ago that Oracle finally closed its controversial $7.4 billion acquisition of Sun Microsystems. Among all the talk about Solaris, MySQL and Java, the future of Sun's hardware business was hotly debated by industry observers.

            Why would then-CEO Larry Ellison, who built Oracle's fortune through enterprise software, keep a Sun hardware business that was struggling against the onslaught of x86-based servers? The skepticism continued even as Ellison repeatedly said he intended to keep - and invest in - Sun's SPARC/Solaris server technologies, with the goal of creating highly integrated systems optimized to run Oracle's enterprise applications.

            Five years on, Oracle has done just that, offering a growing lineup of Engineered Systems for everything from databases to analytics to the cloud, as well as building on the SPARC- and x86-based servers inherited from Sun..."

            Exadata
            x
            Bank of Georgia Strengthens Market-Leading Position with Maximum Availability and Engineered Architecture
            Created a high-performance banking platform
            "JSC Bank of Georgia (BOG) is Georgia's leading bank, with a share of more than 30% in the country's financial services market, based on assets, loans, deposits, and shareholder equity. BOG offers a broad range of retail banking, corporate banking, wealth management, brokerage, and insurance services. The bank serves more than 1.3 million private and business customers through 217 branches - ranging from full-service centers to small banking outlets - 521 automatic teller machines (ATMs), 2,217 self-service terminals, 5,979 point-of-sale terminals, an online banking platform, and a call center.

            BOG is the only Georgian bank to be rated by Standard & Poor's, Moody's, and Fitch Ratings. Its holding company Bank of Georgia Holdings plc - incorporated in the UK - is a constituent of the FTSE 250 Index, an index consisting of the 101st to the 350th largest companies listed on the London Stock Exchange..."

            Controlling Software Costs on Exadata
            Take advantage of several techniques to control database software license costs

            "Users of Exadata Database Machines can now take advantage of several techniques to control database software license costs including Capacity on Demand (CoD), Elastic Configurations, and Trusted Virtual Machine Partitions.

            Exadata Capacity on Demand allows users to disable a subset of the cores on Exadata database servers to reduce licensing requirements. The maximum number of cores that can be disabled on an Exadata X5-2 Database Server is 60%. In other words, with Exadata Capacity on Demand, users only need to license 14 cores per Exadata X5-2 Database Server even though there are 36 physical cores, thus greatly reducing the number of software licenses required per server. Exadata Capacity on Demand allows additional cores to be enabled and licensed as needed. Exadata comes with all the necessary software tools to provision and manage Capacity on Demand..."

            IT - Storage
            x
            Ranking of SSD Makers in 4Q14
            StorageNewsletter.com February 19, 2015
            "Continuing to be a reference for the HDD market, and now a reliable source for SSDs, Trendfocus, Inc. has published the report, NAND/SSD Information Service - February 17, 2015 CQ4 '14 Quarterly Update and Long-Term Forecast Rev. 021615.

            Samsung once again held the highest market share for total SSDs shipped in the quarter, shipping one-third of all SSDs in CQ4 '14. SanDisk held the second highest share overall, but declined from 21.1% in CQ3 '14 to 20.3% in CQ4'14. The overall SSD market grew 4.1% in CQ4'14, with an increase of approximately 900K SSD units versus CQ3'14..."

            The Three Problems with Software Defined Storage (SDS)
            Storage-Switzerland February 19, 2015
            "Software defined storage (SDS) promises to reduce storage capital and operational costs by abstracting data services from the storage hardware. To deliver on these promises, SDS typically enables the use of commodity storage which should lower storage acquisition costs. It also provides a common interface to data services regardless of the storage hardware used, lowering operational costs. While this may sound like a dream come true, data centers continue to purchase proprietary, turnkey, networked storage hardware. To reverse the trend SDS solutions should address three key problems that are keeping the data center from adopting them more broadly..."
            IT - Technology
            x
            Nano-Manufacturing Makes Steel 10 Times Stronger
            MIT Technology Review February 16, 2015
            "An inexpensive new process can increase the strength of metals such as steel by as much as 10 times, and make them much more resistant to corrosion. If the modified metals pass field testing, the new process could go on to make bridges and other infrastructure last far longer; it could also make cars lighter and therefore more fuel-efficient..."
            This Time, AI Is Truly Here To Help Build Intelligent Applications
            Forrester February 19, 2015
            "What's taken artificial intelligence (AI) so long? We invented AI capabilities like first-order logical reasoning, natural-language processing, speech/voice/vision recognition, neural networks, machine-learning algorithms, and expert systems more than 30 years ago, but aside from a few marginal applications in business systems, AI hasn't made much of a difference. The business doesn't understand how or why it could make a difference; it thinks we can program anything, which is almost true. But there's one thing we fail at programming: our own brain - we simply don't know how it works..."
              9 Fantastical Future Display Technologies
              InfoWorld February 19, 2015
              "For decades, there was exactly one way to look at electronically displayed text and images: the cathode ray tube. This hardworking, stalwart technology was the display of choice for everything, from radar systems in the 1940s all the way to desktop PCs in the 1990s, with millions of heavy, fragile cabinet TVs in between.

              As computing has moved out of the office, into the home, and onto the streets, so has display technology. Here we look at emerging initiatives for the traditional workstation, as well as potential developments in screen tech for mobile, gaming, and outdoor environments. Consider this less a comprehensive overview of display technology -- entire segments of the industry are dedicated to that -- than a leisurely scroll through some of the more far-out displays the future may hold..."

                Newsreel Reveals that even 1946 Debut of ENIAC was Greeted with '1984'-ish Suspicion
                Network World February 13, 2015
                "A 'today in history' post from The Poynter Institute includes an old newsreel showing that ENIAC, the first general-purpose electronic computer, was also the first to raise the specter of government prying eyes ... or a least a look over your shoulder.

                Here's that 20th Century Fox newsreel, with a transcript below for those who'd rather read:..."

