News about Oracle's Solaris and Sun Hardware
System News
Mar 9th, 2015 — Mar 15th, 2015 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 205, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


IT - CxO
x
How the Elite Eight of IT Will Lead You to Victory
Network World, March 10, 2015
"IT isn't a winner-takes-all sport, but it does rely on teamwork, coordination and knowing when to deploy the full-court press or push for the fast break. The start of March Madness is still a week away, but when it comes to essential IT elements to run a successful IT organization, we're ready to declare our Elite Eight IT bracket. These eight elements will help bring your IT organization success and acclaim..."
    How to Lead When Working Through Layoffs
    CIO, March 10, 2015
    "As an IT manager, one of your many jobs is to keep your team productive and its morale high through a layoff process. That, of course, is no easy task, so we asked tech leaders and career experts what you can do to ease fears and keep the remaining workforce productive..."
      R.E.S.P.E.C.T.: The Way for CISOs To Get and Keep It
      CSO Online, March 10, 2015
      "While they have a 'C' at the beginning of their title, CISOs are held in generally low regard in the executive suite. The way to reverse that, say those who are familiar with, or have held, the position, is to be more than a geek..."
        5 Things CISOs Can Learn from the Best GMs in Baseball
        Dark Reading, March 10, 2015
        "A MLB team has several goals and objectives, both short- and long-term. One goal is to win. The team also must be profitable. They have to have a strong strategy to accomplish both. They have to know their revenue, and revenue potential. They have to understand the expectations of their fan base. Does this list look familiar? Chances are these are some of the same drivers for your information security team.

        A baseball GM must understand the overall goals and objectives of ownership, and also must be extremely savvy and smart about putting together the right team. When it comes to corporate IT security you need to act like a GM to create a confident program..."

        15 Chief Data Officer Job Requirements
        Information Management, March 9, 2015
        "Sixty-one percent of CIOs want to hire chief data officers (CDOs) within the next 12 months. At a high level, CDOs oversee how data is gathered, managed, protected, and monetized. But what else fits into a CDO job description? Here are 15 requirements for the position..."
        Are Chief Data Officers (CDOs) a Short-term Fix?
        Information Management, March 10, 2015
        "Are chief data officers (CDOs) a short-term fix -- meant to fill a painful business gap between CIOs and chief marketing officers? That's the thesis from Forrester Research VP Carlton Doty -- who shared a range of IT leadership opinions during the Adobe Summit this week in Salt Lake City..."
        Why aren't We Performing Risk Management Well?
        Risk Management Monitor, March 6, 2015
        "Whenever a project is being planned, risk management has to be part of the equation - things rarely go smoothly or completely as expected, and there will always be areas that present more risks than others. Whether they affect the projected timeframes, budgets or outcomes, it is the job of the project manager to identify them and ensure that provisions are in place to limit their impact should they occur..."
        Why Should you Treat Employees Better? It's Actually Pretty Simple
        TLNT, March 11, 2015
        "Fortune's Best Companies to Work For list is out once again. What makes these companies special?

        The Negative Nellies will say it's because of perks - free food, foosball, nap rooms, etc. - offered by the well-funded tech companies that tend to top the list.

        But that's not true. The list is also populated with retail outlets famous for slim margins and manufacturing companies not often known for their splurges on employees..."

          Features
          x
          Going Beyond Big Data
          A Conversation with Tara Robert
          March is Influencer month on the Oracle Social Spotlight blog! Today's influencer is data guru Tara Roberts, Vice President of Oracle Data Cloud.

          "Tara Roberts: Big data is meaningless unless businesses have a way to 1) extract important signals from the noise and 2) have the ability to 'act on' those insights to target, personalize and measure every customer interaction. The companies who win are the ones who are able to uniquely predict their customers' desires and intentions and to personalize, plan and react before their competitors can. The answer is to 'know more' with unique data insights, not just access to big data - which, as a standalone is more of a business challenge than an opportunity..."

          SPARC
          x
          SPARC Software in Silicon Film Festival
          Also webinar on March 18th
          Larry Wake writes, "Over at Oracle University, they've produced several short videos talking about the upcoming SPARC M7 processor and its revolutionary Software in Silicon technology.

          If you're a developer, the key thing you should know is that access to this technology is available today, via the Software in Silicon cloud. You can take your existing programs and run them as-is and see how they run, or you can start to play with some of the new performance and security technologies.

          If you want to learn more, take a look at the videos, or follow the links below. Plus, be sure to sign up for the webinar on March 18th!

          Exadata
          x
          Oracle engineered systems are now going to compete on price
          An Ovum report

          "Summary: Analyst firm Ovum attended Oracle's January 21st X5 Engineered Systems launch and authored an analysis of the news and expected market impact.

          Key findings about the new X5 generation of engineered systems noted in the Ovum report, titled, 'Oracle engineered systems are now going to compete on price' include:..."

          IT - Storage
          x
          Performance at All Costs: 11 Speedy All-Flash Arrays
          CRN, March 11, 2015
          "Solution providers and their clients looking for ways to improve the performance of their storage infrastructures are increasingly turning to flash storage.

          The market for flash storage is booming, with every major storage vendor, most second-tier vendors, and a host of startups vying for mind share and market share in the performance storage market..."

          Nanosecond Storage Performance Latencies? Get Ready
          NetworkComputing, March 12, 2015
          "Predictable and persistent microsecond storage performance will usher in new possibilities in application development and capabilities in the data center.

          In its natural state, nitroglycerin is extremely sensitive to shock and prone to unexpected explosions. Alfred Nobel invented a process to stabilize this volatile compound into a more practical form -- dynamite -- and helped usher in a new era of development by enabling hydropower, oil exploration, transcontinental railroads, and many other innovations of the Industrial Revolution..."

          The value of Global Primary Storage Deduplication
          Storage-Switzerland, March 11, 2015
          "Standard deduplication is the elimination of redundant data on a single storage system. Whether that system is used for backup or primary data, the goal is to put as much data as possible on a single storage system so that the deduplication algorithm can 'see' as much data as possible. The more data the storage system stores the better the chance of finding redundancy and the better the effective efficiency rate. Global deduplication essentially expands that effectiveness across multiple storage systems..."
            Java Technology
            x
            Java EE 7 Hands-on-Lab Updated for You to Use!
            An excellent learning resource
            "The official Java EE 7 Hands-on-Lab is an excellent learning resource. It was initiated by my former colleague Arun Gupta (now at Red Hat). The lab starts with some skeleton code (that's mostly Java EE 5 and Java EE 6) and through a series of well-written step-by-step instructions adds a select set of Java EE 7 features to create a fairly cohesive sample web application. The instructions do a reasonable job of explaining the context and motivation for the features being added. Although it touches upon a tiny subset of what was added in Java EE 7, in my experience the lab takes about six to eight hours to complete. In the end attendees get a real sense of how developing with Java EE and Java EE 7 actually feels like and learn a few Java EE 7 features..."
            IT - Technology
            x
            Hotel Guests Open the Door To a Robotic Butler
            ComputerWorld, March 12, 2015
            "If a guest is staying at the Aloft hotel in Cupertino, Calif. and asks for a comb or a late-night snack, the guest may be surprised at who -- or what -- brings it to the room.

