News about Oracle's Solaris and Sun Hardware
System News
Mar 23rd, 2015 — Mar 29th, 2015 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 205, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

MICROS Workstation 6 Point-of-Service Terminal
Sleek workstation design and superior reliability enhance staff and guest experiences
As hotels and restaurants employ mobile, social, and informational tools to connect with guests, they require a new type of "engagement" device at the point of service (POS). To meet this need, Oracle today introduced Oracle's MICROS Workstation 6 with a fresh, modern design that provides hospitality and select retail venues with a next-generation POS terminal that works in concert with mobile, cloud, and social media to deliver consistent, integrated content across multiple sources.

For hospitality businesses, Oracle's MICROS Workstation 6 is part of an integrated strategy built around content delivery, moving well beyond transactions to offer guest recommendations, roll out special promotions, and personalize the guest experience.

New Oracle Consumer Study Challenges Retailers to Adapt to Modern Retail Marketplace
'Retail Without Limits - A Modern Commercial Society'
Enabled by technological advances, today's consumers are reaching across borders and channels for shopping experiences that provide unprecedented choice and convenience. A new consumer research report, "Retail Without Limits - A Modern Commercial Society," explores how a technology-powered "invisible hand" has transformed the retail environment and reveals lessons for retailers as they adapt to this new, nearly limitless retail marketplace.

The report is the result of a survey of 500 participants from each of 10 countries - Australia, Brazil, China, France, Germany, India, Japan, Russia, the UK, and the US. Findings reveal that consumers across the world are driven by convenience and want a converged commerce experience, in which retailers combine the best of digital and in-person resources...

    Dombivli Nagari Sahakari Bank Chooses Oracle FLEXCUBE as its Core Banking Solution
    Leading Cooperative Bank in India to transform operations and improve customer experience
    Dombivli Nagari Sahakari Bank Ltd. (DNS Bank), one of the leading scheduled urban cooperative banks in India, has chosen Oracle FLEXCUBE Universal Banking to transform its banking operations. The deal was finalized in May, 2014, and DNS Bank expects to go live with a state-of-the-art system in 2015. With 42 branches spread across 13 districts of Maharashtra and a business mix of Rs 5,500 crore, DNS Bank has a plan to grow to more than Rs 15,000 crore with more than 100 branches by 2019.

    By implementing a new-generation core banking solution based on Oracle FLEXCUBE, DNS Bank plans to optimize its operational efficiency, profitability, and growth...

    Understanding The Oracle Backup Ecosystem
    The need for offline backup & restore is driven by a few specific types of needs...

    Matthew P. Barnson writes, "A frequent question I hear these days is something along the lines of 'How is Oracle IT leveraging the Zero Loss Data Recovery Appliance, Oracle Secure Backup, and ZFS together?"

    Matt also notes, "The opinions in this blog are my own, and do not necessarily represent the position of Oracle or its affiliates" and "I'm going to talk about some of my real-world, actual experiences here in Oracle IT over the past decade that influenced my position on backups. Don't take these experiences as an indictment of our Information Technology groups. Accidents happen; some are preventable, some not. The real key to success is not in not failing, but in moving forward and learning from the experience so we don't repeat it..."

    Business Control Solutions Integrity is Oracle Exadata and Oracle SuperCluster Optimized
    Provider of GRC control software
    Business Control Solutions is a provider of GRC control software to the financial services sector based in London, with a development center in Peterborough.

    Recently they earned Oracle Exadata Optimized and Oracle SuperCluster Optimized status through Oracle PartnerNetwork (OPN), demonstrating that BCS integrity version 3.8 has been tested and tuned with Oracle Exadata Database Machine and Oracle SuperCluster to deliver speed, scalability and reliability to customers.

    By achieving Oracle Exadata Optimized and Oracle SuperCluster Optimized status, Business Control Solutions is able to offer its BCS integrity clients a significant increase in performance and scalability while processing millions of accounts per month.

    IT - Storage
    12 free Cloud Storage Options
    Network World, March 23, 2015
    "With all the public cloud storage offerings on the market today, many vendors just want customers to sign up for their services. So, in return for a new account, many offer free cloud storage.

    Using the following 12 public cloud storage options, you could theoretically get 112GB of free cloud storage. But not all services are the same. Some have their pros and cons related to how large a file can be uploaded, the pricing of additional cloud storage space, integrations with various operating systems and mobile apps, and of course security precautions the vendors take.

    Here are side-by-side comparisons of free cloud storage options..."

    Data Storage Innovation: 10 Factors That Could Impact Your System
    eWeek, March 26, 2015
    "Data storage in 2015 is all about the following factors: more content to store, big data workloads to process, more need for speed in data movement and the onset of the Internet of things. These trends all require more and faster storage capacity, and real-time analytics and mobility are driving the need for greater storage performance. Enterprises and non-profit organizations are continually looking for ways to keep up with the deluge yet do it in a way that doesn't overtax their systems..."
    Mark Hinke: An Overview of Cloud Computing Architectures - Thursday April 9th @NSU
    Einstein's from 6:30PM to 7:30PM; Presentation at 7:30PM
    This crash course is designed to give an overview of cloud computing architecture and the open source software that can be used to deploy and manage a cloud computing environment.

    Speaker: Mark R. Hinkle, Senior Director, Open Source Solutions, Citrix Systems

    Please RSVP at

    Topics to be discussed in this session will include virtualization (KVM, LXC, and Xen Project), orchestration (Apache CloudStack, Eucalyptus, Open Nebula, and OpenStack), and storage (GlusterFS, Ceph, and others). The talk will also provide insight into how to deliver Platform-as-a-Service (PaaS) and what technologies can be used to compliment this evolving cloud computing paradigm.

    Systems administrators and IT generalists will leave the discussion with a general overview of the options at their disposal to effectively build and manage their own cloud computing environments using free and open source software and understand the capabilities and benefits of a host of technologies.

    Directions on FLUX website.

    IT - Technology
    Not All Machine Learning is Created Equal
    InfoWorld, March 20, 2015
    "Barely a week goes by when you don't see a product or service advertised as powered by "machine learning." When a label is so broadly employed, it risks being devalued -- or used to describe something that barely qualifies as machine learning.

    Call it "machine-learning washing" -- the liberal use of the label to allow a product to ride the current bandwagon..."

