News about Oracle's Solaris and Sun Hardware
System News
Feb 23rd, 2015 — Mar 1st, 2015 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 204, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Is Mobile Over-hyped?
By David Dorf
David Dorf writes, "Don't get me wrong; I think mobile has and will continue to have a huge impact to the retail industry. It's just that sometimes we get swept up by the shinny new object and neglect the basics. Less than two years ago Marc Andreessen declared that stores were dead, yet they still typically represents more than 90% of a retailer's revenue. Investments may not track contributions exactly, and that's understandable. We just can't let the ratio get too out-of-sync. Put another way, a meal consists of main dishes and side dishes. If the chef neglects the side dishes the meal won't be ruined, but the converse is not true..."
    Introducing Oracle GoldenGate for Big Data!
    By Madhu Nair
    Madhu Nair writes, "Big data systems and big data analytics solutions are becoming critical components of modern information management architectures. Organizations realize that by combining structured transactional data with semi-structured and unstructured data they can realize the full potential value of their data assets, and achieve enhanced business insight. Businesses also notice that in today's fast-paced, digital business environment to be agile and respond with immediacy, access to data with low latency is essential. Low-latency transactional data brings additional value especially for dynamically changing operations that day-old data, structured or unstructured, cannot deliver..."
    IT - Storage
    What are IOPS and should you care?
    Storage-Switzerland, February 23, 2015
    "When evaluating a new storage system, especially an all-flash array, the number of IOPS (Inputs/Outputs per Second) that the storage system can sustain is often used to differentiate one storage system from another. But is this really a standard that has any merit given the demands of today's data center and the capabilities of today's storage systems?

    There are three factors that when combined tell the full story of storage performance; bandwidth rate, latency and IOPS. Most storage vendors tend to focus on IOPS to brag about how fast their storage system is. But measuring storage system performance by IOPS only has value if the workloads using that storage system are IOPS demanding..."

    Create a Data Archive Strategy that Resists the Lure of Clustered DAS
    Search Storage, February 24, 2015
    "Server-side clustered storage puts yet more distance between users and sound data management...

    A while back, I wrote a piece about archive in place, my term for an alternative data archive strategy that's increasingly necessitated by the Balkanization of centralized storage infrastructure. Simply put, with the advent of software-defined storage, and the continuing appeal in some quarters of big data analytics leveraging Hadoop, MapReduce and related technologies, it wasn't too far a leap to suggest that some sort of distributed archival strategy -- one that didn't require migrating data to or from a central repository -- might be in order..."

    When flash goes wrong: how to plug the SSD disaster recovery gap
    Information age, February 27, 2015
    "Flash storage is definitely here to stay, with many organisations leveraging the performance and reliability benefits of the technology. But according to a new survey by data recovery and ediscovery firm Kroll Ontrack, while 90% of firms are using flash for these reasons, a third of them have experienced some sort of SSD technology malfunction.

    Of those that had failures, 61% lost data. Fewer than 20% were successful in recovering it. So why is there such as gap between the loss of flash data and the ability to recover it when things go wrong?..."

    Software-Defined Storage vs. Software-Delivered Storage
    NetworkComputing, February 25, 2015
    "The difference between a software-defined storage product and one that's software delivered has more to do a vendor's go-to-market strategy than technical features.

    Software-defined storage is a perfect example, like cloud, of how we in the IT industry can take a useful term and stretch it to cover so many unrelated use cases that it becomes as meaningless as whatchamacallit or thingamabob..."

      Java Technology
      Java EE Adoption in One of the World.s Largest Online Financial Systems
      Reza Rahman writes, "One of the most important things to do at this stage of the life-cycle of Java EE is highlight successful adoption stories. We have been doing just that for a long time through our adoption stories blog as well as JavaOne. JavaOne 2014 was particularly good in this regard and JavaOne 2015 looks to be even better. Indeed we hope the folks with great adoption stories that submitted last year but did not get accepted will resubmit next year. We will highlight some of those sessions from JavaOne 2014 in the next few months and the best place to start is the Java EE adoption story from Rakuten..."
      FLUX Presentation @ NSU - Next Generation of Identity Management - Thursday March 12th
      Einstein's from 6:30PM to 7:30PM; Presentation at 7:30PM
      This is a topic that should be of interest to all IT professions including managers, sysadmins, and developers.

      Bill Nelson, aka the "IDM Dude", Co-Founder of Identity Fusion, will talk about IRM, The Next Generation of Identity Management.

      In today's internet-connected world, employees, partners, and customers all need anytime access to secure data from millions of laptops, phones, tablets, cars, and any devices with internet connections.

      Identity relationship management platforms are built for IoT, scale, and contextual intelligence. No matter the device, the volume, or the circumstance, an IRM platform will adapt to understand who you are and what you can access.

      In this discussion, Bill will describe the basic pillars of identity relationship management systems, how they differ from identity and access management solutions, and how you can build an identity platform to begin taking advantage of IRM.

      Please RSVP at The FLUX group

      About Identity Fusion, Inc.

      Identity Fusion offers comprehensive services focused on ForgeRock's Open Identity Stack and includes sales, services, and education.

      Directions on FLUX website.

      IT - Technology
      DARPA Aims to Breach the Human-Computer Natural Language Barrier
      Network World, February 20, 2015
      "Will it be possible to actually communicate with a computer and have it understand context, gestures and even its human counterparts facial expressions? Such notions are usually reserved for the screenplays of science fiction novels and movies.

      A new Defense Advanced Research Projects Agency (DARPA) program however wants to take such ideas out of the science fiction realm and make them reality in the next few years..."

        7 Emerging Technologies IT should Study Now
        InformationWeek, February 23, 2015
        "Staying on top of technology trends is serious business for those of us in the field. Skill sets come and go at a breakneck pace, and it's important to stay ahead of the curve in an attempt to anticipate the next hot trend to keep oneself relevant in an ever-changing world.

        Here's a look at seven trending technologies that IT professionals should be studying right now. Where these technologies lead us, IT jobs are certain to follow in order to help design, implement, and support each one..."

          10 Things Brands Should Know about Virtual Reality
          TechRepublic, February 24, 2015
          "From car makers to hotel chains, brands are turning their attention to virtual reality (VR) as a new avenue to reach potential customers and build relationships.

          The move to the mainstream has begun... Here are 10 things brands should know about virtual reality before jumping in..."

            Spotlight On: Oracle Systems Learning Stream
            Online Training to Support Your Infrastructure Professional Development
            Ask yourself:

            • Are you up to speed on "Software in Silicon"?
            • Are you familiar with the Virtual Compute Appliance?
            • Are you using SPARC M6-32 or FS1 software?
            • What's new with the Exadata X5 release?
            • Do you know what the experts are saying about Linux?
            • Do you know how to build an Oracle Key Manager Cluster setup?
            • Have you heard of the new Engineer System, Zero Data Loss Recovery Appliance?
            • How do you scale SAM-QFS?
            • Which systems provide optimization for the cloud?
            • What is the latest information available on ZFS Storage Appliance?
            • Would an overview of the Oracle Enterprise Manager help you?
            • Which Oracle products can increase performance in your Data Center?

            Learn the answers to these questions by accessing our recently released training option: Oracle Learning Streams..

            IT - Bitcoin
            Traditional Remittance Provider Adds Bitcoin Services in Latin America
            Coindesk, February 25, 2015
            "A bitcoin exchange and a remittance company have partnered to offer customers fiat-to-bitcoin deposit services across Latin America.

   has joined with More Money Transfers (MMT), a Latin American remittances company in what they claim is the first alliance of its kind. However, the partnership, said Bitex chief marketing officer Manu Beaudroit, isn't meant to provide remittance services in bitcoin, but instead, enable more people into contact and activity with the digital currency.

            Speaking to CoinDesk, Beaudroit voiced his belief that bitcoin holds some of the greatest promise for remittance companies in the Latin American region..."

