News about Oracle's Solaris and Sun Hardware
System News
Mar 16th, 2015 — Mar 22nd, 2015 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 205, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Fiscal 2015 Q3 Total Revenues were unchanged at $9.3 billion
Total SaaS, PaaS and IaaS Cloud Revenue Up 29% to $527 Million
Oracle Corporation announced that fiscal 2015 Q3 Total Revenues were unchanged at $9.3 billion. The strengthening of the U.S. dollar compared to foreign currencies had a significant impact on results in the quarter. Without the strengthening of the U.S. dollar, Total Revenues would have been up 6% as measured in constant currency. Software and Cloud Revenues were up 1% to $7.2 billion, and up 7% in constant currency. Cloud software-as-a-service (SaaS) and platform-as-a-service (PaaS) grew 30% to $372 million, and grew 34% in constant currency. Hardware Systems Revenues were down 2% to $1.3 billion, but were up 5% in constant currency.
Oracle Introduces Oracle Data as a Service for Customer Intelligence
New Oracle Data Cloud service enables organizations to leverage intelligence from direct or indirect customer feedback across all channels to gain unique business insights
To help organizations increase customer understanding and uniquely extract meaningful insights from any form of indirect or direct customer feedback, Oracle announced Oracle Data as a Service (DaaS) for Customer Intelligence.

The new Oracle Data Cloud product is designed to help organizations extract and unify insights from a growing world of unstructured data assets. These insights can be used to capture a complete view of customer input across social and enterprise channels, identify and manage customer issues, understand how customer voice is impacting sales, and ultimately arm businesses with the intelligence to create happier customers.

Organizations are struggling to deal with unprecedented amounts of customer data. While many organizations have visibility into marketing and social conversations, most don't have the ability to connect those with data from customer service channels for a broader view of the customer voice and how it impacts overall business.

Oracle DaaS for Customer Intelligence helps organizations address these challenges by unifying customer data across all social and enterprise service channels into aggregated signals about customer intent, including topics, indicators, themes and sentiment.

Do I still need Exadata now I have Oracle Database In-Memory?
Exadata is definitely the best platform for running Oracle Database In-Memory
Maria Colgan writes, "Over the last few weeks I've been meeting with Oracle customers all across Europe to discuss Oracle Database In-Memory. During these discussions there was a common concern raised by nearly everyone I spoke to, 'Do I still need Exadata now that I have Oracle Database In-Memory?'. So I thought it would be a good idea to address this question once and for all here on the blog..."
IT - Storage
New Spin on Magnetic Memories
Storage Newsletter, March 16, 2015
Abstract: "Spin-transfer-torque magnetic random access memory (STT-MRAM) devices store information in the orientation of the magnetization of nanometre-scale ferromagnetic elements. As such, they are like hard disk drives, which use magnetic states to store information. In contrast to hard disk drives, however, STT-MRAM is written and read electrically, and does not have moving parts. This is a key difference that enables the integration of magnetic devices with semiconductor chips. Such devices might fulfil the speed requirements of a computer's working memory while having the inherent advantages of using magnetic states - that no energy is needed to retain information."
    New method leaves older ways of 3-D printing in its goopy wake
    Science News, March 16, 2015
    "Researchers have created a versatile method for producing three-dimensional objects from a puddle of goo in mere minutes - faster than current 3-D printers by orders of magnitude.

    The technique, reported online March 16 in Science, manipulates a liquid resin, ultraviolet light and oxygen to create objects with precision down to less than a tenth of a millimeter. It could be used to manufacture products such as engine parts and medical devices.

    'They really thought about the chemical process,' says chemist Lee Cronin of the University of Glasgow in Scotland, who was not involved with the study. The speed and chemical tricks will 'definitely move the field forward,' he says..."

      IT - Technology
      USB Type-C Explained: What It Is and Why You?ll Want it
      How To Geek, March 17, 2015
      "Apple's new MacBook has a single USB Type-C port, but this isn't an Apple-only standard. This is a new USB standard, and - given time - it'll spread to everything that currently uses an older, larger USB connector.

      USB Type-C is closely intertwined with other new standards, like USB 3.1 for faster speeds and USB Power Delivery for improved power-delivery over USB connections..."

        Here's a USB Flash Drive that Could Fry Your Laptop
        ComputerWorld, March 13, 2015
        "Have you ever heard stories about malicious USB thumb drives frying laptops and thought they were far fetched? An electronics engineer heard them, too -- then set out to create a prototype.

        The "USB Killer" device was created by a do-it-yourself hardware enthusiast who described his project, complete with pictures and technical details, on a Russian blogging platform in February. An English-language version was posted on a different site earlier this week..."

          Do Smart Machines Require Ethical Programming?
          HelpNet Security, March 17, 2015
          "Realizing the potential of smart machines - and ensuring successful outcomes for the businesses that rely on them - will hinge on how trusted smart machines are and how well they maintain that trust. Central to establishing this trust will be ethical values that people recognize and are comfortable with..."
            Self-Driving Audi to Drive from California to New York
            ComputerWorld, March 18, 2015
            "Automotive component-supplier Delphi is about to launch a self-driving Audi SUV on a 3,500-mile journey from San Francisco to New York.

            The trip, which will begin March 22 near the Golden Gate Bridge, will end in New York City. It is the first cross-country trip by an autonomous vehicle, and arguably the longest anyone has made.

            The autonomous Audi SQ5 is making the trip in order to test Delphi's suite of advanced driving assistance systems (ADAS) vehicle-to-vehicle and vehicle-to-infrastructure wireless communications and automated driving software..."

            IT - Bitcoin
            Bitcoin Nanosatellites Could Orbit Earth in 2016
            Coindesk, March 16, 2015
            "An ambitious plan to launch bitcoin-enabled microsatellites has taken a step forward with a new business deal.

            Dunvegan Space Systems, a startup led by bitcoin core developer Jeff Garzik has signed a manufacturing contract with Deep Space Industries (DSI) that will find it constructing 24 nanosatellites for its proposed BitSat program.

            The BitSat cluster will act as space-bound bitcoin nodes and is the first of a planned series of nanosatellites. Additional BitSats will be available for purchase at $1m apiece, according to the company..."

            Intel Joins the Blockchain Technology Race, Forms Special Research Group
            Bitcoin Magazine, March 19, 2015
            "Last week Bitcoin Magazine reported that IBM is considering adopting the blockchain technology behind Bitcoin to create a digital cash and payment system for government and central banks. Now another technology giant is joining the digital fintech technology race: Intel is planning to investigate the potential of blockchain technology.

            Intel has posted a job announcement for a new researcher to join its special innovation projects group to 'investigate hardware and software capabilities that advance the performance, robustness, and scalability of open, decentralized ledgers.'..."