                  IT - Bitcoin
                  x
                  Ultra Fast Block Chain With New Bitcoin Wallet
                  Cryptocoin News February 16, 2015
                  "The Bitcoin Core development team released version 0.1 of its wallet software packages for all platforms this morning. The wallet was made available via the BitTorrent protocol, specifically to better serve regions of the world where Bitcoin.org official servers are either banned or hard to access. Among the goodies bundled in the new release were faster block transfer and a new way of setting transaction fees..."
                  CNN Starting To Believe In Bitcoin? Adds Bitcoin Ticker
                  Cryptocoin News February 16, 2015
                  "If there was any doubt in your mind that Bitcoin is going places, then it may be time to banish them for good. This past Wednesday, CNN Money announced on its Twitter account that they were going to introduce a Bitcoin ticker on their show. Bitcoin has come of age.

                  It was just last month, January 2015, that an article appeared on the CNN Money website that raised doubts on the long term prospects for a Bitcoin rebound. This was in the wake of the poor performance of Bitcoin in 2014, a year that saw the cryptocurrency plunge by up to 60%..."

                  Enterprises are Encrypting and Inspecting More Network Traffic
                  Coindesk February 19, 2015
                  "Stripe has launched its bitcoin payments integration following nearly a year of testing.

                  With the launch, Stripe is now allowing any merchant in its network with a US dollar bank account to accept bitcoin. Integration for merchants is made possible through either its API or as part of its Checkout feature.

                  A representative for Stripe told CoinDesk that its beta test had delivered promising results, and as part of the testing merchants within Stripe's network received both domestic and international payments.

                  The spokesperson noted:..."

                  Payment Processor Stripe Goes Live With Bitcoin Integration
                  Coindesk February 19, 2015
                  "Stripe has launched its bitcoin payments integration following nearly a year of testing.

                  With the launch, Stripe is now allowing any merchant in its network with a US dollar bank account to accept bitcoin. Integration for merchants is made possible through either its API or as part of its Checkout feature.

                  A representative for Stripe told CoinDesk that its beta test had delivered promising results, and as part of the testing merchants within Stripe's network received both domestic and international payments.

                  The spokesperson noted:.."

                  The Ledger Wallet Nano: Cutting-Edge Hardware Security
                  Bitcoin Magazione February 16, 2015
                  "Stripe has launched its bitcoin payments integration following nearly a year of testing.

                  With the launch, Stripe is now allowing any merchant in its network with a US dollar bank account to accept bitcoin. Integration for merchants is made possible through either its API or as part of its Checkout feature.

                  A representative for Stripe told CoinDesk that its beta test had delivered promising results, and as part of the testing merchants within Stripe's network received both domestic and international payments.

                  The spokesperson noted:..."

                  Bitcoin Powers New Worldwide Cellphone Top-Up Service
                  Coindesk February 16, 2015
                  "Mobile payments pioneer mHITs has entered the bitcoin space with a platform it claims is the "easiest way" to send phone credit across borders.

                  The new service, BitMoby, lets users transfer between $10 and $100 to mobiles in over 117 different countries, without the need to register.

                  MHITs, founded in 2004, offers a range of mobile money services to customers in Australia and beyond..."

                  3 reasons entrepreneurs shouldn't be scared of Bitcoin
                  VentureBeat February 20, 2015
                  "You might be aware that the price of Bitcoin has fallen from over $1,000 in December 2013 to $200 in February 2015. Although this does not mean Bitcoin is less attractive as an industry, entrepreneurs are becoming more hesitant to enter the market.

                  At BTC.sx, a Bitcoin trading platform, we have been studying correlations with Bitcoin's price. Our analysis compares price, startup formations, and venture capital (VC) deals..."

                  Breaking the bank: Bitcoins hit Africa's money transfer traditions
                  CNN February 17, 2015
                  "Money makes the world go round, they say, but what if notes and coins were replaced with online code?

                  Bitcoin -- the world's much talked about cryptocurrency -- is just that. It can't be printed, it can't be directly controlled by governments or central banks, but it can be sent around the world instantly at a low cost.

                  And in sub-Saharan Africa, where 75% of the population don't have a bank account, experts say the currency could help millions of people pay bills and get to grips with their finances.

                  Transferring cash via a bank or a Money Transfer Operator (MTOs) like Western Union or MoneyGram can be costly. According to the Overseas Development Institute, the average charge to transfer $200 to Africa using traditional money transfer services is 12%. If you send $200, you pay $24. The ODI added up all the transfers that happen in a year, and found remittance fees cost the African continent $1.8 billion a year..."

                  New Email Service Tackles Spam With Bitcoin Micropayments
                  Coindesk February 19, 2015
                  "A recently launched service called Composed aims to boost the fight against spam by charging bitcoin micropayments for emails.

                  Composed users are assigned an email address with a getcomposed.com domain name and can decide how much they wish to charge senders for an email. Anyone wanting their message to arrive at that address will have to respond to an automated reply and pay for the privilege by sending bitcoin or fiat currency via PayPal.

                  Ryan Gerard, who created the service, said:.."

                  IT - FOSS
                  x
                  A Beginner's Guide to GitHub
                  Opensource.com February 17, 2015
                  "From Google to The White House, everyone is on GitHub. If you don't know what GitHub is, keep reading, because I'm also going to talk about why it's one of my favorite websites and share some of its most popular features.

                  What's GitHub?

                  GitHub is a web-based Git repository hosting service that offers all of the distributed revision control and source code management functionality of Git combined with a unique set of other features.

                  In layman's terms, it's a place where every developer (or aspiring developer) can share their source code and stories with the world. It's a huge and highly respected collaboration platform, and it's used by just about every big technology company you can think of..."

                  Where do we stand 30 years after the founding of the Free Software Foundation?
                  Opensource.com February 16, 2015
                  "There is a growing concern about government surveillance. At the same time, those of us who live and breathe technology do so because it provides us with a service and freedom to share our lives with others.