      12 Drone Disasters that Show Why the FAA Hates Drones
      TechRepublic, March 20, 2015
      "Whether good or bad, everyone seems to have an opinion on drones. Few technological advancements are as hotly debated as drones are right now.

      The definition for what constitutes a drone varies, but most people agree that a drone is a remotely-piloted, unmanned aerial vehicle or aircraft. The distinction usually comes in its purpose -- commercial or military.

      With regard to military use, objections are fairly obvious -- people have ethical concerns about "drone strikes," or the idea that a remotely-piloted aircraft could swoop in on a target and destroy it, especially when that target is a person. On the commercial end, though, arguments are more complicated..."

        Smartwatches, Ultra-Thin Notebooks, Odd IoT: Gadgets for Spring
        InformationWeek, March 22, 2015
        "What's on your gadget wish-list this spring?

        In recent weeks, much of the tech world's attention has focused on the Apple Watch, which, after months of pre-launch rumors, speculation, and hype, will finally arrive April 24. Ranging from $350 (sort of affordable) to $17,000 (a one-percenter's splurge), Apple's first foray into the smartwatch market still seems oddly mysterious, perhaps because the gadget's practical value to consumer and enterprise users won't become clear until real-world testing gets underway..."

          Riding In the Mercedes-Benz F 015 Concept Car, The Self-Driving Lounge of the Future
          PCWorld, March 23, 2015
          "The Mercedes-Benz F 015 looks so out-of-this-world amazing, even people who can't stand the idea of a self-driving car might still be willing to ride in it.

          And that's exactly what I did on Tuesday - not on city streets, but within the controlled environment of a former naval base. Other journalists and I chatted in the space-age cabin while the car drove. We skimmed music choices on integrated touchscreens that lined the walls - while the car drove. I waved at the dashboard to adjust the air conditioning. The F 015 drove..."

            Stanford Breakthrough could Make Better Chips Cheaper
            PCWorld, March 24, 2015
            "Researchers at Stanford University have come up with a new way to make chips and solar panels using gallium arsenide, a semiconductor that beats silicon in several important areas but is typically too expensive for widespread use.

            For several decades, silicon has been the go-to semiconductor for electronics. It's abundant and cheap, and manufacturing processes are well understood, but it's not always the best choice.

            Electrons move faster through gallium arsenide than through silicon, which makes it better suited for chips handling data at very high speeds or high-frequency radio signals. Solar panels based on gallium arsenide are more efficient than silicon panels at converting light to electricity..."

              The Tech Cycle: Out With the Old Problems, In With the New
              InfoWorld, March 25, 2015
              "There's a moment in everyone's existence, toward the tail end of midlife, where we look around in utter confusion. Many people mistake it for the first day of old age and mental decrepitude, but they're wrong. It's the first day of wisdom -- not deep, Buddha-like knowledge that might draw in hemp-dressed groupies who frolic around while you sit and eat organic grapes, but stark common sense forged in scotch and blood..."
                Six Best Uses of Drones In Business
                TechWorld, March 25, 2015
                "Amazon has been given the green light to pilot drones in the US for its Prime Air delivery service - aiming to drop packages weighing less than 5lbs at customer's doors in half an hour. Despite the US aviation authority's go-ahead, there are strict regulations in place, which might delay the retail search giant's new service.

                Drone operators must hold a pilot's license, and along with a second observer should be able to keep the drone in their line of sight throughout its entire journey.

                A few other firms in the UK and abroad have declared their intent to use drones in the future. Here are the top six possible uses of drones..."

                IT - Bitcoin
                Bitcoin in the Headlines: Wall Street Goes 'Nuts'
                CondDesk , March 27, 2015
                "While bitcoin's ability to deliver on its potential is still an open question, the number of Wall Street supporters for the technology grew this week, a development that was not lost in the headlines.

                Wall Street's new interest in bitcoin was the talk of many major publications, spurred by the news that major American stock market Nasdaq had licensed its technology to Noble Markets and further cemented by news the Bitcoin Investment Trust, the OTC Markets investment vehicle spearheaded by investor Barry Silbert, would finally open to retail investors.

                Still, the week had its share of bitcoin bashing and odd announcements.

                With this in mind, CoinDesk takes a look at the top bitcoin related headlines from across the globe..."

                The 25 most exciting bitcoin startups
                Business Insider, March 23, 2015
                "The bitcoin ecosystem has never been more diverse, with multimillion-dollar companies trying to take the digital currency "mainstream" and hackers dreaming up a new blockchain-powered social order.

                We've spent the past several weeks speaking to CEOs, journalists, investors, and others in the bitcoin scene in search of some of the most exciting startups and projects out there..."

                NASDAQ To Support Development Of Digital Currency Marketplace
                Crypto Coin News, March 24, 2015
                "Nasdaq OMX Group Inc., which owns NASDAQ, has agreed to provide New York-based Bitcoin startup Noble Markets with the core technology to power the new digital marketplace. The focus of this endeavor is to allow companies and institutional investors such as hedge funds to trade bitcoin and related digital-currency assets. Nasdaq's innovative X-stream trading system will be used by Noble to match orders of the participants. X-Stream is already used by more than 30 exchanges and marketplaces worldwide..."
                Neteller Adds Bitcoin Funding to Prepaid Mastercard
                Bitcoin Magazine, March 26, 2015
                "In a surprise move, e-wallet provider and payment processor Neteller quietly started to accept bitcoin deposits at zero fees. Neteller customers will now be able to top up their accounts by exchanging Bitcoin into one of the currencies offered by Neteller..."
                Survey Finds Americans Trust 'Digital Currency' The Most
                Crypto Coin News, March 26, 2015
                "Americans overwhelmingly trust job titles referencing 'digital currency ' over 'virtual currency,' 'bitcoin,' 'cryptocurrency' and 'litecoin,' according to a survey by the Digital Currency Council (DCC) this month. The survey was conducted March 8 and used a representative sampling of 506 people across the U.S. and was conducted by DCC via Google Insights polling. The DCC announced the survey results in its recent 'Pulse Report' on public perceptions of bitcoin and digital currencies..."
                British Banking Association: Bitcoin is a Real Threat to Banks
                CondDesk , March 27, 2015
                "As cryptocurrencies grow in popularity, they will continue to threaten revenue streams of the traditional banking system, according to a new report from the British Banking Association (BBA).