            The Aloft Hotel in the Silicon Valley city has been using an autonomous robot as a butler, delivering small items that guests might have forgotten to pack, like toothpaste or a razor, along with snacks and candy.

            The robot, dubbed Butlr, has worked out so well that another one of the hotel chain's properties has begun using its own robot and a third has plans in the works to adopt another..."

              25 Teams in Finals for DARPA's High-Risk Robotics Challenge
              DefenseSystems, March 9, 2015
              "The field is set for the Defense Advanced Research Projects Agency's Robotics Challenge, which has now grown to 25 teams from seven countries in what has become perhaps the most anticipated - and most difficult - robotics competition ever.

              The teams will compete June 5-6 at Fairplex in Pomona, Calif., in a variety of disaster-response tasks, with three cash prizes totaling $3.5 million at stake. But from DARPA's point of view, a lot more than money is at stake..."

                IBM to demonstrate first on-package silicon photonics
                ExtremeTech, March 13, 2015
                "One of the most tantalizing next-generation technologies that could dramatically reduce system power consumption and improve bandwidth is silicon photonics. This method of chip-to-chip communication uses silicon as an optical medium, and transmits data incredibly quickly with far better power consumption and thermals than traditional copper wires. Now, IBM is claiming to have advanced the technology a significant step by integrating a silicon photonic chip on the same package as a CPU..."
                IT - Bitcoin
                x
                Threshold Signatures: The New Standard for Wallet Security?
                Bitcoin Magazine, March 9, 2015
                "A group of researchers from Princeton University, Stanford University and the City University of New York, have announced a new ECDSA threshold signature scheme that is particularly well-suited for securing Bitcoin wallets.

                Threshold signatures can be thought of as 'stealth multi-signatures.' The new Bitcoin security scheme is detailed in a research paper titled 'Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme'..."

                Why Bitcoin Regulation Lags Where it's Needed Most
                Coindesk, March 8, 2015
                "International remittance is ostensibly one of the most compelling use cases for bitcoin and digital currencies.

                Recorded remittances to Africa grew four-fold between 1990 and 2010 and have increased steadily since. The World Bank projects $39bn in remittances to sub-Saharan Africa this year.

                Yet with the continent's fast-growing middle class and tech-savvy youth population, the high cost of remitting to sub-Saharan Africa, particularly from within Africa, has brought the subject of financial inclusion under new light..."

                European Central Bank Report Examines Growth In Virtual Currencies
                Crypto Coin News, March 10, 2015
                "The European Central Bank (ECB) has published a report on virtual currencies that recognizes their dramatic growth in recent years and analyzes some of their dynamics and challenges. Titled 'Virtual currency schemes - a further analysis,' the 37-page report points out that virtual currencies have risks. However, it notes that currently, bitcoin is used for around 69,000 transactions per day worldwide, compared with a total of 274 million non-cash retail payment transactions per day for the European Union alone..."
                Goldman Sachs Report Says Bitcoin Could Shape 'Future of Finance'
                Coindesk, March 11, 2015
                "Bitcoin and cryptocurrencies are part of a technology 'megatrend' that could change the fundamental mechanics of transactions, according to a new report from Goldman Sachs' equity research analysts.

                Bitcoin, along with improved payment security, 'big data' analytics and faster payment networks are the components of a technology trend that will disrupt the payments ecosystem, the report says.

                The disruption of the $1.2tn global payments industry will be also be driven by converging trends in regulation, global demographics and the rise of markets outside the United States..."

                China Now Controls Bitcoin (And That'S Just The Beginning)
                Crypto Coin News, March 12, 2015
                "Americans have had it good for a long time. Since the end of WWII, it has been a privilege to be an American. Since the United States took over the Global Reserve Currency from Britain in 1944 at Bretton Woods, life couldn't be better for an American. When you have a license to print money that everyone else in the world must use, you can do a lot of things the rest of the world can't do..."
                  'The Age of Cryptocurrency' is Perfect Introduction to Bitcoin and the Blockchain
                  Bitcoin Magazine, March 13, 2015
                  "At least twice a week, I get asked about Bitcoin. More people in my network realize I write about it, so they naturally want to know what it is, how it works and whether it's a Ponzi scheme.

                  I quickly realized that I had rehearsed the perfect answer to every question. At least, I thought it was the perfect answer to every question.

                  Then I read The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order by Paul Vigna and Michael J. Casey. The two are Wall Street Journal writers, and this is their attempt at explaining the history of digital currency, the inception of Bitcoin, its evolution and future..."

                  IT - FOSS
                  x
                  5 ways to answer questions the open source way
                  Opensource.com, March 13, 2015
                  "Eric Raymond's How to Ask Questions the Smart Way was published in 2001 and has been very popular ever since. It gets referenced on my local Linux User Group mailing list with some frequency (usually alongside an admonishment to stop top-posting). To be sure, it contains a lot of good advice for how to perform research, how to frame a question, and what salient information is generally a minimum required to solicit help.

                  And yet, I think it could have been done better. Raymond spends roughly 10,000 words telling people what is expected of them when they seek help, including how not to react like a loser, but why not some words on how to answer questions in a helpful way?..."

                  4 reasons CIOs should give open source a second look
                  The Enterprisers Project , March 12, 2015
                  "Seeking out open source solutions is second nature for Red Hat IT. It's in our DNA, and it's what we believe in. And while our passion for open source is shared with many IT leaders, I still encounter CIOs who cite concerns about security, intellectual property, talent, and existing vendor relationships as reasons they aren't comfortable with open source solutions. Here's what I say when I hear IT leaders identify these as barriers:..."
                  Solaris
                  x
                  Maintaining Configuration Files in Solaris 11.2
                  By Jeff Victor

                  Jeff Victor writes, "Have you used Solaris 11 and wondered how to maintain customized system configuration files? In the past, and on other Unix/Linux systems, maintaining these configuration files was fraught with peril: extra bolt-on tools are needed to track changes, verify that inappropriate changes were not made, and fix them when something broke them.

