News about Oracle's Solaris and Sun Hardware
System News
Apr 6th, 2015 — Apr 12th, 2015 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 206, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Fujitsu Enhances Performance of Fujitsu M10 SPARC Servers
Available Worldwide from Oracle and Fujitsu
Fujitsu announced that the space-saving Fujitsu M10-1 as well as the compact Fujitsu M10-4 mid-range servers are now available worldwide in additional configurations featuring the new 3.7GHz SPARC64 X+ 8 core processors providing approximately 30 percent performance improvements.

When coupled with the Fujitsu M10 servers' industry-leading compute capability, the enhanced servers can cut batch processing times for business data and tackle a broad range of Big Data analyses - from such sources as SNS, sensors and mobile devices - to accelerate decision making and increase business productivity.

The Fujitsu M10 server family running Oracle Solaris provides performance and flexible capacity to meet the growing needs of organizations across all industries. The new Fujitsu M10-1 and M10-4 models offer the same higher per core performance of the high-end Fujitsu M10-4S server...

Oracle Adds New Data Integration Technologies to Enterprise Big Data Portfolio
New Oracle-only innovations help speed time from data to decisions
A key component of Oracle's comprehensive big data strategy, Oracle today unveiled Oracle Data Integrator for Big Data to help make big data integration more accessible and actionable for customers. This news follows closely on the heels of Oracle's recent Enterprise Big Data announcement and furthers Oracle's vision to enable Hadoop, NoSQL, and relational database technologies to work together and be deployed securely in any model-whether public cloud, private cloud, or on-premises infrastructure. Oracle Data Integrator for Big Data enables customers to quickly go from data to decisions, streamline their Hadoop development, and enhance data transparency and data governance across the organization. It provides customers with access to an increased number of diverse data types from on-premises and cloud sources, and helps deliver increased performance for growing data volumes, and enrich data quality for business decisions and regulatory compliance. Unlike other products in the marketplace, Oracle Data Integrator for Big Data is designed to fully leverage a customer's existing investment in their Hadoop cluster, running completely natively without requiring proprietary code to be installed or a separate server to be run.
Oracle's Top EPM Trends for 2015
CFOs leveraging digital technologies in their Enterprise Performance Management (EPM)
Toby Hatch writes, "Modern CFOs are successfully leveraging digital technologies in their Enterprise Performance Management (EPM) processes to transform their finance organizations and generate value for the business. Which EPM priorities are at the top of the Finance agenda? What are the most compelling developments in big data, analytics, mobile technology, and cloud computing that motivate Finance leaders to undertake new technology initiatives?

Oracle surveyed hundreds of decision makers to learn more about their EPM plans for 2015 - both within the Oracle customer base and the industry at large. We asked your colleagues to provide specific feedback on EPM technologies and practices - past, present, and future. From this extensive data set we compiled the following views and outlook - along with a bit of advice.

For details on each trend, download the entire report..."

Enhanced SPARC64 X+ Processor for Fujitsu M10 Servers
By John Shell
John writes, "More choice = more opportunity.

A new 3.7GHz SPARC64 X+ 8-core processor option is now available for the Fujitsu M10-1 and M10-4 servers. The SPECint_rate2006 benchmark shows a 30% increase in performance for the M10-1, and a 25% increase for the M10-4.

The Fujitsu M10 servers are designed to meet the needs of mission critical and business critical applications. Combined with Oracle Solaris, they provide excellent investment protection for Oracle customers. A quick comparison of the SPARC64 X and X+ processors is below:..."

IEEE Presents Prestigious SPARC Milestone Plaque in Front of SRO Crowd
On February 13, a standing room only crowd approaching 200 attendees at Oracle's Santa Clara Auditorium watched as the Institute of Electrical and Electronics Engineers (IEEE) presented the prestigious Milestone plaque recognizing the technological achievements of the SPARC RISC Architecture for innovation and excellence.

After being introduced by Uday Kapoor, Director of Hardware Development for Oracle and IEEE member, John Fowler, Oracle's Executive Vice President Systems, thanked IEEE for recognizing SPARC "as an accomplishment which belongs on the same list as the CD player and the light bulb."

IEEE 2015 President, Howard Michel presented the award and talked about the significance of the SPARC architecture and its impact on the future...

Exalogic Learning Streams
Online video tutorials and presentations
Srini Chavali writes, Online video tutorials and presentations that highlight various operational aspects of Exalogic, as well as application specific information (such as WebLogic Server, E-Business Suite and PeopleSoft) are available in the Exalogic Learning Streams of the Oracle Education site. Streams give you unlimited access to videos delivered by Oracle experts, 24/7..."
Oracle VM Server for SPARC 3.2 - Enhanced Virtual Disk Multipathing
By jeff Savit

Jeff writes, "Last month, Oracle released Oracle VM Server for SPARC release 3.2 which includes numerous enhancements. One of these is improvement for virtual disk multipathing, which provides redundant paths to virtual disk so that disk access continues even if a path or service domain fails.

Multipath groups are arranged in an active/standby pair of connections to the same physical media. In case of a path or service domain failure, I/O activity continues on a surviving path. This is also helpful for rolling upgrades: a service domain can be rebooted for an upgrade, and virtual disk I/O continues without interruption. That's important for continuous availability while upgrading system software..."

IT - Storage
Budgeting for Flash
NetworkComputing, April 6, 2015
"Flash is fast, but expensive. Ask these three questions to make sure your flash storage investment makes sense for your data lifecycle needs.

Ask any IT administrator -- storage can be a headache. It's expensive, troublesome, and it has a shelf life of roughly three years before hardware needs to be replaced. While other elements of data center infrastructure, such as networking and compute, have evolved to a point where the latest innovations solve many of the management issues inherent with large-scale deployment, common problems wrought by storage systems still remain..."

Everything You Need To Know About NVMe, The Insanely Fast Future For SSDs
PCWorld, April 6, 2015
"As SSDs become more common, you'll also hear more about Non-Volatile Memory Express, a.k.a. NVM Express, or more commonly -NVMe. NVMe is a communications interface/protocol developed specially for SSDs by a consortium of vendors including Intel, Samsung, Sandisk, Dell, and Seagate.