                A section of The Digital Disruption: UK Banking Report looks specifically at cryptocurrencies and the impact they have already had, and will continue to have, on people's perceptions of monetary transfer.

                "Cryptocurrencies increasingly look like becoming ubiquitous challengers to more familiar, established currencies. And, as they grow in popularity, so too will the risks for banks," the report reads..."

                  Why You Need to Love Bitcoin to Love the Blockchain
                  CoinTelegraph , March 28, 2015
                  "Most people following developments in Bitcoin are familiar with the often repeated mantra proclaiming the blockchain an innovative technological breakthrough, but Bitcoin an unnecessary and superfluous addition.

                  Recent reports, for example, suggest IBM is exploring the use of Bitcoin-less blockchain technology. Separating Bitcoin from the blockchain, however, misses the fundamental, interdependent relationship between digital currency and its underlying blockchain technology..."

                  IT - FOSS
                  What the New York Times CIO asks when evaluating open source software
                  The Enterprisers Project, March 25, 2015
                  "In this interview, New York Times CIO Marc Frons explains how his teams evaluate whether to use open source or proprietary software and the simple question that helps guide the conversation.

                  The Enterprisers Project (TEP): Your Technology group has been using open source for some time now. Are you implementing more?..."

                  The "New to Solaris Development Forum" Has Moved
                  Now under the Application Development in C, C++, and Fortran space
                  Rick Ramsey reports that, "The New to Solaris Development Forum brought over from Sun Microsystems is still pretty active. It used to live in the Oracle Solaris space, but we just moved it under the Application Development in C, C++, and Fortran space.

                  We did this for two reasons:

                  • To create a dedicated space for systems developers.
                  • To reflect the fact Oracle Solaris Studio is an IDE for Oracle Linux as well as Oracle Solaris applications.

                  If you haven't been on the Forums in a while, you might not know about the changes we've made to them. Quite a few, actually..."

                  Cloud Computing
                  On the Role of Today's CIO in Cloud & Business Transformation
                  By Juergen Kress
                  Juergen Kress writes, "Expectations of business-driven IT are higher than ever and changing rapidly. Words like agility, mobility, digital, data, cloud and customer centricity are common and constant from Line of Business (LOBs) executives like CMOs. Today's business must move at the pace of - scratch that - ahead of the pace of today's consumer. Businesses must anticipate customers' needs to be truly customer-centric organizations. Innovation through the cloud is a big force driving customer experience and customer centricity.

                  Here's another word of importance: collaboration..."

                    Newfield Supports Employee Performance with Oracle HCM Cloud
                    Independent oil and gas company adopts cloud-based solution to manage critical human resource functions
                    In the oil and gas industry, expedition into new areas and successful development of ongoing operations drive growth. To capitalize on such opportunities, Newfield Exploration Company, a business engaged in exploring and producing oil and gas, adopted Oracle Human Capital Management Cloud (Oracle HCM Cloud), which gives employees and managers access to HR data and helps them identify and work toward individual, team, and company goals.

                    To support business expansion around the globe, Newfield will leverage the mobile capabilities of Oracle HCM Cloud, part of Oracle Applications Cloud, to eventually focus its 1,500 employees on goals and objectives that add value for shareholders.

                    Oracle OpenStack for Oracle Linux and Oracle VM
                    Available Hands-on Labs
                    Zeynep Koch writes, "Last year, Hands-on Lab events for OpenStack at Oracle Open World were completely sold out. People who have had no prior experience with OpenStack could not believe how easy it was for them to launch networks and instances and exercise many features of OpenStack. Given the overwhelming demand for the hands-on lab and the positive feedback from the participants, we are announcing its availability to you - all you need is a laptop to download the lab and the 21-page document using the below links in this blog..."
                    Epsilon Deploys Oracle Linux and Oracle VM to Deliver Solutions up to 20 Times Faster
                    at a 35 Percent Lower Total Cost of Ownership
                    To meet the growing demands of its dynamic customer base, Epsilon, an all-encompassing global marketing company and a worldwide leader in creating connections between people and brands, needed a more flexible, cost-effective architecture to support its database and business intelligence offerings. With Oracle VM and Oracle Linux, Epsilon has significantly accelerated its service delivery while improving the resiliency of its infrastructure and reducing total cost of ownership. Epsilon can now rapidly provision high-performance, location-independent, elastic, and production-ready database and business intelligence environments for its customers - delivering these solutions up to 20 times faster than before...
                    IT - Cloud
                    Your Guide to Compliance In the Cloud
                    CIO , March 24, 2015
                    "Although businesses have a high level of control and customization with private clouds, using services on a public or hybrid cloud present compliance challenges. Cloud service providers (CSPs), however, have begun to see real value in helping customers achieve compliance, and processes are improving. But if you are looking to move data to the cloud–data that must meet compliance regulations - you still have your work cut out for you..."
                      NFV and SDNs Will Make Up the Cloud
                      Network World, March 24, 2015
                      "If McLuhan was right, what we know today as "The Cloud" will be resources linked through massively and continuously variable software-designed networks using largely software-defined linking. Your compute might be in Dallas, but let's store the data in Germany where the privacy laws suit our regulatory/compliance..."
                        Five Basic Things You Should Know About Cloud Computing
                        CIO, March 24, 2015
                        "Confused by the cloud? You're not alone. This cloud computing introduction may be useful.

                        We've all heard about cloud computing, but it may still seem like a foreign language to some. Because cloud computing has become a big deal (like, change the face of IT big), we thought we would provide a brief cloud computing introduction. Here are some key points you need to know about cloud computing to help your organization reap its benefits and get you back into the 21st century..."

                        IT - CxO
                        Frenemies of the C-Suite: CSO, CIO, CRO, CPO
                        Dark Reading, March 19, 2015
                        "Sometimes the security, IT, risk, and privacy offices just can't get along.

                        Fifteen-year-old girls are the go-to experts on the phenomenon of a 'frenemy' -- a person who is both your friend and your enemy. Yet, even 15-year-old girls would agree that leaders of security, privacy, risk, and IT departments know just as much about those kinds of complex, melodramatic relationships.

                        Part of the problem: 'There are too many chiefs, and none of them are really chiefs,' says Jason Straight, senior vice president and chief privacy officer at UnitedLex..."

