News about Oracle's Solaris and Sun Hardware
System News
Mar 2nd, 2015 — Mar 8th, 2015 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 205, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Announces Release of Java Development Kit 8, Update 40
Continues to Invest in World's Leading Programming Language to Deliver Foundation for Today.s Modern Technologies
Demonstrating its continued investment in the world's #1 programming language, Oracle announced the release of the Java Development Kit (JDK) 8, Update 40 (JDK 8u40). From small devices to smart cities, Java powers solutions like no other technology. As such, Oracle is committed to working closely with key partners in the Java ecosystem to continually modernize and deliver new innovations to the Java Platform. This latest release of Oracle's implementation of Java SE, JDK 8u40, brings improvements to performance, scalability and administration, making it easier for Java developers, partners and IT decision makers to innovate faster in a simple, easy manner and improve application services. The release also includes new updates to JavaFX.
SPARC: (Still) Not Dead, Since 1989
by Larry Wake
Larry writes, "Okay, I wanted to talk about IEEE's recent event honoring SPARC; but, before I even get started, I should address a couple of points about the title.

First: when I've written before about our technology history, I've sometimes been asked, 'Should you really be talking about how old such-and-such a thing is?'

Not even a problem here. As far as current enterprise processors are concerned, SPARC's still the new kid on the block:

  • x86? 1978.
  • Mainframes? Still around, as you know. Built on an architecture announced in 1964.
  • IBM POWER? 1990.

And yes: I see that hand waving frantically in the back: 'WAIT! WAIT! But why does the title say '1989'? Wasn't SPARC introduced in 1987?!'

Well, yes. Yes, it was. Gold star for you!

But it's been not dead since 1989..."

Feature of the Week: Liquid Loop Cooling
Fujitsu has brought liquid cooling to the masses
Leveraging their supercomputing background, Fujitsu has brought liquid cooling to the masses. Embedded within the Fujitsu M10 server brochure and technical presentations is a feature called Liquid Loop Cooling.

Liquid cooling has been around for some time - used in data centers, supercomputers, and high-end gaming PCs. It's one of the most, if not the most, efficient ways to cool heat sensitive components. Unfortunately, it can be costly to implement and complex to maintain.

Liquid Loop Cooling, on the other hand, uses a hybrid cooling model. To remove heat, there are six pumps for each processor, which circulate coolant across an air-cooled radiator. The cooling system is sealed and maintenance-free...

Exalogic Run Book
System administration procedures and operational workflows
This blog post is brought to you by Albert Leigh of the Exalogic Product Management team.

The Exalogic Runbook is a compilation of system administration procedures and operational workflows for Exalogic administrators and operators. This document provides operational guidelines and information about what needs to be done after an Exalogic rack has been successfully installed and configured. It is intended for Exalogic virtualized environments. The Runbook is available on My Oracle Support as Document ID 1930293.1 (Operations Runbook For Exalogic Elastic Cloud Software 2.0.6.x.x).

Oracle VM VirtualBox 4.3.24
maintenance release
Oracle has just released Oracle VM VirtualBox 4.3.24, a maintenance release of VirtualBox 4.3 which improves stability and fixes regressions.

See the Changelog for a complete list of changes. Binaries can be downloaded here (at or here (Oracle Technology Network).

FLUX Presentation @ NSU - Next Generation of Identity Management - Thursday March 12th
Einstein's from 6:30PM to 7:30PM; Presentation at 7:30PM
This is a topic that should be of interest to all IT professions including managers, sysadmins, and developers.

Bill Nelson, aka the "IDM Dude", Co-Founder of Identity Fusion, will talk about IRM, The Next Generation of Identity Management.

In today's internet-connected world, employees, partners, and customers all need anytime access to secure data from millions of laptops, phones, tablets, cars, and any devices with internet connections.

Identity relationship management platforms are built for IoT, scale, and contextual intelligence. No matter the device, the volume, or the circumstance, an IRM platform will adapt to understand who you are and what you can access.

In this discussion, Bill will describe the basic pillars of identity relationship management systems, how they differ from identity and access management solutions, and how you can build an identity platform to begin taking advantage of IRM.

Please RSVP at The FLUX group

About Identity Fusion, Inc.

Identity Fusion offers comprehensive services focused on ForgeRock's Open Identity Stack and includes sales, services, and education.

Directions on FLUX website.

IT - Technology
The Next Generation of Identity Management - Identity Relationship Management
IDM Dude, March 1st, 2015
Bill Nelson, IDM Dude, writes, "The face of identity is changing. Historically, it was the duty of an identity management solution to manage and control an individual's access to corporate resources. Such solutions worked well as long as the identity was safe behind the corporate firewall - and the resources were owned by the organization.

But in today's world of social identities (BYOI), mobile devices (BYOD), dynamic alliances (federation), and everything from tractors to refrigerators being connected to the Internet (IoT), companies are finding that legacy identity management solutions are no longer able to keep up with the demand. Rather than working with thousands to hundreds of thousands of identities, today's solutions are tasked with managing hundreds of thousands to millions of identities and include not only carbon-based life forms (people) but also those that are silicon-based (devices)..."

Google AI Teaches itself Atari Video Games
InformationWeek, March 2, 2015
"Using a single learning algorithm, Google's AI agent has developed its video game skills to the point where it can beat most human players in dozens of different games.

With news streaming out of Google this week that seems to show AI can learn, we ask: Where's the John Henry of the computer era?

The Industrial Age legend of John Henry is an apt analogy for our current relationship with robotics. As the story goes, Henry was a steel driver who raced a steam-powered hammer to prove that man could beat machine. According to the legend, which dates to the 1800s, Henry won the contest but his was a Pyrrhic victory. He died as a result of overexertion and machines ultimately transformed the nature of work..."

Toyota Begins Production of Its First Hydrogen Fuel Cell Car
IT World, March 2, 2015
"Toyota this week began production of its first hydrogen fuel cell vehicle (FCV), the Mirai, which will have a starting price of $57,500.

The sedan, being produced at the Motomachi Plant in Toyota City, Japan, will act much like a gasoline powered car at the fuel pump; drivers can pull up, attach a pressurized hose, and fill it the car's carbon-fiber fuel tanks in about five minutes. It can travel up to 300 miles on a full tank..."

    Researchers Make a 3D-Printed Jet Engine
    ComputerWorld, March 2, 2015
    "A group of researchers at an Australian university, along with its spinoff company, have used 3D printing to make two metal jet engines that, while only proof-of-concept designs, have all the working parts of a functioning gas turbine engine.

    The two engines, created by Monash University and its spinoff Amaero Engineering, are garnering a lot of attention from leading aeronautics companies, including Airbus, Boeing and defense contractor Raytheon, which are lining up at the Monash Centre for Additive Manufacturing in Melbourne to develop new components with 3D printing..."

    3D Printers: The Next Wave of Robots
    InfoWorld, March 5, 2015
    "When combined with scanners, today's 3D printers do more than mold figurines out of plastic goop. They're closer to displacing a broad swath of everyday jobs than you think...