                  A combination of features added to Solaris 10 and 11 address those problems. This blog entry describes the current state of related features, and demonstrates the method that was designed and implemented to automatically deploy and track changes to configuration files, verify consistency, and fix configuration files that 'broke.' Further, these new features are tightly integrated with the Solaris Service Management Facility introduced in Solaris 10 and the packaging system introduced in Solaris 11..."

                  MySQL
                  x
                  MySQL for Excel 1.3.4
                  A maintenance release for 1.3.x
                  "The MySQL Windows Experience Team is proud to announce the release of MySQL for Excel version 1.3.4. This is a maintenance release for 1.3.x. It can be used for production environments.

                  MySQL for Excel is an application plug-in enabling data analysts to very easily access and manipulate MySQL data within Microsoft Excel. It enables you to directly work with a MySQL database from within Microsoft Excel so you can easily do tasks such as:..."

                  What's New in MySQL 5.6
                  Better performance and scalability

                  "With MySQL 5.5 generally available and being deployed all over the planet, the architects and strategists can start looking ahead to the exciting new thing with SQL in its name: MySQL 5.6.

                  MySQL 5.6 builds on the momentum of 5.5, and Oracle's investment and commitment to MySQL, by delivering better performance and scalability.

                  At this year's MySQL Conference & Expo, you'll hear about:..."

                  Cloud Computing
                  x
                  Oracle Social Cloud Adds Support for Instagram and Weibo
                  Expands capabilities to reach, target and engage with global consumers

                  "To help organizations efficiently reach, target and engage global consumers on social media channels, Oracle today announced that Oracle Social Cloud's Social Relationship Management (SRM) platform now supports Instagram and Weibo. With the new capabilities, Oracle helps organizations deliver the best possible customer experience by adding two of the world's fastest-growing social media platforms to the expanding lineup of social networks supported by the Oracle Social Cloud..."

                  Linux
                  x
                  General Availability of Oracle Linux 7.1
                  First update release for Oracle Linux 7

                  "We're happy to announce the general availability of Oracle Linux 7 Update 1, the first update release for Oracle Linux 7. All packages are currently available on ULN and public yum; ISO installation images will be freely available for download from the Oracle Software Delivery Cloud soon.

                  Oracle Linux 7 Update 1 ships with the following kernel packages:..."

                  Secure Boot support with Oracle Linux 7.1
                  Tech Preview for OL7.1

                  Wim writes, "Another feature introduced with Oracle Linux 7.1 is support for Secure Boot.

                  If Secure Boot is enabled on a system (typically desktop, but in some cases also servers) - the system can have an embedded certificate (in firmware). This certificate can be one that's uploaded to the system by the admin or it could be one provided by the OEM/OS vendor. In many cases, in particular newer desktops, the system already contains the Microsoft key. (there can be more than one certificate uploaded...). When the firmware loads the boot loader, it verifies/checks the signature of this bootloader with the key stored in firmware before continuing. This signed bootloader (at this point trusted to continue) will then load a signed kernel, or signed second stage boot loader and verify it before starting and continuing the boot process. This creates what is called a chain of trust through the boot process..."

                  Oracle Linux 7 System Administration Training Available
                  5-day instructor-led course
                  Oracle introduced Oracle Linux 7, an open source operating platform that gives customers and partners the capabilities, tools and features to innovate, collaborate and create solutions across traditional, cloud-based and virtual environments.

                  As with previous releases, Oracle Linux 7 is easy to download, free to distribute and is the only major enterprise Linux distribution that publishes all bug fixes and security errata publicly. Oracle Linux 7 provides more flexibility and choice than other commercial Linux distributions.

                  With extensive testing for demanding workloads such as Oracle Database, a flexible free-to-use and paid support model, and strong uptake, Oracle Linux is the best general-purpose open source operating platform for the modern data center.

                  IT - Cloud
                  x
                  What's New and What's Ahead for Public Cloud Services
                  CIO, March 8, 2015
                  "What's in store this year for the top public cloud providers? CIO.com contribute Jonathan Hassell offers his take on Amazon, Google and Microsoft...

                  If you are not running at least one service in the public cloud, you must either work for a financial institution or you're lagging far behind the technology curve. While not every cloud service is right for every organization, they have come a long way since their introduction in the mid-2000s..."

                  Cloud Implementations: The Default Choice For CIOs In Healthcare
                  Forrester, March 11, 2015
                  "Up to a couple of years ago, healthcare technology executives advocating the use of managed services, cloud, and other off-premises uses of data were mavericks. Management told us that cloud presented too much risk. One leading doctor in a prestigious institution said to me, 'I would rather see my institution's name on the front page of the New York Times because of a data breach on premise. Seeing adverse publicity because we released our data to the cloud and a bad thing happened will destroy our reputation.' Management insisted that we keep the data under the control of our institutions by keeping it in a data center..."
                  The golden rules of hybrid cloud
                  Information age, March 9, 2015
                  "Hybrid seems to have been on the annual predictions lists of industry watchers for at least the last three or four years. Its functionality, architectural flexibility and superior security benefits when supporting workloads, data and applications have been championed as a way of transforming the enterprise IT environment and making the most of public and private clouds. Which, of course, begs the question: why we are still writing about it in 2015?..."
                  The Cloud is Full of Zombies, but That's OK
                  InfoWorld, March 11, 2015
                  "Microsoft wants you to believe that Amazon Web Services is 'a bridge to nowhere,' but nothing could be further from the truth. In fact, as Gartner says, "New stuff [workloads] tends to go to the public cloud ... and new stuff is simply growing faster" than the traditional workloads that currently feed the data center.

                  Most of that 'new stuff' is heading for AWS, although Microsoft Azure is an increasingly credible play..."

                  Google vs. AWS Cloud Storage Just Got a Whole Lot More Interesting
                  Network World, March 11, 2015
                  "Google unveiled a new beta cloud storage offering named Nearline today that aims squarely at the company's biggest rival in the cloud, Amazon Web Services.

                  Nearline is a public IaaS cloud service that allows customers to store data at a low cost with fast retrieval (in seconds). It competes most directly with AWS's Glacier 'cold' storage service, which promises customers inexpensive storage in exchange for long wait times (up to hours) to access data..."

                  Is Cloud Storage Risky for Users?
                  Storage Newsletter, March 12, 2015
                  "In the past, companies required a lot of investment and time to be able to backup their data. Expensive system, software, network infrastructure, salaries of employees were needed, and a place to install all the hardware.

