News about Oracle's Solaris and Sun Hardware
System News
Apr 13th, 2015 — Apr 19th, 2015 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 206, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle OpenWorld and JavaOne 2015 Call for Proposals
Open through Wednesday, April 29
"The Oracle OpenWorld 2015 Call for Proposals is now open. Attendees at the conference are eager to hear from experts on Oracle business and technology. They're looking for insights and improvements they can put to use in their own jobs: exciting innovations, strategies to modernize their business, different or easier ways to implement, unique use cases, lessons learned, the best of best practices.

If you've got something special to share with other Oracle users and technologists, they want to hear from you, and so do we. Submit your proposal now for this opportunity to present at Oracle OpenWorld, the most important Oracle technology and business conference of the year..."

April 2015 Critical Patch Update Released
By Eric P. Maurice

Eric Maurice writes that Oracle, the April 2015 Critical Patch Update. The predictable nature of the Critical Patch Update program is intended to provide customers the ability to plan for the application of security fixes across all Oracle products. Critical Patch Updates are released quarterly in the months of January, April, July, and October. Unfortunately, Oracle continues to periodically receive reports of active exploitation of vulnerabilities that have already been fixed by Oracle in previous Critical Patch Update releases. In some instances, malicious attacks have been successful because customers failed to apply Critical Patch Updates...

Oracle Announces Oracle Application Express 5
Enables customers to develop, design and deploy elegant, responsive, database-driven desktop and mobile applications using only a browser.
Joel Kallman writes, "Oracle Application Express 5 is now generally available! The result of a two and a half year engineering effort, it represents the greatest advancement of Oracle Application Express (APEX) in its 10 year history. Oracle Application Express 5 enables customers to develop, design and deploy elegant, responsive, database-driven desktop and mobile applications using only a browser.

"Oracle APEX 5 is the largest and most important release in the history of Oracle Application Express" said Michael J. Hichwa, Vice President of Oracle Database Tools. "Universal Theme in Oracle APEX 5 dramatically improves how quickly and easily SQL-savvy developers can build Web apps that are both responsive and accessible. Universal Theme enables developers, like myself, to build a robust customized UI without the help of a CSS/HTML guru."...

Faster Processors for Fujitsu M10-1 and M10-4 Servers
Torrey Martin
Torrey Martin, Fujitsu M10 Product Specialist, writes, "We have come a long way with SPARC64, both the architecture and the systems around the chips.

First the news, then my story.

We just released the next step in the SPARC64 story this month. The power of the highest performance SPARC64 X+ processor is now available for space-saving Fujitsu M10-1 and compact, mid-range Fujitsu M10-4 servers. With the new 3.7GHz 8-core processor, performance improvements of up to 30 percent per core are available..."

Customers Share Business Benefits of using Oracle Exalogic Elastic Cloud
By Alexandra Huff

"Many satisfied Oracle Exalogic Elastic Cloud customers are enthusiastically sharing their success stories, and we are proud to pass them on. Here are a few of the more recent testimonials on how Exalogic is helping to solve business problems. Key highlights are mentioned below; more details are included in each of the stories..."

Perspectives on Docker
Jfrog CTO and co-founder Yoav Landman explains the use of Docker with Chef
Want to know why and how to use Docker? Docker is a popular tool to build and deploy applications across environments. In these three interviews, you will learn about the benefits of Docker, its integration with other tools, and teams using the tool for different applications.

Jfrog CTO and co-founder Yoav Landman explains the use of Docker with Chef, and Vagrant in the development of a Bintray application. (see videos) ...

IT - Storage
Erasure Coding to the Rescue
NetworkComputing, April 10, 2015
"As an alternative to RAID, erasure coding offers better protection with less compute time and solves the drive rebuild problem.

RAID has slowly been choking on the growing capacity of disk drives. The problem is that as capacities increase, the time to rebuild a failed drive onto a spare also goes up linearly. Today's drives have reached 10 TB in capacity, and rebuilds can take days. Statistics show that the probability of a second failure during rebuild is now large enough to generate concerns about guaranteeing data integrity. The result is that we have had to find new solutions, one of which is erasure coding..."

    Will Containers Sink the All-Flash Array?
    NetworkComputing, April 14, 2015
    "All-flash arrays are touted as solutions for virtual desktop deployments and big data, but virtual containers and Docker could undercut that. All-flash arrays (AFAs) are hot in storage today. They provide low-latency access and phenomenal I/O rates, reaching beyond a million IOs per second. Because of this performance, and the relative ease of installation in existing SANs, AFAs have done well in the market.

    The use cases for AFA cover a broad spectrum, but two stand out: supporting virtual desktops and big data. However, the rise of virtual containers and Docker could provide an alternative approach for these use cases, potentially putting a damper on demand for all-flash arrays..."

    IT - Technology
    Drivers Get an Eyeful With BMW's Connected Car Goggles
    TechWorld, April 13, 2015
    "German carmaker BMW has revealed a wearable to rival Google Glass - a pair of virtual reality goggles that let MINI drivers receive messages, get navigation tips and navigate tricky parking spots from behind the wheel.

    The wearables, in the shape of traditional driving goggles, are a prototype that will be on show at the Auto Shanghai trade fair this week.

    Drivers will be able to select their destination through the glasses before entering the car, the time and mileage to destination, speed limits and texts and messages that will be read out by the car..."

    8 Things You Need to Know About 3D Scanners
    TechRepublic, April 14, 2015
    "You can 3D print almost anything. But having a scanner helps foster even more creativity. Here are eight things to know about digital scanners for 3D printers.

    You want to get your dad a great birthday present. He loves his motorcycle. An idea pops into your head: a 3D model of that favorite possession, eternalized in plastic for his desk at work. You have a desktop 3D printer, so that's totally possible, and it's also pretty cheap..."

      Moore's Law at 50: The Past and Future
      ITWorld, April 16, 2015
      When you're strapping on the latest smart watch or ogling an iPhone, you probably aren't thinking of Moore's Law, which for 50 years has been used as a blueprint to make computers smaller, cheaper and faster.

      Without Moore's Law it's quite possible that new types of computers like Microsoft's HoloLens, a holographic wearable with which users can interact with floating images, would not have been developed. For decades, Moore's Law has been a guiding star for the development of modern electronics, though in recent years its relevance has been subject to debate.