            An Overview of the Current State of Bitcoin Cloud Mining
            NEWSBTC, March 20, 2015
            "Earlier this year, the leading Bitcoin Crypto Exchange and Cloud Mining service provider had suspended Bitcoin cloud mining services citing a drastic plunge in the cryptocurrency's price and an increase in network difficulty.

            'Mining with using User's Gigahashes can be stopped by CEX.IO if the amount of the Maintenance Cost exceeds rewards for each mined block or if the mining is economically inexpedient.'..."

            Bitcoin Users To Approach 5 Million Mark By 2019, Juniper Research Reports
            Crypto Coin News, March 17, 2015
            "The number of active bitcoin users worldwide will reach 4.7 million by the end of 2019, marking a significant gain over the 1.3 million last year, according to a report from Juniper Research we received today. However, the report, 'The Future of Cryptocurrency: Bitcoin & Altcoin Impact & Opportunities 2015-2019' notes that exchange trading will continue to dominate bitcoin use, with retail adoption largely restricted to niche demographics..."
            UK's Plans to Regulate Bitcoin Revealed in Treasury Report
            Coindesk, March 18, 2015
            "The UK Treasury has announced a series of initiatives dealing with digital currency in a landmark report published in conjunction with the Chancellor of the Exchequer's annual budget speech today.

            The announcement is the government's first major attempt to grapple with the regulatory and consumer safety issues surrounding digital currencies.

            The report is largely positive towards digital currencies, noting its potential as a payments technology, while also underlining its nascent state and the potential risks associated with its use..."

              Credit Suisse Publishes Paper on Bitcoin: Explores Integration with Traditional Financial System
              Bitcoin Magazine, March 20, 2015
              "Mainstream banks and financial institutions are warming up to Bitcoin and digital blockchain-based fintech, often with a surprisingly positive and open-minded attitude.

              In a recent research paper titled 'One Bank Research Agenda,' the Bank of England said that Bitcoin could reshape the financial industry and called for further research to devise a system that could use distributed ledger technology without compromising a central bank's ability to control its currency..."

              Bitcoin?s Future ? A Macroeconomic Model
              NEWSBTC, March 21, 2015
              "If you know about bitcoin, then you will be familiar with its ever fluctuating price. Have you ever wondered what causes these price fluctuations? Is it something to be worried about? Also, what does the future hold for bitcoin?

              It is assumed that the value of bitcoin is directly dependent on its use for transactions. It is believed that an increase in bitcoin transactions increases its value. But a working paper published by Hong Kong based Bitquant Research Laboratories begs to differ. Bitquant is a company involved in R&D supporting high risk/high reward open source financial systems..."

              Is The World Ready For Bitcoin To Go Mainstream?
              Forbes, March 19, 2015
              "Bitcoin is changing the way people pay for things and the larger economy overall. Although bitcoin remains mysterious and confusing to most people, there are signs nearly every day that bitcoin is gaining more and more legitimacy, not only in technology circles but also amongst the mainstream.

              Bitcoin was pegged in a report by Goldman Sachs as having the potential to reshape the financial industry, in large part due to the way the currency decentralized the movement of money. If that's not enough, just recently one New Hampshire legislator introduced a bill that could lead to the state accepting bitcoins for taxes and fees..."

              IT - FOSS
              101 Open Source Tools for Developers
              Datamation, March 19, 2015
              "These days, nearly every developer is familiar with the benefits of open source code and coding tools. Open source repositories like GitHub and SourceForge provide invaluable resources for those searching for assistance in creating their own applications.

              In addition, many of the most popular development tools are available under open source licenses. The last few years have seen an explosion of new tools, particularly in categories like mobile development and JavaScript frameworks. This month we're updating our previous list of open source development tools and highlighting 101 of the very best open source bugtrackers, programming languages, version control systems, frameworks, IDEs, text editors and other tools..."

              Unbreakable Enterprise Kernel Release 3 Quarterly Update 5 Now Available
              Includes driver updates and a consolidation of fixes for bugs and security issues
              Michele Casey writes, "We are pleased to announce the availability of Unbreakable Enterprise Kernel Release 3 Quarterly Update 5 (UEKR3U5) for Oracle Linux 6 and Oracle Linux 7. This is the fifth quarterly update release for UEK Release 3 (Version 3.8.13-68) and includes driver updates and a consolidation of fixes for bugs and security issues.

              Some notable highlights include:..."

              MySQL for Developers Training Now Available Online
              Now available as a Training-on-Demand offering
              The popular MySQL for Developers course is now available as a Training-on-Demand offering. Start training within 24 hours of registration, following lecture materials at your own pace via streaming video and booking time to get hands-on experience when it suits your schedule.

              The MySQL for Developers training covers everything a developer needs to know when planning, designing and implementing applications using MySQL. Learn through realistic examples using languages like Java and PHP.

              MySQL Enterprise Backup 3.12.0 has been released
              Focuses on enhancing the capabilities of the product

              Priya Jayakumar writes that the "MySQL Enterprise Backup team is excited to announce the new release of MySQL Enterprise Backup (MEB) 3.12.0.

              MEB 3.12.0 focuses on enhancing the capabilities of the product that would be very useful to the database administrators.

              New functionality added:

              • Support for Open Stack Object Storage
              • Table rename while selective restore

              Bugs Fixed: In MEB 3.12.0 we have addressed quite a number of bug fixes..."

              MySQL Newsletter
              March 2015
              The MySQL March Newsletter is published! Find out what's new in MySQL Cluster 7.4 GA and MySQL 5.7.6 DMR in this edition, and mark your calendar for upcoming webcasts. Below are the highlights in this edition:

              • Blog: 200M Reads Per Second in MySQL Cluster 7.4
              • Get Ready for the MySQL Central 2015 Call for Papers
              • Webcast: NoSQL and SQL--The Best of Both Worlds on March 26
              • Webcast: What's New in MySQL Cluster 7.4 on April 9
              • Blog: More Awesome Replication Features in MySQL 5.7.6 DMR

              You can read it online.

              Cloud Computing
              Oracle Data as a Service for Marketing Connects B2B Marketers with Millions of Business Professionals and Decision-Makers
              300 million anonymous audience profiles and 100 million known professional contacts help marketers prospect across e-mail and digital media channels
              Business-to-business (B2B) marketers must constantly reach new audiences in order to increase the number of sales leads and opportunities to drive sales conversion. Their challenge is to efficiently target qualified audiences while not wasting impressions and dollars on businesses or people who are not qualified buyers. To help marketers identify, qualify, and target new professional audiences with more relevant cross-channel messages,

              Oracle extended Oracle Data as a Service for Marketing (Oracle DaaS for Marketing) with the release of a comprehensive B2B data set for smarter prospecting. The offering spans anonymous audience data for digital media targeting as well as known profile and business data for database enrichment and e-mail prospecting.