            5 Reasons Why The Bitcoin Revolution Has Only Just Begun
            Crypto Coin News, February 24, 2015
            "Over the weekend, I ran across a link to a Sputnik International opinion piece about Bitcoin called 'Five Reasons the Bitcoin Revolution is over.' ... Maybe the author or the company, is jumping on Bitcoin to get the ball rolling on their fledgling media enterprise. Maybe they have an agenda against Bitcoin, or they have knuckled under to a centralized third-party or government entity. Nevertheless, whether it is worthy of a rebuttal, which it really isn't, I look to dispel these five myths and any negative undercurrent of sentiment against Bitcoin. It is best not to let such targeted mainstream agendas fester unchecked. Like cancer, it's best to get it early..."
            Bucks to Bitcoin: Top Exchange Platform Fees Compared
            Coindesk, February 24, 2015
            "Whether you fancy trying your hand at trading the digital currency for the first time, or want to use it as an easy, cheap and fast method of payment, you're going to have to buy some bitcoin.

            That will likely mean using one of the many online exchange and trading platforms that are vying for your custom. But how much do these companies charge to swap dollars for bitcoin? And how do the various services compare?..."

            CoinSpark 2.0 Taps Blockchain Tech for Notarized Messaging Service
            Coindesk, February 26, 2015
            "CoinSpark has released a new version of its protocol that allows users to send private messages tied to bitcoin transactions, effectively allowing its technology to be used for more commercial, notarized transactions.

            The second major update from the asset transfer protocol launched in September, CoinSpark 2.0 will enable a broad range of applications based on the ability for two parties in a bitcoin transaction or asset transfer to record its purpose..."

            How Western Union Rips You Off And Bitcoin Doesn't
            Crypto Coin News, February 26, 2015
            "The most recent release of the Bitcoin Core wallet allows the user to define the transaction fee they are willing to pay. The amount that a user is willing to pay does, in the end, affect the speed of their transactions. However, users who pay no fee at all are not necessarily going to be prevented from having their transactions confirmed. Liken it to a standby flight, but for currency..."
            Bitcoin-friendly Bills Unveiled in Utah, New Hampshire, New York City
            Bitcoin Magazine, February 27, 2015
            "Pay your taxes in bitcoin? Maybe, if you live in one of three states now considering bills in support of that option.

            In January, Utah Republican state representative Mark K. Roberts introduced a bill, H.C.R. 6, to create a Council on Payment Options for State Services that will study how Utah could accept Bitcoin as a valid form of payment. The bill includes the possibility for Utah residents to pay state taxes using Bitcoin..."

            Study: Consumers Feel Bitcoin More Secure than Mobile Payments Apps
            Coindesk, February 27, 2015
            "A new survey shows that US consumers believe payments made with bitcoin are safer than those conducted using mobile wallets or apps.

            The report, published by Chicago-based Walker Sands Communications, focuses on changes in retail payments behavior, particularly as it pertains to digital transaction methods.

            Ultimately, it found that 3% of respondents said that they consider bitcoin to be the most secure form of payments..."

            Stripe Completes Beta Bitcoin Test; Offers Merchants Bitcoin Payment
            Crypto Coin News, February 28, 2015
            "Stripe, a San Francisco, Calif.-based mobile payments startup, has offered its customers a bitcoin payment option after completing a bitcoin beta test. CCN reported the beta test in March 2014. 'While in beta, Stripe merchants accepted bitcoin transactions from more than 60 countries, so we're excited to see what's next,' said Tim Drinan, a company spokesman..."
            CNN's Morgan Spurlock Spends Week 'Living on Bitcoin'
            Bitcoin Magazine, February 25, 2015
            "Morgan Spurlock, Academy Award nominated director of 'Super Size Me,' is CNN television's 'Inside Man.' In 2014, he spent a week living on bitcoin. The resulting 'Inside Man' episode aired on February 19, 2015, affording a large television audience an in-depth Bitcoin experience that was no doubt a first for many viewers.

            The episode begins with a brief explanation of Bitcoin founder Satoshi's goals, as defined by the white paper, 'Bitcoin: A Peer-to-Peer Electronic Cash System'..."

            IT - FOSS
            Weather Company CIO: 5 reasons why I believe in open source
            The Enterprisers Project, February 23, 2015
            "Since The Weather Company has been a major adopter of open source software, I'm often asked why we have chosen this path. Where is the value in taking the open source route to solve your business challenges? I'm a big advocate of open source, so I'm always happy to oblige. Here are my top five reasons:..."
            LibreOffice 4.4 raises the bar
            ITWorld, February 27, 2015
            "The developers behind LibreOffice, the free and open source productivity suite forked from OpenOffice, have sweated and bled to advance the toolkit over the past couple of years. The effort has paid off: It's a no-brainer to recommend LibreOffice over OpenOffice, thanks to Libre's consistent release schedule and the increasingly polished quality of the product.

            Now for the bigger question: Can you recommend LibreOffice in the same breath as Microsoft Office? The short answer: Maybe..."

            New Solaris articles on Oracle Technology Network
            OpennStack and Oracle on Solaris 11
            Glynn Foster writes, "I haven't had much time to do a bunch of writing for OTN, but here's a few articles that have been published over the last few weeks that I've had a hand in. The first is a set of hands on labs that we organised for last year's Oracle Open World. We walked participants through how to create a complete OpenStack environment on top of Oracle Solaris 11.2 and a SPARC T5 based system with attached ZFS Storage Appliance. Once created, we got them to create a golden image environment with the Oracle DB to upload to the Glance image repository for fast provisioning out to VMs hosted on Nova nodes..."
            Last Solaris 8 and 9 patches released
            Solaris 8 and 9 Extended (a.k.a Vintage) Support finished at the end of Oct 2014.
            Gerry Haskins writes, "Solaris 8 and 9 Extended (a.k.a Vintage) Support finished at the end of Oct 2014.

            We've flushed the queues of any fixes which were still in-flight from that time and released the final set of Solaris 8 and 9 patches have been released to MOS.

            Solaris 8 and 9 patches will continue to be available to customers with appropriate Sustaining Support contracts, as will telephone support, but no new Solaris 8 and 9 patches will be created..."

            MySQL Cluster 7.4 Now Generally Available
            New release demonstrates up to 200 million reads per second and enhanced high availability for online transaction processing
            Oracle announced the general availability of MySQL Cluster 7.4. The new release delivers greater performance, high availability, and advanced management capabilities to power highly demanding telecommunications, web, mobile, and cloud services.

            "With digital proliferation generating more data than ever before, businesses need online transaction processing to be as efficient and performant as possible," said Tomas Ulin, vice president, MySQL engineering, Oracle. "With no single point of failure, MySQL Cluster 7.4 provides high performance to a wide range of application requirements for a user base that spans administrators of major telecommunications subscriber databases to providers of next-generation web, cloud, social, and mobile applications. The new release is a significant update that not only improves overall performance but eases the management efforts for database administrators and DevOps teams..."

            MySQL Enterprise Monitor 3.0.20 has been released
            By Andy Bang
            Andy Bang writes, "We are pleased to announce that MySQL Enterprise Monitor 3.0.20 is now available for download on the My Oracle Support (MOS) web site. It will also be available via the Oracle Software Delivery Cloud in a few weeks. This is a maintenance release that includes a few new features and fixes a number of bugs..."
            Cloud Computing
            Cloud computing: Sophisticated solutions led to hybrid clouds
            Companies opt for hybrid models
            According to a study conducted by IDG Connect on behalf of Oracle, most companies have learned how to successfully carry out cloud projects, whereby private cloud models are apparently particularly quick to set up: Almost two thirds of the companies surveyed (60%) reported immediate, or at least fast implementation.
            Q&A: The Cloud Journey with Enterprise Manager
            By Yoav Eilat
            Yoav Eilat writes, "On last week's Enterprise Manager webcast, we had a great opportunity to catch up on the latest product news and hear how Enterprise Manager is helping companies transition to the cloud. We specifically focused on new capabilities around Platform as a Service for databases and middleware. You can still view the webcast on demand.

            As a speaker on the webcast, I really enjoyed seeing the high number of questions in the text chat window ..."