      The Crazy-Tiny Next Generation of Computers, April 16, 2015
      "When Prabal Dutta accidentally drops a computer, nothing breaks. There's no crash. The only sound you might hear is a prolonged groan. That's because these computers are just one cubic millimeter in size, and once they hit the floor, they're gone. 'We just lose them,' Dutta says. 'It's worse than jewelry.' To drive the point home, Dutta, an assistant professor of electrical engineering at the University of Michigan, emails me a photo of 50 of these computers. They barely fill a thimble halfway to its brim..."
        How Gordon Moore Made "Moore's Law", April 16, 2015
        "On April 19, 1965, chemist Gordon Moore published an article in Electronics magazine that would codify a phenomenon that would shape our world. At its core was a non-intuitive, and incredibly ballsy, prediction that with the advent of microelectronics, computing power would grow dramatically, accompanied by an equally dramatic decrease in cost. Over a period of years and decades, the exponential effect of what would be known as 'Moore's Law' would be the reason why, for instance, all of us carry in our pockets a supercomputer that only years earlier would have cost billions of dollars and filled many rooms. We call them 'phones' ..."
          The FTC is Worried About Algorithmic Transparency, And You Should Be too
          PC World, April 9, 2015
          "It's no secret that algorithms power much of the technology we interact with every day, whether it's to search for information on Google or to browse through a Facebook news feed. What's less widely known is that algorithms also play a role when we apply for a loan, for example, or receive a special marketing offer.

          Algorithms are practically everywhere we are today, shaping what we see, what we believe and, to an increasing extent, what our futures hold. Is that a good thing? The U.S. Federal Trade Commission, like many others, isn't so sure..."

          Why Floors, Walls and Ceilings Are the Next Interface
          ComputerWorld, April 11, 2015
          "It's a cliché to say that in the past few decades "everything has become computerized" and that the power and quality of our computers has increased massively.

          What hasn't changed much is the size of the interface. Sure, some of us have large monitors, or many monitors (you know who you are). But the vast majority of us interact with our computers and the Internet through a small rectangle (on a laptop, tablet or phone) that we place in front of our faces..."

            The $5 Billion Race to Build a Better Battery
            Bloomberg, April 14, 2015
            "Professor Donald Sadoway remembers chuckling at an e-mail in August 2009 from a woman claiming to represent Bill Gates. The world's richest man had taken Sadoway's Introduction to Solid State Chemistry online, the message explained. Gates wondered if he could meet the guy teaching the popular MIT course the next time the billionaire was in the Boston area, Bloomberg Markets magazine will report in its May issue..."
              IT - Bitcoin
              Former White House Advisor to Head MIT Digital Currency Initiative
              CoindDesk, April 15, 2015
              "MIT Media Lab has announced the launch of Digital Currency Initiative, a three-pronged program aimed at increasing awareness of the technology on campus and abroad while providing research to promote policy and standards initiatives.

              The news was first detailed in a post penned by former White House senior advisor and Digital Currency Initiative director Brian Forde, who today officially joined the university-run research laboratory..."

                5 Surprising Facts from CoinDesk's State of Bitcoin Report
                CoindDesk, April 18, 2015
                "Last Friday we released our quarterly State of Bitcoin report, which aims to provide a snapshot of events across the bitcoin ecosystem.

                With 87 slides of data, it's a hefty read. Here, we've cherry-picked some of the most surprising insights gleaned about the cryptocurrency space this year...

                Back in March, Fortune journalist Daniel Roberts gave mainstream media coverage of bitcoin a Kulber-Ross spin. Mirroring the five stages of loss, he suggested, journalists' approach to the cryptocurrency has typically morphed from 'ignore', 'dismiss', 'cover' and 'hedge' to the fifth and final stage: 'write a book'..."

                Top Banking Software Vendor Infosys To Make Use Of The Bitcoin Block Chain
                Crypto Coin News, April 13, 2015
                "Legitimacy does not flow from the barrel of a gun, from the banking industry, nor from governments, or such is the feeling of the average Bitcoiner. However, it's nice when the technology behind the world's first cryptocurrency gets some respect in traditional banking sector...

                one of the top banking software providers, Infosys, is considering the implementation of the block chain into its core product, Finacle. Finacle is the front-end to bank databases used by employees to manage accounts, open accounts, and so forth.

                Last year, the company was rated as having the best online banking suite in terms of customer experience...."

                  Bitcoin Moves From Commodity To Payment Currency
                  Crypto Coin News, April 15, 2015
                  "Bitcoin is becoming an actual currency for everyday use among consumers more than a traded commodity, according to recently released BitPay research. The data indicated the total number of bitcoin transactions more than doubled last year.

                  The value of the average bitcoin order fell by almost half, the research found. This finding reflects increasing bitcoin use as a method of payment among merchants and consumers..."

                  Welcome to Liberland: Where Bitcoin is the National Currency
                  Crypto Coin News, April 18, 2015
                  "No longer confined to the tech world, big data is everywhere these days. It is shaping the way governments are run, how we buy everything from groceries to video games and how we interact in a global social media landscape. It was only a matter of time before big data made a big appearance in sports. Data insights and analytics for professional and college sports is increasing fan interest and driving revenue previously unavailable. The use of big data in sports is exploding in a big way..."
                  Reserve Bank of Australia Favors Hands-off Approach for Bitcoin Regulation
                  Bitcoin Magazine, April 14, 2015
                  "The Reserve Bank of Australia (RBA) will not intervene in oversight of digital currencies such as bitcoin at the moment, The Australian Business Review reports.

                  In reply to an Australian Senate inquiry, RBA's representatives said in their opening statement that the limited use of the currency had no discernible impact on competition or risk to the financial system and that digital currencies represent a potentially important development..."

                  IT - FOSS
                  It's an open-source world: ?78 percent of companies run open-source software
                  ZDNet, April 16, 2015
                  "The good news is that open-source software is used in the vast majority, 78 percent, of businesses. The bad news is that far less do even a half-way decent job of managing it.

                  Black Duck Software, the open-source software (OSS) logistics and legal solutions provider, and North Bridge, a seed-to-growth venture capital firm, have announced the results of the ninth annual Future of Open Source Survey. They found that the enterprise is adopting open source like crazy, but they're not managing it worth a darn..."

                  Solaris Swift All In One
                  Set up a Swift storage service on single standalone Solaris OS useful for development
                  Jim Kremer writes, "I'm going to talk about my favorite Swift which is an object store that is part of OpenStack.