    I recently traveled to India with my 10-year-old son for a friend's wedding. I had less than two weeks, three days of which were filled with wedding events, but while there I wanted to do something that's usually cost prohibitive in the United States: I wanted to get a made-to-fit custom suit, sport jackets, slacks, and shirts..."

      IT - Bitcoin
      Bitcoin Investment Trust Becomes the First Publicly Traded Bitcoin Fund
      Bitcoin Magazine, March 2, 2015
      "The Wall Street Journal reports that Barry Silbert's Bitcoin Investment Trust (BIT) is about to become the first publicly traded Bitcoin fund. The BIT will be an interesting option for traditional investors looking for exposure to Bitcoin who prefer not to trade Bitcoin as currency. The BIT is sponsored by Grayscale Investments, a part of Silbert's Digital Currency Group.

      Currently, the BIT, launched in 2013, is a private, open-ended trust that is invested exclusively in bitcoin and derives its value solely from the price of bitcoin. It enables accredited investors, with annual incomes greater than $200,000 or assets of more than $1 million, to gain exposure to the price movement of bitcoin for a minimum investment of $25,000 without the challenges of buying and securely storing bitcoin. BIT-accredited investors are shielded from hacking attacks and unregulated entities, which would be appealing for small investors as well. But the BIT hasn't been publicly available to small investors so far..."

      US Bank Regulator: Virtual Currencies Could Be 'Revolutionary'
      Coindesk, March 4, 2015
      "The head of an independent US agency within the US Treasury that supervises national banks has issued new statements on virtual currencies and their "potentially revolutionary" impact on banking.

      Speaking before the Institute of International Bankers this week, the head of the Office of the Comptroller of the Currency (OCC) Thomas J Curry discussed virtual currency as part of a speech aimed at addressing the Bank Secrecy Act (BSA) and its ability to adapt to new innovations..."

        Could Abra be Bitcoin's 'Killer App'?
        Bitcoin Magazine, March 5, 2015
        "Bitcoin's 'killer app' has long been a topic of speculation. What is the compelling use case that will cause millions to adopt bitcoin, knowingly or unknowingly? It just might be Abra.

        Announced on the final day of Launch Festival 2015, Abra is a company that is looking to take a slice of the $550 billion global remittance market. With legacy companies such as Western Union charging 10 percent and more to remit money internationally, Abra offers the potential for instantaneous money transfers at a fraction of the cost..."

        BTCPoint Creates 10,000 Bitcoin-Enabled ATMs Using Spanish Bank Network
        Coindesk, March 6, 2015
        "Bitcoin-to-cash withdrawals are now available at 10,000 additional bank ATMs in Spain.

        The development is the result of agreements between BTCPoint, major national bank Banc Sabadell and Hal-Cash that will see the bitcoin service integrating with Banc Sabadell, Banco Popular, Abanca and EVO Bank units..."

        SWIFT Panel Sees A Future For Bitcoin In International Banking
        Crypto Coin News, March 6, 2015
        "Bitcoin price has taken a major hit since Mt. Gox, but that has not stopped Bitcoin from building a worldwide infrastructure that has led to massive expansion opportunities. It seems to have traded price for a deeper market penetration, in every sector of modern society. Bitcoin has already made a connection with online consumer payment giant PayPal, and now commercial banking may be its next conquest..."
        With Decentralization, Where is the Money?
        Coindesk, March 7, 2015
        "William Mougayar is a Toronto-based angel investor and four-time entrepreneur who advises startups on strategy and marketing. Here, he discusses where the monetization is behind decentralized business models.

        If we are to strictly follow bitcoin's first principles of decentralization, then very little to no money should be made by the centers.

        Bitcoin, the system, is itself the quintessential decentralized and autonomous ecosystem today. And its center is poor, because it is non-existent as an entity. All of the revenues/profits are being made at the edges of the bitcoin network..."

        IT - FOSS
        10 best uses for open source software in the business world
        TechRepublic, March 5, 2015
        "Certain inevitabilities occur in technology. For instance, open source software will make its way into your business. Ten years ago, this could easily have been called into question. Now? There's no way to avoid it -- and there's no reason to. With so many powerful (and necessary) pieces of technology, open source has become, in various cases, the savior of tech. But what areas of your business are best suited for open source? The answer to that question is, of course, will be different from one company to the next. But some applications can apply in almost every circumstance.

        Let's take a look at 10 possible best-case uses for open source software that can help make your business grow, bring you a level of flexibility and reliability you haven't experienced, or just save you a welcome percentage of your budget..."

        5 Steps for Installing Oracle Database 12c on Oracle Solaris 11
        By Rick Ramsey
        Rick writes, "You can install and run Oracle Database 12c on different platforms, but if you install it on an Oracle Solaris 11 zone, you can take advantage of these capabilities:

        • Isolation
        • Independently Managed and Autonomous Environments
        • Distinctive Identity
        • Easy Database Instance Migration
        • Hard Partitioning

        Ginny Henningsen and Glynn Foster from the Oracle Solaris product management team wrote down the simplest instructions for installing Oracle Database 12c in an Oracle Solaris 11 non-global zone, including how to implement hard partitioning.

        Tech Article: 5 Steps to Installing Oracle Database 12c on Oracle Solaris 11 by Ginny Henningsen and Glynn Foster

        Why SQL is the natural language for data analysis
        87% of enterprises believe big data analytics will redefine the competitive landscape of their industries
        Analytics is a must-have component of every corporate data warehousing and big data project. It is the core driver for the business: the development of new products, better targeting of customers with promotions, hiring of new talent and retention of existing key talent. Yet the analysis of especially 'big data environments', data stored and processed outside of classical relational systems, continues to be a significant challenge for the majority companies. According to Gartner, 72% of companies are planning to increase their expenditure on big data yet 55% state they don't have the necessary skills to make use of it.
        MySQL Workbench 6.2.5 GA
        maintenance release for MySQL Workbench 6.2

        The MySQL developer tools team announces 6.2.5 as our maintenance release for MySQL Workbench 6.2.

        For the full list of bugs fixed in this revision, visit

        For discussion, join the MySQL Workbench Forums:

        Download MySQL Workbench 6.2.5 now, for Windows, Mac OS X 10.7+, Oracle Linux 6 and 7, Fedora 20, Fedora 21, and Ubuntu 14.04, Ubuntu 14.10 or sources, from:

        MySQL Workbench 6.3.1 Beta has been released
        New and enhanced features which are feature complete

        The MySQL developer tools team is pleased to announce 6.3 Beta - the start of the public beta testing phase of MySQL Workbench 6.3

        This release contains a number of new and enhanced features which are feature complete but might still contain bugs. So use them with care.

        IT - Cloud
        8 Rising Stars in Cloud Management
        CIO, March 5, 2015
        "Have you ever been frustrated trying to find the perfect cloud storage service for either work or your personal use? You might pick one, only to have a new feature on a rival service change your mind months later.

        If so, you'll be happy to know that there are a variety of mature, full-featured tools that allow you to work across multiple cloud storage services. Here's a look at some of the most popular ones, as well as others you may not have heard about..."