            Open source: Oracle Linux now available as Docker image
            By Mattias Drefs
            Mattias Drefs writes, "Oracle now also officially provides its Linux distribution in the Docker registry hub. In a press release, Oracle explicitly praises the open Docker platform for the opportunities it offers for rapid software development and distribution. By making applications portable beyond clouds and local installations, the platform promotes business growth..."
            Oracle Linux and Database Smart Flash Cache
            Use flash memory to increase the size of the buffer cache

            Wim writes, "One, sometimes overlooked, cool feature of the Oracle Database running on Oracle Linux is called Database Smart Flash Cache.

            You can find an overview of the feature in the Oracle Database Administrator's Guide. Basically, if you have flash devices attached to your server, you can use this flash memory to increase the size of the buffer cache. So instead of aging blocks out of the buffer cache and having to go back to reading them from disk, they move to the much, much faster flash storage as a secondary fast buffer cache (for reads, not writes)..."

            Introduction to Using Oracle's Unbreakable Linux Network
            By Antoinette O'Sullivan

            Antoinette O'Sullivan writes, "Oracle's Unbreakable Linux Network (ULN) is a comprehensive resource for Oracle Unbreakable Linux support subscribers. ULN offers Linux software patches, updates and fixes, along with information on the yum program and support policies. Support subscribers can also download useful extra packages not included in the original distribution.

            Watch this series of 3 videos Introduction to Using Oracle's Unbreakable Linux Network..."

            IT - Cloud
            Zero-Knowledge Cloud Storage: Far From Perfect
            NetworkComputing, February 20, 2015
            "You may get an extra layer of protection with zero-knowledge cloud encryption, but the cloud security system isn't fail-safe. Edward Snowden is probably the most well-known advocate for zero-knowledge cloud storage services. And while zero-knowledge services generally are a step up from cloud services that either aren't encrypted at all or that use shared-key encryption methods, it's far from perfect..."
            Everyone's Going Container Crazy
            Network World, February 24, 2015
            "It's a busy time for container technology in the cloud computing market: IBM this week at its InterConnect conference in Las Vegas announced broad support for containers in its hybrid cloud computing software, while Google partnered with OpenStack distributor Mirantis to enable container technology capabilities in the open source cloud platform.

            Forrester storage analyst Henry Balatzar reported from IBM InterConnect that: 'Everyone is going container crazy'..."

            Cloud Integration Pain
            NetworkComputing, February 23, 2015
            "CDW study shows that integrating cloud services with legacy systems can be a headache for IT pros.

            Cloud computing is always touted as way to cut costs, but IT pros aren't finding cloud services all that cheap when it comes to integrating them with existing IT infrastructure.

            According to a new report released by IT solution provider CDW, IT pros are struggling with cloud integration and migration. Fifty-nine percent said the complexity and cost of integrating cloud services with legacy IT systems prevent them from deploying more cloud workloads..."

            Seven Reasons Your Cloud Deployment Might be Delayed
            Datamation, February 24, 2015
            "Cloud computing has been around for several years now, so people should be getting the hang of it and cloud deployments are a relatively straight-forward process, right?

            Well, not so much. Cloud deployments have a rather high failure rate, or at best can take a lot longer to deploy than expected. One survey from Gartner found that 95% of private clouds fail in some form or another.

            There was no one overarching or dominant problem, either. It's a mixture of problems, and you may get hit with more than one problem along the way. Gartner analyst Thomas Bittman listed six reasons in his report, but we're going one further and listing seven reasons why your cloud deployment may not go as planned..."

            SaaS: disruptive dynamo, slow burner - or both?
            Information age, February 27, 2015
            "There is no doubt that today's cyber security arena is dynamic, fast and under constant evolution - indeed, it is seemingly impossible to keep up with.

            Every day, some breach or another is announced, the next world-ending vulnerability is discovered or the latest big data analytics solution is released that is going to solve everything. It is certainly exciting, but it also increases the risk of not being able to see the forest for the trees.

            In the physical world our typical behaviours in how we secure ourselves easily translate into what we should be doing to secure ourselves virtually. Here are a few examples..."

            RightScale Identifies Trends in Enterprise Cloud Adoption
            GIGAOM, February 25, 2015
            "RightScale recently published the results of its annual survey, State of the Cloud. The report reveals increasing cloud adoption from both enterprises and SMBs, and a preference for hybrid deployments. This post highlights the trends that matter to the supply side of the cloud market-the cloud providers.

            Enterprises are hedging their bets by investing in a multicloud strategy. Indeed, 82 percent of respondents prefer a multicloud deployment to a single cloud platform..."

              IT - CxO
              CIO Leadership Fundamentals: Relationships do Matter
              IT World Canada, February 20, 2015
              "This is the second in a series of short blogs on the CIO basics from a practitioner perspective. First up was getting the CIO strategy properly defined and put in place. The next step is for the CIO to identify and develop the internal and external relationships that are essential for supporting and successfully executing on that strategy..."
              Greetings, Chief Data Officers
              Information Management, February 20, 2015
              "Why are chief data officers (CDOs) in high demand - and how might their roles evolve within large enterprises worldwide? Some intriguing answers surfaced in 'Dawn of the Chief Data Officer (CDO)' - a survey and research report from Experian. The survey involved 254 CIOs worldwide. Here are 10 key takeaways..."
              Rejection Letter Dos and Don'ts: How to Treat People With a Little Decency
              TLNT, February 20, 2015
              "A number of years ago I got rejected for a job.

              I know, I know, you are probably as surprised as I was. The funny part is, I got the hard copy, snail mail rejection letter 18 months after I had apparently applied. I went back into my email to try to figure out what really happened.

              You see, as a Recruiting Pro, I wouldn't actually apply through an ATS, especially for an executive position, which this was. My email confirmed that fact; I had sent the Chief HR Officer of a large organization my resume directly. This rejection letter was from that contact..."

                10 Chief Data Officer (CDO) Trends
                Information Management, February 21, 2015
                "Why are chief data officers (CDOs) in high demand - and how might their roles evolve within large enterprises worldwide? Some intriguing answers surfaced in 'Dawn of the Chief Data Officer (CDO)' - a survey and research report from Experian. The survey involved 254 CIOs worldwide. Here are 10 key takeaways..."
                CIOs Reveal their Worst Nightmare
                CIO, February 24, 2015
                "What keeps CIOs awake at night? Worrying about security, downtime and acquiring the right talent, according to a recent survey.

                Of all the workplace issues keeping CIOs up at night, three in particular are worrisome for IT executives: security, downtime and talent acquisition, according to a December 2014 study of 276 U.S. CIOs and executive IT professionals commissioned by Sungard Availability Services (Sungard AS)..."

                Security implications for the C-suite
                Information age, February 26, 2015
                "Over the course of the last few months, information security has dominated headlines across the media. High profile cyber breaches, pressing EU regulation, educational policy changes and a generational gap in information security skills are all triggers behind intensified board level engagement on the subject.

                However, a lack of understanding around the threat to cyber security, at the board level, remains one of the most significant challenges for organisations..."

                The 5 stages of shadow IT: How to cope with rogue technology
                ITProPortal, February 28, 2015
                "It's easy to think of shadow IT as an enemy to the traditional IT way of life. The name itself can conjure up images of employees lurking in the darkness on personal devices and rogue cloud-based services, quietly undermining the security and control of IT.

                While sometimes these unsanctioned IT solutions can be at odds with what's best for the company, the truth is usually much less sinister. More often than not, shadow IT is just the result of employees trying to find the best way to do their jobs..."

                CIO/CTO Roundtable: The 2015 Outlook
                South Florida Technology Alliance Monthly Meeting - Citrix, Ft. Lauderdale
                Learn from tech thought leaders who are building leading edge software products and services right here in South Florida. Join Paul Martine, Citrix CIO as he moderates a panel to include leading South Florida CIOs. Arrive early and network with your IT colleagues.