                  There is a tacit assumption that once we leave the store, the device we have in our pocket, backpack, or desk is ours. We buy a computer, a tablet, a smartphone, and we use applications and apps without even thinking about who really owns the tools and whether we truly own any of it. You purchase a device, yet you are not free to modify it or the software on it in any way. It begs the question of who really owns the device and the software?..."

                    Solaris
                    x
                    Oracle Solaris 11 and Pluribus - application-awareness in the cloud
                    By Mike Mulkey
                    Mike Mulkey writes, "Talk to any executive of any leading enterprise company and they will tell you that they are embracing cloud computing for the future of their business. And with the rapid growth of turnkey cloud computing solutions, the network fabric carrying the application packets is emerging as a key focus to drive greater performance, reliability, and efficiency of the application. Networks need to be able to prioritize packet flow according to the importance of the application. So if an application is of high importance to their business, the network fabric should be able to know that, and provide the necessary resource to ensure high performance of that application is delivered..."
                    How to Install and Use Oracle Solaris 11.2 for x86 from an ISO in VirtualBox
                    by Erik Benner

                    Rick writes, "I ran into Erik Benner, founder of the SPARC/Solaris SIG group for IOUG, at Rocky Mountain Oracle User Group Training Days yesterday. He has been busy. Not only is he working on some labs and demos for OTN's upcoming Virtual Technology Summits, but he's taken the time to write a three-part blog to show you how easy it is to install and play with Oracle Solaris 11.2 for x86 on VirtualBox..."

                    Partners
                    x
                    BMC Control-M Workload Automation integration with Solaris Cluster 4.2 on Solaris 11.2
                    Certification was run on a T5-1 Blade
                    The upcoming V9 release of BMC Control-M Workload Automation has been certified with Oracle Solaris Cluster 4.2 on Oracle Solaris 11.2. The certification was run on a T5-1 Blade running Solaris 11.2 on guest LDoms at BMC's Tel Aviv Lab.

                    The ability of Solaris 11 to provide customized and virtualized HA capability for BMC's environment, in addition to building application-specific agents was key. The certification will directly benefit Oracle and BMC customers who want to deploy Control-M in their high-availability production environments.

                    MySQL
                    x
                    MySQL Enterprise Monitor 2.3.20 has been released
                    By Andy Bang
                    Andy Bang writes, "MySQL Enterprise Monitor 2.3.20 is now available for download on the My Oracle Support (MOS) web site. This is a maintenance release that updates various third party components and fixes some bugs. You can find more information on the contents of this release in the change log.

                    You will find binaries for the new release on My Oracle Support. Choose the "Patches & Updates" tab, and then choose the "Product or Family (Advanced Search)" side tab in the "Patch Search" portlet..."

                    Linux
                    x
                    Update Your Oracle Linux Kernel with Ksplice
                    Update the kernel on a running system applying the latest kernel security errata
                    Antoinette O'Sullivan writes, "With Ksplice you can update the kernel on a running system applying the latest kernel security errata. Patches are effective immediately without any need to reboot. Ksplice applies updates in the background without halting the system or restarting applications.

                    Watch this 12 minute video and learn to:

                    • Subscribe an Oracle Linux system to the Ksplice channel on Oracle's Unbreakable Linux Network (ULN)
                    • Install the Ksplice uptrack software package using the yum utility
                    • Use the Ksplice uptrack utility to install Ksplice kernel updates without any need to reboot
                    • Use the Ksplice web interface

                    This is one topic you can learn about in the Oracle Linux System Administration curriculum..."

                    IT - Cloud
                    x
                    The Death of the SLA
                    CIO February 17, 2015
                    "I've attended countless cloud presentations discussing vendor relationships and contract agreements. A common feature of these presentations is a discussion of the Service Level Agreement (SLA) and how to define, negotiate and enforce it. I've always found this curious, but felt it was a relatively harmless, if not terribly, useful topic.

                    No longer. If you invest significant effort on a contractual SLA you're not only wasting time, you're focusing on the wrong thing. The SLA, if it ever made sense as a key contract topic, does so no longer. The traditional SLA is dead. Here's why:.."

                      How to Choose Between Cloud Online Storage Proposals from Big Vendors?
                      Storage Newsletter February 16, 2015
                      "Today we have counted more than 2,000 cloud-based storage services in the world. But which one is the best? Itís hard to choose. The real question is which one fits you most? Well, everything will depend on what platform you use, and for what purpose you need it. You will find below a comparison table of the ones we think are the best in the market among the biggest actors, and what we think about them..."
                        Do You Know if "Shadow IT" Cloud Services Present a Problem to Your Company?
                        Network World February 13, 2015
                        "Does your organization have a shadow IT problem? Would you even know if you did? According to the Cloud Security Alliance (CSA), 72% of respondents to the 2014 Cloud Adoption Practices and Priorities survey know the scope of shadow IT in their computing environments.

                        CSA defines shadow IT as 'technology spending and implementation that occurs outside the IT department, including cloud apps adopted by individual employees, teams, and business units.' Nearly half of the survey respondents (49%) say their primary concern about shadow IT is the security of corporate data in the cloud..."

                        The Rise of the Cloud WAN
                        NetworkComputing February 13, 2015
                        "The trend of pushing WAN functionality into the cloud -- software-defined WAN -- is gaining steam as enterprises look to reduce WAN complexity and lower costs.

                        Cloud technology is pushing WAN technology toward the consumer paradigm, as a raft of new startups make it easier to provision and deploy WAN services in the cloud with a software-only model. The WAN functionality moving into the cloud includes business-class Internet, security, WAN optimization, and application policy control..."

                        IT's Top 3 Cloud Migration Errors
                        InfoWorld February 17, 2015
                        "A few years ago, only 10 to 20 percent of enterprises had a cloud migration strategy, but nowadays, nearly all do. There are many good reasons to move to the cloud, but for many enterprises, the path to cloud is not paved with gold, nor is it easy to navigate.

                        Despite all the best-practice information out there, I still see huge mistakes being widely made..."