                        5 Tools Public CIOs find Indispensable
                        Government Technology, March 20, 2015
                        "Public CIOs have a lot to balance. From building relationships internally and externally to developing their teams to rolling out systems that impact both government operations and the public, the CIO has no time to waste. Luckily there are some tools (both high and low tech) that can help IT leaders to stay connected and get the most out of each workday. Five state and local government CIOs shared with us the technology and tools they rely on to get the job done..."
                        CIO Survival Guide: How to Respond to 5 Game-Changing Disasters
                        Government Technology, March 20, 2015
                        "Scotland's favorite son Robert Burns once wrote that the best laid schemes of mice and men often go awry. He was right, but no one ever saw a tornado bearing down on their position and reached for a poem. Besides, he never owned a computer, so while Burns might be good at pointing out problems, he's sort of useless in the solutions department.

                        Disasters are inevitable and no amount of planning will account for every possible scenario, and that's why improvisation skills are so valuable..."

                          Smart CIOs ignore Cloud Extremists
                          InfoWorld, March 20, 2015
                          "Infrastructure and operations leaders should focus on a cloud-first strategy, Gartner advises in a new report. However, they should do this on an application-by-application basis. The report, called 'Flipping to Digital Leadership: The 2015 CIO Agenda,' surveyed more than 2,800 CIOs and found that the public cloud was an option for IT projects, but a priority only for a small minority..."
                          CIO Insight: Starbucks Chief on Wireless Charging, Mobile Payments and Flexible Working
                          v3 co uk, March 23, 2015
                          "In today's society smartphones and cloud apps are embedded in most people's personal and work lives.

                          This change has been both a blessing and a curse. While the productivity perks of smartphones and cloud services have made it easier for employees to stay connected and productive during all hours of the day, they come with some serious trade-offs. For many years we've heard IT managers complain employees' use of the technologies has made it harder for them to know what devices are being used for work purposes and where company data is being stored at any one time..."

                            12 Things Enterprises Don't Know They Can Automate
                            CIO Insight, March 24, 2015
                            "Today, IT departments operate in increasingly complex environments with an array of heterogeneous technologies. Traditional batch processing and job-scheduling solutions only allow for the execution of one or more jobs on a single system and often require manual intervention.

                            'While most operating systems, mission-critical applications and database management systems provide their own basic job-scheduling capabilities, these point solutions are often conceived to serve the immediate needs of a single solution,' said Jim Manias, vice president of Advanced Systems Concepts..."

                            Outside-the-Box IT Hiring Tips from Akamai's CSO
                            IT World Canada, March 25, 2015
                            "Within the next five years, Canadian companies will need to fill no less than 182,000 technology positions, according to the latest IT labour market report from the Information and Communications Technology Council (ICTC).

                            Near the top of the list of Canadian companies’ shopping list are IT security experts. As many as 11 per cent of hiring executives reported finding it 'most difficult' to find skilled talent in the area of security, according to a survey by recruitment firm Robert Half technology..."

                            RadioShack Puts Customer's Personal Data Up for Sale In Bankruptcy Auction
                            PCWorld, March 25, 2015
                            "For years, RadioShack made a habit of collecting customers' contact information at checkout. Now, the bankrupt retailer is putting that data on the auction block.

                            A list of RadioShack assets for sale includes more than 65 million customer names and physical addresses, and 13 million email addresses. Bloomberg reports that the asset sale may include phone numbers and information on shopping habits as well.

                            The auction is already over, with Standard General - a hedge fund and RadioShack's largest shareholder - reportedly emerging as the victor. But a bankruptcy court still has to approve the deal, and RadioShack faces a couple legal challenges in turning over customer data..."

                              How to Find Value In IoT Data
                              v3 co uk, March 25, 2015
                              "Accenture has reported increasing interest from its clients about deploying and harnessing Internet of Things (IoT) systems, but these companies still need to uncover specific value in the technology.

                              James Bailey, managing director of Accenture's mobility department, said in an interview with V3 that, while Accenture's clients still look for mobility-related consultancy, they are also looking for help in understanding the IoT..."

                              CIOs cite virtualisation, security and privacy as top priorities in 2015
                              Information Age, March 26, 2015
                              "CIOs and IT professionals are under mounting pressure to manage IT transformations while simultaneously addressing cyber threats, research has revealed.

                              Protiviti's 2015 IT Priorities Survey found that the roles of CIOs and business-minded technology leaders continue to encompass a broadening scope of responsibilities. The priorities of these leaders have increased in significance and severity since the firm's 2014 survey - a result that stems in great part from growing security and privacy concerns..."

                              Meet the IT Dream Team
                              Network World, March 26, 2015
                              "Last year, I wrote about the worst people you meet working in IT, the Jungian archetypes of terrible tech co-workers, and while this was an important cautionary tale, it was also kind of ... let's say negative. Sure, the easy takeaway is 'don't be that person,' but what if your goal is to be one of the best people working in IT? What makes a good teammate? I posed this question to a number of IT pros and they were more than happy to share with me their vision of who the Avengers are on their IT dream team. Finally, some positive role models for you!..."
                                5 ways CIOs can help CMOs win at technology
                                Information Age, March 27, 2015
                                "Everyday, marketers receive emails promoting some new piece of technology that’s 'guaranteed' to revolutionise their activities. Whether it be viral email acquisitions programme that promise double email subscriber lists or a match-and-append solution for customer databases, marketers are consistently bombarded with information on how new technology can benefit their business..."
                                  vBeers @ Palm Beach Gardens (1st Wed of Month)
                                  Wed April 1st - 6pm - 9pm @ Twisted Trunk Brewing
                                  The newest South Florida vBeers meets on the 1st Wednesday of every month. The April 1st meetup will be at Twisted Trunk Brewing.

                                  This event will be sponsored by the South Florida Technology Alliance (STFA) and at least one other firm (details to follow).

                                  Bring your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community.

                                  Please share this invitation with your IT colleagues and encourage them to attend and RSVP at

                                  "Meet-Ups" are an essential aspect of your professional growth and development. Connect with an array of professionals while enjoying a drink or two.

                                  • Twisted Trunk Brewing
                                  • 2000 Pga Blvd, Palm Beach Gardens, FL, US google map
                                  • Wednesday, April
                                  • 6pm to 9pm - arrive and depart any time

                                  Join us for one of the four South Florida vBeers events. The South Florida vBeers events happen four times a month. Details posted to vBeers South Florida LinkedIN Group.