          'Shadow' Cloud Services Rampant in Government Networks
          Dark Reading, March 2, 2015
          "Survey finds public sector employees use unmanaged cloud services just as much as private employees. Shadow cloud services pose nearly as much of a risk to government organizations as they do to private sector companies.

          Skyhigh Networks recently conducted a study of cloud services usage among 200,000 employees at public sector organizations in the U.S and Canada. The study found that on average, there are some 721 cloud services running inside government organizations at any time, only 61 of which IT is actually aware about..."

            Don't Let the Cloud Become Your Next Data Prison
            InfoWorld, March 4, 2015
            "No one likes being in a prison. Yet the history of enterprise technology is a move to virtual prisons, whether by virtue of choosing to standardize on a vendor (so it's not a prison) or agreeing to lock-in as the only viable solution in terms of affordability or capability.

            Even when they willingly shut out themselves, enterprises have eventually escaped these prisons. At one point, for example, IBM dominated mainframes, and companies accepted the resulting lack of freedom. Then came midframes, followed by client-server computing, and enterprises clawed their way to freedom, where they had wide vendor choice and complete control over on-premises servers..."

            Cloud Service Providers must Guarantee Zero Down Time
            CIO, March 5, 2015
            "When government agencies go shopping for a cloud services provider, they are looking for a vendor that can guarantee the highest possible degree of reliability.

            In a panel discussion this week, senior government IT officials said they have zero tolerance for downtime, and are expecting vendors to include strong performance guarantees in their service-level agreements..."

            IT - CxO
            7 Dirty IT Words: Don't Say These In the C-Suite
            InformationWeek, March 2, 2015
            "Are you using dirty words at work?

            We're not referring to those dirty words -- you know the ones we mean. (And if you don't, the Internet is a wonderful tutor in foul language.) You (hopefully) don't need to be advised that it's not a great idea to walk around your office barking all manner of profanities, bathroom jokes, and other inappropriate vocabulary..."

              Why CSOs Should Plan for the Future
              IT World Canada, March 2, 2015
              "It is the nature of many security pros to look to the past to prepare the organizations IT defences. After all, there's never a shortage of historical data spewed out by everything on the network.

              But an expert says chief security officers and risk managers instead should use tools and skills in a new discipline called strategic foresight to look into the future.

              That's the message Satyamoorthy Kabilan, director of national security and strategic foresight at the Conference Board of Canada, gave this week at a conference in Toronto on enterprise risk management..."

              Is the CIO Job Stretched to the Breaking Point?
              IT Knowledge Exchange, March 2, 2015
              "The job of the CIO has always been a big topic for us on SearchCIO. Over the years we've kept close tabs on what the CIO job entails and read the tea leaves on where it is headed, examining, among other parameters: reporting structures (Remember when it was considered the kiss of death to report to the CFO?); salaries; bonuses; C-suite alliances (e.g, the current notion that CMOs and CIOs should be best friends); potential rivals for the top IT job (chief data officer, chief digital officer); career blunders (talking about uptime using the numeral 9)..."
              7 Warning Signs an Employee Has Gone Rogue
              CSO Online, March 2, 2015
              "For all the emphasis on tools and gizmos, IT is still very much about the people who develop and use said tools and gizmos. Collaboration, mutual respect, passion for the work -- all this and more are essential to a beneficial outcome, whether your IT group is shipping code, swatting bugs, working with business users, or securing company systems.

              But as technology becomes more powerful and computer systems become increasingly rife with sensitive data, one facet of the people side of IT finds itself under increased scrutiny: Trust..."

                How to Tell If You're a Micromanager (and How to Stop)
                IT World, March 2, 2015
                "Micromanagement may seem harmless, but it's sabotaging your teams, your productivity and morale from within, and stifling your business's ability to grow. Here's how to tell if you're a micromanager, and some steps you can take to overcome this fatal flaw.

                Are you never quite satisfied with your team's results? Do you avoid delegating at all costs, often taking on work that's far below your experience and talent level just because you're certain no one else can do it as well as you can? Are you constantly demanding status updates, progress reports and check-ins? It's time to face the facts: You're a micromanager..."

                  3 Engagement-Enhancing Conversations Every Manager should Have
                  TLNT, March 2, 2015
                  "In Three Critical Conversations That Boost Employee Engagement, we described three types of conversations that provide managers with valuable information about how to bring out the best in each employee.

                  But, there are more conversations you need to have:

                  • The Expectations Conversation;
                  • The Aspirations Conversation; and,
                  • The Preferences Conversation.

                  Read on.

                    Is it time to shift from Dev-to-Cloud to Enterprise-to Cloud?
                    Forrester, March 3, 2015
                    "The majority of large enterprises are using cloud platforms now but few have shifted this use from their DevOps team over to central IT - but will in the next 1-2 years. When you do, you should quickly get your networking team involved as most of the Dev-to-Cloud connections that have been put in place by your developers may not meet your corporate security or WAN performance standards. This is a key finding in the latest report from myself and Andre Kindness that is now available to clients at"
                    Chief Data Officers: Shaping One of the Newest Positions in Government
                    Government Technology, March 4, 2015
                    "Data is the watchword, the new tool by which governance can be managed. Crunch enough numbers hard enough, the logic goes, and you'll get something meaningful, something that can guide civic efforts in diverse arenas.

                    Who will gather, sort and crunch those numbers? Increasingly it is the chief data officer (CDO), a rising class of officials with an often broad mandate to convert data into actionable intelligence. Such a position has its advocates...

                    Revealed: the true scale of legacy IT
                    Information age, March 4, 2015
                    "If your organisation struggles with legacy IT, you're not alone- many of the world's major institutions rely on ancient, creaking systems to run vital services...

                    The pace of innovation can be relentless, as IT constantly strives for technology that can work faster and better. It might be surprising then, that many of the most important and bital organisations and services in the world, such as the US Navy, the NHS's Centralised Blood Supply System, and the Department of Work and Pensions' Paymet Service run on outdated, legacy IT..."

                      Five takeaways for CIOs from this year's MWC
                      PCWorld, March 6, 2015
                      "A broad range of companies at Mobile World Congress this week have teamed up to improve smartphone security and offer better software integration for Internet-of-things deployments.

                      The conference in Barcelona covered a wide range of topics, but for enterprises the most important issues were IoT and how enterprise resources can be made available on smartphones without sacrificing security.

                      Here are some of the trends and announcements from this year that will have an impact on enterprise mobility:..."

                      President's Message
                      Dr. James Parrish
                      With only one week left till our CIO/CTO Roundtable, I recommend registering here as soon as you can. We'll learn about some of the coolest work being done by local companies. Our CIO/CTO Roundtable: 2015 Outlook will cover what's hot with trending technology.

                      Hope to see you there.

                      Dr. James Parrish

                      President, South Florida Technology Alliance


                      CIO/CTO Roundtable: The 2015 Outlook
                      South Florida Technology Alliance Monthly Meeting - Citrix, Ft. Lauderdale
                      Learn from tech thought leaders who are building leading edge software products and services right here in South Florida. Join Paul Martine, Citrix CIO as he moderates a panel to include leading South Florida CIOs. Arrive early and network with your IT colleagues.