Like SCSI and SATA, NVMe is designed to take advantage of the unique properties of pipeline-rich, random access, memory-based storage. The spec also reflects improvements in methods to lower data latency since SATA and AHCI were introduced ..."

How to Safely Use 8TB Drives In the Enterprise
Storage-Switzerland, April 8, 2015
"After a few year hiatus higher capacity hard drives are coming to market. We expect 8TB drives to be readily available before the end of the year with 10TB drives soon to follow. And at the rate that capacity demands are increasing those drives can't get here soon enough. But, these new extremely high-capacity disk drives are being met with some trepidation. There are concerns about performance, reliability and serviceability. Can modern storage systems build enough safeguards around these products for the enterprise data center to count on them?..."
IT - Technology
TED Talk: Your Brain + The Cloud = Super Humans
Network World, April 6, 2015
"Nanocomputers implanted in our brains that connect to the cloud will usher in a new era of critical thinking and human advancement, Google's Director of Engineering predicts in a TED Talk.

Ray Kurzweil says that by the 2030s, nanobots embedded through the bloodstream into our brains will create hybrid-minds that combine the current power of our brain with the almost limitless processing capacity of cloud-based computers. These micro-computers will help us get quick answers to complex problems and will provide the extra juice needed to come up with creative new ideas..."

This is the world's smallest computer
CBS News, April 6, 2015
"Computers used to consume whole rooms, but now one computer can fit on the edge of a nickel. At just one millimeter cubed, the Michigan Micro Mote (M^3) is the smallest autonomous computer in the world.

For over a decade, the faculty and students at the University of Michigan's computer science department have been working on the M^3. As the Internet of Things (IoT) gets bigger, the Michigan team is pushing to make computers ever smaller..."

Why Augmented Reality Is Expected to Be Four Times Bigger than Virtual Reality
Network World, April 6, 2015
"Virtual reality (VR) has gained a lot of attention in both the technology and mainstream consumer markets over the past few years, and rightfully so. It's a jarring experience not only for the user who gets fully immersed into the move or video game they view through the device, but also to anybody who happens to see somebody with an Oculus Rift strapped to their face. That latter aspect is a big part of the reason why one analyst expects the less-invasive augmented reality (AR) to be the more successful of the two..."
    10 Ways Virtual Reality is Revolutionizing Medicine and Healthcare
    TechRepublic, April 8, 2015
    "When people experience virtual reality for the first time, a common reaction is to start imagining all the different uses the technology might hold. Even within one industry, healthcare, the potential is open-ended. The good thing is that scientists and medical professionals have been at the drawing board for years now, developing and implementing virtual reality in ways that can help them train, diagnose, and treat in myriad situations.

    Here are just ten of the use cases that are currently in practice and continually developing as the technology itself develops too..."

    4 Ways You're Wasting Money on Your Technology
    Business 2 Community, April 8, 2015
    "Every day businesses have to mitigate risk when they consider their IT budgets. They have to take time to understand that if their budget is X, they have to choose between the things that they want most and compromise to balance their risk while still maintaining optimal productivity. It's a fine line and can sometimes feel a little bit tight. Are you struggling to find room in your technology budget to complete new projects, upgrade your existing infrastructure or try out a new software?..."
    Up Against Laws of Physics, Bell Labs Pushes Network Performance
    ComputerWorld, April 8, 2015
    "By using more spectrum and developing new ways to send multiple channels of data at the same time, researchers at Bell Labs are working to increase bandwidths over fiber, copper and the air.

    Alcatel-Lucent's Bell Labs celebrated its Nobel laureates and gave a sneak peek at some of the projects that are part of its vision for networks in 2020 at an event on Wednesday.

    Because most network technologies have hit or are very close to the limit of what can be transferred over one channel, increasing speeds is getting more complicated. But Bell Labs President Marcus Weldon is convinced there is still room for major improvements..."

      4K monitors: Everything you need to know about UltraHD PC displays
      ITWorld, April 9, 2015
      "It's finally time to get serious about 4K displays. Let's be honest, the first wave left much to be desired. Some had painfully low refresh rates while others were difficult to configure and get working properly. Prices were all over the map.

      The situation is much better today, thankfully, but moving up to a 4K display still involves some planning. Everything from the cable type to which applications you use most often can ultimately have a huge impact on your experience. Here's all you need to know before you splurge on a 4K monitor..."

        IT - Bitcoin
        How Bitcoin Can Help Millions of Women Around the World
        Bitcoin Magazine, April 4, 2015
        "Western Union released a report on the role of women in global remittances. According to the report, women currently move 50 percent of the estimated $582 billion global remittances, and they send a greater percentage of their wages than men.

        Women also are the largest group of recipients, receiving over two-thirds of remittances. The flow of money to these women can be a matter of life and death if they have no alternative means of earning a living. The United Nations reports that despite women working two-thirds of the world's working hours and producing more than 50 percent of the world's food, women earn only 10 percent of the world's income and own less than 1 percent of property..."

          Ecuador Setting an Example by Adopting Digital Currency
          NEWSBTC, April 5, 2015
          "Earlier this year, the South American nation of Ecuador became the first country in the world to have its own official digital currency. Ecuador abandoned the use of its national currency 'sucre' in 2000 amidst the banking crisis to adopt the US dollar as the currency for transaction. Since then the country has been using dollars as the instrument of payment. The country, led by its President Rafael Correa since 2007 had announced in mid-2014 the plan of going digital with a government backed digital currency.

          The new digital currency system is set up to be used alongside the conventional US Dollar ..."

            Why Bitcoin Qualifies As Money While The Dollar Is Just Currency
            Crypto Coin News, April 5, 2015
            "As national fiat currencies slowly, but surely, fall by the wayside, or get outright replaced by digital currencies, its time to review the advantages of using Bitcoin as money going forward.

            Currency and money are not the same things, they just have many of the same properties. The textbook definition in your dictionary may even give credence to money being 'stamped by public authority'. That's interesting, given the fact that before there were governments creating paper currency people did exchange beads for feathers, or milk for eggs. There was barter, as currency, and Gold was real money for its ability to hold value since the dawn of time..."

            Payments VP: One Thing Stands Between Bitcoin and Mass Adoption
            CoindDesk, April 8, 2015
            'Everyone thinks bitcoin is the currency of criminals.'