                          How a Hybrid IT Cloud Service helped Findly Reach New Heights
                          CIO February 18, 2015
                          "When social recruiting firm Findly acquired an on-demand talent communications company its client base doubled overnight. IT execs knew a serious infrastructure change was in order. Here's how a hybrid cloud solution addressed Findley's new needs.

                          Since 2002, when Amazon Web Services (AWS) initiated its suite of cloud-based solutions, the real-time cloud environment including managed services has become a worldwide phenomenon. It's so widely implemented, in fact, that The Channel Company publishes an exclusive list of the top 500 managed service providers every year..."

                          The enterprise view of cloud, specifically Private Cloud, is confusing
                          GIGAOM February 16, 2015
                          "Enterprise organizations are actively looking for ways to leverage cloud computing. Cloud presents the single-largest opportunity for CIOs and the organizations they lead. The move to cloud is often part of a larger strategy for the CIO moving to a consumption-first paradigm. As the CIO charts a path to cloud along the cloud spectrum, Private Cloud provides a significant opportunity.

                          Adoption of private cloud infrastructure is anemic at best. Looking deeper into the problem, the reason becomes painfully clear. The marketplace is heavily fractured and quite confusing even to the sophisticated enterprise buyer. After reading this post, one could question the feasibility of private cloud. The purpose of this post is not to present a case to avoid private cloud, but rather expose the challenges to adoption to help build awareness towards solving the issues..."

                          vBeers-SF
                          x
                          vBeers @ Miami - Biscayne Tavern - Wed Feb 26th
                          6pm - 8pm:
                          Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida. Register today so you can be a part of this great monthly event! Feel free to invite all of your friends and co workers who work in the IT industry!

                          Sponsored by VaultNetworks

                          This will be a sponsored event so beers are on us. Join us for an evening of creating connections and building your network in a relaxed and fun environment.

                          Vault Networks offers dedicated server solutions, colocation services, cloud computing, hybrid cloud solutions, backup services, and technical service 24/7/365.

                          There is absolutely NO SALES PITCH, just FREE ice cold beers and tech talk!

                          "Meet-Ups" are an essential aspect of your professional growth and development. Connect with an array of professionals while enjoying a drink or two.

                          • Location: Biscayne Tavern
                          • Address: 146 Biscayne Blvd, Miami, FL 33132
                          • Date: Wednesday, February 26th
                          • Time: 6pm to 8pm - arrive and depart any time

                          Join us for one of the three South Florida vBeers events. The South Florida vBeers events happen three times a month, once per county:

                          Please register at EventBrite.

                          Details posted to vBeers South Florida LinkedIN Group.

                          vBeers @ Palm Beach Gardens (Wed, March 4th, 2015)
                          6pm - 9pm - Paddy Mac's - Sponsored
                          We are starting a new South Florida vBeers on the 1st Wednesday of every month, beginning March the 4th at Paddy Mac's.

                          We picked this Palm Beach Gardens location as it is within a 30 minutes drive of many Palm Beach County cities and some Martin County cities.

                          This event will be sponsored by the South Florida Technology Alliance (STFA).

                          Bring your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community.

                          Please share this invitation with your IT colleagues and encourage them to attend!

                          Details and RSVP: meetup.com.

                          IT - PM
                          x
                          6 Ways to Cope With a Resistant Sponsor
                          CIO February 19, 2015
                          "An executive sponsor who is out to undermine a project can be very dangerous

                          A few years ago, the chief administrative officer at a multinational enterprise realized that, despite the extensive benefits projected, support for a new ERP system was not unanimous. In order to strengthen commitment, he forced the heads of finance, HR and manufacturing to sponsor the project within their respective areas. While the heads of finance and HR were enthusiastic about better automation, the VP of manufacturing liked the current systems and saw no need for ERP. Over the next few months, he publicly supported the project while simultaneously creating significant project roadblocks..."

                            IT - Networks
                            x
                            Net Neutrality (Open Internet): The Real Issues and Resolutions
                            TECGZONE360 February 20, 2015
                            "So, what's all the fuss about with Net Neutrality you're hearing about? On February 26th, the FCC may change the game and screw it up for everybody...

                            Let me start with this. The reason there are so many successful Internet companies such as Google, Facebook, Netflix, etc., is that they started with a blank slate and created a new and better way to create and deliver products and services. They didn't try to amend an 80 year-old FCC law. They had a fresh start. And that's where this paper will take us. But to get there, you need to understand some of the true issues and complexities of what happens when new business and old business models collide..."

                            6 Internet Of Things Building Blocks
                            InformationWeek February 22, 2015
                            "Need an embedded system to whip up an IoT prototype? These six platforms make it easier than ever to get started with embedded programming.

                            The "Internet of Things" is, in reality, the rise of embedded systems. Taking a small computer and embedding it in a formerly un-computerized object allows us to control the object, gather data from the object, and ultimately tie the object to other things through a network or the Internet..."

                            WAN Topology Contingent on ISP Resources, User Needs
                            Search Networking February 17, 2015
                            "When designing a WAN topology, enterprises have to carefully balance their requirements against what their service providers can offer.

                            When procuring a wide-area network (WAN), IT managers must understand which capabilities they will need from their service providers to meet their specific requirements, and thus determine WAN topology.

                            Lacking a clear understanding of the products and services marketplace can result in the wrong purchasing decision, causing underperforming applications or even a loss of connectivity..."

                              Whatever Happened to the Ipv4 Address Crisis?
                              Network World February 17, 2015
                              "In February 2011, the global Internet Assigned Numbers Authority (IANA) allocated the last blocks of IPv4 address space to the five regional Internet registries. At the time, experts warned that within months all available IPv4 addresses in the world would be distributed to ISPs.