                  What I'll show is how I set up a Swift storage service on single standalone Solaris OS useful for development. There is already OpenStack Swift documentation that shows how to do this for many OSes but Solaris documentation is missing. The Swift instance will store all of its data in a single ZFS filesystem. Redundancy is assumed to be supplied by the ZFS filesystem so this example only requires one copy for all Swift data objects.

                  One advantage of storing data on ZFS is that you will get all the ZFS features including compression, encryption, snapshots and clones..."

                  Is The Performance of Your MySQL Database Important?
                  MySQL Performance Tuning course
                  "How important is the performance of your MySQL database? If you want to learn more about tuning the performance of MySQL servers, consider taking the MySQL Performance Tuning training course. In this course you learn to:

                  • Understand performance tuning concepts
                  • Benchmark your MySQL server
                  • Tune MySQL server settings
                  • Investigate performance metrics with a range of system databases, command-line and graphic tools
                  • Design your database for optimal performance
                  • Optimize slow queries
                  • Troubleshoot common performance problems
                  • Scale your hardware and application environment as your database grows

                  You can take the MySQL Performance Tuning course in the following formats..."

                  On Choosing Mature Technologies
                  By Bertrand Mattheli

                  Bertrand Mattheli writes, "Two recent blogs from engineering managers at successful Web properties have highlighted the wisdom of selecting proven and mature technologies, whether for new startups or projects.

                  The first one is entitled "Learn to stop using shiny new things and love MySQL", by Marty Weiner, Engineering Manager at Pinterest. Marty starts off explaining "A good portion of the startups I meet and advise want to use the newest, hottest technology to build something that's cool, but not technologically groundbreaking. I have yet to meet a startup building a time machine, teleporter or quantum social network that would actually require some amazing new tech. They have awesome new ideas with down-to-earth technical requirements, so I kept wondering why they choose this shiny (and risky) new stuff when all they need is a good ol' trustworthy database. I think it's because many assume that building the latest and greatest needs the latest and greatest!"..."

                  Cloud Computing
                  Unmask Your Data. The Visual Face of Hadoop (parts 2 to 5 of 5)
                  Richard Tomlinson

                  Richard writes, "Over the last 18 months or so, while Oracle Big Data Discovery was in early stages of design and development I got to ask lots of customers and prospects some fundamental questions related to why they struggle to get analytic value from Hadoop and after a while common patterns started to emerge that we ultimately used as the basis of the design for Big Data Discovery. So here's what we learned....

                  See all 5 parts at

                  Suffering From Bloated SaaS?
                  Can there be too much of a good thing
                  Jim Lein writes, "When it comes to SaaS can there be too much of a good thing? Many SaaS-adopting organizations now find themselves with dozens of precariously connected solutions, primarily because line of business buyers bypass the offices of finance and IT.

                  Matt Blumber, CEO and founder of Return Path, recently penned this fun post Honey, Does this Make My SaaS Look Big?. Blumber inventories his company's SaaS stockpile off the top of his head (50+ solutions; 50+ vendors) and acknowledges that there may be overlap because, 'it's easy for people to put small charges on credit cards and not realize other pockets of the organization are using different or even the same tools'.

                  I understand how this happens. And I'm not one to talk. I have over a dozen personal social media accounts, including five Facebook pages. But no harm no foul. My strategy may be chubby but it's not hurting me..."

                  Oracle Cloud: Platform-as-a-Service
                  IDC Vendor Profile
                  Larry Carvalho Jeff Silverstein, from IDC, write in an IDC Vendor Profile, "The platform-as-a-service (PaaS) market, and within it the cloud application platform (CAP) market, is growing rapidly as enterprises seek quicker development times along with cloud and mobile enablement of their applications and customers. One of the key forms of a PaaS is the cloud application platform. While cloud technology that enables CAPs is unsettled and changing rapidly, Oracle, with its Oracle Cloud and Oracle Private Cloud Solutions, is building a competitive position in the market by offering:..."
                  Training for Oracle Linux 7 and Earlier Versions
                  the Oracle Linux curriculum has training for you
                  "Linux system administration skills are key to many job roles and an advantage for those looking for new job opportunities. Whether you are interested in Linux 5, 6 or 7, the Oracle Linux curriculum has training for you.

                  The subjects you should be familiar with before taking Oracle Linux training are:

                  • Types of user accounts
                  • Working with files and directories in Unix
                  • Text editing using vi
                  • Unix process control
                  • Unix shell command line features
                  • Basic shell scripting
                  • Archiving and compressing files in Unix
                  • Performing remove connections and file transfers I f you already have this prerequisite knowledge, it is time for you to start on Oracle Linux training..."
                  The Power of The Ksplice Feature of Oracle Linux Video
                  By Chris Kawalek
                  Chris Kawalek, "I'm really excited to share this week's Friday Spotlight with you. Oracle Senior Vice President of Linux and Virtualization Wim Coekaerts sat down with Director of Product Management Michele Casey and Senior Development Manager Jamie Iles to talk about Ksplice.

                  In the video, they go into a lot of detail about why Ksplice is a production-ready tool for keeping systems up to date..."

                  IT - Cloud
                  What is Shadow IT And Why You Should Care
                  Storage-Switzerland, April 13, 2015
                  "'Shadow IT is a name for the process that occurs when users self-select IT services, signing up for cloud-based services without the knowledge or approval of the IT organization. IT could take the attitude that Shadow IT is a good deal for them, since, on the surface it sounds like users are going to take care of their own problems; creating one less task for already busy administrators. But it's not that simple. Shadow IT is full of risk. Organizations should be very concerned about leakage and data loss. We also find that most Shadow IT projects get thrown back over the wall to IT at some point and they end up supporting the initiative anyway..."
                    How to Overcome 3 Hybrid Cloud Integration Challenges
                    Network World, April 9, 2015
                    "Companies adopting cloud technologies often end up with a public/private hybrid approach that balances business needs with infrastructure goals, and while the end result provides numerous benefits, hybrid clouds can result in integration challenges. But with the right planning and the strategies below, connecting cloud applications can be done easily and effectively:.."
                    The Cloud Scores NIH Approval for Gene Research
                    InfoWorld, April 10, 2015
                    "As the big data community gores itself over real-time vs. batch, Basho CTO Dave McCrory (@mccrory) offers an easy way to settle the question:

                    Let gravity decide.

                    Or data gravity, to be more precise. In a world where "data attracts data," McCrory tells me in an interview, enterprises will be "inclined to store additional quantities of large data in the same place." That means more data in traditional data centers, but also more data in the cloud.