                                  IT - PM
                                  How Technology Has Revitalized Project Management
                        , March 25, 2015
                                  "Poject management and collaboration are no longer limited to emails or sharing platforms such as Google Drive. Recent developments in technology have opened doors to a brighter horizon in project facilitation.

                                  With the right tools available to you, your projects are more likely to succeed..."

                                  IT - Networks
                                  Bare-Metal Switches Poised to Take Off In Data Centers
                                  ComputerWorld, March 20, 2015
                                  "Bare-metal switches that can be programmed like Linux servers aren't just for big Web companies anymore. They may show up in a lot more average enterprises in the next few years.

                                  Cloud-based service providers like Facebook and Google have been building data-center networks out of generic hardware and homegrown software for years. Now vendors including Hewlett-Packard and Dell are beginning to sell switches much like they do bare-metal servers..."

                                  SDN Shows Promise for Security
                                  NetworkComputing, March 23, 2015
                                  "Improved security is emerging as a major reason for adopting software-defined networking, but concerns about potential SDN risks persist.

                                  Software-defined networking is often discussed in terms of its promises of increased flexibility, better agility, and improved cost efficiency. Increasingly, though, SDN is talked about in the context of security and how it can be leveraged to streamline enterprise security.

                                  In fact, security is the first use case many companies see for SDN..."

                                  Continuous Delivery: Coming to Your Infrastructure
                                  NetworkComputing, March 23, 2015
                                  "Get your network ready to instantly support all the things that need to happen when a new application or update is pushed to production.

                                  Continuous delivery. CD. It's a term thrown around by dev and ops (and subsequently, DevOps) but until recently, network folk had no reason to consider it -- other than it enabled deployments to be hurled over the production wall faster and more frequently..."

                                  The Real Problem with Unified Communications
                                  InfoWorld, March 24, 2015
                                  "The notion has been around for 20 years and gone nowhere despite incessant promotion by the tech industry. That notion is unified communications, which seeks to create single computer-based system to handle all communications a person might do: phone, video, chat, and document sharing.

                                  Ironically, that very unification makes unified communication an unwieldy nonstarter. You have to buy a one-size-fits-all service (whether locally hosted or in the cloud), then ensure that every participant has the compatible tools at all times. That's simply not portable, which communications need to be..."

                                  When Will IPv4 become Obsolete?
                                  Network World, March 24, 2015
                                  "On Reddit's forum devoted to networking - r/networking - a user asks: "I know that IPv4 is all out of addresses, and most devices are running both IPv4 and IPv6. How long is it going to take before we no longer see both addresses on a device, but only IPv6? 5 years? 10 years? 20 years? Does anyone have an estimate?"...
                                  Misconfiguration Exposes Hotel Routers to Risk
                                  eWeek, March 27, 2015
                                  "Hospitality network equipment vendor ANTlabs issued a public advisory on March 26 about a vulnerability (identified as CVE-2015-0932) in its systems. The vulnerability is the configuration of the rsync service, which is a common synchronization utility found on Linux and Unix systems. ANTlabs InnGate gateways were running an rsync service in a manner that is not secure..."
                                  IT - Linux
                                  Three ways to run Windows software in Linux
                                  IT World, March 24, 2015
                                  "In today's open source roundup: How to run Windows software in your favorite Linux distribution. Plus: Four tools to securely delete data in Linux, and MIPS-powered Chromebooks might be on the way.

                                  Some users switch to Linux to completely get away from Windows. But others still find some Windows software helpful or important. If you're one of those users, you'll be happy to know that there are a number of ways you can run Windows software in Linux..."

                                  Docker's No Flash in the Pan
                                  Linux Insider, March 24, 2015
                                  "There are similarities between Docker and recent open source communities. Not only in the surge of supporting developers, IT operations pros, vendors, investors and end users, but also in the way the technology is making its way to the market through developers and lines of business before central IT departments. Expect to see a support-and-services-driven market for Docker and containers..."
                                  16 Commands to Show System/Hardware Info in Linux
                                  TuxArena, March 24, 2015
                                  "This is a tutorial aimed at showing how to get hardware and general system information on Linux. There are also a few examples which normally work on Debian and its derivatives, like Ubuntu or Linux Mint..."
                                  The Linux desktop battle (and why it matters)
                                  TechRepublic, March 26, 2015
                                  "I have been using Ubuntu Unity for a very long time. In fact, I would say that this is, by far, the longest I've stuck with a single desktop interface. Period. That doesn't mean I don't stop to smell the desktop roses along the Linux path. In fact, I've often considered other desktops as a drop-in replacement for Unity. GNOME and Budgie have vied for my attention of late. Both are solid takes on the desktop that offer a minimalistic, modern look and feel..."
                                  IT - Security
                                  Is It Time to Adopt a Military-Style Approach to Cyber Security?
                                  Network World, March 19, 2015
                                  "It seems like every week we hear about another serious breach affecting this merchant or that healthcare provider or some other major business. Successful cyber attacks of the private sector have become all too common.

                                  In comparison, we rarely hear about a U.S. military branch or a national intelligence agency like the National Security Agency (NSA) getting hacked. Why is that? It's not because they aren't getting attacked; these entities are probably bigger targets than any commercial business..."

                                  When DDoS Isn't All about Massive Disruption
                                  Dark Reading, March 23, 2015
                                  "New data shows prevalence of often-undetectable DDoS attacks aimed at quietly wreaking havoc on the network while performing data exfiltration and other attacks.

                                  There's the long-lasting, loud DDoS attack that takes down a website or disrupts a company's network operations, but there's also a stealthier, shorter-burst DDoS meant to fly under the radar while sapping just enough bandwidth or network resources to perform more nefarious activity, like silently stealing information..."

                                    What's your Security Fail?
                                    ComputerWeekly, March 19, 2015
                                    "Unsecured email is just the tip of the iceberg at many companies. Security experts dish dirt on some of the 'fails' they have seen in their careers...

                                    Politics and partisan posturing aside, the fact that Hillary Clinton and Jeb Bush as secretary of state and governor of Florida, respectively, played it fast and loose with email security protocols for the sake of convenience is shocking.

                                    To be sure, the ways in which Clinton and Bush circumvented controls differed a bit, according to reports that have come out recently..."