                  Since storage capacity grew so fast, those equipments were always overpowered to make the huge investment lasting as long as possible. Once the data center was installed and implemented, which would take months to be accomplished, they had to add the operational and maintenance costs to the bill..."

                  SFTA
                  x
                  CIO/CTO Roundtable: The 2015 Outlook
                  South Florida Technology Alliance Monthly Meeting - Citrix, Ft. Lauderdale
                  Learn from tech thought leaders who are building leading edge software products and services right here in South Florida. Join Paul Martine, Citrix CIO as he moderates a panel to include leading South Florida CIOs. Arrive early and network with your IT colleagues.

                  MODERATOR:

                  • Paul Martine, CIO, Citrix

                  PANELISTS:

                  • Joel Steigelfest, CIO, Cross Country Home Services
                  • Alexander Sjogren, CTO, Yellow Pepper
                  • Patric Edmonson, Senior Vice President, Modernizing Medicine
                  • Bryan Dennstedt, CTO, MDLIVE

                  WHEN:

                  • Thursday, March 19, 5:00 - 8:30 pm

                  SCHEDULE:

                  • 5:00 pm - 6:45 pm: Registration and Networking
                  • 6:45 pm - 8:00 pm: Panel Discussion
                  • 8:00 pm - 8:30 pm: Meet the Speakers

                  Register

                  IT - Wireless
                  x
                  7 Weird Wireless Concepts that Just Might Work
                  InformationWeek, March 7, 2015
                  Here, we bring you some of the biggest, strangest, and best ideas to come out of the 2015 Mobile World Conference...

                  Some of the best ideas from MWC rely on near-horizon technology not yet perfected, or they aren't from major players. Some of them are just plain wacky. Some will never really make it, but they will at least inspire another round of ideas. That's the best part of thinking big. This was a good year for thinking big, with several big shifts, including 5G on the way, digital payments options growing, IoT products becoming more mature, and connected cars and homes becoming more common..."

                  vBeers-SF
                  x
                  vBeers @ Boca - Biergarten - Wed March 18
                  6pm - 9pm: Sponsored
                  Join us for vBeers @ Boca. We meet on the 3rd Wednesday of each month in Boca Raton, FL. The next meeting will be at Biergarten Boca, which is located in on US 1, just South of Palmetto Park and East of I-95.

                  Biergarten Boca Raton

                  • 309 Via De Palmas #90
                  • Boca Raton, FL 33432

                  $5 burger/fries and $3 featured drafts during happy hour!

                  This event will be sponsored by Volico Hosting. Get a couple of tickets and exchange them for beers!

                  Bring your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community.

                  Please share this invitation with your IT colleagues and encourage them to attend!

                  Join us for one of the four monthly South Florida vBeers events.

                  Details posted to vBeers South Florida LinkedIN Group.

                  Events
                  x
                  Oracle Industry Connect 2015
                  Brings Together Business Leaders and Visionaries to Share Expertise, Insight, and Innovation
                  Oracle announced its second-annual Oracle Industry Connect, an exclusive, executive-level event that enables leaders across industries to share strategies for organizational transformation and success. The event will take place March 25 through 26, 2015, in Washington DC.

                  The conference will feature keynotes from Condoleezza Rice, 66th United States secretary of state; Mark Hurd, chief executive officer, Oracle; Bob Weiler, executive vice president, Global Business Units, Oracle; and Warren Berger, author of A More Beautiful Question: The Power of Inquiry to Spark Breakthrough Ideas. The keynotes will be followed by eight industry-specific tracks with business leaders from communications, education and research, energy and utilities, financial services and insurance, hospitality, life sciences and healthcare, asset- and service-intensive industries, and retail...

                  IT - Networks
                  x
                  Dissolve a Network Bottleneck with These Techniques
                  Search Data Center, March 11, 2015
                  "As IT adds I/O and communication-intensive apps to servers, the strain on data center networking increases drastically.

                  Installations built around 1 GbE are no longer efficient, and in many instances, the replacement -- 10 GbE -- is also a network bottleneck.

                  There's more than one way to break a log jam of network traffic, from inexpensive and quick fixes to strategic capital investments and restructuring. New technology is set to boost networking capacity, and network fabric adoption has solved backbone performance bottlenecks with multi-lane Ethernet. In some cases, simple operational organization relieves congestion..."

                  IT - Linux
                  x
                  5 Best Linux Distros For Beginners And Newbies
                  Computer Business Review, March 13, 2015
                  "Interested in the open source OS but unsure what to try?

                  Linux has always been the outsider's operating system. Even more hipster than Apple's iOS and completely off the radar of most Microsoft Windows users, the open source OS umbrella covers an ever increasing collection of mutations and flavours, known to its users as distros (short for distributions).

                  For the beginner such choice can appear overwhelming, and so CBR has pared it down to the five most accessible..."

                  VMware expands desktop virtualization to Linux
                  ComputerWorld, March 12, 2015
                  "VMware's VMware Horizon desktop virtualization software suite will soon deliver virtual Linux desktops over a network, in addition to the Microsoft Windows desktops it has long provided for remote workers.

                  The company has launched an early access program for customers to test a version of Horizon 6 that can package server-based Red Hat and Ubuntu Linux desktops so they can be accessed from remote computers and mobile devices..."

                  Don't forget one of Linux's best features: multiple workspaces
                  PCWorld, March 9, 2015
                  "Windows users have long been jealous of workspaces - also called virtual desktops or multiple desktops - on Linux. But many Linux desktops have hidden this feature by default in recent years. Soon, Windows users will have multiple desktop workspaces enabled by default - and many Linux users won't.

                  That's crazy! Virtual desktops have long been one of the standout features of the Linux desktop, and it shouldn't be lost. Here's how you can get started with workspaces on Ubuntu's Unity or another desktop environment today..."

                  New Linux Foundation Members Invest in Linux and Collaborative Development
                  The Linux Foundation, March 12, 2015
                  "The Linux Foundation, the nonprofit organization dedicated to accelerating the growth of Linux and collaborative development, today announced that LMAX Exchange Ltd., Linutronix GmbH, NI and SerenataFlowers.com are joining the organization.

                  The versatility and power of the Linux operating system makes it well-suited to diverse markets, from financial services and online retail to embedded and industrial industries. Many of the world's best programmers actively contribute to the kernel, investing in community development as way to compete in these demanding markets and overcome serious challenges such as security..."