                • Paul Martine, CIO, Citrix


                • Joel Steigelfest, CIO, Cross Country Home Services
                • Alexander Sjogren, CTO, Yellow Pepper
                • Patric Edmonson, Senior Vice President, Modernizing Medicine


                • 5:00 pm - 6:45 pm: Registration and Networking
                • 6:45 pm - 8:00 pm: Panel Discussion
                • 8:00 pm - 8:30 pm: Meet the Speakers


                vBeers @ Palm Beach Gardens (Wed, March 4th, 2015)
                6pm - 9pm - Paddy Mac's - Sponsored
                We are starting a new South Florida vBeers on the 1st Wednesday of every month, beginning March the 4th at Paddy Mac's.

                We picked this Palm Beach Gardens location as it is within a 30 minutes drive of many Palm Beach County cities and some Martin County cities.

                This event will be sponsored by the South Florida Technology Alliance (STFA).

                Bring your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community.

                Please share this invitation with your IT colleagues and encourage them to attend!

                Details and RSVP:

                IT - DR
                Can Your Organization Survive a Natural Disaster?
                Risk Management Monitor, February 20, 2015
                "In the wake of a natural disaster, about a quarter of businesses never reopen. Whether due to primary concerns like a warehouse flooding, secondary complications like supply chain disruption, or indirect consequences like transportation shutdown that prevents employees from getting to work, there are a broad range of risks that can severely impact any business in the wake of a catastrophe that must be planned for.

                Planning and securing against natural disaster risks can be daunting and exceptionally expensive, but researchers have found that every dollar invested in preparedness can prevent $7 of disaster-related economic losses..."

                  IT - PM
                  How IT Projects Become 'Groundhog Day' for Insurers
                  Insurance Networking News, February 20, 2015
                  "Insurance industry IT executives, undertaking projects to modernize core systems, improve customer engagement or adapt to the Internet of Things can feel a little like they are in the movie Groundhog Day: They find themselves doing the same things over and over without seeing any real transformation.

                  In the movie, Bill Murray plays Phil Connors, a weatherman assigned to cover the traditional Groundhog Day celebrations in Punxsawtawney, Pa. Phil dreads the occasion and vows he'll soon move on to bigger and better things.

                  But things don't go quite as planned..."

                    Code Watch: The five essential rules of software project management
                    SD Times, February 25, 2015
                    "Although the point of this column is to discuss 'where the rubber meets the road' of software development rather than theory, if you read SD Times, you are most likely managing a software development team or teams. As endlessly challenging as code is, dealing with people is, by far, the harder part of developing software products.

                    Once upon a time, I had a certification for Project Management from some Very Prestigious Project Management Organization. I knew all about PERT and Gantt charts, critical paths, and resource balancing. I won't say that knowledge of such things is useless in software project management, but they are not nearly as important as these five issues:..."

                    IT - Networks
                    Should You Ionize Air in the Data Center?
                    Search Data Center, February 23, 2015
                    "Is air ionization in the data center justifiable for preventive equipment maintenance? Is it worth the hassle and cost?

                    Dust contamination around servers is a growing concern as component densities and heat generation increase, and air flow becomes more complex and critical. Dust buildup on filters and heat sinks can cause overheating.

                    Air ionization reduces the potential for static discharge and captures very fine dust particles from the air, but installation isn't generally useful or a justifiable data center expense..."

                      How Better Log Monitoring can Prevent Data Breaches
                      CIO, February 24, 2015
                      "Recent high-profile data breaches reaffirm that the threat from data thieves is both persistent and pervasive. Could better log monitoring mitigate or even prevent these types of security catastrophes?

                      Evidence suggests that high-profile data losses at major retailers such as Home Depot, Sony, Target and Michaels Stores are a major ongoing trend, not a one-and-done anomaly of the IT infrastructure on which most companies rely..."

                      Three Novel Approaches to Building a Data Center
                      Search Data Center, February 23, 2015
                      "Factors from PUE and build time, to accessibility and amenities, will influence your data center design and construction decisions. Here are three routes to consider...

                      Data center building options have diversified to accommodate a range of locations, business needs, power supplies and expansion.

                      These different approaches to building a data center each demonstrate characteristics suited to a particular use. The traditional facility meets modern IT needs with expandability and flexibility at its heart, while containers and modular prefabricated units enable data centers in new locations, industrial and wild..."

                      Tips to Standardize Your Next Data Center Move
                      Search Data Center, February 23, 2015
                      "With colocation and centralization on the rise, you're likely to take on multiple data center moves in your career. It's time to standardize your process...

                      With consolidation and colocation on the rise, data center operators need standardization for what used to be a once-in-a-lifetime event: the data center move.

                      "People will go out and wing it, but you end up on your third or fourth one and think, 'Why are we doing this alone?,'" said Danny Aldham, senior program manager at TELUS Communications Company, a Canadian telecom provider. "Other people are in the same boat."

                        Can Vendors Go Unescorted In a Secure Colocation Center?
                        Search Data Center, February 24, 2015
                        "You've sentenced your production servers to five-to-life lockdown in a secure colocation cage. Who's allowed to visit them?

                        Unescorted access to colocation facilities is a big NO.

                        That engineer coming in from ABC123 Computer Equipment Inc. to patch your cables is just like any other employee of any company. Can you personally vouch for him? Has ABC123 or its partners vetted the person's background to the extent that the colocation provider would have -- or to the same degree to which you vet employees?.."

                        How Google Avoids Downtime
                        Network World, February 26, 2015
                        "Google offers lots of services and it has pretty good reliability. How does the company do it?

                        Much of that is up to Ben Treynor, Google's vice president of engineering, and founder of the company's site reliability team. And he's developed an interesting approach at Google for thinking about reliability..."

                        Power and Cooling Checklist for a Better Data Center PUE
                        Search Data Center, February 25, 2015
                        "Data center power consumption eats up a large portion of operating costs. These cooling and power changes can help cut back energy use without lessening IT performance.

                        Power is an expensive commodity that's getting even more costly, so it makes fiscal and environmental sense to conserve it in data centers.

                        Even the most efficient Energy Star-rated servers require power. While you will never eliminate data center power consumption, you can increase energy efficiency, reduce computing hardware and cooling energy needs, and get your company a green reputation..."

                        Are New Data Center Cabinets too Heavy for the Floor?
                        Search Data Center, February 24, 2015
                        "We built a data center several years ago and are refreshing the IT equipment in it. Should I worry about how big and heavy my new cabinets will be for the existing structure?

                        Structural analysis is a very complex field of engineering. There's a lot you can figure out yourself, but beyond simple verifications, it's not an amateur's game.

                        The answer varies depending on whether you have a raised or leveled floor..."

                          IT - Linux
                          May the fourth be with you: Torvalds names next Linux v 4.0
                          The Register, February 23, 2015
                          "Linus Torvalds has decided it's time for version 4.0 of the Linux kernel.

                          The Linux lord has been wondering about Linux kernel release numbering for a while, notably in a Google+ post last week.

                          He now seems to have taken the plunge, by declaring that the version of the kernel he's working in is 'Linux 4.0-rc1' in this post to the Linux Kernel mailing list..."

                          5 specialized Linux distributions for computer repair
                , February 24, 2015
                          "Computers are incredible tools that let users doing amazing things, but sometimes things go wrong. The problem could be as small as accidentally deleting files or forgetting a password-and as major as having an operating system rendered non-bootable by file system corruption. Or, worst case scenario, a hard drive dying completely. In each of these cases, and many more like them, there are specialized tools that can aid you in fixing problems with a computer or help you be prepared for when something bad does happen.

                          Many of these tools are actually highly-specialized Linux distributions..."

                          7 Linux Facts That Will Surprise You
                          InformationWeek, February 24, 2015
                          "Here are seven things we bet you didn't know about Linux and why it remains a software project of historic proportions.

                          In the 20 years since Linux 1.0 first appeared, the open source operating system has become one of the major winners in the enterprise data center, alongside Microsoft Windows. Linux also has a presence on the public Internet and in public cloud services.

                          But we don't hear a lot about the ongoing development of Linux. In 2007, Linus Torvalds and the other Linux kernel committers were adding patches to the kernel at the rate of 86 per hour, or 1.43 per minute. InformationWeek reported in 2007 that Linux, then 16 years old, was the largest sustained software project in the world. Dan Frye, an IBM VP who tracked it, then said: "No other open source project has gotten this large or moved this fast. It's a first-of-a-kind developer community."