                                    Are your Business Partners Secure?
                                    CSO Online, March 20, 2015
                                    "Are your business partners secure? Without giving too much thought to the question, you nod for a moment saying to your self 'sure, they are' by, then the confusion starts to wind its way into your brain. Are you safe in the assumption that your business partners are in fact secure? Further to that end, do you have a clear understanding as to who and how they are connecting into your network?..."
                                      Context: Finding The Story Inside your Security Operations Program
                                      Dark Reading, March 23, 2015
                                      "What's missing in today's chaotic, alert-driven incident response queue is the idea of a narrative that provides a detailed understanding of how an attack actually unfolds.

                                      Decision-making is a regular part of our lives. Most of us probably don't give much thought to how many decisions we make on a daily basis. Although we may not be aware of it, particularly for smaller decisions, each decision involves considering multiple data points. Granted, there will always be some decisions that we make emotionally or irrationally. But for logical decisions, let's take a step back and consider what happens during the decision-making process..."

                                        Six Reasons Your Next DDoS Attack will Be Less Visible, but More Disruptive
                                        Network World, March 23, 2015
                                        "You no longer need a legion-sized following to orchestrate a distributed denial of service (DDoS) attack. Previous DDoS approaches tapped host computing devices in the thousands or millions, easily overwhelming unprepared sites with fake traffic. Soon after the Holiday attacks on Sony's PlayStation Network, the group Lizard Squad unveiled its DDoS-for-hire tool, allowing anyone to easily launch a cyberattack. If the masses have easier access to cybercrime on a budget, organizations are at the whim of any disgruntled employee, college kid or competitor. Moving forward, businesses will need to approach DDoS mitigation as an evolving and ever-present, 24/7 threat rather than an occasional risk..."
                                          Why aren't You Vulnerability Scanning More Often?
                                          CSO Online, March 24, 2015
                                          "I've always been curious about companies that scan their enterprises for vulnerabilities once per quarter or even once per year. Why is this the case exactly? I've worked in these environments and I've heard all manner of excuses as to why this was an issue. 'We can't have any outages because it is a critical roll out for $project and we can't have any downtime.'

                                          That one was always one of my favorites..."

                                            Educating The Cyberwarriors of the Future
                                            Dark Reading, March 24, 2015
                                            "If I have to choose between hiring a university-educated CompSci grad or an IT specialist strong in sysadmin, networking or programming, I will pick the IT specialist every time.

                                            Some 209,000 cybersecurity jobs remain unfulfilled. And according to a January PBS report, job postings for the profession are up 74 percent. These are shocking numbers that quantify one of the nation's primary cybersecurity issues..."

                                              The Data Breach Quiz: What have We Learned?
                                              Network World, March 24, 2015
                                              "Data breaches from Target to Sony to Anthem have been getting a lot of attention as millions of personal records are violated, and there's lessons to be learned about data security from all these events. Here's a short quiz about some of these and cyber security in general that will gauge how well you are prepared to deal with these threats. Keep score as you go and find out how well you did at the end..."
                                              Security Best Practices for Users Is Your First Line of Defense
                                              CSO Online, March 25, 2015
                                              "Most savvy businesses are on top of their game when it comes to securing networks, encrypting sensitive data and keeping private customer information safe. But there's a glaring security vulnerability you may not have thought of: your end-users..."
                                              One-Fifth of Scanned Sites Have Vulnerabilities, Menlo Security Finds
                                              eWeek, March 25, 2015
                                              "Stealth vendor Menlo Security scanned 750,000 Web domains and found many with known vulnerabilities.

                                              More than one-fifth (21 percent) of sites have known vulnerabilities, including Web server and PHP issues, according to Menlo Security's State of the Web March 2015 study that scanned 750,000 unique domains.

                                              'The home page of each of the 750,000 domains in the Alexa 1 million [Alexa's top 1 million Websites] was visited once,' Kowsik Guruswamy, CTO of Menlo Security, told eWEEK.."

                                              How to pin down tricky portable media in your security policy
                                              Information Age, March 27, 2015
                                              "According to research performed by Lloyd's of London insurer, Aegis London, in the first half of the 2013 fiscal year, the US Department of Homeland Security's Industrial Control Systems - Computer Emergency Readiness Team responded to more than 200 incidents, 53% of which were in the energy and utility sector, and many of them sponsored by states such as China..."
                                              IT - Careers
                                              2015 reality check: IT hiring, spending are up -- for now
                                              ComputerWorld, March 24, 2015
                                              "How is 2015 shaping up for the IT industry? Spending is on the rise and hiring is increasing, but competition for employees with in-demand skills may slow innovation.

                                              IT managers started into 2015 feeling pretty optimistic, according to data from several industry reports, with solid economic growth paving the way for new IT initiatives and with them, a steady stream of IT hiring.

                                              While the IT unemployment rate during the height of the recession remained far below the average across all industries, companies still were keeping the brakes on tech hiring, committed to doing more with less..."

                                                15 Interviewing Tips That Convert to Job Offers
                                                Forbes, March 28, 2015
                                                "One of the philosophies that our recruiters adhere to is that if, as a candidate, you're going to attend an interview, you might as well perform at 110% during the meeting. Regardless of the individuals whom you're interviewing with or the level of job you're pursuing, the recruiting team at KAS Placement has formulated 15 interviewing tips that, when implemented, should convert to a job offer..."
                                                  I'll Know It When I See It
                                                  Business 2 Community, March 29, 2015
                                                  "'I'll Know It When I See It.' I hear that phrase way too often.

                                                  I hear it when I'm talking to a manager about hiring new people. Usually it's in response to a question I ask like, 'What specific skills, experiences, competencies, attitudes, and behaviors are you seeking in the ideal candidate?'

                                                  Or when I talk to someone about their search for partners or strategic alliances. Usually, in this case, it's in response to 'What's the profile of the ideal partner?'

                                                  Often, when I talk to a sales person about qualifying prospects. They seem somehow to feel or intuit whether a deal is real, whether it's the right one, whether the customer wants to change..."

                                                    26 MORE tech skills worth a $100,000+ salary
                                                    Business Insider, March 29, 2015
                                                    "When you have the right tech skills, you can command a great salary. But the hot tech one year is not the next.