            "According to Alasdair Rambaud, senior vice president for payment solutions provider CardinalCommerce and a self-proclaimed bitcoin user, this is the only factor prohibiting bitcoin from mass adoption.

            Rambaud believes that 'most large merchants' in the US are currently looking into accepting bitcoin as payment, and that the reasons go far deeper than the publicity that can be gained..."

  's Judd Bagley Sees Great Future For Bitcoin
            Crypto Coin News, April 9, 2015
            "Judd Bagley, director of communications at, didn't take long to become a bitcoin enthusiast after the online retailer became one of the first major U.S. companies to let customers pay with bitcoin. Speaking to Sarah Martin, vice president of Digital Currency Council, Bagley discussed his experience as a spokesman for one of the leading retailers to support bitcoin. He will be speaking as one of the thought leaders at the Virtual Currency Today Summit on April 29. The event will be held at the Hilton Boston Back Bay in Boston, Mass..."
            Bitcoin for Freelancers: Popular Billing Service Hiveage Adds Bitcoin
            Bitcoin Magazine, April 10, 2015
            "Operating a small business with Bitcoin just got a bit easier. Online billing service Hiveage has announced its integration with Bitcoin wallet and exchange Coinbase, allowing its 45,000-plus small business and freelance clients around the world to invoice and accept payments in bitcoin.

            'Bitcoin is quickly becoming a useful way of transferring value, and it's been highly demanded over the past few months by our users,' says Hiveage founder and CEO, Lankitha Wimalarathna..."

            eBay and PayPal Confirm Upcoming Separation, Support for Bitcoin Payments
            Bitcoin Magazine, April 10, 2015
            "In September 2014, eBay announced plans to separate eBay and PayPal. In a recent SEC filing, eBay confirmed that a newly formed corporation named PayPal Holdings, Inc. ('PayPal') will take over the businesses that make up eBay's payments segment. eBay, the existing publicly traded corporation, will continue to operate its marketplaces business.

            The separation, which will provide current eBay stockholders with equity ownership in both eBay and PayPal, will be effected by means of a pro rata distribution of 100 percent of the outstanding shares of PayPal common stock to holders of eBay common stock..."

              JP Morgan CEO: We Can Learn From Technologies Like Bitcoin
              CoindDesk, April 10, 2015
              "Jamie Dimon, chairman and president of JP Morgan Chase, says his bank can learn from disruptive payment systems like bitcoin.

              Dimon, famously dismissive of the digital currency, made the comments in his annual letter to JP Morgan shareholders, noting:..."

              IT - FOSS
              The new Struggles Facing Open Source
              InfoWorld, April 6, 2015
              "The early days of open source were fraught with religious animosities we feared would tear apart the movement: free software fundamentalists haggling with open source pragmatists over how many Apache licenses would fit on the head of a pin. But once commercial interests moved in to plunder for profit, the challenges faced by open source pivoted toward issues of control.

              While those fractious battles are largely over, giving way to an era of relative peace, this seeming tranquility may prove more dangerous to the open source movement than squabbling ever did..."

              Mozilla Firefox hits 100 million Android downloads from Google Play Store
              ITProPortal, April 11, 2015
              "Firefox is important to me and I hope it is important to you. Even if you do not use the browser, there is value in having an open source browser available that isn't based on WebKit or a fork of it (Blink), as so many are nowadays.

              Variety is the spice of life, and having only one browser engine is not only sad, but dangerous; competition drives innovation..."

              Cloud Computing
              Oracle Java Cloud IDE Integrations
              By Gokhan Goksu
              Gokhan writes, "Oracle Java Cloud is the platform that runs on Oracle's Weblogic Server combined with the Oracle Database that allows deploying Java applications on Cloud just like deploying on a local Weblogic instance.

              Oracle supports Netbeans IDE, Oracle Jdeveloper and OEPE (Oracle Enterprise Pack for Eclipse) and offers Java Cloud integration for these IDEs..."

              End-to-end Data Protection Using Oracle Linux with the ETERNUS DX S3 series and Emulex HBA
              White Paper from Fujitsu
              As demand for data protection has grown in recent years, ensuring the integrity of the customer's data is a very important task. To carry out this task, data protection is not only required for the storage system but the entire system.

              This White Paper from Fujitsu, an Oracle Diamond Partner, explains how data protection can be implemented for the entire system using T10 Protection Information (T10 PI) that comes with the Oracle Linux with Unbreakable Enterprise Kernel (UEK), the ETERNUS DX S3 series, and Emulex HBA.

              IT - Cloud
              Make Sense of Cloud Service Brokers
              InfoWorld, April 3, 2015
              "Don't look now, but the U.S. cloud service broker (CSB) market will grow from $225.4 million in 2013 to $2 billion by 2018, growing 55.3 percent per year. The global CSB market will grow from $1.6 billion in 2013 to $10.5 billion by 2018, growing 46.2 percent per year, according to MarketsandMarkets.

              I deal with CSBs more and more as an increasing number of enterprises move to multicloud approaches. Another factor is that IT increasingly takes on the role of providing cloud services to the rest of the enterprise, and it needs automated ways to manage those services..."

                Two Types of Fear, Or How to Win In the Next Stage of The Cloud
                ZDnet, April 5, 2015
                "The real opportunity is moving mission critical systems in the cloud. [Industries] are the biggest hold out. We see that as the biggest opportunity." That's how Stephan Scholl, co-president of Infor--an enterprise software company that specializes in solutions for specific industries--explains what he sees when he looks at the cloud market.

                For all of the endless hype about cloud computing over the past five years, most companies have remained slow to move their most important applications to the cloud. Sure, the cloud has been good enough to run a few experiments and save big money on licensing fees with less critical apps like HR and collaboration and some overly-glorified shared address books..."

                Lost In the Clouds: 7 Examples of Compromised Personal Information
                CSO Online, April 6, 2015
                "Each day millions of people across the globe create backups of their files. These backups are supposed to offer a measure of assurance that their files are safe, but that's not entirely true.

                In fact, depending on how you've configured the device, your backups are freely available online to anyone who knows what they're looking for.