                          Kali Linux: Wireless Penetration Testing Beginner's Guide, 2nd Edition
                          O'Reilly, February 26, 2015
                          "As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes, and makes wireless testing useful and easy to learn.

                          Building on the foundation of the Backtrack 5 Wireless Penetration Testing Beginner's Guide, this book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example as you implement them step by step, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte. Following this, you will move to more complicated scenarios, and conduct bleeding edge wireless attacks such as WPS hacking, extensions on probe sniffing, and geolocation.

                          If you are curious about what wireless security and hacking is all about, then this book will get you started by providing you with the knowledge and practical know-how to become a wireless hacker..."

                          IT - Operations
                          An Introduction To DevOps From One Of Its Godfathers
                          Forbes, February 23, 2015
                          "Gene Kim was bitten by the entrepreneurial bug early. In 1992, while still a student at Purdue, Kim co-authored an open source tool called Tripwire, which would become a free software security and data integrity tool useful for monitoring and alerting on specific file changes on a range of systems. Kim would become the Chief Technology Officer of Tripwire, a role he would have until mid-2010.

                          In 1999, while still at Tripwire, Kim began to formally study IT organizations, noting the methods used by high performing organizations..."

                          The Million Dollar DevOps Question
                          CMS Wire, February 23, 2015
                          "Everyone is trying to define DevOps. Whether it's a three page white paper or an annotated diagram/model, this is perilous territory as the most vibrant thing in the DevOps movement is its lack of a singular definition (i.e., a litmus test). Instead of asking 'What is DevOps?' maybe we should be asking 'How do you DevOps?'.."
                          Organizational learning: a new perspective on DevOps
                , February 25, 2015
                          "In the DevOps community, we talk a lot about automated deployments, doing multiple deployments per day, and the need for culture. I want to share with you something that isn't talked about nearly as widely, but I think is just as important: the benefits of organizational learning.

                          Let's take a moment to visualize what an organization that has fully adopted DevOps principles and practices might look like.

                          We are able to accommodate a high rate of change that allows us to satisfy our organization and out-experiment our competition. Our changes have short lead times, and we can make changes and deploy code at any time of the day (as opposed to only on Friday at midnight), without organization-paralyzing fear that it will cause massive chaos and disruption..."

                          IT - Security
                          Creating Cybersecurity that Thinks
                          ComputerWorld, February 20, 2015
                          "Until recently, using the terms 'data science' and 'cybersecurity' in the same sentence would have seemed odd. Cybersecurity solutions have traditionally been based on signatures - relying on matches to patterns identified with previously identified malware to capture attacks in real time. In this context, the use of advanced analytical techniques, big data and all the traditional components that have become representative of 'data science' have not been at the center of cybersecurity solutions focused on identification and prevention of cyber attacks..."
                          Don't Wait Until Youre Attacked to Take Cybersecurity Seriously
                          HelpNet Security, February 20, 2015
                          "CISOs foresee cyber terrorism and cybercrime posing significant risks to their organizations over the next three years, according to Raytheon and the Ponemon Institute.

                          The survey of 1,006 cyber security CIOs, CISOs and senior IT leaders also found a lack of resources and a critical disconnect between CISOs and senior leadership are preventing companies from addressing the growing cybersecurity threats..."

                          Top 10 DNS Attacks Likely to Infiltrate Your Network
                          Network World, February 20, 2015
                          "DNS-based attacks are on the rise because many organizations don't realize DNS is a threat vector and therefore don't protect it...

                          The problem with traditional firewalls is that they leave port 53 open, which is for DNS queries. So they are not always effective in protecting against DNS-based DDoS attack such as amplification, reflection, etc. They require extremely high compute performance to accurately detect DNS-based attacks, making deep inspection an impractical approach in terms of cost and the number of distribution points that are needed. Hence traditional protection is ineffective..."

                          Who Cares Who's Behind a Data Breach?
                          Dark Reading, February 20, 2015
                          "Identifying precisely what information was accessed and communicating this information to those compromised is a major first step. A victim who knows that their credit card number has been stolen can act to set up credit freezes or alerts on its use; the longer that notification is delayed, the more time an attacker has to complete their scams and distance themselves from the event. During investigations, evidence should be preserved so that an attempt can be made to identify the culprit later and first response can focus on determining the entire scope of the attack..."
                            With $15 in Radio Shack Parts, 14-Year-Old Hacks a Car
                            ComputerWorld, February 20, 2015
                            "A teenager not even old enough to drive a car was able to wirelessly connect to a vehicle's internal computer network and control various functions.

                            The 14-year-old built an electronic remote auto communications device with $15 worth of Radio Shack parts that were assembled in less than a night.

                            Auto executives at a conference this week sponsored by the Center for Automotive Research revealed how stunned they were by the feat..."

                              4 reasons why physical protection is more similar to cyber security than you think
                              Information age, February 23, 2015
                              "There is no doubt that today's cyber security arena is dynamic, fast and under constant evolution - indeed, it is seemingly impossible to keep up with.

                              Every day, some breach or another is announced, the next world-ending vulnerability is discovered or the latest big data analytics solution is released that is going to solve everything. It is certainly exciting, but it also increases the risk of not being able to see the forest for the trees..."

                              96% Say ISO 27001 is Important for Improving Security Defenses
                              HelpNet Security, February 23, 2015
                              "Already established as international best practice, the information security management standard ISO 27001 has become an effective weapon in the fight against cyber crime. It is therefore unsurprising that 96% of respondents to a new survey say that ISO 27001 plays an important role in improving their company's cyber security defenses.

                              Nearly 70% of respondents say that improving information security was the biggest driver for implementing ISO 27001..."

                              Rebuilding After A Breach
                              Business 2 Community, February 23, 2015
                              "In 2014, the Identity Theft Resource Center reported that more than 85 million confidential files were compromised in data breaches. That's 85 million customers, employees and patients who were failed by organizations they entrusted with their personal information.

                              Those who are exposed must contact their banks, scour their statements for signs of fraud, monitor their credit report and possibly work with law enforcement officials and creditors to reclaim their identity. They won't forget this brush with identity fraud anytime soon and as a small business owner neither should you..."

                                5 Ways to Prepare for IoT Security Risks
                                Dark Reading, February 24, 2015
                                "As the Internet of Things begins to take shape, IT organizations must prepare for change.

                                Enterprises can expect to see some fundamental changes in the information security and data privacy landscape as the Internet of Things (IoT) begins to take shape over the next several years.

                                The sheer diversity of IoT assets and the myriad ways in which they connect with each other and the enterprise network will raise new IT governance and cybersecurity challenges, Verizon said in a status report on the IoT market this week. Dealing with the changes will require a new way of thinking about IT security and management, the report noted..."

                                Are You Overlooking These 5 Critical IT Security Measures?
                                Business 2 Community, February 24, 2015
                                "Let me ask you something: How well equipped is your company to deal with and respond to a potential data breach? On a scale of 1-10. Do you know? Not sure?

                                Experian put out an interesting report regarding data breach preparedness. They found that 23% of respondents believed that their organization doesn't understand what needs to be done following a material data breach to prevent loss of customer and client trust. 30% weren't sure at all and only 14% agreed. That should tell you that if you're not taking proactive steps to prevent and manage data breach, you're not alone.

                                Thousands of companies are overlooking the most basic IT security measures and have little understanding for where to start. Are you one of those companies? Take a moment to explore five of the most commonly overlooked IT security measures and see how you stack up..."

                                Why People Ignore Security Warnings
                                IT World Canada, February 24, 2015
                                "Employee IT security awareness training is one of the most effective weapons CSOs can have in their armoury. But old habits are hard to break.

                                That's what Google realized recently about warnings the Chrome browser is programmed to issue when suspicious SSL certificates are found on Web sites. Most Chrome users ignored the warnings and clicked through, it found..."

