News about Oracle's Solaris and Sun Hardware
System News
Apr 20th, 2015 — Apr 26th, 2015 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 206, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


IT - CxO
x
Climbing the Career Ladder: What Do You Need On Your CV to Make It to the Top In Tech?
ZDnet, April 17, 2015
"What is the best way to develop your career as a CIO? Should you work your way up to the top in one IT department, should you spend time in other business disciplines or should you consider a move into other related positions, such as CDO, analyst, board advisor, consultant or interim CIO?

We hear from IT experts who consider the best way to develop a career as a technology leader, both in terms of taking broader responsibility for business issues and defining how technology can add value to the wider organisation..."

NFL CIO: Tech Isn't the Problem with Health Info Sharing
ComputerWorld, April 17, 2015
"Every one of the 32 NFL teams has 60 players that often receive medical care from hospitals or other facilities they've never visited before.

So imagine how difficult it might be to share an electronic medical record (EMR) when you're a player on the visiting team and you need treatment at an out-of-region facility or specialist.

That's what the NFL has had to deal with for the past 90-plus years of its existence. While the healthcare industry as a whole is today grappling with interoperability of EMR systems, even within the same hospital system, the NFL has already solved the issue industry-wide..."

Why Digital Transformation Is a Make-or-Break Proposition
CIO, April 17, 2015
"There is a growing global community of digital citizens - individuals who are always connected. These individuals are placing new and greater demands on the businesses with which they interact and keeping pace with those demands may well be a 'make-or-break' situation, according to research conducted by Institute for the Future and Vanson Bourne on behalf of EMC..."
Gartner: 5 (Mostly Negative) Ways IT Spending Will Change in 2015
CRN, April 20, 2015
"Analyst firm Gartner's estimates that worldwide IT spending in 2015 will fall by about 1.3 percent compared with 2014 is no reason to become pessimistic, according to solution providers who work in such key areas as mobility, data center, software and services.

Indeed, those solution providers say, the fall in IT spending spells opportunities as it is resulting from a shift in spending from hardware to software and services, and from infrastructure to the cloud.

CRN talked to solution providers with experience in the kinds of technologies Gartner wrote about in its report, and found them to be already taking advantage of the shifts that drove Gartner to reach its conclusions..."

The Art of Leadership: It's a Lot Like Riding a Bicycle
TLNT, April 21, 2015
"Let's demystify the art and practice of leadership. There are many parallels to the aspects of riding a bicycle and leading a team.

First of all, the purpose or usefulness of the bicycle is to get from point A to point B. Clearly, leadership is focused on forward movement toward a vision of a future desired state.

The bicycle has a framework or structure that allows it to transfer energy to serve a positive purpose. Leadership is about energy management and how to focus the individual and collective energy on meaningful goals of the organization..."

CIOs Reveal the Secrets of Their Success
ZDnet, April 22, 2015
"No CIO is an island. All business leaders, no matter how strong their leadership skills, form part of an executive chain, where support and feedback from senior peers and colleagues are crucial elements of individual success.

But what is the single best piece of advice a CIO can receive?

I've spoken to CIOs and management experts to find out what was the most useful guidance they have ever been given - and how it can help others too..."

CIOs, This Is How to Talk to Your CEO About the Cloud
Forbes, April 22, 2015
"A lot of CIOs are being told by their CEOs, 'We need to be in the cloud. Go research it and get us there.'

From the CEO's standpoint, they know that the cloud is 'big.' They may have heard a peer say, 'We're leveraging the cloud in our business,' where 'the cloud' is being used as bragging rights. They've probably heard about phenomenal cost savings associated with the cloud..."

What's In A Name? Between CX and UX, A Lot
Forrester, April 24, 2015
"I think it's an over-simplification to say that UX and CX 'pretty much refers to the same thing'. Particularly in the current environment where UX is growing up and the worlds of UX and CX are starting to collide. Anyone who knows the difference between the two may find the statement a bit too much of a 'dumbing down' of an important distinction, and set a wrong tone. I think it's worth just making clearer that there is a distinction, although they are both essentially centered around the user and their experiences."...
    Features
    x
    Digital Disruption: It's Not What You Think
    Rob Preston writing in Forbes
    "The digital euphoria of 2015 is starting to smell a bit like the digital euphoria of 2000, as pundits herald exceptional business models and investors bestow massive market caps on the profit-challenged. Just as in 2000, observers are missing a critical element: Some slumbering giants can awake, and some industries are more ripe for external disruption than others," writes Rob Preston in 'url "http://www.forbes.com/sites/oracle/2015/04/20/digital-disruption-its-not-what-you-think/" "Forbes."'

    "Making the social media rounds is this observation, courtesy of TechTarget's Tom Goodwin:..."