                      • Paul Martine, CIO, Citrix


                      • Joel Steigelfest, CIO, Cross Country Home Services
                      • Alexander Sjogren, CTO, Yellow Pepper
                      • Patric Edmonson, Senior Vice President, Modernizing Medicine
                      • Bryan Dennstedt, CTO, MDLIVE


                      • Thursday, March 19, 5:00 - 8:30 pm


                      • 5:00 pm - 6:45 pm: Registration and Networking
                      • 6:45 pm - 8:00 pm: Panel Discussion
                      • 8:00 pm - 8:30 pm: Meet the Speakers


                      vBeers @ Broward - Funky Buddha - Wed March 11
                      6pm - 9pm (Sponsored Pizza and Beer)
                      Please join us for the next vBeers @ Broward. We meet on the 2nd Wednesday of each month in Broward County, Florida, USA.

                      The next Broward meeting will be at the Funky Buddha Brewery, which is located in Oakland Park, just a few minutes East of I-95.

                      This event will be sponsored by Volico and Nexenta. Volico Hosting will be buying the beers and Nexenta will provide pizza! Bring your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community. Please encourage to IT friends and colleagues to attend!

                      • Funky Buddha Brewery
                      • 1201 NE 38th St
                      • Oakland Park, FL 33334

                      Please RSVP at the vBeers South Florida page.

                      Join us for one of the four South Florida vBeers events. The South Florida vBeers events happen three times a month, once per county:

                      Details @ ...

                      IT - PM
                      The 11 People You Meet on (Nearly) Every Open Source Project
                      IT World, March 2, 2015
                      "Open source projects are built collaboratively, across organizations, by professionals and hobbyists alike. This is a formula for a colorful cast of occasionally exasperating characters. In the spirit of this list of terrible IT archetypes I compiled last year, I asked people who had been involved in open source development in the past what types -- good or bad -- they had encountered in their professional travels. While I heard some complaints, I also got a sense of the type of people open source developers like encountering the most; let those be your models..."
                      Project Management Screw-Up 6 - The Team didn't Gel
                      Project Management Advisor, March 2, 2015
                      "To me, a well-structured project team where each team member understands their role in making the project successful is like the musicians playing in a band. Each project team member knows what they need to contribute to the project, when they have to perform, what other project team members are doing on the project, and what it takes to be successful. Just as important, each of the project tea.."m members helps each other to ensure overall project success..."
                        6 Essential Leadership Responsibilities that Build Effective Teams
                        TLNT, March 3, 2015
                        "Everybody in business, at one time or another, and probably more than once, has witnessed the results of poor leadership: listless and confused employees leading to stagnating sales, excess costs, and crumbling profits.

                        It happens at every level of the organization, from frontline supervisors right through the top echelons.

                        Teamwork is key, but it doesn't happen automatically.

                        To create a fully functional team, the leader needs to exhibit six (6) leadership traits:..."

                          Webinar: Software in Silicon - Register Now
                          March 18, 2015
                          Join us on March 18, 2015 for a FREE Webinar on "Software In Silicon" hosted by Oracle experts, Angelo Rajadurai and Mike Mulkey.

                          Oracle ISV Engineering is offering an exciting opportunity to learn about the NEW offering for developers who want early access to the revolutionary Software in Silicon technology in the forthcoming Oracle SPARC M7 processor running Oracle Solaris 11.

                          What Will You Learn?

                          By listening to this webinar, you'll learn how to:

                          • Use the NEW Software in Silicon Cloud to dramatically improve reliability and security.
                          • Accelerate application performance in today's market.
                          • Software in Silicon implements accelerators directly into the processor to deliver a rich feature-set that enables quick development of more secure, robust, reliable, and faster databases and applications.

                          With the Oracle Software in Silicon Cloud, developers can have a secure environment in which to test and improve their software, as well as exploit the unique advantages of Oracle's Software in Silicon technology.

                          IT - Networks
                          BGP Security: No Quick Fix
                          NetworkComputing, March 2, 2015
                          "The routing protocol is plagued by multiple security vulnerabilities, which attackers are exploiting. However, securing BGP is no small feat.

                          Border Gateway Protocol (BGP), which is the routing protocol different networks use to find communication paths to each other, was not designed with security in mind. It has security vulnerabilities that nefarious individuals and governments can and do exploit, causing varying degrees of damage..."

                          NFV Home Lab: Licensing, Storage & Networking
                          NetworkComputing, March 2, 2015
                          "In the second part of this two-part blog, Ethan Banks describes the storage and networking considerations that come into play when building a lab for testing network functions virtualization.

                          In my last blog post, I described how I built a lab for testing network functions virtualization (NFV), and the pros and cons of various configuration options. In this post, I'll discuss issues to consider in your NFV lab -- licensing, storage and networking -- and provide tips based on what I found worked best in mine. I'll also provide a short list of NFV appliances to get started in your lab...."

                            Is It Possible to Determine If Your Internet Connection Has Been Hijacked?
                            CSO Online, March 2, 2015
                            "The title of this post is a question sent to XSS by reader after this blog covered the removal of Superfish two weeks ago.

                            Other readers sent in questions related to the topic of SSL connections and Man-in-the-Middle attacks, all hinging on the same premise - how can the average person, someone who isn't technical - tell if their connection has been altered?

                            Unless you're familiar with the topic and the technology involved, SSL / TLS is a complex subject that's hard to explain. The basic thing you need to remember is that SSL / TLS is what turns HTTP into HTTPS in the browser's address bar..."

                              5 Signs That the Firewall's Not Dead Yet
                              Dark Reading, March 2, 2015
                              "Demise of firewall is a long way off, according to recent survey results.

                              It's been nearly two decades since the security pundits declared the death of the firewall, and yet the technology still lives on. Like tape storage and mainframes, firewalls are just the type of technology that continues to not only survive, but thrive in the IT ecosystem, due to their established role in the network. And a new survey out by firewall management firm Firemon offers some compelling evidence that firewalls will continue to be integral to IT security strategies for many years to come..."

                              Will Network Disaggregation Play In the Enterprise?
                              Network World, March 2, 2015
                              "Disaggregation seems to be all the rage in networking these days.

                              HP is the latest to decouple merchant silicon-based hardware from operating system software, following Dell and Juniper. The strategy is to attract web-scale companies like Google, Facebook and Amazon who need the flexibility, choice, rapid deployment/decommissioning and cost efficiency of commodity 'white box' switches capable of running a variety of software packages..."

                              Ten Recommendations to Improve Your NFV Network Evolution
                              Search SDN, March 2, 2015
                              "To remain competitive, leading service providers are focused on introducing new services and reducing costs. The development of network functions virtualization (NVF) technology is helping them transform their networks, with the promise of greater flexibility, agility and cost savings. To help plan for the transition, here are 10 ways providers can leverage NFV's benefits.

                              But first, if you're just starting to evaluate the technology, the NFV network leverages IT technologies -- including virtualization, standard servers and open software -- to fundamentally change the way networks are built and operated. The key benefits service providers will gain from NFV implementation include faster time to market, new service enablement, the ability to rapidly scale resources up and down, and reduced capital and operating expenses..."