                    In short, big data, according to McCrory, isn't about cloud vs. data center, or real-time Spark vs. batch-oriented MapReduce. It's about all of the above..."

                    5 Ways to Reduce Data Loss in the Cloud
                    Government Technology, April 10, 2015
                    "There's an ongoing debate about when the term 'cloud computing' first appeared. But there's no debate about the cloud's positive impact over the past decade. Whether discussing technology infrastructure, new data center needs, software as a service, disaster recovery, mobile app delivery or other aspects of future technology innovation, cloud computing is at the center of the conversation.

                    But security continues to top the list of cloud concerns. To prep for a recent online symposium on improving cloud security, I reviewed 2008 presentations from when I was Michigan's CISO describing the good, the bad and the ugly in the cloud. Here were some of the bullets:..."

                    To the Cloud!? The CIO's Decision
                    Business 2 Community, April 14, 2015
                    "Every CIO has to eventually face the decision on whether to build a datacenter or move to the cloud. This is especially true for companies with infrastructures of a certain size, where conventional wisdom dictates that once a platform grows to 1,000 servers it would be cheaper to build rather than rent. Historically, the argument has always been that building your own infrastructure is cheaper because renting essentially lets someone else do the work, take on the cost and then charge you a margin to use it. While this will always be true to a certain extent, the cost of cloud computing continues to drop to the point where the cost benefit of building, even at scale, is not so clear...."
                    IT - CxO
                    Are You Prepared for the Leadership Gap?
                    CIO, April 9, 2015
                    "Fewer employees are aspiring to C-level roles, preferring to use their leadership skills to make a direct impact on their organizations and colleagues from their current positions. What does that mean for the future of your business?

                    Millions of Baby Boomers are getting ready to retire, many of them from high-level corporate leadership positions, leaving plenty of C-suite vacancies just waiting to be filled by the next generation. But according to the Global Workforce Leadership Survey released by talent management solutions provider Saba Software and research and HR advisory service firm, no one wants the job..."

                    What Does the Modern IT Team Look Like?
                    Business 2 Community, April 12, 2015
                    "IT teams are evolving. The old model of a Finance/IT Director supported by Infrastructure and Application managers, with a host of network engineers and developers, is changing to meet new challenges.

                    In most organizations, IT used to be almost entirely about finance: sales, cash flow, payroll, and purchasing. Organizations often developed their own software and built their own networks. They needed network engineers, a Wintel team, a mainframe team - Now, much of the software is off-the-shelf, running on commodity hardware, or abstracted to SaaS - the CIO has emerged to coordinate it all..."

                    4 Incredibly Common Hiring Mistakes - and How to Prevent Them
                    TLNT, April 10, 2015
                    "Hiring right is one of the most important decisions a company can make.

                    Hire the right person and you increase productivity and retention. Hire the wrong person and you increase turnover, decrease productivity and waste a lot of time and money.

                    Here are some common hiring mistakes most companies make - and how you can avoid them:..."

                      The Outline for Your Next IT Strategy Meeting
                      Business 2 Community, April 12, 2015
                      "You invest a good percentage of your earnings each year into your technology. From workstations to printing equipment, servers and infrastructure, training, and new applications - technology is the backbone of your organization. So, technology planning? It's even more important. You need plans in place to properly accommodate your growth and streamline your workflows and processes. What does that require?..."
                      vBeers @ Miami - Wed April 22nd - Brick House, Wyndwood
                      6pm - 9pm (Sponsored)
                      Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida. Register today so you can be a part of this great monthly event! Feel free to invite all of your friends and co workers who work in the IT industry!

                      This will be a Sponsored event so beers are on us. Join us for an evening of creating connections and building your network in a relaxed and fun environment.

                      Join us for an evening of creating connections and building your network in a relaxed and fun environment.

                      Networking is an essential aspect of your professional growth and development. Connect with an array of professionals while enjoying a drink or two. Who knows, you just may meet your next client, business partner, employer or employee!


                      • Brick House Wyndwood Address:
                      • 187 NW 28th St, Miami, FL 33127 Date:
                      • Wednesday, April 22nd Time:
                      • 6pm to 9pm - arrive and depart any time Sponsors:
                      • Nexenta Systems, CenturyLink, others to be announce

                      Please RSVP at the vBeers South Florida page.

                      Details @ ...

                      IT - Networks
                      A True Story of Combating A Large-Scale DDoS Attack
                      Network World, April 14, 2015
                      "Real tales of cyberattack response and recovery are hard to come by because organizations are reluctant to share details for a host of legitimate reasons, not the least of which is the potential for negative financial fallout. However, if we never tell our stories we doom others to blindly walk our path. Better to share our real-world battlefield experiences and become contributors to improved threat intelligence..."
                        Should DOD put IPv6 back on the front burner?
                        DefenseSystems, April 9, 2015
                        "Remember the IPv6 crisis? Four years ago, after the Internet Assigned Numbers Authority (IANA) allocated the last blocks of IPv4 address space to the five regional registries around the world, the need to switch to IPv6 was talked about with the urgency of correcting Y2K date code in December 1999. The message at the time: Get with the new protocols or get left behind on the mobile, everything-connected Internet.

                        Since then, the issue has dropped mostly off the radar, as engineers found ways to milk more use out of IPv4 addresses and organizations found plenty of other things to worry about. Now, however, IPv6 could be an issue whose time has returned, a point underscored by a recent Defense Department inspector general report on DOD's failure to keep up with the IPv6 transition..."

                        Network-Based Controls: Securing the Internet of Things
                        Search Security, April 13, 2015
                        "Activity trackers will be feeling the squeeze from smartwatches over the next couple of years, predicts a new forecast from NDP Group.

                        The analyst firm expects that by 2016, 9% of the U.S. adult population will own a smartwatch. According to the U.S. Census Bureau's 2013 estimates, 76.7 percent of the U.S. population (316 million people) is over the age of 18, amounting to over 242 million adults in the country..."

                          The Future Is Now: You May Already be Using IPv6
                          Network World, April 14, 2015
                          "You've probably heard about the looming shortage of Internet addresses, even if you've never gone looking for one. But depending on what websites you visit and how you get to them, you may be helping to solve it.

                          If you go to Google or Facebook through a major carrier in the U.S., Germany or France, for example, there's a decent chance you're using IPv6 'Internet Protocol, Version 6', the next-generation system that has so many addresses that the world may never use them up. Though it's pretty much invisible to end users, the new protocol is already making service providers' networks run better and may be speeding up your connections, too..."