    SPARC
    x
    Energy Efficiency in the Data Center: Fujitsu M10 Servers Lower Power Consumption
    By Carl Hill, Business Development Manager, Fujitsu-Oracle Center of Excellence
    Carl writes, "Earth Day has been celebrated widely around the globe since 1970 in support of environmental protection. Fujitsu is actively implementing innovative technologies to enable your data center to run more efficiently, providing you with significant cost savings while lowering your carbon footprint. Being 'green' becomes even more important when you consider the steady growth of our digital footprint and its impact upon our planet. It is estimated that around 2 percent of global electricity utilization goes to support IT equipment.

    Efficiently managing the electricity needed to power and cool your data center lowers your operating expenses. It also reduces the carbon emission footprint associated with your data center..."

    IT - Storage
    x
    How Flash Changes the Storage Equation
    InfoWorld, April 21, 2015
    "Flash is truly disruptive. We've been using hard disks for almost 60 years, and both storage system design and storage management have revolved around them. Fundamentally, with hard disks we can assume capacity is cheap and performance is expensive, but in a flash world, the equation is inverted: Capacity is expensive and performance is cheap. This change is simple to articulate, but it has non-obvious implications in the way we design storage..."
    Flash is the New Flash
    Enterprise Storage Forum, April 22, 2015
    "Five years ago I wrote an article about the coming wall for flash chip density. Increasing flash density is important because it allows manufacturers to put more capacity in a given amount of space. It should also decrease costs which has been the Achilles heel of flash storage for a long time.

    You can achieve increased flash density a couple of ways. One way is to decrease the feature size of the flash chips. A second way is to change the technology. You could even argue that there is a third way which is to use both approaches. Regardless, the desire is to improve the price of flash drives while maintaining or improving performance and increasing drive capacity..."

    Java Technology
    x
    Java 8 Update 45
    Includes the IANA time zone data version 2015a
    Java SE Development Kit 8, Update 45 (JDK 8u45) includes the IANA time zone data version 2015a. This changes will affect the following timezones : the Mexican state of Quintana Roo, Chile, America/Santiago, Pacific/Easter, and Antarctica/Palmer. For more information visit Timezone Data Versions in the JDK 8u45
    Understanding Time Zone Updater 2.0
    Java needs to keep track of time zone information
    Aurelio Garcia-Ribeyro writes, "Different places in the world are in different time zones so Java needs to keep track of time zone information.

    Such information gets complicated when one considers rules for Daylight Saving Time across regions. There are some places where Daylight Saving Time changes occur multiple times per year. In Morocco, for example, changes occur in March, and October as well as around Ramadan. The rules can vary from country to country and in some cases within a country. These rules are updated from time to time. In the United States they were last updated in 2007..."

    FLUX
    x
    Mark Hinke: An Overview of Cloud Computing Architectures - Thursday April 9th @NSU
    Einstein's from 6:30PM to 7:30PM; Presentation at 7:30PM
    This crash course is designed to give an overview of cloud computing architecture and the open source software that can be used to deploy and manage a cloud computing environment.

    Speaker: Mark R. Hinkle, Senior Director, Open Source Solutions, Citrix Systems

    Please RSVP at meetup.com.

    Topics to be discussed in this session will include virtualization (KVM, LXC, and Xen Project), orchestration (Apache CloudStack, Eucalyptus, Open Nebula, and OpenStack), and storage (GlusterFS, Ceph, and others). The talk will also provide insight into how to deliver Platform-as-a-Service (PaaS) and what technologies can be used to compliment this evolving cloud computing paradigm.

    Systems administrators and IT generalists will leave the discussion with a general overview of the options at their disposal to effectively build and manage their own cloud computing environments using free and open source software and understand the capabilities and benefits of a host of technologies.

    Directions on FLUX website.

      IT - Technology
      x
      New techniques for eye-gaze tracking could change computer interaction
      Phys.org, April 24, 2015
      "Mice, and now touchscreens, have become a daily part of our lives in the way we interact with computers. But what about people who lack the ability to use a mouse or touchscreen? Or situations where these would be impractical or outright dangerous?

      Many researchers have explored eye-gaze tracking as a potential control mechanism. These tracking mechanisms have become sophisticated and small enough that they currently feature in devices such as smartphones and tablets. But on their own, these mechanisms may not offer the precision and speed needed to perform complex computing tasks..."

        US Intelligence Outfit Wants the Ultimate Quantum Qubit
        Network World, April 17, 2015
        "Researchers behind the Intelligence Advanced Research Projects Activity (IARPA) want to gather computer scientists engineers and physicists to define the challenge of 'encoding imperfect physical qubits into a logical qubit that protects against gate errors and damaging environmental influences.'

        A quantum bit or qubit or quantum bit in the quantum computing realm uses qubits instead of the usual bits representing 1s or 0s. Ultimately quantum computing efforts should result in super-fast, super secure computers the experts say..."