                              Soon after that, unless everyone upgraded to IPv6, the world would be facing a crisis that would hamper Internet connectivity for everyone. That crisis would be exacerbated by the skyrocketing demand for IP addresses due to a variety of factors: the Internet of Things (refrigerators needing their own IP address); wearables (watches and glasses demanding connectivity); BYOD (the explosion of mobile devices allowed to connect to the corporate network); and the increase in smartphone use in developing countries...."

                              IT - Linux
                              x
                              10 Highlights of Jon Corbet's Linux Kernel Report
                              The Linux Foundation February 18, 2015
                              "In his keynote talk at Collaboration Summit, kernel contributor and LWN Editor Jon Corbet elaborated on the results of the Who Writes Linux report, released today, and gave more insights on where kernel development is headed over the next year, its challenges, and successes. Here are 10 highlights:

                              1. 3.15 was the biggest kernel release ever with 13,722 patches merged. "I imagine we will surpass that again," Corbet said. "The amount of changes to the kernel is just going up over time." ..."

                              The Linux Foundation Releases Linux Development Report
                              The Linux Foundation February 18, 2015
                              "The Linux Foundation, the nonprofit organization dedicated to accelerating the growth of Linux and collaborative development, today announced the immediate release of its 2015 report 'Linux Kernel Development: How Fast It is Going, Who is Doing It, What They Are Doing and Who is Sponsoring It.'

                              This is the sixth such report that is released on a roughly annual basis to help illustrate the Linux kernel development process and the work that defines the largest collaborative project in the history of computing. This year's paper covers work completed through Linux kernel 3.18, with an emphasis on releases 3.11 to 3.18. The last report was released September 2013 and focused on 3.3 to 3.10.

                              Key findings from this year's paper include:..."

                              The 8 best desktop environments for Linux
                              ITWorld February 18, 2015
                              "There is no shortage of desktop environments for Linux, which means you can customize your PC the way you want it.

                              I have used almost all major desktop environments -- not just to test the waters but to actually find the one that works for me -- because, you know, the best DE is the one that fits your needs.

                              Here are 8 of the best desktop environments, ranked in inverse order -- saving the best (at least according to me) for last..."

                              A Beginner's Guide to GitHub
                              ars technica February 18, 2015
                              "Nearly 2,000 developers started contributing to Linux in the past 15 months, making up nearly half of all developers writing code for the open source operating system kernel.

                              The new developers are helping fuel an ever-bigger Linux community, according to the latest Linux Kernel Development report, which will be released today by the Linux Foundation. The report is expected to be available at this link..."

                              IT - Operations
                              x
                              Micro Data Centers Keep Businesses Competitive from Next Door
                              Search Data Center February 19, 2015
                              "Decentralized data centers can improve application performance and system availability by placing resources close to users.

                              The debate over whether to concentrate data center resources or spread them out in micro data centers isn't new -- and it isn't ending anytime soon. Many large enterprises pull their remote data centers into one or few central locations, but a distributed group of data centers offers better performance, increased reliability and lower costs..."

                              How a University's Data Center Overhaul Makes a Green Impact
                              CIO February 18, 2015
                              "To say that University of Cambridge deployed disparate and diverse data storage and data center infrastructure would be a vast understatement.

                              In a 2013 IT review, data center manager Ian Tasker and his team discovered almost 200 servers across the University's 120 departments. These installations ranged from single servers housed in closets to larger rooms containing 20 to 30 servers, but all contributing to a major drain on power and cooling resources, as well as creating one heck of a management headache..."

                              IT - Security
                              x
                              Why the USA Hacks
                              Dark Reading February 17, 2015
                              "The U.S. government views cyberspace as just another theater of war akin to air, land and sea, and it operates in the domain for one basic reason: national defense.

                              The United States operates in the cyber domain as a national entity for a simple reason -- to protect its citizens. Like traditional notions of national defense, cyber operations extend across political, economic and military pillars of national power. But cyber operations are, in a sense, more complex, because they affect the pillars of power more profoundly, due to the speed at which they occur..."

                                End Users Causing Bulk of Infosec Headaches
                                Dark Reading February 18, 2015
                                "Report shows 80 percent of IT pros blame users for their security woes.

                                Misconfigured systems and software vulnerabilities may cause their share of woes in the information security world, but the actions of end users perennially serve up the worst nightmares for infosec professionals. That fact was confirmed again today with a new survey conducted by Bromium that shows nearly 80 percent of security professionals name end users as their biggest security headache..."

                                7 Social Engineering Scams and How to Avoid Them
                                CIO February 16, 2015
                                "Social engineering threats are widespread, affecting even the most savvy IT professionals. While there's no guaranteed way to defend against them, half the battle is recognizing the methods they use.

                                Here are seven ways social engineers may pilfer your money and data, plus tips to protect yourself against them..."

                                  Code Typo Helps Tie North Korea to the Sony Hack
                                  ComputerWorld February 17, 2015
                                  "A security company in the U.S. has provided further evidence that last year's devastating hacking attack on Sony Pictures Entertainment was carried out by a group with ties to North Korea.

                                  The FBI has already named North Korea as the source of the attack, but some security experts have been skeptical, in part because the FBI didn't disclose all the details of its investigation.

                                  Security firm CrowdStrike is among those who believe North Korea was the culprit, and on Tuesday it presented another piece of evidence to support that claim..."

                                  How to Detect Malware Infection in 9 Easy Steps
                                  InfoWorld February 17, 2015
                                  "Hey Windows users: Here's now to get the incredible power of 57 antimalware engines with no performance impact on your computer...

                                  Hardly a week goes by when I'm not cleaning up someone's computer and detecting and eradicating malware. It's not uncommon for me to find dozens of infections, each doing its best to pester the user into installing multiple bogus antivirus programs -- or worse, getting ready to lock up data in a ransomware attack..."

                                  Are You a Hack Waiting To Happen? Boss Wants to Know
                                  CIO Today February 13, 2015
                                  "The next phishing email you get could be from your boss. With high-profile security Relevant Products/Services breaches on the rise, from Sony Pictures to Anthem, companies are on the defensive. And they want to make sure their employees are not a hack waiting to happen. Data show phishing emails are more and more common as entry points for hackers. Unwittingly clicking on a link in a scam email could unleash malware into a network or provide other access to cyberthieves.