                                Firewall: The King of Network Security
                                HelpNet Security, March 3, 2015
                                "A new FireMon report, based on a survey of over 700 network security practitioners, reveals that firewalls remain highly strategic to organizations' current and future security strategies - with an overwhelming 92 percent of respondents indicating that firewalls will stand as a 'critical' component of their security infrastructures for the foreseeable future.

                                This prevailing view is not without challenges as the study also found significant, persistent and widespread management issues, most notably related to firewall policy complexity..."

                                SDN Controller Handbook
                                Network Computing, March 3, 2015
                                "This guide to SDN controllers describes the options available via open source software, traditional networking vendors and SDN startups, and how they differ.

                                As the concept of software-defined networking gains traction and you think about SDN deployment in your organization, the number of choices available may be baffling. There are a number of open source SDN options, and it seems every traditional networking vendor has jumped into the ring with its own products or platform. Then there are the SDN startups, which are too plentiful to count..."

                                IT - Linux
                                Want an IT job? Brush up on your Linux skills
                                TechRepublic, March 4, 2015
                                "Demand for IT professionals who know their way around a Linux terminal has grown to the point where firms are struggling to fill roles. Of the 1,000 hiring managers and Linux professionals surveyed by Dice and the Linux Foundation almost 9 out of 10 said they had found it difficult to fill 'Linux-based positions'.

                                The majority of hiring managers (70 percent) say their companies have increased incentives to retain Linux talent, with 37 percent offering more flexible work hours and telecommuting, and 36 percent increasing salaries for Linux pros more than for other workers..."

                                Linux Remote Desktop Roundup
                                Datamation, March 2, 2015
                                "Over the years I've found that a significant hurdle to getting family and friends to switch to Linux comes from its lack of familiarity. This is especially true when it comes to troubleshooting any issues. Obviously, when a malfunction occurs it's not always possible to be there in person.

                                However thanks to the wonders of broadband Internet and advanced software, we're now able to do the next best thing. In this article, I'll share some recommended remote desktop software for Linux. I'll explore both open source and closed source solutions..."

                                6 Linux-y announcements from Mobile World Congress
                                ITWorld, March 2, 2015
                                "I earlier wrote about how Linux invaded CES 2015. The domination continues at Mobile World Congress, which kicked off this week in Barcelona. Here are some of the major announcements from MWC that show that Linux has become an unstoppable force."

                                • Ubuntu Phone
                                • Android
                                • Firefox OS
                                • Sailfish OS
                                • Cyanogen OS
                                • WebOS

                                Read on.

                                IT - Operations
                                Five Ways Next-Gen Data Centers Will Be Different from Today's
                                Data Center Knowledge, March 2, 2015
                                "Cloud and virtualization will become the normal for the modern data center as new technologies improve density, efficiency and management. There is clear growth in both virtualization and cloud services all over the world.

                                In fact, a recent Gartner report says that cloud computing will become the bulk of new IT spending by 2016..."

                                DevOps will become mainstream among the Global 2000 by 2016 - Gartner
                                Information age, March 5, 2015
                                "By 2016, DevOps will evolve from a niche strategy employed by large cloud providers to a mainstream strategy employed by 25% of Global 2000 organisations, analyst firm Gartner has predicted.

                                Although DevOps emphasises people and culture over tools and processes, implementation utilises technology. As a result, Gartner expects the total for DevOps tool sets to reach $2.3 billion in 2015, up 21.1% from $1.9 billion in 2014..."

                                IT - Security
                                Who 'Owns' An Investigation Into a Security Breach?
                                CSO Online, March 2, 2015
                                "Experts agree that ownership of an investigation depends on what happened, but an advisory council says no matter who owns it, it needs 'Unified Risk Oversight' to be effective...

                                The last things an organization needs when launching an investigation into any kind of security breach are confusion and disorganization.

                                If it is not clear who is really in charge, or what responsibilities fall to what departments, that is adding trouble to trouble.

                                But that, according to the Security Executive Council (SEC), an Atlanta-based research and advisory firm, is too often the case..."

                                Is Your Security Software Sitting Unused on the Shelf?
                                CIO, March 2, 2015
                                "Your security software isn't working? It could be because your company is one of the many that doesn't actually use the products they buy. Getting IT involved early in the purchasing process and turning to cloud could help fix the problem.

                                When a company invests thousands of dollars in security software, you'd expected the product to be used to protect the company.

                                However, a recent study produced by Trustwave a security services company, shows that in 2014 almost a third of midsized companies bought software they barely or never even used..."

                                Why Our Bad Mental Diet Leads Us to Question If Security Even Matters
                                CSO Online, March 2, 2015
                                "Faced with relentless waves of negative information about the state of security today, it's easy to get discouraged and question if our efforts even matter...

                                'I guess that just proves that what we do in security doesn't matter. Maybe we don't matter.'

                                This sort of response tends to pop up when the industry is presented with evidence that security breaches don't create any or lasting harm for companies and consumers.

                                Does the evidence in those reports suggest we don't matter?..."

                                For Cloud Security, It's Not the Hackers You Should Fear
                                InfoWorld, March 2, 2015
                                "When I talk to reporters, they seem to focus quickly on security concerns around cloud computing, especially the public cloud. Mostly they cite recent well-publicized breaches such as Sony Pictures, Home Depot, and more recently, Anthem.

                                They got hacked, so clouds are more vulnerable, right? Wrong..."

                                The Business and Social Impacts of Cyber Security Issues
                                HelpNet Security, March 2, 2015
                                "With multiple recent high profile attacks targeting household names and large employers, individuals increasingly fear cyber crime and its resulting consequences at work as well as at home, according to GFI Software.

                                The survey revealed that 47 per cent of respondents have been the victims of at least one cybercrime in the last year alone. Credit card fraud was the most prevalent form of cyber crime, with 20 per cent of respondents having been hit in the last year, followed by 16.5 per cent having at least one social media account breached or defaced.

                                Key findings from the survey include:..."

                                  Cyber is a Global Team Sport
                                  AFCEA Signal, March 2, 2015
                                  "U.S. Department of Homeland Security Science and Technology Directorate officials are helping other nations create cyber testbeds that can be linked, forming one large, international virtual laboratory for cyber systems. In addition, they already have in place bilateral agreements with a number of countries and are in discussions with France, Spain, Germany, Mexico and South Korea, which ultimately could expand international cooperation on cybersecurity research and development..."
                                  For User Data Privacy: Think Globally, Act Locally
                                  Business 2 Community, March 2, 2015
                                  "As U.S. organizations become more cognizant about the need to protect the data they collect, they learn how poor the guidelines, laws, and compliance methods are. The U.S. laws are more sectoral. If you really want to adopt a holistic data privacy standard that protect your users - and your organization - look more to the European Union for useful guidance.

                                  Enterprise organizations today are very aware of the importance of IT security. Plenty of data breaches, security vulnerabilities, hacking attempts to compromise systems, and software development defects have driven home that message. As a result, most IT organizations have put practices into place to protect the organization from 'bad guys' who are trying to break in.

                                  However, only recently have most large corporations (and small ones, too) put attention on data privacy: the responsibility for the organization to control access to personally-identifiable information that is collected during the process of doing business..."