        Silicon Valley marks 50 years of Moore's Law
        Phys.org, April 24, 2015
        "Computers were the size of refrigerators when an engineer named Gordon Moore laid the foundations of Silicon Valley with a vision that became known as "Moore's Law."

        Moore, then the 36-year-old head of research at Fairchild Semiconductor, predicted in a trade magazine article published 50 years ago Sunday that computer chips would double in complexity every year, at little or no added cost, for the next 10 years. In 1975, based on industry developments, he updated the prediction to doubling every two years..."

          Drones Behaving badly: Dark Skies Ahead
          IT World, April 16, 2015
          "Like it or not, the Age of the Drone is upon us, as the skies are increasingly crowded with UAVs (unmanned aerial vehicles) used for recreation, photography, filmmaking, commercial applications, and scientific research. Ongoing initiatives by heavyweights like Amazon and Google suggest that cargo transport and package delivery are just around the corner.

          As UAV technology advances and expands, public policy issues around safety, privacy, and regulation are increasingly becoming a concern..."

          IT - Bitcoin
          x
          Have Banks Started to Lose Sleep Over Bitcoin?
          NEWSBTC, April 18, 2015
          "The growing popularity of Bitcoin as a powerful transaction tool and its ability to bank the unbanked has finally started making enough noise to wake up the traditional banking giants. Banks and financial services companies have been enjoying monopoly over the 'money-moving' business for a long time, since its inception. Their only competition so far has been other companies delivering similar services. Not anymore, as the impact of Bitcoin on the banking sector is now being openly acknowledged by Jamie Dimon, CEO of JPMorgan Chase in his recent letter to shareholders..."
          5 Revelations about Bitcoin from the ING 2015 Mobile Banking Survey
          Bitcoin Magazine, April 23, 2015
          "ING Bank hired global research firm, Ipsos, to survey 14,829 Internet users from 13 European countries, the United States and Australia. ING asked participants about mobile banking, payments and digital currency, such as bitcoin.

          The report has some sobering insights into how Bitcoin adoption is going in the West, including what consumers see as the biggest benefits and problems of mobile payments..."

          Bitcoin Getting Serious? MIT Partially Funding Bitcoin Core Development
          Crypto Coin News, April 23, 2015
          "Gavin Andresen, Wladimir van der Laan, and Cory Fields have taken their development efforts back to school, in a sense. Andresen, who lives about two hours from the Massachusetts Institute of Technology in Amherst, Mass., wrote on his blog yesterday:

          "I'm pleased to announce that I've joined the MIT Media Lab's newly launched Digital Currency Initiative to continue my work on the Bitcoin project. So, does this mean that MIT has taken over from the Foundation as the center for 'core development'? No. The Bitcoin Foundation was never the center of development; the Bitcoin Core open-source software project has been the center, and like most open-source software projects, the developers who work on Bitcoin Core are supported in many different ways..."

          BitcoinFax: a Simple and Efficient Use Case for Bitcoin Micropayments
          Bitcoin Magazine, April 23, 2015
          "While Internet citizens find it strange that fax machines still exist, everyone still needs to send faxes at times - often to large legacy organizations, banks and public administrations that still live in the 20th century. Sending faxes is difficult because almost nobody has a fax machine at home anymore, and going to a post office seems a waste of time to those accustomed to living at Internet speed..."
            Cash Bans Grow As Central Bankers Plan Centralized Future: Bitcoin To The Rescue?
            Crypto Coin News, April 25, 2015
            "Paper currency, or cash, is a fairly recent man-made, really a bank made, concept. As I've covered previously, paper money is a convenience of a modern society, but many things have acted as money throughout history. Throughout most of history, outright bartering of goods and services was the way of the world. We've used feathers, gold, beads, 'tally sticks', coins, and now paper currency to transmit value from one person to another. And much like the newspaper has been replaced by the Internet version of your newspaper, paper money is getting sent to Evolution's Scrap Yard, courtesy of your central banking system's design on capital controls..."
              Top Bitcoin Exchange Launches 'Superwallet'
              NEWSBTC, April 23, 2015
              "One of the largest CNY bitcoin exchange companies, OKCoin, announced its plans to revolutionize the cryptocurrency industry with its new feature 'Superwallet' feature. This desktop wallet, which is currently in beta, will allow users to choose from CNY, USD, or BTC to spend at bitcoin-accepting merchants and make the conversion only at the point-of-sale.

              According to its owners, this move by the bitcoin exchange can combine the features of both traditional fiat wallets and online bitcoin wallets. The conversion to fiat value will come at no additional cost to the user during payment and the settling of the transaction..."

              World's Largest Bitcoin Survey: Over 12k People Talk Bitcoin
              Crypto Coin News, April 23, 2015
              "Over the last couple of years, there have been many surveys done about what Bitcoin is and what people think of Bitcoin. The Digital Currency Council (DCC) and Coin Report have done surveys to get consumer opinion on its progress. As Bitcoin has grown, so have the corporate players involved, and the number of countries using Bitcoin worldwide.