                                  So a growing number of companies, including Twitter Inc., are giving their workers a pop quiz, testing security savvy by sending spoof phishing emails to see who bites..."

                                  IT - Careers
                                  x
                                  New Ideas and Innovation: Hiding in Plain Sight?
                                  Business 2 Community February 19, 2015
                                  "What if businesses could learn to see the world differently? In science, this is something that happens every day. Changing your perspective in order to understand a problem in a new way is part of the scientific method. But most businesses don't work like this. When they do, it can have a profound positive effect on innovation and performance.

                                  Look at a fast-changing industry like mobile telecoms or personal finance and you'll see companies get left behind as they struggle to shift their thinking. What's holding them back? ..."

                                  7 Ways Tech Can Help Fix the US Healthcare System
                                  TechRepublic February 18, 2015
                                  "It's no secret that the US healthcare system is broken. A report released by the Commonwealth Fund, a US think tank, showed that in 2014 the US ranked last in the quality of healthcare systems when compared to 10 other industrialized nations. We've occupied that spot from 2004 to 2014.

                                  We also spend much more per capita -- about $8,600 -- on healthcare than any other nation, and that's about 30% higher than the next closest industrialized country, according to the World Bank.

                                  As of 2012, according to the CDC, more than half of Americans live with a chronic disease. Prescription drug spending accounts for one in every $10 spent on healthcare..."

                                  Most Memorable SNL Tech Skits & Bits
                                  Network World February 17, 2015
                                  "In the wake of SNL celebrating its 40th anniversary this past weekend (complete with a free SNL 40 iOS app), we take a trip back through some of Saturday Night Live's most memorable techie skits and bits. Feel free to hit me up if there are good ones I missed (I purposely left out a few NSFW ones).

                                  With smartphones, computers and the Internet going mainstream in recent years, tech has become a much more prevalent subject on the late night show..."

                                    T Career Success Takes Ditching Your Silo Mindset
                                    InformationWeek February 18, 2015
                                    "IT professions are steadily shifting away from what has been considered the natural career progression for the past 20 years. The new path is being shaped by virtualization, cloud computing, and converged infrastructures. For IT professionals who think they're done with career development and can ride the easy train to retirement, this shift will force them instead to step back and venture sideways, into some disciplines they thought they'd left behind when they became tech specialists.

                                    For people still early in their careers, this shift will simply create a different career pathway -- away from specialization and more focused on cross-discipline skills..."

                                    15 Hot Skill Sets for IT Pros in 2015
                                    InformationWeek February 17, 2015
                                    "When You're Hot, You're Hot

                                    The technology world loves its buzzwords, no doubt. If you dig through the hype and hit upon the substance that lies beneath, however, you might be onto career-building gold.

                                    Take DevOps, for instance: It's been among the buzzier terms in and around IT lately. But if you go deeper than the surface, and take note of some of the skills and technologies that DevOps environments increasingly need and make use of, your list will begin to look a lot like the lists that hiring managers and recruiters put together when seeking new talent..."

                                    Why Your Resume Still Matters - Even if You're on LinkedIn
                                    Business 2 Community February 21, 2015
                                    "The world today is very technology-centered. The Internet has become the go-to resource for doing everything from finding information and connecting with friends to paying bills and booking trips. This is also where many people turn to find jobs. Though newspapers do still advertise job openings, the Internet gives job seekers access to a much broader range of options.

                                    LinkedIn has become a valuable resource as well as it allows professionals to connect and network. Recruiters can scope out potential candidates and job seekers can become more engaged in finding openings and learning about companies. So now that you've crafted a polished LinkedIn profile that will attract positive attention, does that mean your resume is obsolete? Not so fast. There are many limitations to only relying on a LinkedIn profile..."

                                      Your Co-Workers are Mean to You for a Reason
                                      Bloomberg February 13, 2015
                                      "Some of the biggest complaints about corporate life concern co-workers - and what self-interested jerks they can be. Turns out there's something to the complaints. People at work act more calculating, are more cynical about favors, and are less likely to reciprocate good deeds to co-workers than they are to acquaintances outside work, Stanford researchers say in a forthcoming Academy of Management Discoveries paper..."
                                      IT - Virtualization
                                      x
                                      Interesting Times Ahead in the Server Virtualization World
                                      ServerWatch February 17, 2015
                                      "VMware is the 800 pound gorilla in the world of server virtualization, dominating the market with more than 50% market share, according to Gartner's Server Virtualization Tracker from last year.

                                      And it's not been averse to flexing its muscles and splashing the cash over the last few years: VMware shelled out a whopping $1.54 billion for mobile device manager AirWatch, Virtually Speaking$1.26 billion for software-defined networking company Nicira, and an undisclosed but no doubt substantial sum for desktop-as-a-service company Desktone..."

                                      How Virtualization Can Get You into Software Licensing Trouble
                                      Search Server Virtualization February 19, 2015
                                      "Maintaining proper software licensing in virtual environments can be a challenge. Find a strategy to cope or you could find yourself out of compliance and in hot water.

                                      One aspect of server virtualization that is sometimes overlooked is licensing. Virtualization can complicate software licensing, so it is important for an administrator to exercise due diligence in making sure that the organization has purchased the required licenses.

                                      There are a couple of different issues that can make licensing difficult in a virtualized environment. One such issue is that the organization may have to purchase several different license types in order to remain compliant. Some of the required license types include:..."

                                        IT - Compliance
                                        x
                                        Getting Data Governance and Legal to Work Together
                                        Information Management February 12, 2015
                                        "As data governance becomes increasingly part of the business (rather than an offshoot of IT), it must proactively seek to build links with other areas of the enterprise.