                The following slides contain a few examples of the sensitive information people have stored on a backup drive that was later indexed by Google..."

                In the Cloud, Development Will be Never-Ending
                Network World, April 7, 2015
                "It's my belief: dev, DevOps, agile and continuous development, all of these will never end in the cloud. No app will ever be finished, only tidy release numbers for comparison sake. This is awful, and this is great. The land grab is on. Containers are the new crack, dimming bright minds, one colleague tells me, while another has become fascinated at the incredibly diverse number of appliances and appliance constructs that have emerged, even in this calendar quarter..."
                Management Is the Key to Effective Cloud Deployment
                InfoWorld, April 7, 2015
                "Typically, cloud management is the last topic of the day when I do a cloud workshop for IT pros. After sessions on big data migration and cloud bursting, eyes often roll when I move to the subject of cloud management. Most participants believe either that cloud-management features come as a part of a public cloud package or it's automatic. Neither is true..."
                Cloud Computing Brings Changes for IT Security Pros
                ComputerWorld, April 8, 2015
                "Watch out, computer security professionals: Cloud computing vendors are coming for your jobs.

                It may be inevitable, or you may be able to take back control by rigorously studying how your organization uses technology. But either way, life is changing for IT security experts.

                Companies like Google and Amazon have figured out configuration management while enterprises avoid the process, said Marcus Ranum, chief security officer of Tenable..."

                IT - CxO
                Why CIOs shouldn't fear shadow IT
                Information Age, April 7, 2015
                "Shadow IT has become one of 2015's hottest topics among technology professionals. Broadly, the term describes employee use of any type of technology for work purposes without the IT department's approval, an issue that has made its way back onto the table as mobile working becomes more popular.

                This has presented a new set of security issues for IT departments which are unsure of what this concept means for their business..."

                When It Comes to Successfully Leading People, Soft Skills are the Key
                TLNT, April 6, 2015
                'We had two very distinct corporate headquarters and now we just have one. At our corporate office in Boston, the doors were locked on the executive floor and you couldn't get in with your badge unless you worked on that floor.

                Now everyone's badge works on the floor. I also moved the coffee machine outside my door so people had to walk by my office to get to it. Now I can tell people to stop in and say Hi.'

                That statement was from CEO Linda K. Zecher of Houghton Mifflin Harcourt.

                Is it IT's Last Chance to Lead Digital Transformation?
                ZDnet, April 6, 2015
                "A strange thing happened at most companies last year as they were planning their 2015 IT budgets: They largely left out the new resources required for IT to undergo an increasingly much-needed generational change.

                Specifically, the change needed today is to shift out of being a relatively stodgy centralized technology support department -- a role long invested primarily in automating and incrementally improving the existing business -- and move into developing sleek and fast-moving new digital lines of business that create growth markets and make-or-break P&L for the organization..."

                  C-suite leaves us to take the blame for insider security threats, say IT pros
                  Information Age, April 8, 2015
                  "More than half of IT professionals (57%) believe their organisation's senior management does not take enough responsibility for internal security, according to new research from IS Decisions.

                  400 of the 500 organisations surveyed in the UK and the US said the IT department takes responsibility for insider threats, compared to just 43% saying the C-suite..."

                  Hey New Boss: Push Change, Have Fun, but Don't Diss the Team As You Do
                  TLNT, April 2, 2015
                  "My husband has this annoying habit of criticizing my television choices whenever he pops into the family room and sees I'm watching something he doesn't like.

                  'Oh, you're watching this again?' He'll say, while grabbing up the remotes. Occasionally he'll add, 'You weren't really watching that, right?' when clearly I was..."

                    The real cost of outsourcing IT
                    Information Age, April 7, 2015
                    "Gartner's latest forecast predicts the worldwide IT services market will exceed $980 billion in 2015. With information technology outsourcing (ITO) contributing to more than half of that market growth, the industry is poised to reach $1.1 trillion by 2018.

                    A booming offshoring market has bolstered the trend, with domestic leaders like HP starting to lose market share to India-based outsourcers and cloud-based service providers. Overall, Forrester Research predicts 542,000 IT jobs will move overseas by 2015, and that number is widely seen as conservative. Clearly, outsourcing is here to stay..."

                    Collaborative innovation - April 16th - 5pm - 8:30pm
                    South Florida Technology Alliance Monthly Meeting - Nova Southeastern University
                    In today's hypercompetitive business environment the speed by which a company is able to innovate is critical to success. This means that many organizations can't afford to rely solely on their own innovative capabilities or "reinvent the wheel" by duplicating existing technologies if they want to keep pace with their competitors with respect to innovation. This problem is made even more complex by the need to manage the tremendous risks associated with innovative activities. Because of this, more and more companies are turning to collaborative innovation.

                    Collaborative innovation is built upon the premise that companies should not "go it alone" when it comes to innovation, but instead should license intellectual property from other companies, academic institutions, customers, and even competitors. This form collaboration allows companies to innovate by sharing both the risks and the rewards of innovation while also shortening the innovation cycle.

                    This month's SFTA event dives more deeply into the issues and benefits related to collaborative innovation by bringing together a panel discussion featuring representatives from all spectrums of the collaborative innovation ecosystem.


                    vBeers @ Boca - Biergarten - Wed April 15th
                    6pm - 9pm (Sponsored)
                    Join us for vBeers @ Boca. We meet on the 3rd Wednesday of each month in Boca Raton, FL. The next meeting will be at Biergarten Boca, which is located in on US 1, just South of Palmetto Park and East of I-95.

                    Biergarten Boca Raton

                    • 309 Via De Palmas #90
                    • Boca Raton, FL 33432

                    This event will be sponsored by Volico Hosting. Get a couple of tickets and exchange them for beers!

                    $5 burger/fries and $3 featured drafts during happy hour! (We may have an additional sponsor, so the food may be sponsored as well.)

                    Please RSVP at the vBeers South Florida page.

                    The South Florida vBeers events happen four times a month (Palm Beach Gardens, Ft. Lauderdale, Boca Raton and Miami).

                    Details @ ...

                    IT - DR
                    Issues and trends: Business continuity and disaster recovery
                    ITProPortal, April 11, 2015
                    "Brandon Tanner, senior manager at nationwide Managed IT Services provider ITS, discusses the trends and issues surrounding business continuity and disaster recovery.