              Now, financial giant ING has integrated Bitcoin into a massive mobile banking survey that covered most of Europe, with over 12,400 people responding to questions about Bitcoin, and it's future in the mobile user space..."

              Bitcoin Is The Future: Paypal Changes Terms Of Service To Take Your Content
              Bitcoin Magazine, April 25, 2015
              "While Internet citizens find it strange that fax machines still exist, everyone still needs to send faxes at times - often to large legacy organizations, banks and public administrations that still live in the 20th century. Sending faxes is difficult because almost nobody has a fax machine at home anymore, and going to a post office seems a waste of time to those accustomed to living at Internet speed..."
                IT - FOSS
                x
                75 Open Source Replacements for Ecommerce Tools
                Datamation, April 22, 2015
                "The U.S. Census Bureau says that online retailers in this country generated $304.9 billion in revenue in 2014. Other estimates put the total U.S. revenue, including B2B sales, closer to $5.5 trillion.

                Attracted by the size of the online market, a growing number of entrepreneurs are looking to set up their own online shops. While there are plenty of proprietary solutions out there, the open source community has created a staggering number of ecommerce tools to help online retailers. Some of these are standalone platforms, while others are integrated with various blogging, content management or ERP solutions. Many are high-quality tools that rival or exceed the features available in closed source solutions..."

                8 new tutorials for success with OpenStack
                opensouce.com, April 24, 2015
                "OpenStack is undoubtedly a skill in hot demand. Whether you're a seasoned IT pro looking to leverage cloud technology in your organization, or just starting out in your career and hoping to put some experience under your belt, we're here to help.

                Every month, Opensource.com gathers together the best how-tos, guides, tutorials, and tips into a single bundle to help you learn what you need to know. For much more information than we can include here, be sure to check out the official documentation for OpenStack for further explanations, guides, and other details you'll want to know..."

                Solaris
                x
                Better ways to handle crash dumps in Solaris
                Chris Beal

                Chris W Beal writes, "For some time now we've realised that system crash dumps in Solaris are getting larger, and taking longer to preserve. A number of us have been working on projects to help speed these up, and reduce the size.

                The first of these was "Crash Dump Restructuring". Implemented by Sriman and Vlad, this went in to Solaris 11.2, and allowed the administrator to remove certain portions from the crash dump via the dumpadm(1m) command..."

                Deferred dump in Solaris
                Store dump in memory, reboot the system and extract the dump to disk

                Vlad writes, "Kernels of even most robust operating systems do crash from time to time and getting crash dump image of kernel and process memory is usually indispensable for root causing the problem. With growing memory sizes (the M6-32 SPARC server can have up to 32TB of RAM) the amount of data which needs to be written to disk in order to store a crash dump can be pretty big - for larger systems uncompressed crash dumps with tens of gigabytes in size are not exceptional... To overcome this limitation I've been working with my colleagues Sriman, Brian, Nick and Chris to store dump in memory, reboot the system and extract the dump to disk. This technology is called Deferred dump..."

                Oracle Solaris Development Initiative
                By Mike Mulkey
                Mike Mulkey blogs, "ISV developers take note, this is even better than FREE beer!

                The majority of Oracle's top enterprise customers run their most mission-critical applications on Oracle Solaris today. Solaris is the vehicle by which Oracle customers leverage the power of the SPARC microprocessor - - delivering world-record performance, maximum scalability, and continuous reliable service.

                There are 113 examples of this on the Oracle customer & partner success portal. Take a look!..."

                MySQL
                x
                MySQL Workbench 6.3.3 GA
                Windows, Mac OS X 10.7+, Linux
                The MySQL developer tools team is pleased to announce 6.3.3 as our GA release for the MySQL Workbench 6.3

                Full list of changes in this revision

                For detailed information about the new features, see What's New in MySQL Workbench 6.3.

                For discussion, join the MySQL Workbench Forums.

                MySQL Newsletter
                April Edition
                The MySQL April Newsletter is posted, again bringing the latest news and technical tips and tricks to the MySQL users. In this edition, you'll read what's new in the recently-announced MySQL 5.7 Release Candidate, as well as upcoming activities such as MySQL webinars and events. Below are the highlights:

                • News: Announcing MySQL 5.7 Release Candidate
                • MySQL Central @ OpenWorld 2015 Call for Papers Open Until April 29
                • Webcast: What's New in MySQL Security on April 23
                • Webcast: MySQL Performance Tuning 101 on May 27
                • Blog: JSON Labs Release -- Effective Functional Indexes in InnoDB

                You can read it online or subscribe to it.