                                        Two paradigms dominate the IT mindset: the drive to build and maintain a technical environment; and reacting to requirements provided by business users. Neither of those paradigms involve proactively engaging with other areas of the business, and to the extent that data governance was conceived in IT, it must discard these paradigms. Instead, data governance must actively seek out partnerships with other areas of the business, and present a vision of synergies that can benefit the enterprise as a whole. One of the most important of these business areas is the legal department..."

                                          Proposal for Altered Data Retention Law is Still Unlawful, Dutch DPA Says
                                          PC World February 16, 2015
                                          "The Dutch government's proposed revision of the country's data retention law is not enough to bring it into compliance with a recent European Union court ruling, the Dutch privacy watchdog said Monday.

                                          An effort by the Dutch government to adjust a law requiring telecommunications and Internet companies to retain their customers' location and traffic metadata for investigatory purposes should be dropped, as the infringement of the private life of virtually all Dutch citizens is too great, the Dutch Data Protection Authority (DPA) said on Monday..."

                                            IT - Email
                                            x
                                            Prepare for Faster, Safer Web Browsing: The Next-Gen HTTP/2 Protocol is Done
                                            PC World February 18, 2015
                                            "The future of the web is almost ready for prime time.

                                            Work on HTTP/2 by the Internet Engineering Task Force HTTP Working Group is finished, according to group chair Mark Nottingham, who made the announcement on his personal blog. HTTP/2 now has to go through the final editing process before it is published and becomes an official web standard.

                                            The announcement comes a little more than a week after Google announced that it was discontinuing SPDY in favor of HTTP/2 inside Chrome. SPDY won't fully disappear from Chrome until early 2016, while HTTP/2 support will roll out to Google's browser in the coming weeks..."

                                            IT - Big Data
                                            x
                                            Vint Cerf Fears a 'Digital Dark Age,' and Your Data Could Be at Risk
                                            ComputerWorld February 13, 2015
                                            "Efforts are emerging to combat the 'bit rot' threatening today's digital records...

                                            In this era of the all-pervasive cloud, it's easy to assume that the data we store will somehow be preserved forever. The only thing to fret about from a posterity perspective, we might think, is the analog information from days gone by -- all the stuff on papers, tapes and other pre-digital formats that haven't been explicitly converted..."

                                              Do You Have a Love-Hate Relationship With Your Data?
                                              Business 2 Community February 17, 2015
                                              "Can't live with it? Can't live without it?

                                              Has your relationship with data seen better days?

                                              When the business is ticking over nicely, and data is fresh, everyone's content and happy. They can get on with their work, free from the burden of decrepit databases and phone numbers that never connect.

                                              But then the honeymoon period ends, and the relationship needs work. It's getting harder to email people. You're always getting names wrong. And half of your mail comes back as returned to sender..."

                                                Matching Personalities in the Call Center
                                                InformationWeek February 17, 2015
                                                "It's common for companies to record customer service calls. But what insights are they gaining from all that data? One solution: Matching customers with service reps for more harmonious calls.

                                                You hear the recording whenever you phone customer support: "Calls may be recorded for training and quality purposes." Of course, companies use call center recordings for training and compliance purposes, but they could do a lot more with this data..."

                                                  Underwriting: Where Insurance Data Really Pays Off
                                                  Insurance Networking News February 19, 2015
                                                  "Insurance companies can use data to boost customer retention and acquisition, detect fraud, create a more satisfying customer experience, transform the contact center, find operational efficiencies, create competitive advantage and improve claims operations. It's the underwriting function, however, that stands to gain the most from increased agility with data. Successfully leveraging big data can make an enormous difference in the underwriting process. Underwriters can use big data to gain insights, inform decisions, drive innovation and improvements, and better understand and assign risk, all leading to greater insurer profitability..."
                                                  Big Data Digest: The Backlash Begins
                                                  ComputerWorld February 17, 2015
                                                  "Big data may have just crested the wave of inflated expectations and be barrelling towards the trough of disillusionment, at least if you're following along with the Gartner Hype Cycle.

                                                  In other words, some practitioners are beginning to doubt the marketing jive around big data analysis and starting to take a more critical view of the limits of big data systems..."

                                                  Big Data, Welcome To Those Awkward Teenage Years
                                                  Forrester February 20, 2015
                                                  "Just a few years ago, when big data was associated primarily with Hadoop, it was like a precocious child - fun for adults, but nobody took it seriously. I'm attending Strata in San Jose this February, and I can see things have changed. Attendance doubled from last year and many of the attendees are the business casual managers - not the blue jeaned developers and admins of days gone by. Big data is maturing and nobody takes it lightly anymore..."
                                                  IT - BYOD
                                                  x
                                                  BYOD: Better Stay Used to It
                                                  HelpNet Security February 16, 2015
                                                  "BYOD is a common trend in organizations today. Businesses may be thrilled they don't have to pay for tablets or smartphones for their workforce and don't usually have to maintain and fix them. But businesses now have to secure all these devices and endpoints.

                                                  The problem gets larger every day. This past holiday season, sales of tablets and mobile phones went through the roof. Apple sold 21 million iPads and 75 million iPhones in the fourth quarter of last year alone. How many of these are now pounding corporate networks across the globe?..."

                                                  Securing Corporate Data in a BYOD World
                                                  Search Networking February 17, 2015
                                                  "There was a time when securing corporate data meant protecting desktop computers with antivirus software and educating employees about cyber security best practices. Threats were still present -- phishing attacks against employees and theft of machines, to name a couple. But for the most part, enterprises could protect themselves just by securing the devices they had on their immediate premises.

                                                  Not any longer..."