                                IT - Careers
                                Oscar Nominees: IT Lessons from the Movies
                                InformationWeek, February 20, 2015
                                "Welcome to a special Geekend slideshow. Every year around Oscar time I talk about the nominated films and the lessons we can learn from them. Believe me, some years are easier than others. I really enjoyed the year that The Social Network was nominated for Best Picture. Made my job easy. The message isn't always quite so direct, but the point remains the same -- movies are a reflection of society. And IT departments are as well. The things we pick to write movies about are the things most important to us.

                                The truth is that the Oscars get this stuff wrong all the time..."

                                  10 Best Tech Jobs In America
                                  CIO, February 24, 2015
                                  "Glassdoor recently released its list of the best jobs in America and 10 of the top 25 jobs listed are in the technology sector. When you combine that with the fact that technology-related careers continue to have unemployment rates lower than national average and, according to BLS statistics, tech jobs are expected to grow 21.5 percent between now and 2022, it's easy to see that the demand for highly skilled technology workers is exploding. It is one of the few areas in the job market that the BLS predicts double-digit growth. So whether you're just entering the tech market or you're looking to make a change, the jobs on this list highlight some of the best that this industry has to offer..."
                                    Employee Assessments: What You Need to Know
                                    Brandon Hall Group, February 26, 2015
                                    "In many sectors, software-as-a-service (SaaS) is radically changing how companies operate and how software suppliers engage with their customers. Yet SaaS is still a slow burner in certain segments.

                                    The SaaS tide is rising and increasingly becoming the norm. In a recent survey of businesses across Europe and America, OC&C found that more than three quarters of organisations are using SaaS applications, and the majority expect to migrate to using more in the future. It's clear that migration to SaaS is in full swing; however, this masks a far more complicated adoption picture playing out below the surface..."

                                    IT - Social Media
                                    8 Examples of Super Useful (Transactional) Push Messages that Can Save Your Users' Day
                                    Business 2 Community, February 26, 2015
                                    "You know what's annoying? Not knowing when your taxi will arrive. Or having to call a restaurant to get an update on your order. Or continuously logging into a website to see if you have new messages.

                                    Ain't nobody got time for that. Can't these hugely valuable pieces of information just be delivered to us automatically, when we need it?

                                    Why yes, yes they can - through transactional push messaging. Are you using these in your app?..."

                                      Social threat intelligence: will Facebook's Threat Exchange have an impact?
                                      Information age, February 26, 2015
                                      "Thinking you might have a problem and knowing you've got a problem are two very different things. Which is why threat intelligence has become such a massive market in its own right, with off-the-shelf security products and services reputed to have created a global market worth over £585 million in 2014, according to IDC.

                                      Good threat intelligence is highly prized but paid-for solutions are expensive, making it hard to justify expenditure. This creates a kind of chicken and egg situation. How do you track or quantify risks to the organisation without the technology to do so?..."

                                      IT - Virtualization
                                      5G boffins break 1Tbps speed limit
                                      Channel EYE, February 25, 2015
                                      "University of Surrey researchers working on 5G mobile broadband claim to have broken the transfer speed limit of 1Tbps (Terabits per second).

                                      Normally when people talk about 5G they are happen to hint at speeds of 10Gbps to 50Gbps (Gigabits per second). Samsung managed 7.5Gbps in a car moving at 60MPH over a distance of 4.35km and using the 28GHz radio spectrum band..."

                                      How to Choose Between Cloud Computing and Virtualization
                                      Search Data Center, February 25, 2015
                                      "When it comes to cloud and virtualization, asking the right questions will help your IT org choose between the two or support a combination.

                                      Cloud computing and virtualization have their merits, but choosing between the two depends on how well an organization fits with each model.

                                      Many organizations are just starting a virtualization journey. IT teams beginning to virtualize systems have many decisions to make, such as whether to follow the usual path to server virtualization first or move directly to a private cloud infrastructure..."

                                      The 'Free VM' and Other Myths that Lead to Sprawl
                                      Search Server Virtualization, February 25, 2015
                                      "Despite the efficiency consolidation brings, even small VMs consume resources; and there are real financial consequences to spinning up new workloads.

                                      Technology allows the virtualization administrator to create a server in minutes, providing a previously unheard of flexibility and enabling IT to move at the oft-increasing speed of business. It's an agility that helps IT shift from a perceived business barrier to a business enabler. However, this new golden age of IT working in lockstep with the needs of the business comes with a price: The continual and sometimes-runaway growth of a virtualized infrastructure..."

                                      IT - Email
                                      6 Internet of Things Building Blocks
                                      InformationWeek, February 22, 2015
                                      "Need an embedded system to whip up an IoT prototype? These six platforms make it easier than ever to get started with embedded programming.

                                      The 'Internet of Things' is, in reality, the rise of embedded systems. Taking a small computer and embedding it in a formerly un-computerized object allows us to control the object, gather data from the object, and ultimately tie the object to other things through a network or the Internet..."

                                      FCC Passes Net Neutrality Rules, Reclassifies Broadband as Utility
                                      PCWorld, February 26, 2015
                                      "The U.S. Federal Communications Commission has voted to approve new net neutrality rules by reclassifying broadband as a regulated public utility, over the objections of the commission's Republican members and large broadband providers.

                                      The commission voted 3-2 Thursday to approve net neutrality rules that prohibit broadband providers from selectively blocking or slowing Web traffic and from offering paid traffic prioritization services. The commission's vote on the new rules prompted loud applause from the audience at the FCC meeting..."

                                      Internet of Things Expected to Quadruple in Size by 2020
                                      Government Technology, February 25, 2015
                                      "Organizations are seeing measurable benefits from Internet of Things (IoT) projects, and the number of overall IoT connections will more than quadruple between 2014 and 2020, according to a Verizon Enterprise Solutions report released Feb. 23.

                                      State of the Market: The Internet of Things (IoT) 2015: Discover How IoT is Transforming Business Results is based on data from a variety of sources, including Verizon usage statistics, customer insights and third-party research...."

                                      IT - Database
                                      PostgreSQL for Data Architects
                                      O'Reilly, February 26, 2015
                                      "PostgreSQL is an incredibly flexible and dependable open source relational database. Harnessing its power will make your applications more reliable and extensible without increasing costs. Using PostgreSQL'sadvanced features will save you work and increase performance, once you've discovered how to set it up.

                                      This book will teach you everything you need to learn in order to get a scalable and optimized PostgreSQL server up and running..."

                                      In-memory computing: current state of play
                                      Information age, February 27, 2015
                                      "There is no doubt that today's cyber security arena is dynamic, fast and under constant evolution - indeed, it is seemingly impossible to keep up with.

                                      Every day, some breach or another is announced, the next world-ending vulnerability is discovered or the latest big data analytics solution is released that is going to solve everything. It is certainly exciting, but it also increases the risk of not being able to see the forest for the trees.

                                      In the physical world our typical behaviours in how we secure ourselves easily translate into what we should be doing to secure ourselves virtually. Here are a few examples..."

                                      IT - Backup
                                      When Backup Is a Disaster
                                      CIO, February 23, 2015
                                      "Shortly after Branndon Kelley joined American Municipal Power (AMP) as CIO, the company's financial system went down.

                                      It took four days to restore the system and Kelley, who had previously consulted with state governments on business continuity issues, immediately started exploring AMP's backup and recovery strategy.

                                      He quickly discovered that there was none. No coherent plan. "We had a whole bag of tricks," Kelley says, including more than 10 different backup systems and processes. There were outdated off-the-shelf packages and hand-coded scripts--none of them documented or interconnected. There were backups of backups, and fewer than half of the backups succeeded on the first try..."

                                      IT - Mobile
                                      Smartphone Wars: Who's Winning Where
                                      InfoWorld, February 20, 2015
                                      "Android dominates the globe and BlackBerry loses everywhere, as iPhone and Windows Phone battle for second place...

                                      It's hard to believe we're eight years into the mobile revolution that the iPhone wrought. But we are. That revolution has played out differently throughout the world, however..."

                                      Digital Wallet: The Future of Pay, and Why You Should Care
                                      Business 2 Community, February 23, 2015
                                      "Dropping coins on a counter or handing over dirty, germ infested paper money may be looked at by future generations as we do towards those who used to trade goats for wheat. Digital wallets are slowly becoming the new mode of tap-and-go consumerism, making fiscal transactions seamless, transparent, safe and incredibly convenient.