                What a MySQL Developer Needs to Know
                5-day MySQL for Developers training course
                Antoinette O'Sullivan writes, "To perfect your skills as a MySQL developer, consider taking the MySQL for Developers training course. In this 5-day course, you learn to:

                • Describe the MySQL client/server architecture
                • Use MySQL client programs and common options
                • Program MySQL applications with Java and PHP connectors
                • Use a 'NoSQL' approach to store and retrieve data
                • Design efficient tables
                • Create and delete database objects
                • Use expressions in SQL statements
                • Examine database metadata
                • Use SQL statements to modify table data
                • Maintain database integrity with transactions
                • Write multiple table queries
                • Create 'virtual tables' containing specific data
                • Create user-defined variables, prepared statements, and stored routines
                • Create and manage triggers
                • identify and deal with errors and exceptions in client programs
                • Write queries that are fast and effective, even under heavy loads

                You can take this course through the following formats...

                Cloud Computing
                x
                Want to Outperform Your Competitors? 4 Ways to Serve Up a Cloud Advantage
                By Rod Johnson, Group Vice President, Applications Business Group, Oracle
                Ethan.burton writes, "With more and more companies moving towards the cloud we wanted to find out how this cloud adoption impacted the success of these businesses. To do this, Oracle sponsored a global study, 'Cloud Computing Comes of Age,' conducted by Harvard Business Review Analytic Services.

                What did we find out?..."

                Linux
                x
                Oracle Linux 7 - Optimizing Deployment Flexibility and Increasing ROI
                Oracle White Paper (18 Pages)
                This paper describes Orale Linux 7 features that help IT organizations deploy strategic applications effectively and efficiently. It discusses the advantages of choosing Oracle Linux and how the operating system brings value to enterprise application delivery. It also explores versatile technologies that are supported with Oracle Linux (such as Linux Containers, Docker, Oracle VM, and OpenStack) that allow IT architects to choose how best to deploy and meet requirements for agile cloud and virtualized application environments.
                Capita IT delivers Private Cloud Services
                Using Oracle VM and Oracle Linux
                Capita IT Enterprise Services has launched a new service that enables businesses to migrate mission critical Oracle software deployments into a secure UK cloud. The service delivers Capita Private Cloud; a secure, private cloud platform, using Oracle VM and Oracle Linux, allowing businesses to adopt a blend of public and private cloud services without the complexity of managing multiple suppliers and contracts. Will O'Brien, VP Alliances & Channels at Oracle UK & Ireland, said: 'Oracle VM has been a key enabler to support Capita's Private Cloud for Oracle solution.'

                Capita Private Cloud for Oracle includes:...

                IT - Cloud
                x
                1 in 4 Employees Enable Cloud Attacks
                HelpNet Security, April 17, 2015
                "While businesses are clearly embracing the power of cloud applications with each organization collaborating with an average of 865 other organizations - internal users, external collaborators and third-party apps are dramatically increasing the threat surface for new cloud cyberattacks.

                CloudLock examined more than 750 million files, 77,500 apps and six million users in the cloud. Their research indicates that nearly one in four employees, unknowingly or not, violates corporate data security policy in public cloud applications. On average, each organization has a staggering 4,000 instances of exposed credentials. These usernames and passwords were either accessible across the entire company, externally, or, in the most severe cases, publicly - a cybersecurity attack waiting to happen..."

                Optimizing Network Performance for the Cloud
                NetworkComputing, April 22, 2015
                "Here are some strategies for avoiding network bottlenecks with the increased use of cloud services.

                There's something about cloud services that makes some companies forget the fundamentals of IT, things like capacity management, change control, and network management. In the rush to move to cloud services, many businesses become so focused on building their cloud platform, that they lose focus on other critical aspects of their enterprise..."

                Time Inc. CTO Navigates Move to Amazon
                InformationWeek, April 22, 2015
                "Colin Bodell, the CTO of Time Inc., has been in the job for a little over a year, and he's accelerating the media company's move from legacy data centers into the cloud. Time is starting with basic compute, networking, and storage, but Bodell expects to use Amazon Web Services' more advanced services as it moves deeper into the digital age of publishing.

                Print advertising revenues have declined industrywide, and Time is no exception..."

                vBeers-SF
                x
                vBeers @ Palm Beach Gardens
                Wednesday May 6th, 6pm to 9pm
                Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida. Register today so you can be a part of this great monthly event! Feel free to invite all of your friends and co workers who work in the IT industry!

                This event is sponsored with and through the South Florida Technology Alliance (SFTA)

                Location

                • Twisted Trunk Brewing
                • 2000 PGA Boulevard, Palm Beach Gardens, FL 33408 Date and Time

                • Wednesday, May 6, 2015 - 6:00 PM to 9:00 PM

                Please RSVP at meetup.com

                IT - DR
                x
                4 Steps For Maintaining Business Operations During An Emergency
                Business 2 Community, April 20, 2015
                "Over the past five years, we've seen an alarming amount of server and IT infrastructure damage caused by frigid winter conditions. When temperatures drop low enough, water pipes inside buildings can burst, causing facilities issues with power and Internet access, as well as damaging computers, servers, and other technology vital to your daily operations.