                          3 Reasons Software-Defined Networking is Streamlining DOD IT
                          DefenseSystems, April 14, 2015
                          "At the 2014 Federal Forum in Washington, D.C., Terry Halvorsen, then-acting CIO (now CIO) of the Defense Department, addressed the growing importance of software-defined networking (SDN) in government. 'We have to embrace the software-defined mission of where we have to go with the networks - that includes all the infrastructure,' Halvorsen said, adding that doing so would enable agencies to 'respond to the changing threat environment faster.' ..."
                          Better Together: Network Operations & Infosec
                          Dark Reading, April 13, 2015
                          "Getting networking and information security teams together in the same room is a critical step for companies that want to build a continuous information security culture.

                          The recent computer attacks against Anthem and Premera Blue Cross are the latest case studies that demonstrate the necessary convergence of IT and security operations. This is something information security professionals should welcome, even demand. In fact, the network operations team can be an information security department's best resource for gaining understanding and insight into an organization's security operations, which traditional security solutions and best practices alone cannot provide..."

                          FCC Net Neutrality Rule Published in Federal Register
                          ComputerWorld, April 13, 2015
                          "The new net neutrality rule was published over the weekend in the Federal Register, the daily journal of U.S. government actions, raising the possibility of a spate of lawsuits from broadband companies that oppose the rule.

                          The U.S. Federal Communications Commission voted 3-2 in February to reclassify broadband as a regulated public utility by invoking Title II of the Communications Act, thus prohibiting providers from selectively blocking or throttling or offering paid prioritization of Internet traffic..."

                            Google Wants To Speed Up The Web With Its QUIC Protocol
                            TechCrunch, April 18, 2015
                            "You may have never heard of it, but if you are a Chrome user, chances are you've used Google's QUIC protocol already. As Google disclosed this week, about half of all requests from Chrome to Google's servers are now served over QUIC.

                            So what's the big deal here? QUIC is Google's experimental, low-latency Internet transportation protocol over UDP, a protocol that is often used by gaming, streaming media and VoIP services. The name 'QUIC' stands for Quick UDP Internet Connection..."

                            IT - Linux
                            Desktop Linux Made Easy
                            Datamation, April 13, 2015
                            "Ask any casual Linux enthusiast whether Linux is easy to use and they'll tell you once installed, it's very simple to navigate. The problem with the Linux desktop in 2015 isn't how easy the desktop environment(s) are to work with, but whether the applications provided are easy enough for the average user at a workstation.

                            Over the years, I've found the real issue was software compatibility and familiarity. For example, open source applications that met my needs weren't always a great fit for my clients. At least, not without some extra help setting up the applications.

                            In this article, I'll share my tips and software picks to make using Linux on the desktop easier and more familiar for the casual user..."

                            IT - Operations
                            The Software-Defined Data Center (SDDC): 5 Tips for Success
                            NetworkComputing, April 10, 2015
                            "Moving to software-defined infrastructure can help companies be more efficient and agile, but requires reengineering of IT processes.

                            A primary goal of the software-defined data center is to help IT organizations be more nimble and deliver rapid, cloud-like services to users. There's also the promise of saving money by delivering IT in a more coordinated, streamlined fashion. Infrastructure components and services are consolidated, fully automated, driven by business policies, and centrally managed for performance. A SDDC can monitor demand and respond automatically in seconds by spinning up appropriate resources..."

                            IT - Security
                            Bad News Everyone: Cybercrime is Getting Even Easier
                            The Register, April 9, 2015
                            "The volume of malware threats is actually on the decline despite the increase in breaches, according to a study from Websense Security Labs.

                            Websense Security Labs logged 3.96 billion security threats in 2014, which was 5.1 per cent less than 2013. Despite this, the number of high-profile breaches increased.

                            Hackers have switched from spray and pray tactics to more "quiet, targeted and unique attacks" that Websense reckons are far more effective.

                            Websense's 2015 Threat Report - published on Wednesday April 8 - also reports that malware authors are consistently reusing the same delivery techniques and infrastructure..."

                            Data Breaches May Cost Less Than the Security to Prevent Them
                            TechRepublic, April 9, 2015
                            "When it comes to data breaches, 2014 was a banner year. However, if Benjamin Dean, Fellow for Internet Governance and Cyber-security, School of International and Public Affairs at Columbia University, did his math right, 2015 will be more of the same.

                            In a March 2015 column on The Conversation, Dean provided a hard to disagree with defense of why things security-wise "ain't gonna change" soon. "When we examine the evidence, though, the actual expenses from the recent breaches at Sony, Target and Home Depot amount to less than 1% of each company's annual revenues," wrote Dean. "After reimbursement from insurance and minus tax deductions, the losses are even less."

                            Secrets are the Enemy of a Good Security Defense
                            InfoWorld, April 14, 2015
                            "Companies frequently call me to assist them after they've suffered a big hack. Often, the company turns out to be a major corporation, with the hack resulting in a big leak of customer information -- which may even surface in news cycles for a week or two. Usually, several security teams are involved, but everyone's goal is to make the company more secure and reduce risk of another, similar compromise.

                            I always ask, "How did the hack occur?" I'm astounded by how few of the project team members know and how many hacked companies don't want to share the answer. I'm here to tell you that secrets don't help defenses. How can anyone really help you reduce risk if your biggest risks are unknown?..."

                            Are Privileged Users the Most Dangerous Insider?
                            HelpNet Security, April 13, 2015
                            "92 percent of healthcare IT decision makers reported that their organizations are either somewhat or more vulnerable to insider threats, and 49 percent felt very or extremely vulnerable.

                            Additionally, 62 percent of respondents identified privileged users - those who have access to all resources available from systems they manage - as the most dangerous insider. Partners with internal access and contractors ranked second and third, respectively..."