                    1. What are your predictions for business continuity and disaster recovery (BC/DR) in 2015?

                    More SMEs are going to be seeking out cloud solutions. A recent study by the Cloud Industry Forum predicted that the end of support for Windows Server 2003 would drive businesses to the cloud, and I agree with that expectation...."

                    IT - Networks
                    Yes, NFV Is Important for the Enterprise
                    NetworkComputing, April 2, 2015
                    "Due to its origins and complexity, it's tempting to view network functions virtualization as a service provider technology. That's not the case.

                    Network functions virtualization (NFV) is a concept that erupted just a year and a half after the Open Networking Foundation (ONF) started talking about software-defined networking (SDN). The initial proponents of NFV were major service providers that tried to get network services components that would allow them to build more agile networks at lower costs. They formed an Industry Specification Group within the European Telecommunications Standards Institute (ETSI), which eventually created a number of documents, including the pretty complex NFV Architectural Framework..."

                    The Pentagon's Groundbreaking IPv6 Project hasn't Broken Much Ground
                    Network World, April 6, 2015
                    "The U.S. Department of Defense hasn't followed through on its commitment to convert to IPv6, the new Internet standard designed to make room for an explosion of new connected devices.

                    The DoD demonstrated IPv6 in 2008 but then disabled the technology because it didn't have enough people trained to use it and was worried about potential security risks, according to a report by the Inspector General of the department. The Inspector General issued the report internally in December and on Monday released a redacted version to the public..."

                    IT - Linux
                    The best HDMI operating system sticks
                    ZDnet, April 5, 2015
                    "Google recently grabbed a lot of headlines for its new Chromebit, a Chrome OS computer in a HDMI stick. That's fine, but Google and Asus are far from the first to put a computer on an HDMI stick. That honor goes to FXI Technologies Cotton Candy, which released it first model in 2012.

                    The first model used a Samsung's 1.2GHz dual-core Exynos 4210 CPU, which is based on an ARM Cortex-A9 processor, a Mali 400 graphics processor capable of streaming 1080p video, and 1GB of RAM. For storage it used a MicroSD card.

                    While it never set the world on fire, the Cotton Candy did start the market for Android-based HDMI sticks.

                    10 Linux Distros You Need to Know
                    InformationWeek, April 6, 2015
                    "Wondering which Linux distribution is right for your organization? Check out our quick guide to find the distro with the features and capabilities you need.

                    Linux, originally developed as a free-to-use operating system, is growing more powerful, capable, and user-friendly by day. Currently there are a large number of Linux versions, called distributions or "distros" for short, available in the market, each followed by a large group of users and developers who are working to further enhance the product. To identify the best fit for your organization, it's important to know the capabilities and limitations of these distros..."

                    7 Command Line Tools for Browsing Websites and Downloading Files in Linux
                    Tecmin, April 9, 2015
                    "In the last article, we have covered few useful tools like 'rTorrent', 'wget', 'cURL', 'w3m', and 'Elinks'. We got lots of response to cover few other tools of same genre, if you've missed the first part you can go through it..

                    This article aims at making you aware of several other Linux command Line browsing and downloading applications, which will help you to browse and download files within the Linux shell..."

                    Linux Foundation to Host Open Encryption Project
                    Linux Foundation, April 9, 2015
                    "The Linux Foundation, the nonprofit organization dedicated to accelerating the growth of Linux and collaborative development, today announced it will host the Internet Security Research Group (ISRG) and its Let's Encrypt project, a free, automated and open security certificate authority for the public's benefit. Let's Encrypt allows website owners to obtain security certificates within minutes, enabling a safer web experience for all..."
                    Using Putty to remotely open GUI applications
                    HowtoForge, April 9, 2015
                    "Remote connections can be established with system over a network through SSH (secure shell) easily, we can login, perform actions or send commands to another system remotely trough this conection on the commandline. But what we cannot do is launch a GUI application for viewing content present in the remote node. This is the disadvantage of using ssh in a terminal.

                    But this disadvantage can be easily solved by making use of "putty", a remote login application which can not only be used to login to a remote node, but also launch GUI applications. Examples of GUI applications are Browser, text viewers, etc..."

                    Amazon's Container Service Goes GA
                    Datamation, April 10, 2015
                    "Few technologies in the virtualization space are as hyped as Docker containers are today. Many companies have made promises about products and services for Docker, including cloud giant Amazon, and now Amazon is making good on its promise.

                    Amazon first announced the EC2 Container Service (ECS) in November 2014 at its re:invent conference in Las Vegas. Amazon explains on its ECS product page that it is," - a highly scalable, high performance container management service that supports Docker containers and allows you to easily run applications on a managed cluster of Amazon EC2 instances."

                    IT - Operations
                    Use Software License Optimization Tools to Get Your Money's Worth Out of SaaS
                    Network World, April 3, 2015
                    "Software as a Service (SaaS) breaks the shackles of traditional software licensing approaches, but savvy users still optimize their SaaS environments to avoid undue costs.

                    SaaS subscription models typically require a one to three year commitment. Customers are invoiced, usually on a monthly basis, and the license typically uses some sort of billing metric based on resource usage, such as the number of end users that can access the product. The flexibility of SaaS licensing models enables organizations to expand the use of the product according to their needs during the term of the subscription..."

                    Kludges Are a Scourge -- Except When They Aren't
                    InfoWorld, April 6, 2015
                    "When you work in IT, you quickly discover situations where a slapdash solution is needed right away -- because a better, long-term solution will take too long to shore up an item that's crumbling to bits.

                    These fixes are known as kludges. They're best used sparingly, then replaced with a respectable solution as soon as possible.

                    A major source of pain in IT comes from having to maintain kludges that have existed far beyond their intended lifetime and have become the long-term fix by default, though their upkeep is a burden on the infrastructure as a whole..."

                    In-Rack and In-Row Cooling Options for Any Data Center
                    Search Data Center, April 8, 2015
                    "Just because everyone else is cooling the whole data center with massive CRACs doesn't mean you have to. In-rack and in-row cooling systems are highly efficient ways to minimize energy usage while maximizing chilling capabilities.