              "Data targeting is no longer a strategy employed only by consumer marketing professionals," said Omar Tawakol, senior vice president and general manager, Oracle Data Cloud. "By bringing data as a service to marketers, we are providing a new world of external data that enables targeting accuracy and scale to every B2B interaction."

              SaaS for Dummies
              How do you talk cloud for those that lack IT vocabulary?
              Cloud is no longer just an IT or Technology issue, cloud is becoming increasingly popular at organizations around the world as they are realizing that cloud has something for everyone, including business managers. Industry trends are showing that LOB leaders are taking more of a prominent role in decision making when it comes to adopting cloud applications for their department. So the question becomes, how do you talk cloud for those that lack IT vocabulary?
                IT - Cloud
                Mastering OpenStack
                O'Reilly, March 18, 2015
                "OpenStack is becoming the ultimate open source cloud operating system. It is an open source infrastructure as a service (IaaS) initiative for creating and managing large groups of virtual private servers in a data center. Managing a large set of computing, storage, and networking resources is becoming more flexible for cloud administrators through a web interface. One of the many features of OpenStack is that it makes use of a common infrastructure which helps an entire industry to plug into it and support it individually. This in turn reduces the complexity of maintaining the infrastructure and in turn assists in cost saving.

                This comprehensive guide will help you to choose the right practical option and make strategic decisions about the OpenStack cloud environment to fit your infrastructure in production..."

                Multi-cloud doesn't have to mean cloud chaos - here's how
                Information age, March 19, 2015
                "Working with a variety of cloud vendors can create a complex environment, making it all the more important to have a proper strategy in place to manage it

                In an effort to capitalise on the benefits of cloud computing, early adopters turned to multiple cloud vendors to satisfy their various infrastructure needs. For instance, you may have been working with a customer relationship manager (CRM) specialist for hosting your customer insights, and a private cloud expert for financial data..."

                Spending Less Without Sacrificing 'Pay As You Go' in the Cloud
                Business 2 Community, March 16, 2015
                "In a recent article, I discussed the cost trade-offs of using AWS Reserved Instances compared to On-Demand Instances, especially in light of AWS' habit of reducing prices of the latter. We saw that the savings promised by Reserved Instances dissolve if On-Demand pricing is reduced.

                I also lamented the fact that AWS' approach of asking for money upfront for Reserved Instances violates the spirit of cloud computing, which is supposed to have a 'pay as you go' approach.

                So, how do you keep your costs low without giving up 'pay as you go'? There are a few options:.."

                How Data as a Service (DaaS) Revolutionizes Marketing
                Information Management, March 17, 2015
                "Marketing has changed almost beyond recognition in the last decade. In an age of bigger and faster data, consumers are driven by knowledge and have more choices across an ever-increasing number of channels. More so than ever before, marketers must truly embrace a multi-channel mindset of sending the right message at the right time and through the channels consumers most prefer.

                Meeting the demands of today's omni-channel consumer requires a well-integrated offline and online marketing strategy..."

                  Forget About IaaS, PaaS And SaaS - It's All About the Platform
                  Network World, March 17, 2015
                  "Forrester report urges us to reconsider how we think about the cloud

                  The cloud computing market is typically broken into three buckets: IaaS, SaaS and PaaS. Infrastructure as a Service (IaaS) represents on-demand compute and storage; Software as a Service (SaaS) vendors host applications in the cloud; and Platform as a Service (PaaS) is a cloud-based application development platform. But a recent Forrester's Wave report throws those buckets out the window..."

                  How CIOs become Hybrid Cloud Heroes
                  Data Center Knowledge, March 19, 2015
                  "Oded Haner is the CTO at HotLink. He is an accomplished, strategic, collaborative technology leader with extensive experience in bringing innovative IT technologies to market.

                  The role of the CIO is difficult. Traditionally, CIOs face three main issues: ever-shrinking budgets, ever-growing expectations and overall lack of predictability. The CIO falls victim to too many responsibilities being thrown at him, and he has to field requests from all different parts of the business for the tools users need to make informed decisions. In addition to managing his regular duties, the CIO is dealing with other surprises..."

                  It Came from the Cloud: The Looming Change In IT
                  InfoWorld, March 19, 2015
                  "Guess what? PaaS -- the cloud platform to automate dev, test, and deployment of applications -- is back.

                  For years, so-called thought leaders including myself have run off at the mouth about how IaaS is more of a stopgap, and eventually everything will be SaaS and PaaS. After all, why should you lovingly craft each installation yourself? Why should you build your own PaaS on IaaS with Puppet? Instead, the commoditization of computing will enable you to treat everything as either an application or a resource. PaaS must surely triumph..."

                  IT - CxO
                  The decade of the data breach ? how to cope
                  Information age, March 20, 2015
                  "Virtually every Fortune 5000 company, government entity and NGO has had at least one major data breach during this decade, with many having multiple 'badges of shame' to their credit.

                  Each breach, whether malicious or accidental, brings all sorts of recriminations and bad press to the organisation and its leadership. Mea culpas and low-level IT managers falling on their swords has become commonplace and is now meaningless for the most part as the root cause of the issue continues to not be addressed: the lack of executive data leadership.

                  Data, especially those classes that contain personally identifiable information (PII), is one of the most valuable assets that every organisation collects, stewards, exploits and protects..."

                    4 Data-Driven Predictions for IT Innovation
                    InformationWeek, March 12, 2015
                    "Data from the 2015 InformationWeek Elite 100 companies shows how these digital innovators are using analytics and cloud, and where they could miss the boat.

                    Each year, InformationWeek releases our list of the Elite 100, a select group of companies that are business-IT innovators. In the process, we survey these top-of-the-class companies on how they address important IT issues such as tech spending, organizational priorities, and strategy..."

                    Listen to Your Employees or Deal With Shadow IT
                    HelpNet Security, March 13, 2015
                    "Data leakage, compliance breaches, business inefficiency and hidden costs are just some of the risks organizations are leaving themselves open to by not meeting the IT demands of their workforce.

                    Speaking at Cloud Expo Europe in London, Tom Homer, the Head of EMEA and the Americas for Telstra Global Enterprise and Services listed these problems as the potential results of shadow IT, the phrase coined for the increasing trend of employees going against their company's IT policy to implement their own solutions and platforms..."

                      Is It Time For CIOs to Step Up And Rule The Digital World?
                      CIO, March 17, 2015
                      "To help gain a view of the digital customer, some enterprises are expanding the C-suite to include a chief digital officer, chief data officer, chief analytics officer, chief marketing technologist, chief experience officer and the list goes on. But have businesses had the answer all along in the CIO?..."
                      If You Don't Fail, You Aren't Innovating: How to Keep Tech Staff Engaged and Customers Happy
                      ZDnet, March 19, 2015
                      "Finding and retaining staff with in-demand tech skills is one of the hardest jobs for tech executives, and some firms are already taking proactive steps. Take Jim Anning, who is head of data and analytics at British Gas Connected Homes, a specialist unit that has been set up to investigate the use of big data and smart technology.