                  Linux Certifications Growing In Importance To Employers
                  WebProNews, March 14, 2015
                  "The 2015 Linux Jobs Report from The Linux Foundation and Dice was recently released. This forecasts the Linux job market based on a survey of Linux professionals and hiring managers. It found that managers are looking for more evidence of formal training and certifications when hiring Linux professionals.

                  Most hiring managers are looking to recruit Linux pros in the next six months, so that's certainly good news. 97% of managers said they'll bring on Linux talent relative to other skills areas in the next six months..."

                  The future of Linux storage
                  ZDNet, March 12, 2015
                  "At the Linux Foundation's new Vault show, it's all about file systems and storage. You might think that there's nothing new to say about either topic, but you'd be wrong.

                  Storage technology has come a long way from the days of, as Linus Torvalds put it, "nasty platters of spinning rust" and Linux has had to keep up. In recent years, for example, flash memory has arrived as enterprise server primary storage and persistent memory is bringing us storage that works at DRAM speeds. At the same time, Big Data, cloud computing, and containers are all bringing new use cases to Linux.

                  To deal with this, Linux developers are both expanding their existing file and storage programs and working on new ones..."

                  IT - Operations
                  x
                  Identify Risky Data Center Providers Before It's too Late
                  Search Data Center, March 12, 2015
                  "Data security and integrity don't get the same attention as physical infrastructure in a colocation facility. But power and cooling failures at cloud and data center hosting sites take down multiple clients and services.

                  Before negotiating with data center providers, determine the level of redundancy, uptime and so on required for your IT operations. To ensure that providers meet the criteria, scrutinize and test the contract, and inspect the physical data center facility whenever possible..."

                  Within 15 Years, Solar Will Be a Dominant Energy Source
                  CIO, March 9, 2015
                  "Solar electricity is expected to become competitive with other forms of electricity in an increasing number of markets globally due to declining solar panel and installation costs, according to a new report.

                  By 2030, solar power will generate $5 trillion in revenue worldwide, a 10-fold increase over today, according to the report from Deutsche Bank (PDF)..."

                    Take Data Center Efficiency to the Max on Three-Phase Power
                    Search Data Center, March 12, 2015
                    "Three-phase power configurations, with expert phase balancing, are the key to maximum efficiency in the data center and avoiding unnecessary shutdowns.

                    Three-phase branch circuits to cabinets put hardware on 208-Volt service. This provides more power over fewer wires and offers better energy efficiency than single-phase, 120-V service. Any 20 kW or larger uninterruptible power supply (UPS) also uses three-phase power supply and distribution. Most data centers therefore have three-phase power somewhere in the facility, whether just at the power infrastructure or running to the cabinets of IT equipment..."

                    Words to Go: Data Center Design Standards Bodies
                    Search Data Center, March 12, 2015
                    "Need a handy reference sheet of the various data center standards organizations? Keep this list by your desk as a reference.

                    Several organizations produce data center design standards, best practices and guidelines. This glossary lets you keep track of which body produces which standards, and what each acronym means.

                    Print or bookmark this page for a quick reference of the organizations and associated websites and standards that data center designers and operators need to know..."

                      IT - Security
                      x
                      Pirates in the Cloud: Security Issues, Threats, and Trends in Cloud Computing
                      ISSA South Florida Security Conference - March 20, 2015 @ The Signature Grand, Davie, FL
                      March 20, 2015 @ The Signature Grand, Davie, FL

                      We will look at all aspects of cloud computing, not just storage. Please have expertise on, Platform, Infrastructure, Software-as-as-Service, public/private/hybrid clouds, various new cloud providers and services. Issues of security should include privacy and trust as well.

                      The conference will have three tracks focusing on Cloud Computing Security:

                      • Management track - This track will focus on what is important for managers: policy, cost, budget, strategic solutions, hiring, retention, security programs, risk management, interacting with senior management, etc.
                      • Technical - This track will focus on everything technical from attack to defense and everything in between.
                      • Legal & Compliance - This track will address specific issues related to compliance and regulations such as PCI, HIPAA, IT governance, audit, etc.

                      All presentations are educational in nature - No vendor or sales talks!

                      Making the Case for Security
                      ComputerWorld, March 10, 2015
                      "Having been at my new company for several months now, this week I was invited to inform executive management about the state of our security. I had half an hour to formally introduce myself and talk about my philosophy, my initial findings and the priorities I think we need to have.

                      Thirty minutes isn't much time, of course, and I figured that I should be prepared to talk for just 15 minutes, so that I could give the team time to ask questions. I had to make that quarter of an hour really count..."

                      Security Testing Compliance Down from Last Year
                      CSO Online, March 12, 2015
                      "Compliance rates between audits increased substantially across all PCI DSS requirements except for security testing, according to a report released Wednesday by Verizon.

                      The average increase was 18 percentage points, the report said, with 20 percent of companies validated as compliant in their interim reports, up from just 11 percent in 2013 and 7.5 percent in 2012.

                      However, this means that 80 percent of companies are out of compliance between audits..."

                      6 Ways the Sony Hack Changes Everything
                      Dark Reading, March 11, 2015
                      "Sony Pictures experienced what many are calling the most devastating cyber attack to date, disrupting a movie release, knocking its corporate systems offline for weeks, threatening its distribution channels with terroristic threats of mass violence, and ultimately costing Amy Pascal, Sony Pictures Co-Chairman, her job. Throw in the nation-state component and how the attack played out in a very public way, and I see the Sony Pictures hack as a seminal security event that will forever change the way we view cybersecurity.

                      Aside from spending the better part of the holidays responding to concerned parties on the topic, after reflecting on the situation, I feel even more strongly that the Sony hack changes everything. Here's why:..."

                      When It Comes to Patient Data Privacy, Compliance and Security Differ
                      HelpNet Security, March 12, 2015
                      "If a name perfectly underscored a growing issue of concern, it's Anthem. In February, the health insurance plan provider disclosed cyber attackers had breached its IT system for several weeks and obtained consumers' personal data. The message this revelation spread is that healthcare-related organizations are increasingly prime targets for hackers and cyber thieves..."
                      Why the Internet of Things is useless without identity
                      Information age, March 13, 2015
                      "From toothbrushes that can schedule check-ups with dentists to yoga mats that can analyse poses in real-time, one thing is abundantly clear: 2015 is going to be a big year for connected devices.

                      Collectively referred to as the Internet of Things (IoT), this concept of connected devices is obviously nothing new. In fact, Gartner predicts that the number of Internet-connected devices will inflate to more than 25 billion by the year 2020. At the International Consumer Electronics Show (CES) in January, 3,000 companies launched more than 20,000 new products..."