                                  It's Not Security that Should Worry You. It's Data Privacy.
                                  Business 2 Community, March 3, 2015
                                  "Security and privacy are not interchangeable, and we must have both in order to protect our data and to live up to our obligations as data stewards. So what's the difference between the two? It's an important one.

                                  Anthem, Sony Pictures, Target - It seems like we can't turn around today without bumping into another data breach. Security consumes IT mindshare. We endlessly debate things like firewalls, encryption, and malware detection, and we focus relentlessly on keeping the bad guys out..."

                                  Compliance & Security: A Race to the Bottom?
                                  Dark Reading, March 3, 2015
                                  "Compliance has been a buzzword in the cyber security industry for quite some time now. Many organizations have dedicated teams with the sole purpose of ensuring that their systems are in compliance with industry-regarded best practices, standards, and guidelines. We race toward compliance not fully understanding to what extent it impacts our overall security posture. Along this race many fail to realize that compliance doesn't necessarily lead to systems being more secure..."
                                  8 Steps to Secure Your Data Center In the Distributed Computing Era
                                  InfoWorld, March 3, 2015
                                  "It's no secret that information security has failed to keep up with the speed of business and IT. While data centers have become increasingly dynamic, accommodating rapid application changes and on-the-fly deployments that span private and public clouds, security has remained relatively static, based on perimeter appliances like firewalls or other network chokepoint devices that leave the insides of the data center vulnerable to attack..."
                                  3 Ways to Advocate for Data Security at Your Company
                                  HelpNet Security, March 4, 2015
                                  "There's an unfortunate tendency among many businesses to rank data security well below other functions. It's a familiar story: firms slash resources at the first sign of a budget shortfall and otherwise invest anemically in security personnel or tools. 'If we're in compliance with industry rules or regulations,' says leadership, 'that's enough.'

                                  But it's not enough. Often, those rules and regulations are slow to adapt to a turbulent data security landscape. Still more often, organizations aren't as compliant as they imagine themselves to be. But most crucially, every business has a unique set of risks determined by their particular goals, assets, resources, and challenges. If a security strategy isn't tailored to the needs of a given organization, there will be cracks in their armor - and likely big ones. By taking a generic or low-impact approach to security, companies expose themselves and their customers to serious risks, which can result in big costs to both their reputation and the bottom line..."

                                  Forensic Files: Lessons from Real Cases
                                  Information Management, March 4, 2015
                                  "In a recent investigation at a large US-based corporation, FTI Technology's team of computer forensics specialists was asked to collect data from every mobile phone, USB device, computer and cloud source used by the company's employees in order to piece together the clues surrounding a suspected fraudulent business transaction. Another matter this year involved a client's request to collect information from its corporate Facebook page, which included the requirement to go back in time and recover historical and deleted data that was no longer resident on the site..."
                                  The paranoid CISO
                                  CSO Online, March 4, 2015
                                  "It is often said that for information security, the absence of failure does not mean success. Put it another way the security team has to be constantly vigilant and always watching for the current and next threat that may come our way. Just because there is no noise on our security sensors does not mean we are not under attack. Enter the ever-vigilant and paranoid CISO..."
                                  IT - Careers
                                  3 Reasons Why We Fail to Recognize Women in Tech
                                  Business 2 Community, March 2, 2015
                                  "What gender comes to mind when you think about professionals in the tech industry? Let's be honest - the tech field primarily consists of men. In fact, according to a recent study conducted by The New York City Tech Ecosystem, men outnumber women 7 to 3 in tech jobs in New York city, as well as nationwide. So what's the reason for the great gender divide between men and women in tech?

                                  The proof is in the number pudding

                                  As a young woman who has worked at tech startups for the past few years, I have always wondered why there is a lack of women present in such an advancing and innovative field. Don't more women want to be a part of shaping the future of technology? I would think so, yet statistics illustrate the opposite. The numbers of women in STEM fields (science, technology, engineering, mathematics) are dismal - and rather embarrassing.

                                  Here are 3 figures that show why people might fail to recognize women in science and technology:..."

                                    Future-Proof Your IT Career: 8 Tech Areas that Will Still Be Hot in 2020
                                    Network World, March 2, 2015
                                    "It's prudent for IT pros to cultivate skills that are in high demand. Even better are skills that will stay in demand. Here are eight key technology areas that show no signs of falling out of favor.

                                    Smart companies have corporate road maps that spell out where they'd like to be three, five and 10 years out, how they're going to get there, and how technology fits into that vision. As a smart IT professional, can you say how your skills and position figure into your company's plans -- or the industry's as a whole?..."

                                      7 IT Career Risks Worth Taking
                                      CIO, March 4, 2015
                                      "Whether you're just starting out in your tech career or you're a seasoned IT veteran, knowing when to take risks can mean the difference between success and failure. Here are seven chances worth taking at any stage of your career...

                                      Nate Good knows a thing or two about risk. The 30-year-old passed up the more traditional IT career path that would have taken him to Silicon Valley and, instead, took a series of calculated risks that propelled him to the rank of CTO of ShowClix, a full-service ticketing and event management company based in Pittsburgh, Penn., at an age when many of his peers are still struggling to find their place in the corporate world..."

                                      IT - Virtualization
                                      Five Rules to Ease VM Provisioning
                                      Search Server Virtualization, March 2, 2015
                                      "Incorrectly sizing a VM can lead to poor performance or wasted resources. Implementing a formal VM provisioning process and taking these five rules can help mitigate the risks.

                                      It's not that application and server administrators set out to abuse the system and intentionally overprovision VMs. Instead, they want to provide the best possible experience for end users. Oftentimes this means following vendor guidelines for installing applications. Those recommendations, though, are nothing more than guidelines or minimums to help the VM provisioning process..."

                                      IT - Email
                                      How to Reduce Spam & Phishing with DMARC
                                      Dark Reading, March 2, 2015
                                      "Providers of more than 3 billion email boxes have taken up a new Internet protocol to help put trust back into electronic messaging.

                                      While email is a mission-critical communication channel for most companies, it has also become an untrusted one. Thanks to spam and phishing scams, users are taught to be wary of incoming messages. This lack of trust impacts a company's ability to effectively communicate, market, and sell to customers via email. DMARC (Domain Message Authentication Reporting and Conformance) stands to change all that..."

                                      8 Ways IoT will Change IT Forever
                                      InformationWeek, March 3, 2015
                                      "There has been a great deal of discussion lately surrounding the concept of how the Internet of Things (IoT) will change everything. But very little of it really dives into the nuts and bolts of how IoT could dramatically change the roles and opportunities for those of us who work within IT. Here are eight ways we think IT will change in an IoT world..."
                                      Announcing Oracle Hierarchical Storage Manager
                                      StorageTek Storage Archive Manager 5.4 (SAM-QFS) has been renamed
                                      Due to recent enhancements and importance within Oracle's storage portfolio, StorageTek Storage Archive Manager 5.4 (SAM-QFS) has been renamed to Oracle Hierarchical Storage Manager (Oracle HSM) 6.0.