                                                    Job site recently published its 2015 Salary Survey, which named the highest-paying tech skills right now. And many skills pay more than $110,000, as we recently reported. But there are plenty more skills that can net you a six-figure salary.

                                                    Of course, skills alone won't always lead to a high salary. Work experience counts, too..."

                                                      IT - Virtualization
                                                      Joyent's Docker Cloud Skips the VM Layer
                                                      Data Center Knowledge, March 24, 2015
                                                      "Docker containers, which over the past two years or so have been enjoying a lot of popularity in the world where IT operations intersect with application development, have had one disadvantage when deployed on traditional public cloud infrastructure: server virtualization.

                                                      Virtualization impedes performance of applications running in Docker containers, according to Bryan Cantrill, CTO of Joyent, a San Francisco-based cloud service provider. The company announced today a new Docker cloud architecture, which takes that virtualization layer out of the equation..."

                                                      IT - Email
                                                      Custom Browsers that Crush Chrome, Firefox, and IE
                                                      Network World, March 20, 2015
                                                      "When it comes to web browsing, most Windows users are concerned with only three choices: Firefox, Google Chrome, and Internet Explorer. You'll occasionally run into someone running Opera, too. But those aren't the only options - far from it!

                                                      There's a wide world of alternative browsers out there, all fighting for your attention with unique features and specializations in gaming, privacy, media consumption, and more. There's even something to appeal to old-school Internet users. If you're looking to shake up your web surfing experience, here's a look at 10 great browsers not named Firefox, Chrome, or Internet Explorer..."

                                                      Net Neutrality Rules: Separating Fact from Hype
                                                      PCWorld, March 20, 2015
                                                      "The net neutrality debate in the U.S. over the past year has been filled with hyperbole, speculation and questionable claims, coming from both sides of the debate.

                                                      Let's look at some of the hype and compare it to what we know from the U.S. Federal Communication Commission's net neutrality order, released last week, and from other information.

                                                      Four million people in favor of the rules..."

                                                        IoT Roads are the Future of UK Highways, Says Transport Minister
                                                        v3 co uk, March 20, 2015
                                                        "Roads of the future will be Internet of Things highways full of sensors, robots and connected cars, according to Department for Transport (DfT) minister John Hays MP, who believes Britain is at a turning point in the history of road building.

                                                        "The craft is about to be transformed by the digital revolution. Our roads, bridges and tunnels are joining the Internet of Things (IoT)," he said in a speech to London's ResPublica think tank..."

                                                        The Internet of Bring-Your-Own Things
                                                        Dark Reading, March 25, 2015
                                                        "Devices and interconnected systems are finding a foothold not only in our homes but in mainstream organizations. Here are three tips to mitigate the risk.

                                                        It's a Monday morning and time to go into the office and kick off the week. But before leaving the house, I need to write an executive summary for a client report that's due by 8:00 a.m. I pull out my Livescribe 3 pen to write, which automatically synchs to my iPhone 6, plus allows me to email the summary to my CEO. Once the email is launched, I open the OnStar application on my iPhone and start my vehicle remotely so that it's nice and toasty once I've braved a 10-degree jaunt to the car..."

                                                        IT - Backup
                                                        5 Tips for Finding the Best Solution to Protect Your Customers' Data
                                                        Virtual Strategy, March 26, 2015
                                                        "Finding the best solution to address your customers' data protection needs is no easy feat. The wide variety and specificity of options available in the marketplace clearly shows how hard it can be to find the right fit. Everyone has different needs, and sizing up different products to find one that meets all of your requirements can feel like finding a needle in a haystack..."
                                                          IT - Big Data
                                                          Data-Driven Decisions: Rethink your Approach
                                                          Information Management, March 24, 2015
                                                          "Neurologists have proven that no decision can ever be independently made without emotion. Decision-making is obviously prevalent in the workplace, and executives are not immune to falling back on emotion and intuition when they act. The myriad mental trapsthat managers fall into when making business decisions include everything from anchoring - basing a decision off of an initial figure that may or may not be purposefully inflated - to over confidence - being overly confident in our ability to make estimates and forecasts..."
                                                            Big Data Software Requirements
                                                            Insurance Networking News, March 25, 2015
                                                            "What are the core software components in a big data solution that delivers analytics? Although requirements certainly vary from project to project, here are ten software building blocks found in many big data rollouts..."
                                                            How big data can help businesses dodge mistakes
                                                            Information Age, March 27, 2015
                                                            "Computer processing power doubles roughly every 18 months. This is the widely known Moore's Law, which has proven to be reasonably accurate for over 35 years. The effect has been a staggering decrease in the cost of processing data.

                                                            Less well known, but equally important, is Kryder's Law, which states that disk storage density doubles every year. In short, storage productivity doubles every year, while processing productivity doubles every year-and-a-half..."

                                                              IT - Mobile
                                                              Mobile storage about to balloon with new 3D flash chips from Intel and Micron
                                                              ComputerWorld, March 26, 2015
                                                              "Smartphones, tablets and PCs are about to get a whole lot more storage capacity thanks to new 3D flash chips from Intel and Micron that cram more bits into a smaller space.

                                                              With the 3D NAND chips, which started shipping Thursday, solid-state drives with more than 10TB of storage are just around the corner ..."

                                                              9 security gadgets for mobile devices
                                                              ComputerWorld, March 27, 2015
                                                              "Nowadays, when it seems like every week brings news of a new security breach, it seems appropriate to modernize an old saw by saying: You can never be too rich, too thin -- or too secure.

                                                              Most of these security breaches relate to stolen or illegally accessed databases, of course. But let's not overlook a more local problem: The security of your mobile devices and data. Your smartphone, your tablet and even your wallet all contain oodles of critical information -- business and personal alike -- that could be hacked, scanned, stolen or otherwise compromised..."

                                                              IT - BYOD
                                                              BYOD Trend Shifts to Mobile Virtualization
                                                              Information Management, March 25, 2015
                                                              "The worldwide bring-your-own device (BYOD) market is expected to grow at a compound annual growth rate of 25% from 2014 to 2019. Amid that growth, companies are now exploring mobile virtualization to ease anywhere, anytime application access, according to a new report from technology research firm Technavio..."
                                                              Traffic shaping in a BYOD environment
                                                              ITProPortal, March 29, 2015
                                                              "Traditionally, IT managers have been averse to ceding control over the devices, which are on the corporate/business network.