                      IT Disaster or Data Breach?: 7 Must-Do Steps
                      Information Management, March 6, 2015
                      "It's no secret 2014 was a notable year for enterprise IT crises, and it's safe to say 2015 will have its fair share of scares as well. Unfortunately, data breaches aren't the half of it - system and service outages can be equally (if not more) devastating to enterprises. While major IT disruptions are damaging, preserving customer trust and confidence afterward is the next challenge organizations must perfect.

                      Maintaining trust from customers requires more than just a mea culpa. The stakes are high for customers with their personal data and information on the line, so transparent and proactive communication is key between businesses and their customers. Here's how to implement best practices for maintaining transparency and trust in the face of catastrophic service disruptions..."

                        Shortage of Security Pros Worsens
                        InfoWorld, March 9, 2015
                        "Security hiring challenges have worsened over the last several years. Threats are more numerous and more sophisticated; security breaches are more publicized; and CEOs, CIOs and CISOs are being held accountable for damaging hacks. It's no surprise companies are working harder to find, hire and retain experienced security pros..."
                        Weird Security Term of the Week: 'Snarfing'
                        LIFARS, March 9, 2015
                        "The Problem: You've just spent 36 hours traveling for work and finally arrived at your hotel. After finally relaxing a bit, you want to logon via the hotel's secure Wi-Fi and check your email, check out the news and watch some Netflix. After powering up the laptop, you discover the name of the Wi-Fi access point but notice that there are several with the same name. They all look secure, so you believe that they are all the same and pick one at random and connect..."
                        Kaspersky: 'A very Bad Incident' Awaits Critical Infrastructure
                        Network World, March 10, 2015
                        "Cyber-terrorism attacks against power grids, water supply systems, chemical plants and other critical infrastructure loom as a threat that could become harsh reality before slow-moving agencies act to secure them better, says the head of Kaspersky Lab.

                        Organizations that run these facilities using supervisory control and data acquisition (SCADA) gear are still gathering data about threats and aren't close to implementing new defenses to counter them, says Eugene Kaspersky, founder and CEO of the company..."

                        IT - Careers
                        x
                        9 Networking Tips for Introverts
                        CIO, March 11, 2015
                        "Networking, whether during a job search or simply to maintain professional connections and grow your network, can be stressful, even for the most outgoing, extroverted job-hunter. For an introvert, however, the process can be downright paralyzing. Even though introverts are often creative, thoughtful and work well with others, it often seems that extroverts have the edge when it comes to networking and making beneficial professional connections. But if you're an introvert, you can make networking more enjoyable and more successful by translating it into an approach that works with and not against their personality..."
                          IT is the Doctor
                          ComputerWorld, March 12, 2015
                          "I've been privileged to meet IT professionals around the world, and I'm always struck by their many fine qualities. One of the most common of these is the desire to help others. As a group, IT people believe in progress and hold that technology can be an important part of making people’s lives better. At work, we like to see that our products contribute to the efficiency, effectiveness and happiness of users and consumers..."
                            Six Entry-Level Cybersecurity Job Seeker Failings
                            CSO Online, March 10, 2015
                            "When it comes to hiring, enterprise security teams can use all of the help that they can rally. But when it comes to hiring entry-level talent, that's not as easy as it may seem.

                            According to a poll last summer of 1,000 18-26 year olds conducted by Zogby Analytics and underwritten by Raytheon, about 40 percent of Millennials reported they would like to enter a career that makes the Internet safer, but roughly two-thirds of them said they aren't sure exactly what the cybersecurity profession is, and 64 percent said that they did not have access to the classes necessary to build the skills required for a career in information security..."

                            7 Timeless Lessons of Programming 'Graybeards'
                            InfoWorld, March 9, 2015
                            "... The software industry venerates the young. If you have a family, you're too old to code. If you're pushing 30 or even 25, you're already over the hill.

                            Alas, the whippersnappers aren't always the best solution. While their brains are full of details about the latest, trendiest architectures, frameworks, and stacks, they lack fundamental experience with how software really works and doesn't. These experiences come only after many lost weeks of frustration borne of weird and inexplicable bugs..."

                              How to Tell If You're a Micromanager (and How to Stop)
                              IT World, March 2, 2015
                              "Micromanagement may seem harmless, but it's sabotaging your teams, your productivity and morale from within, and stifling your business's ability to grow," opines Sharon Florentine in IT World. "Here's how to tell if you're a micromanager, and some steps you can take to overcome this fatal flaw.

                              Are you never quite satisfied with your team's results? Do you avoid delegating at all costs, often taking on work that's far below your experience and talent level just because you're certain no one else can do it as well as you can? Are you constantly demanding status updates, progress reports and check-ins? It's time to face the facts: You're a micromanager..."

                              IT - Email
                              x
                              3 Reasons to Be Wary of the Internet of Things
                              CIO, March 11, 2015
                              "IT and security experts discuss why companies and consumers alike should be careful about deploying 'smart' appliances and devices that connect to the Internet and offer steps to protect against security and privacy threats..."
                              IT - Mobile
                              x
                              Smartwatches and Corporate Data
                              HelpNet Security, March 10, 2015
                              "I was super excited when my wife got me a smartwatch. In addition to the geeky coolness factor of a smartwatch, being a long-time security professional I was also interested in the security implications in a BYOD or corporate issued device scenario. Would this allow a new way for users to access corporate data? Is it possible to block these devices? And what other implications had I not considered?..."
                              8 Android Security Concerns that Should Scare IT
                              InformationWeek, March 10, 2015
                              "Even though mobile operating systems such as Android are superior to PCs when it comes to protecting against security threats, there still are several concerns that IT should beware...

                              Compared to traditional PC operating systems, the Android smartphone OS is far and away more secure. That's right. It's more secure than PCs mainly because the mobile smartphone space is so new. Android OS developers learned from security mistakes of the past, and they made significant strides in blocking those threats right from the start..."

                              Smart Home or Dumb Security Risk?
                              InfoWorld, March 6, 2015
                              "Internet-connected devices are flooding into homes, but with convenience comes vulnerability...

                              Technology-filled smart homes have come a long way since Rosie the robot housekeeper catered to the Jetsons' needs. But one thing the Jetsons never seemed to worry about was Rosie turning on them or being used as a surveillance device..."

                                10 Cool Tablets that are Coming Soon
                                InfoWorld, March 6, 2015
                                "A top 10 tablet tour from the tech types in Barcelona.