                                      Key points to note:

                                      • The functionality of Oracle HSM 6.0 is identical to that of SAM-QFS 5.4
                                      • There are no changes to partner resell requirements. Oracle HSM resell rights are granted through the Tape, NAS, or SAN storage knowledge zones.

                                      SAM/HSM is the critical component to the popular Tiered Storage Specialization, and has a wide variety of use cases including:

                                      • Cloud infrastructure using OpenStack Swift
                                      • Genomics data
                                      • Geospatial data
                                      • Medical images
                                      • Research data
                                      • Public transportation records
                                      • Content management
                                      • Oracle Recovery Manager (Oracle RMAN) backup

                                      The latest release included significant enhancements...

                                      IT - Backup
                                      Four New Features that Will Keep Backup Software 'Sticky'
                                      DCIG, March 6, 2015
                                      "Backup software has traditionally been one of the stickiest products in organizations of all sizes in art because it has been so painful to deploy and maintain. After all, once it was installed and sort of working, no organization wanted to subject itself to that torture again. But in recent years as backup has become easier to install and maintain, swapping it out for another or consolidating multiple backup software solutions down to single one has become much more palatable. This puts new impetus on backup software providers to introduce new features into their products to keep them relevant and 'sticky' in their customer environments longer term..."
                                        IT - Big Data
                                        Process Trumps Innovation in Analytics
                                        Ventana Research, March 2, 2015
                                        "The idea of not focusing on innovation is heretical in today's business culture and media. Yet a recent article in The New Yorker suggests that today's society and organizations focus too much on innovation and technology. The same may be true for technology in business organizations. Our research provides evidence for my claim..."
                                          Exploiting Big Data Could Save The European Commission Up To 200bn Euros A Year
                                          ComputerWeekly, March 2, 2015
                                          "Achieving a digital economy is a clear goal for Europe, but there are several key challenges that need to be met first, says Marta Nagy-Rothengass, head of data value chain unit at the European Commission (EC).

                                          'Data has become an economic and societal asset, but it has to be handled accordingly, taking into account both the opportunities and risks,' she told the Trust in the digital world conference in Madrid.

                                          One of the biggest challenges is establishing secure infrastructure to enable the data-driven economy that the EC sees as vital to decision making, job creation and economic growth..."

                                          Big Data Until the Cows Come Home
                                          Information Management, March 2, 2015
                                          "Much to my chagrin, I had to return home to frigid Chicago late Friday night from three days of delightful weather respite at Strata + Hadoop World in San Jose. I've been to each of the five winter Stratas in Silicon Valley, this the first outside the Santa Clara Convention Center. As well it needed to be, what with over 4,500 registrants, more than triple the number of the inaugural.

                                          On 'training' Wednesday, my track of choice was 'Hardcore Data Science'. Among the heavy academic-like presentations were talks on machine learning advances in continuous speech recognition, visual understanding, the search for repeated structures in time series data, graph mining, and tensor methods for large-scale unsupervised learning..."

                                          CIOs Have to Learn the New Math of Analytics
                                          IT World, March 2, 2015
                                          "Today's data-driven business runs on the almighty algorithm. But if you're not careful, those geeky formulas can stir up legal and ethical trouble.

                                          We're used to algorithms recommending books, movies, music and websites. Algorithms also trade stocks and predict crime, identify diabetics and monitor sleep apnea, find dates (and babysitters), calculate routes and assess your driving, and even build other algorithms. These math equations, which can reach thousands of pages of code and routinely crunch hundreds of variables, may someday run our lives. Companies increasingly use them to run the digital business and gain competitive advantage..."

                                            Confidence in Analytics Begins with the Data
                                            TDWI, March 3, 2015
                                            "Analytics continues to be a hot topic as more organizations seek to derive greater competitive value from data. In pursuit of smarter decisions, users across organizations want to expand past the limits of spreadsheets, standard business intelligence tools, and applications that offer embedded reporting but not much for serious data analysis. Technology providers have been moving fast to provide analytics tools and platforms to meet heightened demand. Yet, technology can only take organizations so far. In the middle of all the frenzy is the data; without user confidence in the data, analytics will never deliver on its promises..."
                                            Forget big data: what businesses really want is simple and easy
                                            Information age, March 5, 2015
                                            "Big data has become big business for software vendors and a top-of-mind issue for IT decision makers. This is despite reports claiming that in many cases businesses are still failing to draw value from this new technology trend.

                                            However, when you drill into the detail, businesses have many varied definitions for big data - from valuable information held within the organisation, through to taking an analytical perspective using big data' insights to drive changes in the way businesses operate..."

                                            IT - Mobile
                                            The 8 Trends Mobile Developers Care About Most
                                            InfoWorld, March 2, 2015
                                            "Programmers seem to impact just about everything these days and mobile developers, in particular, are playing an ever-growing role in the world. The ubiquity of smartphones and tablets and the rise of the Internet of Things (IoT) make the people who are creating the apps and tools for all the smart devices in our lives all the more important. A new global survey helps to shed light on the trends among mobile developers and the mobile economy, in general.

                                            The 8th edition of VisionMobile's report, Developer Economics: State of the Developer Nation Q1 2015, was released earlier this month. The report is based on a survey of over 8,000 mobile developers in 143 countries. Among other things, it reveals trends in the platforms they target, the tools they use, and what motivates their work. Here are 8 things about mobile developers that you might not have known..."

                                            Break Me If You Can: 4 Rugged Tablets Put to the Test
                                            ComputerWorld, March 2, 2015
                                            "It's a cruel world out there for tablets: Every day, there's the possibility they will be dropped, knocked, spilled on or just shaken around. And that's just in a normal business day -- if you use your tablet outdoors, while traveling or in a work zone, the odds of a disaster go up precipitously.

                                            In its report Mobile Device TCO Models for Line of Business Solutions, VDC Research estimates that the failure rate for conventional tablets in the workplace is 18% per year. That translates into roughly one in five systems failing at work each year.

                                            "Unless you want to treat tablets as disposable, this failure rate should be unacceptable for businesses today," observes David Krebs, executive vice president at VDC Research. "By contrast, rugged tablets have been built for business use and have a 4% failure rate."

                                              IT - BYOD
                                              In 2015 BYOD doesn't have to be a fight: it's time to empower your staff
                                              Information age, March 5, 2015
                                              "Back in 1984, just 30 years ago, the first mobile phone was launched. Today it is estimated that there are more than seven billion phones, tablets and other mobile devices active in the world. That's as many devices as there are people.

                                              Thanks to the rapid growth of mobile technology, we are now able to access e-mails, internet and apps on the go. Never before have we seen a generation of workers so tech-saturated, yet many organisations are failing to take advantage of this valuable resource, namely by using their employee's own devices as authentication tools to connect - securely - to their business data whilst on the move..."