                    Computer room air conditioning (CRAC) units push chilled air into a data center and around the equipment. In most cases, cooling these vast volumes of air is very inefficient. Hot and cold aisle containment decreases that volume, but still results in a lot of excess chilling -- with the concomitant costs of powering the CRACs..."

                      Liquid Immersion Cooling Relief for Ultra-Dense Data Centers
                      Search Data Center, April 8, 2015
                      "Direct liquid immersion cools servers and paves the way for the next generation of ultra-dense systems. It's not air, and it's not water -- the future is oil.

                      As data centers get denser, they get hotter. Liquid immersion cooling could replace conventional air cooling methods for greater server and data center density.

                      Modern servers use a multitude of fans to direct greater volumes of air toward hot components along carefully ducted routes within each enclosure..."

                        Stop Bashing IT Operations
                        InformationWeek, April 8, 2015
                        "It has become almost fashionable to bash internal IT operations as the thing that must always get cut, as opposed to IT innovation efforts that must be nurtured. I'm a little worried about all the bashing. If all internal IT ops are lumped together and discarded, that's bad for business. Some discernment is needed..."
                          What's the Best Way to Measure Data Center Airflow?
                          Search Data Center, April 8, 2015
                          "Most data center operations need to know the amount of air flow from a raised floor tile or an overhead supply duct grill, and a flow hood is the best way to gauge it.

                          In a data center, the flow hood works on an overhead grill just as it does in any other room. The hood must fit the size of the duct for a proper seal. If the hood opening is bigger than the airflow source, air will leak out, invalidating the measurement. In that case, use a smaller hood that fits the grill, or a mask to simulate an extended duct surface..."

                            IT - Security
                            So, You 'Don't Believe In' Security Education?
                            Dark Reading, April 2, 2015
                            "I've heard any number of cyber security professionals downplay the effectiveness of employee awareness and training initiatives. I get it. IT experts love their technologies and their gadgets. It's why they do what they do for a living. To get these individuals to concede that human safeguards are as important as technical safeguards can be an uphill battle.

                            But what I don't get are the industry leaders who put no stock in security education whatsoever. These individuals don't just downplay the effectiveness of training, they flat out tell people to give up on it. Flying in the face of studies by PwC, IBM, Aberdeen, and others, they've publicly shared opinions like these:..."

                            A Security Intelligence Reference Model to Assess Your Security Posture
                            Network World, April 2, 2015
                            "On April 1, the president of the United States issued an executive order to sanction malicious cyber actors who profit from stealing sensitive information from U.S. businesses, government agencies and individuals. President Obama said cyber threats "pose one of the most serious economic and national security challenges to the United States" and the executive order declared a national emergency pertaining to online threats..."
                            Stuxnet Five Years Later: Did We Learn the Right Lesson?
                            Dark Reading, April 2, 2015
                            "No! That's despite an abundance of best practices and standards that are shining light into the dark corners of industrial control system security.

                            The 5th anniversary of the day the Stuxnet worm came into public view is upon us. The worm triggered changes in industrial control systems products, networks, and methodologies. Looking back, what did we learn? Did we look for lessons where the light was brightest? Or did we look in the dark corners where our need was greatest?..."

                            How to Make Passwords Obsolete
                            InformationWeek, April 7, 2015
                            "We've all complained about passwords for years, yet very little has changed. If you had asked me five years ago about the future of the username and password authentication mechanism, I would have proclaimed that the practice would be long dead by now. And I would have been wrong.

                            That raises two questions: Why do we still rely on the human-memorized password for authentication, and what methods are out there that could finally render it obsolete?..."

                              Researchers Show That IoT Devices are not Designed with Security In Mind
                              IT World, April 7, 2015
                              "In the latest blow to Internet of Things (IoT) security, an analysis of smart home devices has found flaws that could give attackers access to sensitive data or allow them to control door locks and sensors.

                              The research was performed by a team from application security firm Veracode for six up-to-date devices acquired in December and found serious issues in five of them..."

                              In a Mock Cyberattack, Deloitte Teaches Business How to Respond
                              ComputerWorld, April 8, 2015
                              "A security breach or big data loss can trigger an emergency for the entire business, not just for the IT or security teams, so staffers from multiple departments must know how to react quickly and effectively in such situations.

                              This was one of the main lessons taught in a cyber incident war-gaming exercise held for the media on Tuesday in New York by consulting firm Deloitte..."

                              Java Security: It's a Multilayer Problem
                              ADT Mag, April 8, 2015
                              "Things have quieted down quite a bit on the Java security front during the last year or so. Rare these days are the heart-stopping revelations of zero-day vulnerabilities; and fewer are the grumbling editorials about the lack of end-user update hygiene. (Although, as far as I'm concerned, that issue is still quite grumble-worthy.) Oracle's click-to-play feature was at least partly responsible for a 2014 in which there were no major zero-day Java vulnerabilities discovered and exploited in the wild.

                              Which is great, but not the end of the Java security story..."

                              NIST Incident Response Plan: Four Steps to Better Incident Handling
                              Search Security, April 8, 2015
                              "The National Institute of Standards and Technology (NIST) published the Computer Security Incident Handling Guide 800-61 v2 in August 2012. It provides guidance for incident handling, particularly for analyzing incident-related data and determining the appropriate response to each incident. It takes a pragmatic approach to incident handling. It is adaptive and flexible so it can be applied to small and medium-sized businesses (SMB) or large enterprise environments..."
                              What's Next for Your Awareness Program?
                              CSO Online, April 8, 2015
                              "When I talk to CISOs or security awareness professionals, I frequently hear the same frustration about the results of their awareness programs. The supposed awareness programs have been a place for a year or more, and they have not yielded noticeable results, and in many cases seem almost useless, as user created incidents seem to continue to increase. When I ask them to describe their programs, what I get are descriptions of components of an awareness program and not a program itself. They describe computer-based training (CBT), and sometimes phishing simulations...."
                              Car-Hacking Prototype Passes Crash Test
                              Dark Reading, April 6, 2015
                              "Technology initially created for protecting US military unmanned aerial vehicles--aka drones--from cyberattacks soon will be available to help protect cars from hacking as well.