                                Even though the BBC argues that the age of the tablet has essentially ended, manufacturers exhibiting at the Mobile World Congress in Barcelona this year have only begun to fight. Here's a look through some of the coolest tablets on display..."

                                  IoT's Dark Side: Hundreds of Unsecured Devices Open To Attack
                                  Network World, March 6, 2015
                                  "A self-described security 'amateur' discovered hundreds of Internet-connected devices ranging from cameras to industrial control systems that were connected to the Internet without even basic password protection -- meaning they could be easily turned on and off or otherwise manipulated with a single click of a mouse..."
                                  IT - Big Data
                                  x
                                  Field Guide to Hadoop
                                  O'Reilly, March 12, 2015
                                  "If your organization is about to enter the world of big data, you not only need to decide whether Apache Hadoop is the right platform to use, but also which of its many components are best suited to your task. This field guide makes the exercise manageable by breaking down the Hadoop ecosystem into short, digestible sections. You'll quickly understand how Hadoop's projects, subprojects, and related technologies work together..."
                                  Should Companies Pay Users for Their Data?
                                  DataCenter Journal, March 12, 2015
                                  "The big business of user data, combined with concerns about privacy, is leading to some arguments that companies should pay their customers for their data. But even ignoring the problem of how to implement such a compensatory system, this idea may be missing the larger picture.

                                  Certain overriding privacy concerns may arise in the current political-economic climate because of the close relationship between government and corporations (read: fascism). Given the extensive, all-encompassing and incomprehensible legal code, along with the rampant spying by government, maintaining privacy has value beyond monetary rewards..."

                                    How big data can make tracks in the rail industry
                                    Information age, March 13, 2015
                                    "With an increasing spotlight on rail delays, disruptions and the rising cost of travel, pressure is understandably mounting on UK rail operators to improve the quality of service for the fare-paying public. And, as the recent bout of bad weather across the UK highlighted, rail travel is still frequently disrupted by signalling problems, broken-down trains and congestion. As a result, the industry, the Government and, of course, customers all recognise that something needs to change.

                                    Big Data is starting to be used to address this challenge through Predictive Maintenance (PM). This solution has come to the forefront thanks to the recent advancements in sensors and communication technologies in trains..."

                                    How Healthy is Your Decision Supply Chain?
                                    Information Management, March 10, 2015
                                    "We've all heard or uttered some variation of the phrase, 'It's not about the data, but the decisions you make with the data.' But still, so much of our emphasis seems to be on coping with data, not on converting that data into better business decisions.

                                    One construct that helps maintain focus on the ultimate prize - better decision making - is the decision supply chain. At Mu Sigma, we use this artifact extensively in our work with clients..."

                                      Big Data and Battle Tanks: Inside World of Tanks' Powerful Infrastructure
                                      Network World, March 11, 2015
                                      "Tracking the scores, progress and behavior of millions of players around the globe playing an online game is no laughing matter, according to T.J. Wagner, an executive producer and creative director for World of Tanks publisher Wargaming West, who spoke to Network World last week at PAX East..."
                                        The emergence of Spark
                                        Redmonk, March 13, 2015
                                        "In the continuing Big Data evolution of reinventing everything that happened in HPC a couple of decades ago (with slight modifications), one newer ecosystem that comes up more and more is the Berkeley Data Analytics Stack. Some of the better-known components of this stack are Spark, Mesos, GraphX, and MLlib.

                                        Spark in particular has gained interest due in part to very fast computation in-memory or on-disk, generally pulling from Hadoop or Cassandra (courtesy of a connector). And its programming model uses Python, Scala, or Java, which - especially in the case of Python - is very friendly to data scientists..."

                                        It's Back to the Future for Machine Learning Applications of Big Data
                                        Search Data Management, March 10, 2015
                                        "The recent rush of machine learning technology and products is formidable, but machine learning techniques are far from new. What's new is the number of parallelized data processing platforms becoming available for machine learning applications of big data.

                                        At the recent Strata + Hadoop World conference in San Jose, Calif., data specialists said the complexity of predictive machine learning algorithms and models, as well as the sheer numbers of such models, can limit use of machine learning in large corporations. They also discussed tools that help them address these limits..."

                                        IT - BYOD
                                        x
                                        The ultimate guide for an effective BYOD policy
                                        ITProPortal, March 14, 2015
                                        "The BYOD trend is something that often creeps up on companies as employees take the initiative in using their own kit. That can leave businesses with a BYOD environment but no proper policy.

                                        There are many potential benefits to BYOD in terms of employee efficiency and morale, but that's of limited use if it puts the safety of commercial data at risk.

                                        Webmasters' blog StudyWeb has created an infographic guide to creating an effective BYOD policy..."

                                        Rise of BYOD leads to explosion of unsafe enterprise apps
                                        ITProPortal, March 13, 2015
                                        "The rise of the App Economy and Bring Your Own Device has meant an uncontrolled explosion of apps inside the enterprise.

                                        IT departments often know nothing of the apps, have little opportunity or access to test them and therefore cannot do a valid risk assessment. For many companies, the risk of losing data or getting hacked is greater from insecure mobile apps than is it from external hackers.

                                        US company Veracode has now released some analytics from its cloud-based platform around the mobile applications that have been submitted to it for testing..."

                                        Top10
                                        x
                                        Top Ten Articles for last few Issues
                                        Vol 205 Issue 1; Vol 204 Issues 1, 2, 3 and 4; Vol 203 Issues 2, 3 and 4
                                        We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                        • SPARC: (Still) Not Dead, Since 1989
                                        • Feature of the Week: Liquid Loop Cooling
                                        • Announcing Oracle Hierarchical Storage Manager
                                        • Oracle's New Ethernet Switches and Virtual Network Services Target Software-Defined Data Centers and Cloud
                                        • 5 Steps for Installing Oracle Database 12c on Oracle Solaris 11
                                        • Oracle Announces Release of Java Development Kit 8, Update 40
                                        • Backing up MySQL using ZFS Snapshots and Clones
                                        • Exalogic Run Book
                                        • CIO/CTO Roundtable: The 2015 Outlook
                                        • Java SE 8 Update 40

                                        The longer version of this article has list of top ten articles for the last 8 weeks.