                                                Top Ten Articles for last few Issues
                                                Vol 204 Issues 1, 2, 3 and 4; Vol 203 Issues 1, 2, 3 and 4
                                                We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                • Last Solaris 8 and 9 patches released
                                                • LibreOffice 4.4.1 'Fresh' and LibreOffice 4.3.6 'Still'
                                                • New Solaris articles on Oracle Technology Network
                                                • Spotlight On: Oracle Systems Learning Stream
                                                • Is Mobile Over-hyped?
                                                • Technology Preview available for the Oracle Linux software collection library
                                                • Open source: Oracle Linux now available as Docker image
                                                • MySQL Cluster 7.4 Now Generally Available
                                                • Establishing a Mobile Security Architecture
                                                • Java EE Adoption in One of the World.s Largest Online Financial Systems

                                                The longer version of this article has list of top ten articles for the last 8 weeks.

                                                  IT - Server
                                                  Why Computers Still Struggle to Tell the Time
                                                  IT World, March 2, 2015
                                                  "While computers manage many things with extreme precision, they have surprising difficulty keeping track of time.

                                                  It's pretty much impossible for a computer to keep exact time, although accuracy can be improved to the extent that users are willing to spend more money on the problem, said George Neville-Neil, who spoke at the Association for Computing Machinery's Applicative conference in New York last week..."

                                                    Oracle's New Ethernet Switches and Virtual Network Services Target Software-Defined Data Centers and Cloud
                                                    High performance, low cost networking fabric engineered for the Oracle stack enables customers to deploy network services on-demand
                                                    Oracle addressed two major networking requirements for cloud-enabled data centers with new high performance, low cost 10Gb/40Gb Ethernet switches and the addition of virtual network services to Oracle SDN. Engineered and integrated to enhance the Oracle stack, the new networking technologies provide the flexibility and scalability for both enterprise data centers and network function virtualization infrastructure...

                                                    Oracle Ethernet Switch ES2-72 and Oracle Ethernet Switch ES2-64 are designed to harness the full capabilities of Oracle engineered systems, servers and storage with extremely low-latency and massive scalability for all Oracle applications including Oracle Real Application Clusters (RAC), as well as financial and high-performance computing (HPC) applications...

                                                    Establishing a Mobile Security Architecture
                                                    Beyond Brute Force: 3 User-Friendly Strategies for BYOD Security
                                                    Organizations of today are at a point of transition from using personal or company-issued devices with restrictive controls to using these devices to meet the personal needs of the end user. One thing most security experts agree on is the high-risk posture that comes with the adoption of mobility. This risk is present because of the practice of extending the corporate perimeter onto the mobile device. To expect that a consumer-grade $300 smartphone can replace the security layers of the enterprise (firewalls, intrusion prevention, anti-malware, access control frameworks, multifactor authentication, and more) is just not a reasonable expectation without a focused look at how enterprises should extend their enterprise security framework to the mobile platform...

                                                    The Oracle mobile strategy is all about providing a secure and available mobile experience from any device, from anywhere, and at any time. From mobile clients to back-end enterprise systems, Oracle's mobile platform offers the reliability, scalability, availability, and portability that enterprises expect in a modern, enterprise-grade platform. With the unique capabilities of this platform, mobile devices, services, and applications can be rapidly and securely developed, creating an ever-expanding list of possibilities...

                                                    Securing Information in the New Digital Economy
                                                    Joint Oracle and Verizon Report
                                                    To learn more about Securing Information in the New Digital Economy, read the joint Oracle and Verizon Report.

                                                    We are in the midst of a data breach epidemic, fueled by a lucrative information black market. The perimeter security most IT organizations rely on has become largely ineffective. Nearly 70% of security resources are focused on perimeter controls, but most exploited vulnerabilities are internal.

                                                    Effective modern security requires an inside-out approach with a focus on data and internal controls...

                                                    Nexenta News
                                                    Delivering the Software-Defined Data Center via Open Software-Defined Storage
                                                    Webinar: March 10th, 8am PST
                                                    Nexenta, in partnership with global enterprise storage leader Dell, premier global analyst firm IDC, and the pioneering cloud service provider and Nexenta customer, ScaleMatrix will offer insights into how mobile, social media, enterprise big data and cloud computing are driving demand for greater flexibility, scalability and cost-effectiveness in the data center.

                                                    Attend to hear from a dynamic panel of industry leaders as they share diverse perspectives on the Software-Defined Data Center (SDDC) of the future and the pivotal role of Open Software-Defined Storage (OpenSDS).

                                                    Learn more about:

                                                    • Challenges that face today's modern infrastructures and how to solve them in respective arena

                                                    • The difference between real industry trends and the SDDC hype

                                                    • How OpenSDS can ensure lower TCO and help organizations achieve the power, capacity and space efficiencies they need to operate the data center of the future

                                                    • Real world use cases on OpenSDS


                                                    Storage March Madness @ Dave and Busters, Hollywood, Florida With Nexenta
                                                    Save the date: March 26th - 3pm to 6pm
                                                    IT professionals involved with buying and selling storage are invited to a casual March Madness Event at Dave and Busters, Hollywood FL.

                                                    Come meet the South East Nexenta team:

                                                    • Megan Jones, Eastern Channel Manager: Megan is dedicated to growing Nexenta's business with Channel Partners. She is actively seeking Partners who can sell Software-Defined Everything (SDx), especially Software-defined Storage.

                                                    • Kelly Ziegele, Regional Account Manager: With 15 years technical sales experience with firms such as NetApp, EMC, F5 and SanDisk, Kelly is your go-to South East resource for Software Defined Storage solutions.

                                                    • Scott Lobdell, Regional Systems Engineer: A 25+ year IT veteran with extensive systems, networking and storage experience, Scott is your pre-sales technical expert for the South East.

                                                    • John McLaughlin, Professional Services: John has been selling and implementing open-systems IT solutions in South Florida for 30+ years. He is your resource for implementing Nexenta-based solutions.

                                                    Details to follow.

                                                    George Washington University Runs on Nexenta Software Defined Storage
                                                    Top Ranked Medical Research Institution Improves Information Availability, Accuracy, and Security with Best Cost/Performance
                                                    Nexenta announced the deployment of NexentaStor by George Washington University. The School of Medicine and Health Sciences (SMHS) is using NexentaStor to cost-effectively scale its storage capacity and ensure high availability and security of important data without requiring additional IT resources.

                                                    Thanks to Nexenta, the university faculty have been able to focus on their efforts on research while minimizing the cost of procuring and managing storage. For example, the university was able to expand their existing Nexenta appliance by 16 TB for less than $7,000.

                                                    Level3 News
                                                    Cyberattacks and Distributed Denial of Service (DDoS) threats on financial firms produce big pay offs
                                                    Level(3), March 5, 2015
                                                    "When the target is the financial industry, make no mistake, the intention of a DDoS attack is not just to shut down websites and servers, the goal is to steal valuable data, intellectual property and money. Cybercriminals apply DDoS attacks to distract banks' IT employees while inserting malware into the banks' backend systems to exfiltrate data and/or intercept wire transfers.

                                                    Krebs On Security reported that on Christmas Eve 2012, cybercriminals executed a DDoS attack on a California-based regional bank, brought down the bank's website for at least 24 hours and stole over $900,000 in fraudulent wire transfers out of one of their business customers' accounts. In just 24 hours!..."

                                                    Trending in
                                                    Vol 235, Issue 2
                                                    Trending IT Articles