                      Anning recognises the hype surrounding big data and related areas, such as the Internet of Things and wearable technology, is cacophonous. So, what has Anning learnt from his experiences at Connected Homes and how can other digital leaders apply some of these lessons in their own firms? Here, he offers four pieces of advice..."

                      When a Tech-Savvy Customer Finds a Privacy Flaw
                      Privacy Association, March 19, 2015
                      "As businesses continue to thrive on technological advancements, finding and quickly patching security and privacy flaws in that technology may be the difference between a headline in The Wall Street Journal and a happy customer base. It's true that building systems can be a difficult ordeal and that finding every vulnerability from the outset is next to impossible.

                      That's why some companies actually hire White Hat hackers or sponsor hackathons to scour their systems and point out any vulnerabilities. But even so, with a generation of tech savvy users - many equipped with good intentions - it's likely other flaws can and will be discovered.

                      So what do you do if one of your customers finds a flaw in one of your products?..."

                      vBeers @ Miami - Biscayne Tavern - Wed March 25th
                      6pm - 8pm:
                      Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida. Register today so you can be a part of this great monthly event! Feel free to invite all of your friends and co workers who work in the IT industry!

                      Sponsored by VaultNetworks and Nexenta Systems

                      This will be a sponsored event so beers are on us. Join us for an evening of creating connections and building your network in a relaxed and fun environment.

                      Vault Networks offers dedicated server solutions, colocation services, cloud computing, hybrid cloud solutions, backup services, and technical service 24/7/365.

                      There is absolutely NO SALES PITCH, just FREE ice cold beers and tech talk!

                      "Meet-Ups" are an essential aspect of your professional growth and development. Connect with an array of professionals while enjoying a drink or two.

                      • Location: Biscayne Tavern
                      • Address: 146 Biscayne Blvd, Miami, FL 33132
                      • Date: Wednesday, February 26th
                      • Time: 6pm to 8pm - arrive and depart any time

                      Join us for one of the three South Florida vBeers events. The South Florida vBeers events happen four times a month (Palm Beach Gardens, Broward, Boca & Miami).

                      Please register at EventBrite.

                      Details posted to vBeers South Florida LinkedIN Group.

                      IT - PM
                      Do You Have What It Takes to Be a Project Manager?
                      CIO, March 13, 2015
                      "Do you ever wonder if project management is the right career choice for you? It is multifaceted and rewarding, but it is also a demanding job. Here are eight things to consider to help you decide if you're cut out to be a project manager..."
                      IT - Networks
                      Python Network Programming Cookbook
                      O'Reilly, March 19, 2015
                      "Python is an excellent language to use to write code and have fun by prototyping applications quickly. The presence of lots of third-party libraries, also known as batteries, makes it even more easier and faster to prototype an application or to implement a new algorithm. If you are interested in creating the building blocks for many practical web and networking applications that rely on networking protocols then this book is a must-have.

                      This book highlights major aspects of network programming in Python starting from writing simple networking clients, to developing complex screen-scraping and network security monitoring scripts. It creates the building blocks for many practical web and networking applications that rely on various networking protocols. This book presents the power and beauty of Python in solving the numerous real-world tasks in the area of network programming, system and network administration, network monitoring, and web-application development..."

                      What the battle for the Ethernet market could mean for network management
                      Information age, March 19, 2015
                      "Is IEEE losing ownership of Ethernet standards, and could this be the start of the Ether-wars? Ken Hodge, CTO at network infrastructure firm Brand-Rex, explains what's going on behind the scenes...

                      Major players like Microsoft, Broadcom, Google, Cisco, Dell and others have broken rank and have developed and promoted new proprietary 'standards' outside of the normal multiplier approach. They are supporting new speeds of 2.5Gb/s, 5Gb/s, 25Gb/s and 50Gb/s- seemingly flying in the face of the IEEEs 1 to 10 to 100Gb/s progression (acknowledging 40Gb/s as a technology-limited step to 100Gbps)

                      So we have to ask: is the once IEEE-driven Ethernet market now fragmenting?..."

                      Bare-metal switches poised to take off in data centers
                      ComputerWorld, March 20, 2015
                      "Bare-metal switches that can be programmed like Linux servers aren't just for big Web companies anymore. They may show up in a lot more average enterprises in the next few years.

                      Cloud-based service providers like Facebook and Google have been building data-center networks out of generic hardware and homegrown software for years. Now vendors including Hewlett-Packard and Dell are beginning to sell switches much like they do bare-metal servers..."

                      SDN: An Enabler for NFV
                      NetworkComputing, March 13, 2015
                      "Software-defined networking and NFV can be used independently, but SDN makes it much easier to implement and manage NFV

                      Millions of consumers and businesses are connected to some type of network on a daily basis. Yet, chances are, most can't begin to understand the complexity of what's going on in that network. What they do understand is their need for greater bandwidth and that places even greater stress on the network infrastructure. Fortunately, software-defined networking (SDN) and network functions virtualization (NFV) promise to help mitigate this challenge and in the process transform the future of networks..."

                      Networking's Open at Last. Now What?
                      PCWorld, March 16, 2015
                      "Networking hardware and spontaneous applause don't often go together, but Facebook's Omar Baldonado set off a round of cheering this week when he told engineers there's finally an open-source hardware design that they can use to build switches.

                      It was a goal the Open Compute Project had been working toward since mid-2013, and though the breakthrough happened late last year, Baldonado's speech at the organization's summit in San Jose, California, was a occasion for line-rate, no-packets-barred celebration.

                      OCP had done the same thing for networking that it did for computing: Make hardware designs openly available, so vendors can build lots of different boxes easily and cheaply, and promote open software development to give IT teams a choice of what to deploy..."

                      IT - Linux
                      The Open Source Squad at the GSA
                      Linux Insider, March 3, 2015
                      "The GSA is the largest service provider for the U.S. government, and 18F is at the GSA. The unit follows a cost-reimbursable model. This means that other agencies within the federal government pay 18F for its services. The unit typically works through the Economy Act, so it can only charge for actual expenses spent, said Greg Godbout, executive director of the General Services Administration's 18F..."
                        Data center managers struggle to fill Linux admin jobs
                        Search Data Center, March 16, 2015
                        "Linux talent is in high demand, with organizations willing to pay big bucks for those with the right qualifications. Do you have what it takes?

                        The rise of open cloud platforms has had a positive impact on the Linux admin jobs market, with data center managers doing their best to attract and retain Linux talent.

                        Nearly all of the over 1,000 IT managers surveyed by Dice, an IT career website, and The Linux Foundation said they plan to hire professionals with Linux skills..."