                            Insider Threats: Focus on the User, Not the Data
                            Dark Reading, April 10, 2015
                            "People are more connected than ever. Everyone uses email, social media, the web and instant messaging. Some channels are for business purposes, so IT governs and monitors them. Others are for personal use, even if they're not sanctioned by the organization. A lot of that personal activity is innocent - parents communicating with children at school or making plans for later that day. It consumes some network resources, and most businesses are willing to write that off, but it brings with it the risks associated with the untrained or careless user..."
                              Chinese Nation-State Hackers Give up Attack Campaign
                              Dark Reading, April 13, 2015
                              "Can highly motivated, well-financed, well-organized nation-state cyber attackers working in shifts be persuaded to abandon a long-running attack campaign against a single target? CrowdStrike has new evidence to suggest the answer is yes. And that's heartening news, when viewed alongside the sobering report released by FireEye yesterday about APT30, a cyberespionage group that's been active in South-East Asia for over 10 years..."
                                Why Standardized Threat Data Will Help Stop the Next Big Breach
                                Dark Reading, April 15, 2015
                                "Adopting industry standards for threat intelligence will reduce a lot of the heavy lifting and free cyber security first responders to focus on what they do best.

                                When you post your next Facebook update, I will bet that you are not thinking about tcp/ip, http nor html. I imagine that when you buy the next season of Game of Thrones using your credit card you are not really thinking about the impact of TLS/SSL. And when you access your corporate network I am fairly certain you are not thanking the OSI stack in any way shape nor form. Yet these are the standards that are part of an invisible fabric underpinning our digital lives..."

                                Dabbling in Two-Factor Authentication can Be Dangerous
                                CSO Online, April 13, 2015
                                "What if the front door to your home was virtually impenetrable - secured with a standard lock, as well as a deadbolt and a video surveillance system - but the side door to the house was unlocked and left wide open? How effective would the brakes on your car be if they only worked part of the time? That is what it's like to use two-factor authentication, but only on certain designated systems.

                                The problem many organizations have with two-factor authentication is that it is implemented sporadically..."

                                  10 Eye-Opening Takeaways from Dell's Annual Threat Report
                                  CRN, April 10, 2015
                                  "On Monday, Dell Security will release its annual threat report, and some of the results are eye-opening.

                                  Over the past year, Dell blocked 1.7 trillion IPS attacks and 4.2 billion malware attacks. Almost 37 million of those attacks were unique -- that's double the total record for the previous year...

                                  Following are a few of the report's key findings, some insight from Dell managers on how partners can best respond to the growing list of threats, and a take on the security market from a Dell partner..."

                                  With Greater Visibility Comes Increased Response
                                  ComputerWorld, April 9, 2015
                                  "I mentioned in a previous article that we are using a 'loaner' Palo Alto Networks firewall, with all the bells and whistles. Our testing led to all sorts of interesting discoveries, and I certainly hope that the executive staff will agree that the increased visibility makes this sort of new-generation firewall well worth the investment.

                                  Not wanting to disrupt business operations, I tested the device on a SPAN port that monitors traffic in and out of our network and in between. When I say 'in between' I'm referring to a SPAN port that monitors traffic between the corporate network and our data center..."

                                    Enterprise Security Trends that Will Rule 2015
                                    TechZone360, April 15, 2015
                                    "From 3D printers that can replicate the intricate details of the human heart to wearable technology that tracks everything from blood pressure to incoming emails, 2015 shows great promise in becoming 'Year One' of the new digital world order. But before we get too distracted, it's worth paying attention to - and learning from - the past, which has consistently revealed where even the most established industry giants stumble: enterprise security..."
                                    IT - Careers
                                    8 Free Online Courses to Grow Your Tech Skills
                                    CIO, April 10, 2015
                                    "At one time, universities and colleges were institutes of higher learning for those who were passionate about acquiring knowledge. Today, education discussions tend to to center around how much individuals can make with their degree. Thanks to the Internet there are still places that offer open learning initiatives designed to help a new generation of technologists succeed.

                                    If money was the only thing holding you back from learning more about technology, we've got good news for you. There are many places offering free online tech training that while may not be degree/certificate driven can still give you a leg up on the competition..."

                                      Job Interview Noobies: Avoid these 10 Mistakes
                                      TechRepublic, April 9, 2015
                                      "You've just graduated from college and are about to undertake your first round of interviews for what you hope will be a lifetime career in IT. You know what you're doing. You've got the grades, the skills, and the knowledge to prove it. But did school prepare you for those interviews? Did they give you enough advice to send you into a meeting room with prospective bosses with the confidence and interview savvy to get the job?..."
                                        The Shocking Truth (and Lies) About ESD
                                        Network World, April 13, 2015
                                        "A participant in Reddit's forum devoted to networking asks: 'Has anyone here ever destroyed anything via ESD (electronic static discharge)?'

                                        Oh, yes, indeed they have, as a sampling of the anecdotes will reveal, though there were also skeptics and one fellow who told me via email 'that most failures claimed to be ESD-related are probably covers for something else.'

                                          Pompous Professor Swallows Placebo PC
                                          InfoWorld, April 15, 2015
                                          "There are good and bad aspects of working with people in any business, and each has its quirks. For a university where I worked, a gratifying challenge was finding effective ways to communicate with the users. A downside was working with huge egos and know-it-alls who clearly knew nothing.

                                          We all strive to understand our audience. With changes in technology, the users have to pay more attention to it, which takes time away from their regular jobs. They don't want to waste their day. They simply want to see what it does, how it can be applied to their needs, and how -- in the simplest set of instructions possible -- to make it work..."

                                            8 Time-Saving Productivity Hacks
                                            CIO, April 9, 2015
                                            Overcoming productivity paralysis

                                            "You might fly through your to-do list on some workdays, while on others, it seems insurmountable. Productivity paralysis can be tricky to overcome, and often requires experimenting with new tools and processes to rediscover what works for you.

                                            Lucky for you, we have some solutions. Read on for eight online services, apps, gadgets and habits guaranteed to help you better manage your workflow..."

                                              IT - Email
                                              Schneier on 'Really Bad' IoT Security: 'It's Going to Come Crashing Down'
                                              Network World, April 13, 2015
                                              "Security expert Bruce Schneier has looked at and written about difficulties the Internet of Things presents - such as the fact that the 'things' are by and large insecure and enable unwanted surveillance - and concludes that it's a problem that's going to get worse before it gets better.

                                              After a recent briefing with him at Resilient Systems headquarters in Cambridge, Mass., where he is CTO, he answered a few questions about the IoT and what corporate security executives ought to be doing about it right now. Here's a transcript of the exchange..."