                                                              With the advent of the BYOD practice, IT Managers have now begun to allow employee's personal devices on the network, which are largely unmanaged. As of late 2014, it is estimated that 44 per cent of companies in the UK have a partial BYOD strategy and the number will only grow in the months to come.

                                                              Research firm Ovum predicts that nearly 15.4 per cent of employees using their personal devices to access corporate data are doing so without the IT team's knowledge..."

                                                              Top Ten Articles for last few Issues
                                                              Vol 205 Issue 1, 2 and 3; Vol 204 Issues 1, 2, 3 and 4; Vol 203 Issue 4
                                                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                              • Do I still need Exadata now I have Oracle Database In-Memory?
                                                              • You've just got to be prepared to pay less. (Part 2)
                                                              • Oracle Expands Storage Efficiency Leadership
                                                              • Oracle ZFS Storage ZS4-4 Shows 1.8x Generational Performance Improvement on SPC-2 Benchmark
                                                              • Unbreakable Enterprise Kernel Release 3 Quarterly Update 5 Now Available
                                                              • Java 9 and Beyond
                                                              • Oracle Data as a Service for Marketing Connects B2B Marketers with Millions of Business Professionals and Decision-Makers
                                                              • MySQL for Developers Training Now Available Online
                                                              • MySQL Newsletter
                                                              • SaaS for Dummies

                                                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                                                IT - Server
                                                                Why You shouldn't Ignore Change Auditing
                                                                HelpNet Security, March 20, 2015
                                                                "Rupesh Kumar is the Director of Lepide Software. In this interview, he discusses the benefits of change auditing.

                                                                What are the benefits of using change auditing? What security issues can an organization discover and prevent?

                                                                Change configuration auditing is an integral component of IT security because it reveals the critical changes in server configuration that can lead to security breaches or server crashes. Change auditing is essential for organizations that want to abide with regulatory compliances such as PCI DSS, HIPAA, GLBA, FISMA, and SOX..."

                                                                IT - Encryption
                                                                Massive Healthcare Breach Highlights Need for Encryption
                                                                Information Management, March 19, 2015
                                                                "With Premera Blue Cross now the victim of a huge cyber attack affecting 11 million individuals - following Anthem's attack that hit about 78.8 million - the justifications for not encrypting data at rest may quickly be evaporating.

                                                                When healthcare providers and insurers assess the risks and conduct cost-benefit analyses on whether core electronic health records and insurance information systems should be encrypted, more often than not the decision has been made to not encrypt..."

                                                                IT - Tape
                                                                Balance Tape and Flash in Layered Storage Mix
                                                                GCN, March 25, 2015
                                                                "For agency data center managers looking to improve the economy of their data centers, the best options for cost savings lie in how their storage mix is managed.

                                                                Thanks to new virtualization techniques and emerging flash storage technologies, data center operators now have ways to control how they deploy storage systems to speed backups and reduce costs.

                                                                'Data centers [operators] should be introspective and look at how their storage is being accessed and find ways to customize storage solutions for each different workload,' said Jason Hick, head of the Storage System Group at the Energy Department's National Energy Research Scientific Computing Center (NERSC)..."

                                                                LibreOffice To Become The Cornerstone Of The World's First Universal Productivity Solution
                                                                LibreOffice Online
                                                                LibreOffice, the best free office suite ever, is set to become the cornerstone of the world's first global personal productivity solution - LibreOffice Online - following an announcement by IceWarp and Collabora of a joint development effort. LibreOffice is available as a native application for every desktop OS, and is currently under development for Android. In addition, it is available on virtual platforms for Chrome OS, Firefox OS and iOS.
                                                                Forge Powered Java EE Rapid Application Development Comes to NetBeans
                                                                Rapid Application Development (RAD)
                                                                Reza Rahman writes, "Forge has been a great tool for Rapid Application Development (RAD) with Java EE (for sake of nostalgia it is basically the descendant of the awesome seam-gen tool of the Java EE 5 era). As powerful as Forge is, one of it's drawbacks had been that it is very heavily command-line driven with many commands and sub-commands to learn. As a result it can be initially unnatural for the Average Joe, very IDE centric Java developer to pick up.

                                                                A novel solution to this paradigm mismatch that the Forge team adopted is to integrate Forge into IDEs like Eclipse. I am very happy to report that such integration has finally arrived in NetBeans, perhaps making it truly accessible to the core Java EE community..."

                                                                Is Your Shellshocked Poodle Freaked Over Heartbleed?
                                                                "named" vulnerabilities in commonly used libraries
                                                                Mary Ann writes,"Security weenies will understand that the above title is not as nonsensical as it appears. Would that it were mere nonsense. Instead, I suspect more than a few will read the title and their heads will throb, either because the readers hit themselves in the head, accompanied by the multicultural equivalents of 'oy vey' (I'd go with 'aloha 'ino'), or because the above expression makes them reach for the most potent over- the-counter painkiller available.

                                                                For those who missed it, there was a sea change in security vulnerabilities reporting last year involving a number of mass panics around 'named' vulnerabilities in commonly-used - and widely-used - embedded libraries..."

                                                                Nexenta News
                                                                Storage March Madness @ Dave and Busters, Hollywood, Florida With Nexenta
                                                                April 6th, 3pm to 6pm before the FINAL game at 7pm
                                                                IT professionals involved with buying and selling storage are invited to a casual March Madness Event at Dave and Busters, Hollywood FL. Come learn about Nexenta and Software Defined Storage.

                                                                You'll also have a chance to meet the Nexenta and Vault Networks Teams!

                                                                Leave work a bit early, enjoy appetizers, drinks, and games with IT professionals who share your interests!

                                                                Nexenta is the inventor and global leader of Software Defined Storage solutions. Nexenta delivers secure, high-performance, ultra-scalable, cloud- and virtualization-optimized storage software solutions on any hardware platform realizing the 'true' Software Defined Data Center to enable the biggest challenges in IT today; from rich media-driven Social Media to Big Data; from Internet of Things to Mobility via the Cloud. Built upon an 'open platform' and running on a broad choice of industry-standard hardware, Nexenta eliminates vendor lock-in and provides open, secure and scalable unified storage management at significantly lower total cost than legacy systems.

                                                                Please Register at Eventbright.

                                                                Trending in
                                                                Vol 235, Issue 2
                                                                Trending IT Articles