                        Security in Three Ds: Detect, Decide and Deny
                        The Linux Jornal, March 16, 2015
                        "Whenever a server is accessible via the Internet, it's a safe bet that hackers will be trying to access it. Just look at the SSH logs for any server you use, and you'll surely find lots of "authentication failure" lines, originating from IPs that have nothing to do with you or your business. Brute-force attempts (such as "dictionary attacks") try different passwords over and over to try to get into your box, and there's always a chance that they eventually will succeed. Thus, it's a good idea to apply these "three Ds" for your security: detect intruder attempts, decide when they've gone "over the top" (past what would be acceptable for honest-to-goodness typing mistakes), and deny them access at least for a (longish!) while..."
                        The GNU Manifesto Turns Thirty
                        The New Yorker, March 17, 2015
                        "Unix, one of the earliest computer-operating systems, was developed between the late nineteen-sixties and the early nineteen-eighties, by AT&T Bell Laboratories and various universities around the world, notably the University of California, Berkeley.

                        It was the product of a highly collaborative process, in which researchers and students built and shared their code in an atmosphere of excitement and discovery that was fostered, in part, by an agreement that AT&T representatives had signed, in 1956, with the Department of Justice, circumscribing the company's commercial activities in exchange for an end to antitrust proceedings.

                        But in 1982, AT&T was broken up and its agreement with the department ended; before long, the company was selling copies of Unix without including the source code from which it was derived, effectively commercializing the operating system and hiding its building blocks within a proprietary program. The move greatly upset many in the programming community, including Richard Stallman, a software developer in his late twenties who was then working at M.I.T.'s Artificial Intelligence Laboratory..."

                        IT - Operations
                        CIOs: Use DevOps to break down traditional development silos
                        The Enterprisers Project, March 17, 2015
                        "Everyone's talking about the benefits of DevOps, but moving to a DevOps model can be a big challenge for traditional IT departments. How do you break down traditional silos and ingrained ways of doing things? The American Productivity & Quality Center (APQC), a nonprofit focused on business benchmarking and best practices, is completing just such a transition.

                        Who better to share best practices for moving to DevOps than Ron Webb, APQC's executive director of Open Standards Benchmarking, Stats Hub, and Information Systems? In an interview with The Enterprisers Project, he shares what APQC has learned so far..."

                        Finding a Place for DevOps Innovation
                        Datamation, March 20, 2015
                        "If there was any doubt that DevOps innovation was first and foremost a cultural movement (rather than one predicated primarily upon specific technologies), then the growing influence of DevOps in areas such as UX design should dispel it. The key tenets of DevOps - collaboration, breaking down organizational silos and enabling agile delivery of resources and software - can be just as useful in user experience discussions as in test lab consolidation processes..."
                        IT - Security
                        Biometric Security Could Do Away with Passwords
                        Homeland Security News, March 13, 2015
                        "With hackers and cyber thieves running rampant online, efforts to create stronger online identity protection are leading major tech firms to invest in biometric security methods. Analysts predict that 15 percent of mobile devices will be accessed with biometrics in 2015, and the number will grow to 50 percent by 2020..."
                        The Privacy Revolt: The Growing Demand for Privacy as a Service
                        HuffPost, March 18, 2015
                        "There's one thing just about every company has in common right now. Without even necessarily meaning to, they have in some way become the proprietor of a new kind of wealth. I'm referring of course to their customers' data. But the flip side of acquiring that data is that your customers now hold you to certain expectations -- namely that you're taking steps to safeguard their privacy.

                        So let me put it simply: No matter what market you're in, no matter what service you provide or product you sell, from right now until the end of time, you're in the privacy game. Welcome..."

                          Insider threat programmes set to double as security breaches persist
                          Information age, March 20, 2015
                          "2015 is set to see a huge rise in the number of IT professionals taking action to address insider threat in their organisations, according to new research.

                          Currently 43% of IT professionals in the UK have an insider threat programme already in place, and 36% are planning to put one in place this year. A further 8% are planning an insider threat programme within five years..."

                            Deconstructing Threat Models: 3 Tips
                            Dark Reading, March 12, 2015
                            "There is no one-size-fits-all approach for creating cyber threat models. Just be flexible and keep your eye on the who, what, why, how and when.

                            There are a lot of theories about creating threat models. Over the years, I've used threat models in many ways at both the conceptual and application level. Their utility often depends on the context and the job to which they are applied..."

                              Has Security Ops Outlived its Purpose?
                              Dark Reading, March 12, 2015
                              "CISOs will need more than higher headcounts and better automation tools to solve today's security problems.

                              It's telling how a devastating information security failure can bring about a sudden change in priorities. Nobody was surprised that in the aftermath of Target's compromise, retailer created a CISO role with a budgeted security operations team. Similarly, after the Sony Pictures hack, the entertainment company opened requisitions for key IT security positions.

                              But adding headcount alone is not sufficient ..."

                              8 Steps Successful Security Leaders Follow to Drive Improvement
                              CSO Online, March 13, 2015
                              "These are the steps successful security leaders follow to reframe their efforts and enjoy the success of an improved program, less stress, and recognition from other leaders

                              Security leaders experience pressures and challenges no other leader in the organization faces -- or understands.

                              Improving the security program, aligning with the business, and recognition as a peer from other leaders is possible. Done right, it even generates less stress.

                              Here are 8 steps you can follow to strengthen your leadership while improving your security program..."

                              Users Plus Passwords Equals Disaster
                              Network World, March 14, 2015
                              "A survey by Siber Systems confirms that how passwords are really used is really, really bad

                              Just like oil and water or peaches and concrete, passwords and users don't mix too well. The problem is that users want ease of use with the products and services they access which, to them, means having to remember as few passwords as possible. And by 'remember' I don't just mean from the user's memory; the old sticky note stuck to the underside of their keyboard is a horrifyingly common solution for them..."

                                Yahoo's New On-Demand Password System Is No Replacement for Two-Factor Authentication
                                ComputerWorld, March 16, 2015
                                "In an effort to simplify authentication for its services, Yahoo has introduced a new mechanism that allows users to log in with temporary passwords that are sent to their mobile phones.

                                If this sounds like a two-factor authentication system where users need to provide one-time codes sent to their mobile phones in addition to their static passwords, it's not. Yahoo already had that option.

                                Instead, the new log-in mechanism, which is based on what Yahoo calls on-demand passwords, still relies on a single factor, the user's phone number..."

                                  6 Reasons Why Improving Security Is so Hard
                                  InfoWorld, March 16, 2015
                                  "Last year, when Target's CEO and CIO resigned in the wake of one of the largest thefts of payment card info in history, a seminal moment seemed to have arrived: At last, C-suites everywhere had been put on notice. The consequences of not taking security seriously were abundantly clear.