                              Researchers from the University of Virginia and Perrone Robotics recently completed a pilot track-test of cyberattacks on vehicles using prototype sensor technology from startup Mission Secure Inc. (MSi). They simulated cyberattacks on cars that attempted to take over the braking, acceleration, and collision avoidance features of the vehicles..."

                                IT - Careers
                                How to Tell If a Company's Culture Is Right for You
                                CIO, April 6, 2015
                                "CIO has covered almost every aspect of the job-search process from acing the technical interview to getting past applicant tracking systems to networking your way into your next job, but how do you figure out if a company's culture is the right fit before you accept a job offer? We asked recruiters, CIOs and career coaches to share advice to help you decide for yourself if an organization is one you'll flourish in or one you should pass on..."
                                Hacking the Nazis: The Secret Story of the Women Who Broke Hitler's Codes
                                TechRepublic, April 8, 2015
                                "Of the 10,000-plus staff at the Government Code and Cypher School during World War II, two-thirds were female. Three veteran servicewomen explain what life was like as part of the code-breaking operation during World War II.

                                "I was given one sentence, 'We are breaking German codes, end of story'."

                                It was Ruth Bourne's first job out of college, when, like thousands of other young British women during World War II, she was recruited to aid the Allied cipher-breaking efforts at Bletchley Park..."

                                  IT - Social Media
                                  Meet the Empowered People
                                  Web Strategy, April 9, 2015
                                  "They have new powers. They are backed by powerful companies. And they are starting to organize. No, I'm not talking about the latest episode of Heroes. I'm talking about the people formerly known as your customers. You may be asking, 'What powers do they have? Who gave those powers to them? What are they going to do together?'

                                  I'll be glad answer that..."

                                    IT - Virtualization
                                    Dawn of the Data Center Operating System
                                    InfoWorld, April 7, 2015
                                    "Virtualization has been a key driver behind every major trend in software, from search to social networks to SaaS, over the past decade. In fact, most of the applications we use -- and cloud computing as we know it today -- would not have been possible without the server utilization and cost savings that resulted from virtualization..."
                                    IT - Compliance
                                    A CISO Reveals Why the Cloud Is Your Secret Weapon for Faster, Better, and Cheaper PCI Audits
                                    CSO Online, April 7, 2015
                                    Combining cloud with PCI is the recipe Joan Pepin, CISO of SumoLogic, used to achieve compliance faster, cheaper, and better. Here is what she did...

                                    How do you feel about PCI? Or the security of the cloud?

                                    What happens when you need to attain PCI certification for your cloud-based service?

                                    That's precisely the challenge that Joan Pepin (LinkedIn, Twitter), CISO of SumoLogic, faced. Her results might surprise you..."

                                    IT - Email
                                    Welcome to the Internet of Things. Please Check Your Privacy at the Door.
                                    IT World, April 7, 2015
                                    "It knows when you are sleeping and when you are awake. It knows when you're home and when you're away. It knows how how fast you drive, how many steps you took yesterday, and how hard your heart is working right now.

                                    It's the Internet of Things (IoT), and it is terrible at keeping secrets..."

                                    The Collaboration Gap
                                    TechZone360, April 10, 2015
                                    "Perfect collaboration. Microsoft should do it; they claim they do. But the March 2014 issue of PCWorld magazine got it right: Neither Microsoft nor anybody else is quite there yet. Not Google Drive, nor Dropbox. Not Jive, nor Zoho.

                                    Inc. magazine described the three components of collaboration as scheduling and communication, project management, and corporate social media. Companies of all stripes are converging toward real collaboration by attempting to seamlessly linking all three components the way we yearn for...."

                                    Lights, Camera, and... Action with Oracle ZFS Storage Appliance!
                                    By Sneha Rajendran
                                    Sneha Rajendran writes, "Inspired by the recent Oscars award ceremony, I decided to try my hand at directing and here is my work in progress script, featuring our star - Oracle ZFS Storage Appliance.

                                    Location: Editing Studio..."

                                    Is that purpose-built backup appliance really the best for your database backup and restore?
                                    Data protection is a critical component of the job
                                    Doug Chamberlain writes, "Data protection is a critical component of the job if you have anything to do with IT operations. Regardless of your job title, database administrators and storage administrators alike, know how critical it is to plan for any type of systems outage. Backup and restore are key components of a data protection and preparing for a disaster recovery event. The storage architecture is a key element in the overall enterprise IT environment, and when focusing on the implementation of disk storage for backup and recovery, there isn't just one platform to do the task.

                                    And if you are looking at database backups, only Oracle can provide a better database backup platform than storage behemoth EMC..."

                                    The Oracle Storage Cloud in a Nutshell
                                    By Bogdan Paun
                                    Bogdan writes, "The concept of software defined storage is getting a lot of traction lately. The Oracle Cloud Storage service (part of Oracle's IaaS offering) is one such service that is well-suited for both enterprise needs and the casual end-user I've recently given a talk about this service at the Oracle Cloud Forum held at Cluj/Romania as part of the Cluj IT Cluster Innovation Days series of events. The Oracle Cloud Storage service is based on the OpenStack Swift module.

                                    Remote objects are stored in containers (on which you can easily set read/write permissions pertaining to different user roles). On write each object is copied on to 3 different disks and these redundant copies are actively monitored so you get a high reliability level..."

                                    IT - Database
                                    Big Data Platforms: How to Migrate from Relational Databases to NoSQL
                                    Information Management, April 6, 2015
                                    "Ever wonder how to migrate from a relational database management system (RDBMS) schema structure to a big data platform (NoSQL database implementation). This article (part 2 of an overall series; part 1 is here) offers some practical advice for such a migration.

                                    In the following sections you'll find information that will show you the ins and outs of migrating from a traditional RDBMS schema structure to a big data storage structure. While most of the examples are made to be fairly generic, the final structure will be created for use in the "Wide Column / Column Family Store" variety. There are many ways of getting to the end goal. The process I illustrate is one of many, but it does work well for what I'm trying to show..."

                                    IT - Big Data
                                    The Hierarchy of Needs for Analytics
                                    Information Management, April 2, 2015
                                    "Analytics is a buzzword that is transforming boardroom discussions into scientific data-backed debates. That's mostly a good thing - the problem is, most people don't really know what they are talking about. We see too many organizations that achieve success with one minor analytics project and then try to live off that glamour, like middle-aged suburbanites reminiscing about that epic night out in college.