                                              10 Astonishing Email Habits
                                              InformationWeek, April 14, 2015
                                              "The world's largest study on email was conducted by Yahoo Labs recently, and it revealed startling facts about how we use email. Examining more than 2 million users and 16 billion emails over several months, the Yahoo Labs researchers have given us the best picture we've ever had of the way we work and the way we communicate with email..."
                                                Pentagon's Near-Zero Power Plan Could Change the Game for Wireless Sensors
                                                DefenseSystems, April 14, 2015
                                                "A problem with the Internet of Things, whether in a military or civilian environment, is that all of those Internet-connected devices require power. And if they're not plugged in, that power comes from batteries that will run out pretty quickly, which means regularly replacing or recharging those batteries in a process that is time-consuming, costly and, in military situations, dangerous..."
                                                  IT - Big Data
                                                  From Big Data to Big Decisions
                                                  Information Management, April 13, 2015
                                                  "In the age of big data there are huge opportunities to provide customers with truly personalized experiences that reflect their needs and their desires. However, these opportunities are not without risk and it will take a systematic approach if we want to transform the digital experience from static and constant to dynamic and adaptive. Mining data for small nuggets of insight is not sufficient; to truly succeed we need to use data to drive the acquisition of knowledge about our customers, and to generate understanding of how we can design products to serve their needs and ours..."
                                                  Spark or Hadoop? Let Gravity Decide, Says Basho CTO
                                                  TechRepublic, April 10, 2015
                                                  "As the big data community gores itself over real-time vs. batch, Basho CTO Dave McCrory (@mccrory) offers an easy way to settle the question:

                                                  Let gravity decide.

                                                  Or data gravity, to be more precise. In a world where "data attracts data," McCrory tells me in an interview, enterprises will be "inclined to store additional quantities of large data in the same place." That means more data in traditional data centers, but also more data in the cloud.

                                                  In short, big data, according to McCrory, isn't about cloud vs. data center, or real-time Spark vs. batch-oriented MapReduce. It's about all of the above..."

                                                  Staying Ahead of the Data Deluge
                                                  NetworkComputing, April 15, 2015
                                                  "Data is core to Nielsen's business. Here's how the company is transforming its IT environment to tackle the data explosion. Nielsen has been in the business of consumer insights and data analytics for over 90 years. From day one, our challenge has been to make sure we can collect, transfer, store, analyze and report on that data all of the time to help our clients innovate.

                                                  Nielsen's IT organization is like most when it comes to establishing the core mission. We always merge two fundamental imperatives to determine our strategy:..."

                                                  Five Technologies to Make Sure Your Data Lives Forever
                                                  Make Use of, April 9, 2015
                                                  "They say that on the Internet, nothing ever goes away.

                                                  This is true, for popular content that's endlessly shared and remixed. But this kind of viral candy is only the tip of a really big iceberg. Beneath the surface of memes and naked celebrities lurks endless petabytes of data too boring for immortality. Wedding pictures, college essays, home videos, old emails - most of our data is in this category, and it can be disturbingly ephemeral.

                                                  One of the major lessons from physics is that thermodynamics hates your guts. Computer data is no exception. Flash memory loses its charge in under a decade. Even under ideal conditions, magnetic hard drives won't last longer than about ten years. CD's, under ideal conditions, last about ten as well. Magnetic tape, the gold-standard for long-term data storage for industry, stops being readable after thirty to fifty years..."

                                                  3 Big Data Trends for Business Intelligence
                                                  IT World Canada, April 9, 2015
                                                  "Big data has given businesses a window into valuable streams of information from customer purchasing habits to inventory status. However, internal data streams give only a limited picture, especially with the growth of digital businesses.

                                                  Gartner has identified three trends that describe information's ability to transform business processes over the next few years.

                                                  Our predictions include:..."

                                                  Big Data is Dead -- Long Live Big Data
                                                  InfoWorld, April 9, 2015
                                                  "For the last few years we've talked endlessly about big data, led by Hadoop and now Spark. The next round of hype is all about applying machine learning to big data, but that's merely a way to sell AI and analytics to people without using those dirty words.

                                                  In truth, the big data era is rapidly coming to a close. You've probably seen media reports of big data pullbacks -- which, I suppose, puts us in the trough of disillusionment in Gartner's famous hype cycle..."

                                                  No, The Data Warehouse is Not Dead
                                                  InfoWorld, April 13, 2015
                                                  "When a topic is complex, people tend to indulge in sloppy analysis, inadvertently conflating concepts and making apples-to-oranges comparisons.

                                                  A glaring example of such muddled thinking is the absurd meme that the data warehouse is 'dead.' This line of argument tends to confuse several distinct conceptions of the data warehouse. Here's why, no matter how you approach the topic, the data warehouse is actually very much alive and thriving..."

                                                    How Big Data is Improving Entertainment for Sports Fans
                                                    CloudTweaks, April 14, 2015
                                                    "No longer confined to the tech world, big data is everywhere these days. It is shaping the way governments are run, how we buy everything from groceries to video games and how we interact in a global social media landscape. It was only a matter of time before big data made a big appearance in sports. Data insights and analytics for professional and college sports is increasing fan interest and driving revenue previously unavailable. The use of big data in sports is exploding in a big way..."
                                                    Man vs. Machine: Is the Big Data Battle Valid
                                                    Information Management, April 10, 2015
                                                    "Ever since businesses started embracing big data analytics, a raging debate has been going on about whether this will replace domain experts in the long run. Machine-learned-algorithms without any doubt are superior in their computing power, crunching enormous volumes of data, discovering hidden insights and enabling faster and transparent decision making. However these in no way imply that domain expertise is beginning to turn redundant. On the contrary, what we see happening is that domain expertise and big data analytics are complementing each other to make a transformational impact in multiple industries..."
                                                    IT - Mobile
                                                    5 Reasons the Cloud and Mobile are Inevitable
                                                    entech, April 16, 2015
                                                    "A lot of people think that, like the internet, the cloud is just a fad. Sorry to burst your bubble, but this so-called fad is gaining some serious momentum. According to a recent article, throughout the next five years, a 44% annual growth in workloads for the public cloud is expected. With Millennials demanding that small businesses revolutionize their processes and workflows, more and more companies are jumping into the cloud to help streamline workflows and bring mobility to their workforce..."
                                                      Mobile Security: Largely a Non-Issue...For Now
                                                      ZDnet, April 14, 2015
                                                      "There's great news on the mobile security front: There aren't many cyberattacks and the malware is relatively benign. As a result, there isn't much to worry about and enterprises should spend their efforts securing non-mobile infrastructure. The bad news: Mobile security will matter at some point, most likely when companies button up vulnerabilities elsewhere.