                                      It is the future of pay currently in flux and you might want to re-evaluate any technophobias you may have. It is an industry that offers you the opportunity to embrace cryptocurrency, mobile pay and many more digital money opportunities that just may make your life less cumbersome and more streamlined in our ever-changing cyber race..."

                                        Firms Shunning Intrusive MDM Policies: Citrix
                                        IT World Canada, February 23, 2015
                                        "With the growing maturity of mobile adoption in the workplace, companies are moving away from heavy handed mobile device management (MDM) strategies and focusing instead on enabling collaboration and productivity, according to a report released by networking solutions firm Citrix System.

                                        Global mobile device enrollment in the enterprise space grew by as much as 72 per cent last year compared to 2013 figures, according to the Citrix Mobile Analytics Report for the first half of 2015..."

                                        Lack of Trust Is Affecting How Consumers Use the Internet
                                        HelpNet Security, February 23, 2015
                                        "68% of US smartphone users are concerned about having their activity tracked to serve them targeted ads, suggesting that most smartphone users are uncomfortable with the idea of online behavioral advertising (OBA), according to TRUSTe.

                                        However, research also showed that awareness of the AdChoices icon, part of the Digital Advertising Alliance (DAA) Self-Regulatory Program for OBA jumped to 37% - a significant increase from 21% the previous year. This program provides users with more control over their online ad experience with the option to opt-out of personal targeting..."

                                          3 pillars of enterprise mobility in 2015
                                          Information age, February 24, 2015
                                          "The challenges facing IT teams as they try to juggle the pressures of maintaining core IT systems while also meeting demand for new mobile apps..

                                          As mobile app projects evolve in the enterprise, many organisations are developing employee apps that integrate with back-end systems, enabling access to corporate information.

                                          In developing mobile apps for the enterprise, one of the big challenges facing CIOs is how best to achieve secure integration with existing back-end systems that were never designed to interface with mobile devices..."

                                            Two Billion People Worldwide Now Own a Smartphone
                                            Strategy Analytics, February 26, 2015
                                            "According to the latest research from our WSS (Smartphones) research service, global smartphone users reached 2 billion for the first time ever in 2014.

                                            One in three of the world's population now owns a smartphone.

                                            Global smartphone users grew 37 percent from 1.5 billion in 2013 to reach 2.1 billion users in 2014. This is the first time worldwide smartphone users have surpassed the two-billion level. We forecast global smartphone users to increase a further 22 percent to 2.5 billion in 2015. An impressive 35 percent of the world's 7.2 billion population will own a smartphone by the end of 2015, up from 29 percent in 2014..."

                                              Android Dominated the Mobile OS Market in 2014: IDC
                                              Datamation, February 27, 2015
                                              "Is there no stopping Android?

                                              The bulk of all smartphones shipped worldwide last year, 81.5 percent in fact, ran Google's mobile operating system (OS), according to IDC's Worldwide Quarterly Mobile Phone Tracker. That amounts to over 1 billion Android smartphones in 2014, a 32 percent year-over-year gain. By comparison, over 800 million Android smartphones were shipped in 2013, for 78.7 percent of the market that year.

                                              Shipments of iPhones totaled 192.7 million in 2014, earning Apple iOS second place with 14.8 percent of the market. In 2013, the Cupertino, Calif.-based device maker shipped 153.4 million units.

                                              Together, the two technology giants accounted for 96.3 percent of all smartphone shipments in 2014..."

                                              IT - Big Data
                                              What is Bad Data and its Side-Effects?
                                              Business 2 Community, February 21, 2015
                                              "Information and data are the most strategic assets of an organization. The Data Warehousing Institute reports, 'Intellectual capital and know-how are more important assets than physical infrastructure and equipment.' It is critical to harness business data for effectual decision-making, and this blog series will walk you through the savvies of Big Data, and its impact on your Demand-gen and Revenues. So ready to have some Fuel for Marketing?..."
                                              14 Requirements for Real-Time Analytics
                                              Information Management, February 23, 2015
                                              "To build a successful real-time business analytics system, you'll likely need an in-memory database plus several other core technologies. Here's a look at each potential piece of a real-time analytics solution. Special thanks to Wikibon for background information..."
                                              How To Use Data Even If You're Not a Data Person
                                              Business 2 Community, February 23, 2015
                                              "Data is arguably the most important and versatile business asset available to companies today. It can have unrivaled impact on a business' revenue, especially when presented in an easily comprehensible way. It can also help increase engagement with customers, make you more valuable in the eyes of a prospect, and even establish a level of trust that will lend you more favorable ears.

                                              And yet, data is an often untapped resource..."

                                                Whitepaper: Big data helps bust the top three myths of employee engagement and leadership
                                                ITProPortal, February 26, 2015
                                                "Doing more with less has become familiar to many of us - and our workforce is no exception. The World Bank estimates global GDP grew 2.3% in 2012, with expected continued moderate growth in 2013 (The World Bank, 2013). Much of this growth is driven by the human side of the equation. Between 2011 and 2012, 90% of countries saw an increase in productivity i.e., GDP per capita (IMF World Economic Database, 2013). Since 1993, revenue per employee has seen a 3.2% compound annual growth rate compared with little to no growth in revenue per cost of goods sold or per invested capital (CEB, 2013)..."
                                                  Who Owns Your Big Data?
                                                  Information Management, February 24, 2015
                                                  "Open data is critical for delivering contextual value to customers in digital ecosystems.

                                                  For instance, The Weather Channel and OpenWeatherMap collect weather-related data points from millions of data sources, including the wingtips of aircraft. They could share these data points with car insurance companies. This would allow the insurers to expand their customer journey activities, such as alerting their customers in real time to warn them of an approaching hailstorm so that the car owners have a chance to move their cars to safety. Success requires making logical connections between isolated data fields to generate meaningful business intelligence..."

                                                    Riding the Big Data Wave to Success
                                                    Business 2 Community, February 23, 2015
                                                    "Many have argued that the big data wave is the most significant technological development since the foundation of the Internet. Businesses are increasingly finding new ways to leverage the data that they collect to reduce costs, improve productivity, and make better decisions. However, the usage of big data is not limited to large corporations that have the capability of realizing significant scale economies. Small businesses are perfectly capable of leveraging data to more effectively conduct their daily activities and make better planning decisions for the future. This will take a look at the most important information that businesses need to know about big data..."
                                                    IT - BYOD
                                                    BYOD and the enterprise: Why multi-device app support is a must
                                                    ITProPortal, February 26, 2015
                                                    "The proliferation of mobile and the 'bring your own device' (BYOD) movement have provided a means for enterprise IT teams to reduce some hardware and service costs.

                                                    And while enterprise mobility does create some efficiencies as more employees opt to manage their own devices, the BYOD movement is also increasing the urgency to deliver enterprise-grade, mobile apps that work across all these devices, while tying into corporate systems and processes.

                                                    Already, TechPro Research suggests that 74 per cent of organisations now permit employees to bring their own device into work..."

                                                    A faster path to enterprise mobility in a BYOD world
                                                    ITProPortal, February 28, 2015
                                                    "In my previous article, I shared how the proliferation of mobile and the BYOD movement have led to greater urgency for enterprise-grade, multi-channel, multi-device apps.

                                                    Workforce reliance on mobile and tablet devices continues to grow stronger, and by 2018, Gartner, Inc. predicts that more than half of business users will go to a tablet or smartphone first for all online activities..."