                                  Since then, unabated, the parade of household names beset by data breaches has rolled on: Michaels, PF Chang's, Community Health Systems, UPS, Dairy Queen, Goodwill, Home Depot, JP Morgan Chase, Kmart, Staples, and most notoriously Sony, where the consequences -- not only for Sony Pictures exec Amy Pascal, but for the storied brand itself -- were catastrophic..."

                                  Ransomware: Pay it or Fight It?
                                  Network World, March 16, 2015
                                  "Ask security experts what to do when hit with ransomware - the sophisticated malware that infects a device or network, uses military-grade encryption to restrict access, and demands payment for the decryption key -and you'll typically get the same answer: "never pay the ransom."

                                  But for many, that's simply not an option. For example, last November an employee in the Sheriff's Department in Dickinson County, Tenn., accidentally clicked on a malicious ad and exposed the office network to the infamous CryptoWall ransomware..."

                                  9 Biggest Information Security Threats for the Next Two Years
                                  CIO, March 17, 2015
                                  "Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security threats over a two-year period. Here are the top 9 threats to watch for through 2017..."
                                  Not All Data Breaches Are Created Equal - Do You Know the Difference?
                                  CSO Online, March 17, 2015
                                  "It was one of those typical, cold February winter days in Indianapolis earlier this year. Kids woke up hoping for a snow day and old men groaned as they scraped ice off their windshields and shoveled the driveway. Those were the lucky ones, because around that same time, executives at Anthem were pulling another all-nighter, trying to wrap their heads around their latest data breach of 37.5 million records and figuring out what to do next. And, what do they do next?..."
                                    The 7 best Social Engineering Attacks Ever
                                    Dark Reading, March 17, 2015
                                    "Social engineering is nothing new.

                                    In 1849, Samuel Williams, the original "confidence man," as the newspapers named him, engineered gullible strangers out of their valuables simply by asking "Have you confidence in me to trust me with your watch until tomorrow?" Through the late 19th and early 20th century Joseph "Yellow Kid" Weil ran a variety of scams, including conning Benito Mussollini out of $2 million by selling him phony rights to mining lands in Colorado. And of course in the 1960s, Frank Abagnale, subject of the movie Catch Me If You Can, made a living faking identities and passing bad checks..."

                                      Don't Overlook your Biggest Security Flaw -- Your Talent
                                      CIO, March 18, 2015
                                      "The IT skills gap isn't as bad as you think -- it's worse, much worse. Especially in the area of cybersecurity, that skills gap is a major threat to your business.

                                      The skills gap all IT organizations struggle with can be summed up in three words: "not enough people," according to author and Wall Street Journal columnist Gary J. Beach (Beach is also publisher emeritus of CIO magazine and But when the skills gap is viewed through the lens of cybersecurity, it becomes much more than an HR struggle to put bodies in seats - it can be dangerous and costly..."

                                      New Security Mindset: Focus on the Interior
                                      Dark Reading, March 18, 2015
                                      "Chief privacy officer Jason Straight shares his insights on why organizations are struggling to stop the breach wave -- and manage the aftermath.

                                      Hackers keep on hacking, breaches keep on happening. The cycle continues, as major corporations now routinely get successfully compromised. A key element of the equation now is properly and efficiently responding to an attack as well as managing its aftermath..."

                                        IT - Careers
                                        5 Tools for Wrangling Remote Workers
                                        Business 2 Community, March 15, 2015
                                        "With more than 3.3 million people in the United States working from home at least half the time, collaboration tools are becoming an essential part of the formula for business success. Many tools are available to help your business bring remote workers to a 'virtual office' to ensure everyone works efficiently and productively..."
                                          10 Career Risks You Should Be Willing to Take
                                          TechRepublic, March 18, 2015
                                          "One of my favorite guilty-pleasure films is Hackers. There's a great line in it, where the gang is hunched over a new laptop. Dade and Kate have a quick exchange that says it all:

                                          DADE: Yeah. It's not just the chip. It has a PCI bus. But you knew that.

                                          KATE: Indeed. RISC architecture is gonna change everything.

                                          DADE: Yeah. RISC is good.

                                          Of course, they were talking about reduced instruction set computing -- not about taking a chance on the unknown. But the subtext was clear. In some cases, risk is good, too. In fact, with many a career, taking a chance with the unknown could be just the thing to launch you into a brilliant future you might not have had otherwise.

                                          But what risks should you consider taking? Here's my list of possibilities..."

                                          Tech Apocalypse! 9 Doomsday Scenarios
                                          Network World, March 19, 2015
                                          "Apocalypse stories have become so popular they now represent a genre unto themselves. Books, TV, film, video games -- everywhere people look for escape from the everyday, the world is at its end. Apocalyptic conjecture may go back to the beginning of human history -- evidence perhaps that we are an anxious, pessimistic species by nature -- but our unsettled, unsettling relationship with technology has certainly accelerated the fascination.

                                          And why not? With technology so profusely infused in our lives, it's hard not to wonder about the likely catastrophes that await us, thanks to our almost insatiable desire for technical innovation and automation..."

                                            IT - Compliance
                                            7 In 10 Businesses Struggle to Sustain PCI Compliance
                                            Dark Reading, March 12, 2015
                                            "Maintaining PCI compliance is a bigger challenge that achieving it for many companies, Verizon study finds.

                                            For many companies, maintaining compliance with the requirements of the Payment Card Industry Data Security Standard (PCI DSS) appears to be more challenging than actually achieving it.

                                            A new survey by Verizon on the state of PCI compliance among organizations that handle debit and credit card data shows that more companies than ever are achieving some form of compliance with the requirements of the standard..."

                                            IT - Email
                                            Don't Get Into an Email Mess
                                            ComputerWorld, March 12, 2015
                                            "Though she may have broken no laws, Hillary Clinton acted irresponsibly in using a personal email account to conduct official U.S. government business in her capacity as secretary of State.

                                            And besides that, it's messy when you mix business things with personal things.

                                            Years back, as I was leaving a job to launch a company, a wise business attorney counseled me to 'leave naked.' He was telling me to leave all company property with the company and keep my own belongings for myself. Of course, I did just that. It makes good sense, after all. But that can be difficult when you've inextricably mixed your business and your personal lives together..."

                                              Where's the Data?
                                              ComputerWorld, March 17, 2015
                                              "The U.S. government wants access to an alleged drug dealer's emails, but Microsoft says, sorry, they're in Ireland and out of bounds. This is what happens when we apply non-digital rules to digital situations.

                                              It's a time-honored tradition: U.S. businesses find ways to skirt inconvenient or expensive laws by moving operations to other countries. Thus we have had U.S. corporations operating overseas to exploit child labor, run sweatshops or avoid taxes and rigorous health and safety inspections. Now the U.S. government says something similar is happening in regards to email..."