                                    What these companies really need to do is scale their analytics efforts - turn that one success into the first of many..."

                                    Big Data Is All About the Cloud
                                    InfoWorld, April 6, 2015
                                    "Big data isn't about real-time vs. batch processing. It's not a question of either/or, as Ovum analyst Tony Baer and others stress. Given the broad range of options and workloads that make up a successful big data strategy, this isn't surprising or controversial.

                                    More controversial, though perhaps not surprising, is the nature of the infrastructure required to get the most from big data. For example, AWS (Amazon Web Services) data science chief Matt Wood warns that, while "analytics is addictive," this positive addiction quickly turns sour if your infrastructure can't keep up..."

                                    Do You Understand what Makes Your Target Audience Tick?
                                    TechWorld, April 7, 2015
                                    "We've all heard of big data. In fact, you can't get away from the hype, articles, conferences, roundtables and webinars about it. However, there's a core element of big data that frequently gets overlooked: the human element. It's people - along with their social media profiles and mobile devices - that are driving the explosion of data. Whether you're on the bus, walking to a meeting or out in the evening, you can share pictures and videos via your social networks, like posts, comment on blogs and articles, tweet and more..."
                                    Making Big Data Work
                                    FCW, April 7, 2015
                                    "Behind the "big data" cliché is an explosion in the volume of information collected by sensors, cameras, social media, e-commerce, science experiments, weather satellites, logistics and a host of other sources. But to extract valuable insights from the terabytes and petabytes of information, analysts have to know how to use datasets in their systems, and compare data from different sources..."
                                    JPMorgan Big Data Algorithm Identifies Rogue Employees
                                    Bloomberg, April 8, 2015
                                    "Wall Street traders are already threatened by computers that can do their jobs faster and cheaper. Now the humans of finance have something else to worry about: Algorithms that make sure they behave.

                                    JPMorgan Chase & Co., which has racked up more than $36 billion in legal bills since the financial crisis, is rolling out a program to identify rogue employees before they go astray, according to Sally Dewar, head of regulatory affairs for Europe, who's overseeing the effort. Dozens of inputs, including whether workers skip compliance classes, violate personal trading rules or breach market-risk limits, will be fed into the software..."

                                      IT - Mobile
                                      Radical New Battery Could Reduce Phone Charging to Just One Minute
                                      PC World, April 6, 2015
                                      "Researchers at Stanford University have developed a new battery that can be recharged in about a minute and is safer than the lithium ion cells used in everything from smartwatches to passenger jets.

                                      It could one day mean super-fast charging of smartphones and other gadgets - and interestingly, a major step in the development came largely by chance.

                                      The battery uses aluminum-ion cells, which are much cheaper than lithium-ion. They're also high performance and are not prone to bursting into flames or exploding when damaged, as lithium ion batteries can do..."

                                      IT - BYOD
                                      The Good & Bad of BYOD
                                      Dark Reading, April 3, 2015
                                      "BYOD has very little to do with technology and everything to do with security, organizational politics, and human psychology.

                                      Shadow IT has been big news lately. Hillary Clinton is still trying to recover from the public beating she endured over her use of a private email server instead of the government's while Secretary of State. Even more dramatic, but not as well-reported, is the story of a US ambassador to Kenya who ran his office, including his own internet connection with a personal Gmail account, out of an embassy bathroom in Nairobi rather than use the government's IT resources..."

                                      Have we finally solved BYOD?
                                      ITProPortal, April 9, 2015
                                      "BYOD or bring your own device, as well as its many variants, is a concept well-known to IT professionals across a multitude of business sectors.

                                      The idea of enabling employees to use their own personal device for work-related tasks is common practice across many organisations and has seen benefits including increased employee satisfaction and lower IT costs.

                                      However, this approach has also not been without its problems and for every satisfied member of staff there's been an IT leader battling against security issues..."

                                      What about the cloud apps? Why controlling them is the key to business-friendly BYOD
                                      Information Age, April 9, 2015
                                      "The proliferation of Bring Your Own Device (BYOD) within the business environment was as much a matter of timing as anything else. The growth in employee-owned devices dovetailed with the global financial crisis. Businesses looking to reduce their overall capex costs therefore encouraged the trend as the cost of purchase, replacement and general day-to-day management of hardware became the responsibility of the owner.

                                      Coupled with this, BYOD actually brought untold benefits to organisations. Not least of which by allowing workers to access systems from outside of the physical parameters of the office led to a general trend for staff to actually exceed their contracted hours and effectively work harder at a time when wages were being frozen..."

                                      Top Ten Articles for last few Issues
                                      Vol 206 Issue 1; Vol 205 Issue 1, 2, 3 and 4; Vol 204 Issues 2, 3 and 4
                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                      • Oracle gets ZFS filer array spun up to near-AFA speeds
                                      • Oracle Server X5-2 Produces World Record 2-Chip Single Application Server SPECjEnterprise2010 Result
                                      • How Engineered Systems Became The iPhones Of The Data Center
                                      • Faster adoption of engineered systems in India than in West
                                      • Virtual Compute Appliance 2.0.2 Released
                                      • LibreOffice 4.4.2
                                      • Oracle VM VirtualBox 5.0 BETA 1 Released
                                      • The Connected Customer" Oracle Roadmap To Modern
                                      • Collaborative innovation - April 16th - 5pm - 8:30pm
                                      • Locality Group Observability on Solaris

                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                        IT - Tape
                                        Major IBM storage breakthrough proves tape is still setting records 63 years on
                                        Information Age, April 9, 2015
                                        "IBM scientists have demonstrated an areal recording density of 123 billion bits of uncompressed data per square inch on low cost, particulate magnetic tape - a breakthrough that represents the equivalent of a 220 terabyte tape cartridge that could fit in the palm of your hand.

                                        To put this into perspective, 220 terabytes of data is comparable to 1.37 trillion mobile text messages or the text of 220 million books, which would require a 2,200 km bookshelf spanning from Las Vegas to Houston, Texas..."

                                        Trending in
                                        Vol 235, Issue 2
                                        Trending IT Articles