                                                      That takeaway sticks out in Verizon's 2015 Data Breach Investigations Report. Among the key things to know:..."

                                                      Survey: 9% of U.S. Adults Will Own Smartwatches by 2016
                                                      Datamation, April 17, 2015
                                                      "A lot of people think that, like the internet, the cloud is just a fad. Sorry to burst your bubble, but this so-called fad is gaining some serious momentum. According to a recent article, throughout the next five years, a 44% annual growth in workloads for the public cloud is expected. With Millennials demanding that small businesses revolutionize their processes and workflows, more and more companies are jumping into the cloud to help streamline workflows and bring mobility to their workforce..."
                                                        IT - BYOD
                                                        A smarter approach to secure BYOD management
                                                        ITProPortal, April 18, 2015
                                                        "Mobile devices have become the preferred means of accessing data and applications, wherever and whenever individuals desire.

                                                        Today, on average, individuals have two to three mobile devices. Employees expect to use their own preferred tools and technologies to do their work; personal mobile devices are chief among them.

                                                        Hence, the BYOD movement is now mainstream and growing. In fact, Forrester estimates that 70 per cent of mobile professionals will conduct their work on personal smart devices by 2018..."

                                                        Top Ten Articles for last few Issues
                                                        Vol 206 Issues 1 and 2; Vol 205 Issue 1, 2, 3 and 4; Vol 204 Issues 3 and 4
                                                        We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                        • Fujitsu Enhances Performance of Fujitsu M10 SPARC Servers
                                                        • What you need to know about the new ODA X5-2
                                                        • Enhanced SPARC64 X+ Processor for Fujitsu M10 Servers
                                                        • The Oracle Storage Cloud in a Nutshell
                                                        • Exalogic Learning Streams
                                                        • Getting fixes faster
                                                        • Oracle Adds New Data Integration Technologies to Enterprise Big Data Portfolio
                                                        • Collaborative innovation - April 16th - 5pm - 8:30pm
                                                        • End-to-end Data Protection Using Oracle Linux with the ETERNUS DX S3 series and Emulex HBA
                                                        • Oracle Java Cloud IDE Integrations

                                                        The longer version of this article has list of top ten articles for the last 8 weeks.

                                                          IT - Encryption
                                                          Files Encrypted by CoinVault Ransomware? New Free Tool May Decrypt Them
                                                          PCWorld, April 13, 2015
                                                          "Victims of the CoinVault ransomware might be able to decrypt their files with a free tool released by Kaspersky Lab together with the Dutch police.

                                                          The tool can be found at The application uses decryption keys found by the Dutch police as part of an investigation.

                                                          Ransomware like CoinVault encrypts data on a disk or blocks access to a computer system. It is usually installed by exploiting a vulnerability on victims' computers via phishing emails or links to malicious websites..."

                                                            IT - Tape
                                                            IBM, Fujifilm Show Tape Storage Still Has a Long Future
                                                            PCWorld, April 9, 2015
                                                            "IBM and Fujifilm have figured out how to fit 220TB of data on a standard-size tape that fits in your hand, flexing the technology's strengths as a long-term storage medium.

                                                            The prototype Fujifilm tape and accompanying drive technology from IBM labs packs 88 times as much data onto a tape as industry-standard LTO-6 (Linear Tape-Open) systems using the same size cartridge, IBM says. LTO6 tape can hold 2.5TB, uncompressed, on a cartridge about 10 by 10 centimeters (4 by 4 inches) across and 2 centimeters thick.

                                                            The new technologies won't come out in products for several years and may not be quite as extreme when they do, but the advances show tape can keep getting more dense into the future, said Mark Lantz, manager of IBM's Advanced Tape Technologies Group...."

                                                            First Bug Hunting Session For LibreOffice 5.0
                                                            Planned for the end of July
                                                            "The LibreOffice community is getting ready for the next major release - planned for the end of July - with a bug hunting session focused on new features and fixes for bugs and regressions. The session will last 3 full days, from May 22 to May 24, 2015, and check the first beta of LibreOffice 5.0.

                                                            On those dates, mentors will be available from 08AM UTC to 10PM UTC to help less experienced volunteers to triage bugs, on the QA IRC channel and via email on the QA mailing list..."

                                                            Nexenta News
                                                            Nexenta Extends its Open Software Defined Storage (OpenSDS) Market Leadership via Fast-Growing Open Source User Community and Membership
                                                            More than 46,000 Nexenta Community Users Access and Experience Leading Nexenta Open Source Projects and Next Generation Software-Defined Storage Innovation via More than 100,000 Transactions
                                                            Nexenta (@Nexenta), the global leader in Open Source-driven Software-Defined Storage (OpenSDS), announced that the Nexenta User Community is growing in record numbers by serving as a driver of OpenSDS innovation. The Nexenta User Community gives thousands of IT professionals a forum to discuss the latest in software-defined storage solutions and the ability to work with new open source releases unavailable anywhere else. Participation in the Community is a driver of Nexenta's OpenSDS innovation, architectures, solutions, and software and hardware platforms.

                                                            • Over 100,000 Nexenta Community Edition solution transactions at no cost.
                                                            • Over 46,000 users and community members.
                                                            • Over 10,000 questions and comments.

                                                            "As a NexentaStor Community Edition (CE) user for over 4 years now, I continually see the benefit from using the community edition as this provides me with a great solution for home lab use, as well as being able to spread the word into the enterprise and having a solid background on the solution," said Larry Smith Jr., a Nexenta community member. "If all companies provided a community edition to home users for their labs, now that would be amazing."

                                                            Level3 News
                                                            Level 3 Enhances Vyvx Network in U.S. to Address Growing Demand for High-Quality Video Delivery
                                                            Adds On-net Connections To 29 U.S. Professional Sports Venues
                                                            Level 3 Communications announced it is enhancing its Vyvx broadcast network by extending Level 3's fiber directly into 29 additional professional sports venues in the U.S.

                                                            This network extension will bring the total number of U.S.-based professional sports venues "on-net" with Level 3 fiber to 55, and total connectivity to more than 100 different professional sports venues as well as 86 college sporting venues. By connecting directly to those venues, Level 3 can offer its Vyvx broadcast network solutions and expanded network services such as voice, data and security, plus added flexibility to scale as customers' connectivity needs evolve and grow - including 4K video acquisition and distribution.

                                                            Trending in
                                                            Vol 235, Issue 2
                                                            Trending IT Articles