                With a record winter in the Massachusetts area this year, we've seen firsthand the extensive costs that arise when a building-wide emergency occurs but there's no business continuity or disaster recovery plan in place..."

                IT - PM
                x
                Users in Pre-Production? It Can Work for IT
                InfoWorld, April 20, 2015
                "There was a wonderfully accurate commercial for EDS several years ago that drew an analogy between IT infrastructure and development projects and the concept of building a plane while it's in flight. That comparison should be very easy to grasp for a lay person, even though they may not fully appreciate exactly how spot-on it really is.

                If we compare projects in other industries to IT, we find that most of them do not have to contend with active use of what they are building while they are building it. I'm not talking about renovations or general maintenance; I'm talking about the plethora of IT projects that wind up in quasi-production by the halfway point of their construction..."

                IT project management
                SearchCIO, April 23, 2015
                "IT project management includes overseeing projects for software development, hardware installations, network upgrades, cloud computing and virtualization rollouts, business analytics and data management projects and implementing IT services.

                In addition to the normal problems that can cause a project to fail, factors that can negatively affect the success of an IT project include advances in technology during the project's execution, infrastructure changes that impact security and data management and unknown dependent relationships among hardware, software, network infrastructure and data..."

                IT - Networks
                x
                The Internet of Things & IP Address Needs
                NetworkComputing, April 16, 2015
                "With IPv6, there's no need to fear that there won't be enough IP addresses for IoT. The real question is whether every 'thing' needs its own IP address.

                Cisco predicts 50 billion interconnected devices by 2020. Intel, more optimistically, predicts 200 billion by that same year. Should we be concerned about the address needs of this large Internet of Things? Briefly, no. Moreover, we shouldn't assume that every 'thing' has to have its own IP address..."

                Why the Journey to Ipv6 Is Still the Road Less Traveled
                Network World, April 20, 2015
                "The writing's on the wall about the short supply of IPv4 addresses, and IPv6 has been around since 1999. Then why does the new protocol still make up just a fraction of the Internet?

                Though IPv6 is finished technology that works, rolling it out may be either a simple process or a complicated and risky one, depending on what role you play on the Internet. And the rewards for doing so aren't always obvious. For one thing, making your site or service available via IPv6 only helps the relatively small number of users who are already set up with the protocol, creating a nagging chicken-and-egg problem..."

                Ethernet Roadmap: A Raft of New Speeds
                NetworkComputing, April 21, 2015
                "The Ethernet Alliance recently released its 2015 roadmap, which outlines Ethernet's response to the ongoing desire for more bandwidth in data centers by adding new speeds for both in-rack and backbone connections. The roadmap calls for some eye-popping speeds in the future, but also charts out a plan for the low end of the market, representing an unprecedented level of activity for Ethernet.

                The first new Ethernet speed is almost upon us. 25 GbE is designed to replace 10 GbE and 100 GbE will fit into the 40 GbE slot (both using quad-lane connections), basically by speeding up the individual link. The first 25 GbE gear should hit late in 2015 with production volume in 2016..."

                IT - Linux
                x
                DevOps: Better Than the Sum of Its Parts
                Linux Journal, April 20, 2015
                "Most of us longtime system administrators get a little nervous when people start talking about DevOps. It's an IT topic surrounded by a lot of mystery and confusion, much like the term "Cloud Computing" was a few years back. Thankfully, DevOps isn't something sysadmins need to fear. It's not software that allows developers to do the job of the traditional system administrator, but rather it's just a concept making both development and system administration better. Tools like Chef and Puppet (and Salt Stack, Ansible, New Relic and so on) aren't 'DevOps', they're just tools that allow IT professionals to adopt a DevOps mindset. Let's start there..."
                Ubuntu 15.04 container-friendly Linux for cloud and servers arrives soon
                ZDnet, April 23, 2015
                "Don't look now but Ubuntu has become the Linux for clouds. On the AmazonElastic Compute Cloud (EC2), for example, Ubuntu is the most popular operating system by an almost two to one margin. 64 percent of production OpenStack users have also chosen Ubuntu to stay on top. Canonical, Ubuntu's parent company, is adding even more cloud and container functionality to the next version, Ubuntu 15.04..."
                Five Important Steps Linux Job Seekers Should Take
                eWeek, April 23, 2015
                "Linux talent is in high demand, and the evidence is in the numbers. According to the 2015 Linux Jobs Report from the Linux Foundation, 92 percent of IT managers plan to hire Linux pros within the next six months. The 2015 Linux Jobs Report includes data from hiring managers (1,010) and Linux professionals (3,446) and provides an overview of the state of the market for Linux careers and what motivates professionals in this industry. With the rise of open cloud platforms positively affecting this ever-growing market, a new generation of open-source projects like Docker and OpenStack ensure the longevity of developers who can hone the most cutting-edge skills..."
                What are good open-source log monitoring tools on Linux
                Xmondo, April 17, 2015
                "Most of us longtime system administrators get a little nervous when people start talking about DevOps. It's an IT topic surrounded by a lot of mystery and confusion, much like the term 'Cloud Computing' was a few years back. Thankfully, DevOps isn't something sysadmins need to fear. It's not software that allows developers to do the job of the traditional system administrator, but rather it's just a concept making both development and system administration better. Tools like Chef and Puppet (and Salt Stack, Ansible, New Relic and so on) aren't 'DevOps', they're just tools that allow IT professionals to adopt a DevOps mindset. Let's start there..."
                Intel Compute Stick now available: $149 for Windows version, $110 for Linux
                ZDnet, April 23, 2015
                "The concept of a "PC stick" -- a processor and RAM embedded into a gum-pack-sized device that can connect to your HDTV via an HDMI connection -- is nothing new, but when a company like Intel embraces the concept, a lot more people start paying attention.