                                              Security Guru Bruce Schneier: Your Privacy is Already Gone
                                              InfoWorld, March 17, 2015
                                              "You can't help but get a little depressed as you read Bruce Schneier's latest book, "Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World." It confirms over and over how all our supposed guaranteed personal privacy, digital or otherwise, is nothing but a façade. Here are some examples from the book:.."
                                                The Benefits of Information Lifecycle Management (ILM)
                                                Manage the increasing cost of storage for their Oracle Utilities products
                                                Anthony Shorten writes, "In the release of Oracle Utilities Application Framework, a new ILM based data management solution was implemented to allow customers to manage the increasing cost of storage for their Oracle Utilities products. It is being progressively rolled out across each of the Oracle Utilities products over the next year. With utilities across the world having to deal with larger and larger data volumes over time, the cost of storing that data and ensuring appropriate access by the business to that data become key concerns. ILM offers tools to address that.

                                                The benefits of using this facility are as follows:..."

                                                Oracle Expands Storage Efficiency Leadership
                                                New SPC-2 result was posted for the Oracle ZFS Storage ZS4-4
                                                Bryce Cracco writes, "On March 17, 2015, a new SPC-2 result was posted for the Oracle ZFS Storage ZS4-4 at 31,486.23 SPC-2 MBPS. (The SPC-2 benchmark, for those unfamiliar, is an independent, industry-standard performance benchmark test for sequential workload that simulates large file operations, database queries, and video streaming.) This is the best throughput number ever posted for a ~$1/2 million USD system, and its on-par with the best in terms of raw sequential performance. (Note that the SPC-2 Total Price metric includes three years of support costs.) ..."
                                                Oracle ZFS Storage ZS4-4 Shows 1.8x Generational Performance Improvement on SPC-2 Benchmark
                                                As shown by the SPC-2 benchmark
                                                The Oracle BestPerf blog notes, "The Oracle ZFS Storage ZS4-4 appliance delivered 1.8x improved performance and 1.3x improved price performance over the previous generation Oracle ZFS Storage ZS3-4 appliance as shown by the SPC-2 benchmark.

                                                • Running the SPC-2 benchmark, the Oracle ZFS Storage ZS4-4 appliance delivered SPC-2 Price-Performance of $17.09 and an overall score of 31,486.23 SPC-2 MBPS.

                                                • The Oracle ZFS Storage continues its strong price performance by occupying the three of the top five SPC-2 price performance.

                                                • Oracle holds the three of the top four performance results on the SPC-2 benchmark for HDD based systems


                                                IT - Database
                                                Why I Choose PostgreSQL Over MySQL/MariaDB
                                                Dice, March 19, 2015
                                                "For the past ten years, developers and tech pros have made a game of comparing MySQL and PostgreSQL, with the latter seen by many as technically superior.

                                                Those who support PostgreSQL argue that its standards support and ACID compliance outweighs MySQL's speed. MySQL remains popular thanks to its inclusion in every Linux Web hosting package, meaning that many Web developers have used it; but ever since Oracle bought Sun, which owned the MySQL copyright and trademark, there have been widespread concerns that the platform isn't quite as open-source as before. Meanwhile, PostgreSQL not only got faster, it also added JSON, making it one of the few relational databases to also support NoSQL..."

                                                IT - Big Data
                                                FDA Leverages Big Data to Monitor Drug Safety
                                                Information Management, March 12, 2015
                                                "The Food and Drug Administration's Sentinel initiative for monitoring the safety of FDA-regulated drugs and other medical products is one of the largest uses of big data in healthcare, according to the regulatory agency's outgoing commissioner Margaret Hamburg, M.D.

                                                The active surveillance system, which recently transitioned from a five-year pilot program to a full-scale system, has established secure access to the healthcare data of more than 170 million patients across the country, including claims data and electronic health records. FDA is currently querying large, diverse health care data for product safety through Sentinel and exploring opportunities to expand the use of real-world observational data to optimize the performance of medical products..."

                                                CIOs Lead Collaborative Team in Growing Big Data and Analytics Initiatives
                                                Storage Newsletter, March 13, 2015
                                                "IDG Enterprise, an enterprise technology media company composed of CIO, Computerworld, CSO, DEMO, InfoWorld, ITworld and Network World, announces the release of the 2015 Big Data and Analytics research, which spotlights an increase in the number of deployed data-driven projects over the past year and reveals that many organizations are still planning implementations, as 83% of organizations categorize structured data initiatives as a high or critical priority.

                                                IT decision-makers (ITDMs) also provided insight into organizational data and analytics purchase plans, security concerns and the top vendor attributes when evaluating solutions in 2015..."

                                                The Seven Habits of Highly Data-Scientific Organizations
                                                TDWI, March 17, 2015
                                                "If you want to be a data science star, check out the advice from industry veteran and director of TDWI Research David Stodder has to say. Stodder is the author of the latest entry in TDWI's "Checklist Report" series -- in this case, "Seven Steps for Executing a Successful Data Strategy."

                                                The first step, according to Stodder, is to determine whether it's a requirement..."

                                                  4 Tenets of a Successful Open Data Plan
                                                  Government Technology, March 17, 2015
                                                  "It was open data's version of a Giants vs. Dodgers game on Monday, March 16, but without the rivalry: Innovation leaders from San Francisco and Los Angeles came together to talk open data strategy at the annual Health and Human Services Open Datafest.

                                                  Abhi Nemani, Los Angeles' first chief data officer, and Jason Lally, San Francisco's open data program manager, each recounted their city's past data efforts, discussed upcoming projects, and delivered advice based on respective geographies, ultimately sharing four key tenets when it comes to open data initiatives..."

                                                  Big Data & Analytics: Your Practical Yoke
                                                  Information Management, March 18, 2015
                                                  "More and more organizations leverage tools and services that bundle different types of data. Very pragmatically, big data is about the profitable analysis of information sources that an organization wasn't previously tracking.

                                                  DATA first: Doing All Things Analytically

                                                  Never dabble in big data and analytics just because it feels fashionable to do so. Big data analytics definitely is an amazing discipline, however the techniques are instrumental. Your data science office should always focus on DATA first: on 'Doing All Things Analytically.' The science part just isn't the big science or rocket science that business executives might fear it is..."

                                                  IT - Mobile
                                                  Why you seriously need to start thinking mobility
                                                  ITProPortal, March 21, 2015
                                                  "Businesses and employees are demanding more mobility than ever before. The rise of smartphones, tablets and cloud computing has given organisations greater flexibility and agility than previously possible, but it has come with added risks.

                                                  BYOD, in its various forms, has meant that firms increasingly do not own the devices responsible for storing and transferring corporate data, and hence securing this data has become much more challenging..."