                                          IT - Server
                                          x
                                          Wall Street Rethinking Data Center Hardware
                                          Data Center Knowledge, March 11, 2015
                                          "Earlier this month, the Wall Street Journal reported that Bank of America, currently the second largest banking firm in the country, was in the midst of a shift from traditional data center hardware to hardware designed through the collective efforts of Open Compute Project, the Facebook-led open source data center and hardware design community. The article quoted the bank's CTO David Reilly saying he was planning to run about 80 percent of the workloads on infrastructure fashioned after the web-scale infrastructure companies like Facebook and Google have been designing for themselves by 2018..."
                                          Developer
                                          x
                                          Oracle Solaris Studio 12.4 Technical Mini-Casts
                                          By Larry Wake
                                          "This is a series of 11 audioless screencasts explaining various features of Oracle Solaris Studio 12.4. Topics include basic features and interesting details of the IDE, thread analysis, and memory leak detection. They're all quick and to the point; most of them are under two minutes.

                                          If you want to see why Oracle Solaris Studio is an essential product for Oracle Solaris and Linux developers, this is a great series to take a look at..."

                                          NetBeans
                                          x
                                          Royal Netherlands Navy on NetBeans
                                          By Geertjan Wielenga
                                          Geertjan writes, "A few days ago I had the opportunity to visit the headquarters of the Royal Netherlands Navy in Den Helder, which is in the tip of the most northern part of the Netherlands...

                                          The various military components on naval ships like the above are controlled by programs coded via an MDA (Model Driven Architecture) methodology based on the Shlaer-Mellor methodology, comparable to Executable UML. An in-house Shlaer-Mellor MDA and an ASL implementation are used for coding. The models and the ASL are compiled by an in-house compiler into C code, which is then compiled into an executable via a C compiler..."

                                          Security
                                          x
                                          Oracle Directory Server Enterprise Edition (DSEE) to Oracle Unified Directory (OUD)
                                          Upgrade and Co-existence
                                          Greg Jensen writes, "As a follow up on 'Why Customers Should Upgrade Directory Server Enterprise Edition (DSEE) to Oracle Unified Directory (OUD)?', I would like to illustrate in a case study how easily upgrade can be achieved.

                                          An upgrade process can be defined as the steps required for moving from a state where application leverage data managed within a DSEE directory service to a state where applications leverage data managed within an OUD directory service.

                                          There are multiple ways to achieve that goal:..."

                                          Nexenta News
                                          x
                                          Storage March Madness @ Dave and Busters, Hollywood, Florida With Nexenta
                                          Rescheduled Save the date: April 6 3-6 before the FINAL game at 7pm
                                          IT professionals involved with buying and selling storage are invited to a casual March Madness Event at Dave and Busters, Hollywood FL.

                                          Nexenta is the inventor and global leader of Software Defined Storage solutions. Nexenta delivers secure, high-performance, ultra-scalable, cloud- and virtualization-optimized storage software solutions on any hardware platform realizing the 'true' Software Defined Data Center to enable the biggest challenges in IT today; from rich media-driven Social Media to Big Data; from Internet of Things to Mobility via the Cloud. Built upon an 'open platform' and running on a broad choice of industry-standard hardware, Nexenta eliminates vendor lock-in and provides open, secure and scalable unified storage management at significantly lower total cost than legacy systems.

                                          Come meet the South East Nexenta team to learn more:

                                          Megan Jones, Eastern Channel Manager, Nexenta

                                          Megan is dedicated to growing Nexenta's business with Channel Partners. She is actively seeking Partners who can sell Software-Defined Everything (SDx), especially Software-defined Storage.

                                          Kelly Ziegele, Regional Account Manager, Nexenta

                                          With 15 years technical sales experience with firms such as NetApp, EMC, F5 and SanDisk, Kelly is your go-to South East resource for Software Defined Storage solutions.

                                          Scott Lobdell, Regional Systems Engineer, Nexenta

                                          A 25+ year IT veteran with extensive systems, networking and storage experience, Scott is your pre-sales technical expert for the South East.

                                          John McLaughlin, Professional Services, Nexenta

                                          John has been selling and implementing open-systems IT solutions in South Florida for 30+ years. He is your resource for implementing Nexenta-based solutions.

                                          Details to follow.

                                          Global Cloud Service Provider for Big Data Analytics in Oil and Gas Industry Runs on Nexenta Open Source-driven Software Defined Storage (OpenSDS)
                                          Drillinginfo Helps Enterprises Make Better, Faster Decisions via Best
                                          Cost/Performance and Web Scale Infrastructure to Manage Massive Data Growth

                                          Nexenta announced the deployment of its platform for Drillinginfo, an Austin-based Software-as-a-Service (SaaS) provider of data-driven intelligence to the oil and gas industry. What began as a simple online permit and completion-mapping database in 1999, became one of the 500 fastest growing companies in the United States by 2008, according to Inc. Magazine, and has one of the largest oil and gas databases in the world. Drillinginfo delivers game-changing information for oil and gas energy exploration decision support, enabling companies to get to better insights, faster...

                                          Drillinginfo has roughly 900 terabytes (TB) of data, and adds roughly 20-25 TB of data per month.

                                          Details

                                          Nexenta Showcases its Open Source-driven Software-Defined Storage Solutions with EUROstor and Supermicro at CeBIT 2015
                                          March 16th - 20th 2015
                                          Nexenta will be participating with top German reseller EUROstor and global provider of end-to-end computing solutions, Supermicro (@Supermicro_SMCI) by offering demos on its latest disruptive storage technologies. EUROstor develops, manufactures and sells high quality storage systems for large and medium enterprises, research centers and universities. CeBIT attendees can experience the range of solutions including NexentaStor, NexentaConnect software suite and NexentaEdge, the industry's first software-only scale out block and object storage solution for multi-petabyte enterprise and cloud solutions. Nexenta will be at stand D52 with both EUROstor and Supermicro.
                                          Level3 News
                                          x
                                          EarthLink Telecommunications Chooses Level 3 to Provide Secure Global Connectivity to its Customers
                                          Provides customers with a one-stop shop for connectivity services
                                          Level 3 Communications, Inc. announced it has been selected by Internet and communication solutions provider, EarthLink Telecommunications, to provide the secure global connectivity needed to support enterprise customers from EarthLink's Middle East location.

                                          EarthLink's 400-plus points of presence enable its customers to communicate in its local market. Yet the company faced the challenge of an ever-increasing demand for enhanced online security and connectivity to worldwide markets, particularly from customers in key local business sectors such as the financial services and oil industries. To meet the needs of its enterprise customers, EarthLink turned to Level 3's MPLS/IP VPN (Multiprotocol Label Switching/Internet Protocol Virtual Private Network) services to deliver the necessary secure, private connectivity.

                                          Trending in
                                          Vol 232, Issue 2
                                          Trending IT Articles