                That was the case at CES back in January, when Intel showed off the Compute Stick, its version of a teeny-tiny PC that includes a quad-core Atom processor and -- depending on whether you want the Windows 8.1 or Linux edition -- comes with up to 2GB of RAM and up to 32GB of onboard storage. All of this fits onto something with dimensions of just 4.1x1.5x0.5 inches..."

                IT - Operations
                x
                Tech's Ticking Time Bombs: The Components You Might (and Might Not) Expect to Wear Out
                ITWorld, April 21, 2015
                "The early computers of the vacuum-tube age were marvels of engineering for their time. Today, we can simultaneously appreciate the advances these computers represented, making previously unthinkable computational work possible, and chuckle at what to us seems like their ludicrous size and painfully slow processing speeds.

                But while you probably know ENIAC took up a whole room, you probably don't know that it just up and stopped working -- a lot. The vacuum tubes that made up its guts would burn hot and eventually fail -- and there were so many of them that this would happen every couple of hours. The reliability that solid-state electronics provided was at least as important an advance as improved speed and size..."

                  Busting 6 myths about DevOps
                  opensouce.com, April 22, 2015
                  "Just as with any transformational and disruptive movement, DevOps can be misunderstood or mischaracterized. Here are some of the top DevOps myths.

                  DevOps replaces Agile

                  DevOps is absolutely compatible with Agile. In fact, DevOps is the logical continuation of the Agile journey that was started in 2001, because we now know that the real definition of 'done' is not when development is done coding. Instead, code is only 'done' when it has been fully tested and is operating in production as designed. (Note that Agile is not a prerequisite for adopting DevOps.)..."

                  Locked Out of the Server Room -- And the Key Quest Begins
                  InfoWorld, April 22, 2015
                  "When you work in IT, a good day can turn into a bad day -- and back again -- with little notice. It doesn't help when a bad day sneaks up on you, at the exact moment you don't have time to deal with small details, which then become large problems. Your best bet is to think through the problem and let your skills and experience lead you to a happy conclusion.

                  That's what happened to a co-worker and me. At the time I was still fairly new, but the incident offered valuable insight on teamwork and problem-solving..."

                    Tips from the Frontline: Switching Operating Systems is Almost Never the Answer To Problems
                    ZDnet, April 22, 2015
                    "How many times have you come across a statement like this in response to a computer problem on a forum in the comments section of posts:

                    "Oh, just switch to XYZ [the responder's favorite operating system] and you'll never have problems like that again."

                    I'm here to tell you that this advice is bad advice, and that the person making the claim is an idiot, and that you should probably ignore everything they say from thereon in..."

                      IT - Security
                      x
                      Tips for Involving Workers in Cyber Security
                      Network World, April 16, 2015
                      "It's time once again for security vendors and practitioners to make their annual pilgrimage to the RSA Security Conference. Tens of thousands of people are gathering in San Francisco to look for technology solutions to reduce the likelihood of cyber attacks or other security incidents. Perhaps you are one of them..."
                      7 Deadly Sins that Get Users Hacked
                      Dark Reading, April 16, 2015
                      "Common knowledge has it that users are the weakest link in the IT risk management world - particularly negligent or uneducated users. But how exactly are the bad guys taking advantage of this ignorance or lack of care to break into users' endpoints and corporate accounts? Many of their methods involve just a little bit of psychological sleight of hand because phishing and social engineering tend to play a part in most attacks. Here are some of the worst ways users make themselves open to the onslaught..."
                      Cyber Extortion: A growth Industry
                      CSO Online, April 17, 2015
                      "The prevailing wisdom in law enforcement has been that it is a bad idea to negotiate with extortionists. Cave to their demands and all you're doing is encouraging more extortion. And you don't even have a guarantee that paying a ransom will produce the return of your loved one unharmed, or your stolen assets.