                                                  10 essential requirements for enterprise mobility success
                                                  Information age, March 19, 2015
                                                  "Enterprise mobility has been the next big thing for years, but a number of factors have now come together to enable it to happen

                                                  Injecting mobility into a business can have numerous positive effects on how a company operates, from boosting productivity and making cost savings, to empowering employees and adding flexibility into the workplace.

                                                  With mobility on the action list for many businesses, here are ten requirements to help them rapidly deliver secure, enterprise-level mobile apps with great user experiences..."

                                                    Can businesses trust Android in the workplace?
                                                    ITProPortal, March 22, 2015
                                                    "Despite Android dominating the global smartphone market, attacks such as the Gazon virus that infected thousands of Android devices act as a potent reminder that no company is entirely immune to attack.

                                                    With swathes of private corporate data to protect and systems to maintain, it's not surprising that global research by SOTI found that almost 40 per cent of respondents have concerns over the security of Google's mobile operating system..."

                                                    Top Ten Articles for last few Issues
                                                    Vol 205 Issue 1 and 2; Vol 204 Issues 1, 2, 3 and 4; Vol 203 Issues 3 and 4
                                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                    • Maintaining Configuration Files in Solaris 11.2
                                                    • Oracle engineered systems are now going to compete on price
                                                    • SPARC Software in Silicon Film Festival
                                                    • Oracle Linux 7 System Administration Training Available
                                                    • General Availability of Oracle Linux 7.1
                                                    • Java EE 7 Hands-on-Lab Updated for You to Use!
                                                    • Secure Boot support with Oracle Linux 7.1
                                                    • Going Beyond Big Data
                                                    • Oracle Solaris Studio 12.4 Technical Mini-Casts
                                                    • Oracle Social Cloud Adds Support for Instagram and Weibo

                                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                                      IT - Server
                                                      Making Your Own Servers Wasn?t Always Sexy
                                                      Data Center Knowledge, March 20, 2015
                                                      "Initiatives like Facebook's Open Compute Project and IBM's OpenPOWER Foundation are perceived as ecosystems comprised of people that do some of the most cutting-edge thinking about computing on a massive scale. DIY server design is what cool kids like Google and Facebook do, but it hasn't always been that way.

                                                      'It wasn't sexy,' Rackspace CTO John Engates says, remembering the company's early years. 'Today it's sexy to build your own servers. Back then it was cheap and scrappy to build your own servers.'.."

                                                      Four Points to Consider for a SQL Server 2014 Installation
                                                      Search SQL Server, March 19, 2015
                                                      "Upgrading a business-critical SQL Server instance is not an easy task; it requires rigorous planning. Inadequate planning increases the chance of encountering difficulties that can derail or delay your SQL Server 2014 upgrade. As you plan an upgrade to SQL Server 2014, here are points to consider that can help you avoid potential upgrade problems.

                                                      Consider an in-place or side-by-side migration for your SQL Server upgrade path. I prefer side-by-side migration because it is less risky, even if it is more difficult..."

                                                      IT - Encryption
                                                      Enterprises Losing Faith in Digital Certificates, Cryptographic Keys
                                                      Dark Reading, March 12, 2015
                                                      "On the heels of Heartbleed and other vulnerabilities, many enterprises are not confident in the ability of digital certificates to protect their data, Ponemon report says

                                                      Security professionals are losing confidence in the ability of digital certificates and encryption keys to protect their data, according to a study published Wednesday.

                                                      The Ponemon Institute released its bi-annual Cost of Failed Trust report, a survey of 2,300 IT security pros across the globe. This year's results indicate that over the next two years, the risk facing every Global 5000 enterprise from attacks on keys and certificates is at least $53 million (USD), an increase of 51 percent from 2013..."

                                                      IT - Tape
                                                      Top Tips for Implementing Data Storage Tape
                                                      Enterprise Storage Group, March 17, 2015
                                                      "How things change. For years, even decades, people have been getting rid of tape. They bought into the idea that disk was the way to go and that tape was 'old hat.'

                                                      But the realities of a Big Data world and the advances in tape technology, density, reliability and usability have brought the realization to many that they shouldn't have been so hasty. And that's showing up in the raw numbers. According to the Active Archive Alliance, nearly 250 million Linear Tape Open (LTO) tape cartridges have been shipped since the format's inception. That's more than 100,000 PB of data on LTO..."

                                                      Boost with Oracle Solaris Studio C++ 12.4
                                                      Substantial update to C++ compiler

                                                      Fedor writes, "Recent release of Oracle Solaris Studio 12.4 brings a substantial update to our C++ compiler.

                                                      Anybody who tried to compile a modern templates-heavy C++03 codebase using Oracle/Sun C++ compiler before Studio 12.4 knows that it required quite a number of bells and whistles, and even then not always worked. Its default template model (-template=extdef) was rather uncommon, its default STL (-library=Cstd) was very old, its internal design of template handling was aging..."

                                                      Three Big Data Threat Vectors
                                                      The Biggest Breaches are Yet to Come
                                                      Troy Kitch writes, "Where a few years ago we saw 1 million to 10 million records breached in a single incident, today we are in the age of mega-breaches, where 100 and 200 million records breached is not uncommon.

                                                      According to the Independent Oracle Users Group Enterprise Data Security Survey, 34% of respondents say that a data breach at their organization is "inevitable" or "somewhat likely" in 2015.

                                                      Combine this with the fact that the 2014 Verizon Data Breach Investigations Report tallied more than 63,000 security incidents - including 1,367 confirmed data breaches. That's a lot of data breaches..."

                                                      Nexenta News
                                                      Leading European University and Research Institute Run on Nexenta Open Source-based Software Defined Storage (OpenSDS)
                                                      Increases Storage Performance, Flexibility and Avoids Vendor Lock-in While Lowering TCO
                                                      Ruhr University Increases Storage Performance, Flexibility and Avoids Vendor Lock-in While Lowering TCO for Its Big Data and High Performance Computing (HPC) Platforms

                                                      Nexenta (@Nexenta) announced that the, Interdisciplinary Centre for Advanced Materials Simulation (ICAMS), a research institute at Ruhr-University Bochum (RUB), supports its research with NexentaStor. Located in the heart of Europe, Ruhr-University Bochum has over 5,600 employees, 41,000 students from over 130 countries, and focuses on the development of innovative scientific institutions like ICAMS.

                                                      Founded in 2008, ICAMS at RUB focuses on the development and application of a new generation of simulation tools for multi-scale materials modelling with the aim of reducing development cost and time for new materials. The center's research on new materials via this interdisciplinary approach makes ICAMS globally unique. Within the approach taken by ICAMS, the different length scales that are relevant for materials - from the atomic structure to macroscopic properties of materials - are bridged by an interdisciplinary team of world-renowned scientists from engineering, materials science, chemistry, physics and mathematics.

                                                      Trending in
                                                      Vol 235, Issue 2
                                                      Trending IT Articles