                                                  Top10
                                                  x
                                                  Top Ten Articles for last few Issues
                                                  Vol 204 Issues 1 and 2; Vol 203 Issues 1, 2, 3 and 4; Vol 202 Issues 4 and 5
                                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                  • Mark Hurd: 40% of US workforce can retire in 8 years. Is your HR ready?
                                                  • Oracle to Receive IEEE Milestone Award for SPARC RISC Architecture
                                                  • How to Build a Software Defined Network
                                                  • Gartner research note regarding Exadata X5
                                                  • Oracle VM VirtualBox 4.3.22 Release
                                                  • Oracle VM 3.3.2 Released
                                                  • Oracle Exadata Database Machine X5
                                                  • Deploying MySQL over NFS using the Oracle ZFS Storage Appliance
                                                  • Thin Cloning of PDBs is a Snap with Oracle Storage
                                                  • New Oracle VM Templates for Oracle Database

                                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                                    IT - Encryption
                                                    x
                                                    Enterprises are Encrypting and Inspecting More Network Traffic
                                                    Network World February 17, 2015
                                                    "Encrypted traffic has become increasingly ubiquitous at most organizations. According to new ESG research, a vast majority (87%) of organizations surveyed encrypt at least 25% of their overall network traffic today (note: I am an ESG employee) Network encryption is a security best practice as it protects the privacy and confidentiality of network traffic as it travels from source to destination..."
                                                    IT - Server
                                                    x
                                                    Much More than Hype: Container Virtualization Brings Efficiency
                                                    Search Server Virtualization February 19, 2015
                                                    "Containers have caught the industry's attention and for good reason. The potential efficiency advantages are real...

                                                    Today, virtualization is a well-understood approach to sharing server resources, allowing systems administrators a great deal of flexibility in building on-demand virtual instances. However, there are some performance and resource utilization efficiency problems associated with hypervisor virtualization, and a new approach called container virtualization is aimed at resolving these..."

                                                    Have you Hugged Your Server Today?
                                                    InfoWorld February 16, 2015
                                                    "Every now and again I summon that IT veteran affect and harrumph about how today's techs are missing out due to the prevailing winds of newer equals better. Some measure of harrumphing is absolutely necessary from time to time, as it serves as a tether for newer folks to older ideas and foundations. But too much becomes self-serving and leads one to empty grousing among the derelict carcasses of AS/400s and VMS systems.

                                                    One recent phenomenon catches me up a bit, however, and definitely deserves an harrumph. That phenomenon is the advent of disposable IT..."

                                                      Developer
                                                      x
                                                      February 11, 2015: Developers Virtual Technology Summit
                                                      By Larry Wake

                                                      Larry Wake writes, "If you're familiar with the Oracle Technology Network's Virtual Sysadmin Days that have been held in the past, you know a bit about what this is about: a series of hands-on, proctored labs brought straight to your desktop on the web.

                                                      But did you know they've expanded in scope? Of particular interest to enterprise developers is that this time around, there's a track aimed straight at you..."

                                                      Networking
                                                      x
                                                      How to Build Software Defined Networks Using Elastic Virtual Switches - Part 1
                                                      By Orgad Kimchi
                                                      Orgad writes, "Oracle Solaris 11.2 enhances the existing,integrated software-defined networking (SDN) technologies provided by earlier releases of Oracle Solaris to provide much greater application agility without the added overhead of expensive network hardware.

                                                      It now enables application-driven, multitenant cloud virtual networking across a completely distributed set of systems; decoupling from the physical network infrastructure; and application-level network service-level agreements (SLAs)-all built in as part of the platform. Enhancements and new features include the following:..."

                                                      Security
                                                      x
                                                      Security Configuration in LDAP Adapter
                                                      Oracle Adapter for LDAP is a JCA resource adapte

                                                      Anuj Kaushal writes, "In this post we'll discuss the various security options that are available as part of the LDAP Adapter configuration. Oracle Adapter for LDAP is a JCA resource adapter that provides bi-directional connectivity with LDAP v3 compliant directory servers*.

                                                      To be able to perform LDAP Operations, the adapter needs to establish a connection to communicate with a target LDAP directory server. For this, it is required to configure the resource adapter connection properties which will be used by the adapter to connect to the directory server..."

                                                      Nexenta News
                                                      x
                                                      Nobel Prize-Winning Renowned European University Deploys Nexenta Software Defined Storage
                                                      to Support Massive Private Cloud Expansion
                                                      Ludwig Maximilian University in Germany Boosts Storage Performance and Capacity Management for 50,000 Students on Commodity Hardware

                                                      Nexenta (@Nexenta), the global leader in Software-Defined Storage solutions, announced it was chosen by the Faculty of Physics at Ludwig Maximilian University (LMU), one of Europe's premier academic and research institutions, to support its IT environment.

                                                      LMU is the second largest university in Germany with over 50,000 students. It attracts inspired scholars and talented students from all over the world and is a global powerhouse for physics research and education, with over 34 Nobel laureates associated with it.

                                                      With eight different sites in and around Munich, the university faced a daily battle to provide fast and efficient service to its students and staff. Leveraging a central data center was not possible due to the demand for low latency...

                                                      CIO Review Names Nexenta Systems to 20 Most Promising Storage Solution
                                                      Disrupts Enterprise Storage Market with its Open Source-driven Software-Defined Storage Market Leadership
                                                      Nexenta Leads the Market with 6,000 Customers, More Than 1 Exabyte of Capacity, 1,000+ Channel Partners

                                                      Nexenta, the global leader in software-defined storage (SDS) solutions, announced that 'url "http://www.cioreview.com" "CIO Review"' chose Nexenta as a 20 Most Promising Storage Solution Provider for 2015 and Storage Company of the Month. A distinguished panel of CIOs, CEOs, VCs and members of CIO Review's editorial board who recognize and promote technology entrepreneurship identify this annual list of companies. The decisions were based on Nexenta's software-defined storage product offerings, core competency, customer testimonials and market standing.

                                                      "Nexenta has been on our radar for some time now with a unique software-defined approach that's starting a revolution in the storage industry," said Harvi Sachar, Publisher and Founder, CIO Review. "We are happy to showcase them this year for their continuing excellence in delivering top-notch enterprise storage solutions. Nexenta's solutions have continued to break new ground within the past year, benefiting enterprises around the globe."

                                                      Trending in
                                                      Vol 231, Issue 4
                                                      Trending IT Articles