                                                    Top Ten Articles for last few Issues
                                                    Vol 204 Issues 1, 2 and 3; Vol 203 Issues 1, 2, 3 and 4; Vol 202 Issue 5
                                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                    • Oracle Continues to Grow Hardware Business 5 Years After Sun Deal
                                                    • Update Your Oracle Linux Kernel with Ksplice
                                                    • How to Install and Use Oracle Solaris 11.2 for x86 from an ISO in VirtualBox
                                                    • Why Oracle Big Data SQL is different
                                                    • Oracle Launches Oracle Hospitality
                                                    • How to Build Software Defined Networks Using Elastic Virtual Switches - Part 1
                                                    • Temenos WealthManager
                                                    • Oracle Advances Vision for Enterprise Big Data
                                                    • How Big Data in Business Will Evolve in 2015
                                                    • BMC Control-M Workload Automation integration with Solaris Cluster 4.2 on Solaris 11.2

                                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                                      IT - Encryption
                                                      NSA Chief Sides with FBI on Encryption, But Says Backdoor Sounds 'Shady'
                                                      Network World, February 24, 2015
                                                      "... at the cybersecurity conference 'New America: Big Ideas and New Voices,' Admiral Mike Rogers, the head of the NSA and U.S. Cyber Command, explained that when he attends such cybersecurity conferences, he is saying, 'Look, there are no restrictions on questions. You can ask me anything.' And bright minds in the audience took him up on that. Yet Reuters reported that other than claiming 'we fully comply with the law,' Rogers refused to comment on Kaspersky Lab's report about the U.S. government using implants on hard drives for surveillance..."
                                                        LibreOffice 4.4.1 'Fresh' and LibreOffice 4.3.6 'Still'
                                                        Available For Download
                                                        The Document Foundation announces LibreOffice 4.4.1, the first minor release of LibreOffice 4.4 "fresh" family, with over 100 fixes over LibreOffice 4.4.0. The release represents the combined effort of the over 900 developers attracted by the project since September 2010, with at least three new developers joining the project each month for 60 months in a row.

                                                        The Document Foundation also announces LibreOffice 4.3.6 "Still", the sixth minor release of the LibreOffice 4.3 family, which is now the suggested version of the software for large deployments in the enterprise and conservative users. LibreOffice 4.3.6 contains over 110 bug fixes. The Document Foundation suggests to deploy LibreOffice 4.3.6 in enterprises and large organizations when backed by professional support by certified individuals.

                                                        Technology Preview available for the Oracle Linux software collection library
                                                        Useful features to both developers and administrators

                                                        Michele Casey writes, "we are announcing a technology preview for the Oracle Linux software collection library. The software collection library provides useful features to both developers and administrators, by providing access to later versions of packages and libraries commonly used in development, such as Perl, PHP and Python.

                                                        Under the software collection library, these packages can be installed on existing systems, without overwriting the base packages delivered by the platform release..."

                                                        From Sublime to NetBeans?
                                                        By Geertjan Wielenga
                                                        Geertjan writes, "What if Sublime were to be less cool than you thought and what if NetBeans were to be faster than you've assumed it to be? Right-clicking on an HTML file on disk and then opening it into Sublime takes 1 second, while with NetBeans IDE 8.0.2, if you're using the small HTML5 & PHP distribution (which doesn't need the JDK, only the JRE) it takes 9 seconds. Is 8 seconds a very big deal? To me, it sounds like NetBeans is an IDE that is 8 seconds away from being as fast as an editor..."
                                                        Enabling Mobile Application Management with Secure Enterprise Single Sign On
                                                        Oracle Mobile Security Suite (OMSS) addresses BYOD challenges
                                                        Carlos Chang writes, "Oracle Mobile Security Suite (OMSS) addresses BYOD challenges by isolating corporate from personal data on consumers' personal mobile devices without needing to lockdown the entire device. Using a technique called containerization; the Oracle Mobile Security Suite creates a Secure Workspace (SWS) in which corporate applications,email and data are stored. Only authenticated users can access the secure workspace to run applications and access data and only applications provisioned or approved by corporate IT can be installed and executed from within this secure workspace. If the device is lost or stolen, corporate IT can remotely wipe the secure workspace without affecting any personal data..."
                                                        Standards Corner: A 'Robust' Schema Approach for SCIM
                                                        System for Cross-domain Identity Management
                                                        Phil Hunt writes, "Last week, I had a question about SCIM's (System for Cross-domain Identity Management) and its approach to schema. How does the working group recommend handling message validation? Doesn't SCIM have a formal schema?

                                                        To be able to answer that question, I realized that the question was about a different style of schema than SCIM supports. The question was assuming that 'schema' is defined how XML defines schema as a way to validate documents..."

                                                        Establishing a Mobile Security Architecture
                                                        New eBook
                                                        Greg Jensen writes, "Today, just as organizations are starting to understand the first wave of the mobile revolution, there are now numerous demands being placed on IT to support the second wave of mobility as a new generation of devices and applications are coming online to take advantage of these new capabilities in today's corporate environments.

                                                        'Establishing a Mobile Security Architecture' provides a deeper understanding of not only the fundamentals, but also the complex issues related to mobile security in today's corporate mobility environment..."

                                                        Nexenta News
                                                        Leading Energy Utility Runs on Nexenta Open Source-Driven Software-Defined Storage Solutions
                                                        Walton EMC Cuts Data Center Costs without Sacrificing Performance
                                                        Walton EMC Cuts Data Center Costs without Sacrificing Performance for Highest Ratings in Customer Service and Satisfaction in the Industry

                                                        Georgia-based Walton Electric Membership Corporation, one of the nation's largest electric cooperatives, uses NexentaStor, Nexenta's flagship OpenSDS platform, in conjunction with VMware to save on storage and maintenance costs. Walton Electric one of the largest of almost 1,000 electric cooperatives in the country and supplies energy to more than 122,000 residential, business and industrial accounts in 10 northeast George counties. The company is known for reliable energy and electric services, delivered efficiently, with extraordinary customer care.

                                                        With only six people in the IT group out of 370 employees, Andy Hill, Director of Information Services at Walton EMC, doesn't have a lot of extra time or resources to be worried about storage.

                                                        Leading University Embraces Cloud Computing With Nexenta Software-Defined Storage
                                                        Nexenta announced the deployment and case study for Northern Arizona University.
                                                        "We kept adding more storage at more cost where the controllers were already having a hard time keeping up, but it felt more like triage than a real solution. We needed to change the way we thought about storage in order to break out of this cycle."

                                                        With a main campus in Flagstaff, NAU accommodates more than 20,000 students, with an additional 7,000 students enrolled in NAU's 36 extended campuses throughout the state of Arizona. Originally founded in 1899, NAU offers 87 bachelor degree programs, 48 master's degree programs and 10 doctoral degree programs, along with 38 undergraduate and 26 graduate certificates.

                                                        Duane Booher, Software Systems Engineer Senior, and Tobias Kreidl, Academic Team Lead are part of NAU's centralized Information Technology Services (ITS) Department. As NAU's academic computing virtualization needs grew, the strain on storage capacity began to manifest itself campus-wide in a variety of ways; one issue was slow user response times due to high I/O latency. The NAU ITS team had already exhausted various tuning options, with little improvement. They also experienced high IOPS during usage spikes that saturated the capabilities of the existing storage array. Furthermore, disk storage capacity was running out; hence the desire to look for a solution that also supported thin provisioning. NexentaStor provided that means, especially when NAU became convinced via testing that NFS performance could equal that of iSCSI in their environment...

                                                        Delivering the Software-Defined Data Center via Open Software-Defined Storage
                                                        Webinar: March 10th, 8am PST
                                                        Nexenta, in partnership with global enterprise storage leader Dell, premier global analyst firm IDC, and the pioneering cloud service provider and Nexenta customer, ScaleMatrix will offer insights into how mobile, social media, enterprise big data and cloud computing are driving demand for greater flexibility, scalability and cost-effectiveness in the data center.

                                                        Attend to hear from a dynamic panel of industry leaders as they share diverse perspectives on the Software-Defined Data Center (SDDC) of the future and the pivotal role of Open Software-Defined Storage (OpenSDS).

                                                        Learn more about:

                                                        • Challenges that face today's modern infrastructures and how to solve them in respective arena

                                                        • The difference between real industry trends and the SDDC hype

                                                        • How OpenSDS can ensure lower TCO and help organizations achieve the power, capacity and space efficiencies they need to operate the data center of the future

                                                        • Real world use cases on OpenSDS


                                                        Trending in
                                                        Vol 234, Issue 2
                                                        Trending IT Articles