                      Better to refuse the demands, find the criminals and punish them in a way that will discourage them and others from doing the same thing.

                      But, in the digital world, where criminals encrypt data and then demand a ransom to provide the key, that prevailing wisdom is getting a forcible adjustment..."

                        How IT Pros Protect and Investigate Their Endpoints
                        HelpNet Security, April 17, 2015
                        "More organizations are operating under the assumption that their network has already been compromised, or will be, according to a survey conducted by the SANS Institute.

                        Fifty-six percent of those surveyed assume that they have been breached or will be soon compared with 47 percent last year. However, organizations are not taking a proactive approach to detecting threats or achieving greater visibility into their networks..."

                          SaaS Security Tips
                          CloudTweaks, April 20, 2014
                          "Most people and companies are now using a significant amount of SaaS solutions. Companies are running sales support software, they are file sharing, collaborating and using e-mail programs and a lot more in the cloud. However, that usage also leads to concerns about the security of those solutions. How safe are they? What risks do we run?..."
                          C-Suite Execs Fear 'Domino Effect' of Cyber Attacks
                          IT World Canada, April 20, 2015
                          "High-ranking corporate executives are worried that in a networked economy, a cyber attack on one company could spill over to other businesses and create a major disruption of national or even global proportions.

                          This was among the findings of a recent survey conducted by RedSeal Inc., a cyber security certification company. The company released the results of the survey at the RSA Conference 2015 security event in San Francisco..."

                          Kill All Passwords by Eating Them Says PayPal
                          TechWorld, April 20, 2015
                          "The payments firm says people will start inserting security devices into their body to enable their unique bodily characteristics to let them into their PayPal accounts, which are commonly targeted by hackers and phishers..."

                          Jonathan LeBlanc, global head of developer advocacy at PayPal, said: "As long as passwords remain the standard methods for identifying your users on the web, people will still continue to use 'letmein' or 'password123' for their secure login, and will continue to be shocked when their accounts become compromised.' ....

                          RSA Chief to Security Pros: Stop Addressing the Wrong Problems
                          Network World, April 21, 2015
                          "IT pros need to stop using old frameworks for addressing security and deal with today's reality because the old view of security is no longer useful, attendees at the RSA Conference 2015 in Las Vegas were told on Tuesday.

                          It is as if security pros are explorers who have reached the farthest reaches of their known world, said RSA President Amit Yoran during his keynote address..."

                          Sony Reminds Us All What a Pathetically Weak Link Email Is
                          ComputerWorld, April 21, 2015
                          "Sony is reliving the nightmare that its hacked databases gave rise to late last year, now that Wikileaks has thoughtfully published all of the leaked documents in a searchable database. Really, they are the most courteous hoodlums ever.

                          But anyone in corporate IT who looks at Sony and feels smug rather than there-but-for-the-grace-of-God humble could be in for an unpleasant surprise of his own. Because the truth is, all IT departments are incredibly exposed when it comes to email..."

                            CSOs Be Warned: Tactics Changing in Phishing War
                            IT World Canada, April 23, 2015
                            "In the continuing war with hackers, defenders have scored at least one small victory: Thanks to widespread awareness education on phishing, attackers largely abandoned the use of social media as an attack vector, according to a security vendor.

                            However, in its report issued this week ProofPoint Inc. said attackers last year shifted their tactics and are instead increasingly targeting middle management with email that includes malicious URLs, documents, e-faxes and links to voicemail..."

                            IT - Careers
                            x
                            What IT Skills Are in Demand?
                            HelpNet Security, April 16, 2015
                            "More than 11,000 IT and business professionals in North America responded to the eighth annual IT Skills and Salary Survey by Global Knowledge and Windows IT Pro.

                            Key findings:

                            Skills in security, cloud computing and networking are in demand.

                            IT security tops the list of skills that IT decision-makers (ITDMs) said their teams need most, and one out of five ITDMs reported having difficulty finding skilled talent for cloud initiatives. ITDMs are also looking for professionals who have skills in network engineering, systems engineering, IT architecture and network operations..."

                            Doxxing Defense: Remove Your Personal Info from Data Brokers
                            Information Management, April 18, 2015
                            "Many women gamers and developers, as well as those who support them, have lately come under attack from online trolls. A common intimidation tactic that trolls use is 'doxxing,' or publicly exposing their targets' personal details, including home address, phone number and even financial records.

                            Doxxing is often accompanied by threats of violence, sexual assault or murder. The message is clear: We're out to get you, and we know where you live. Some women in tech have left their chosen profession rather than deal with continued threats.

                            But anyone is susceptible to doxxing..."

                              Finding the Critical Talent You Need
                              Brandon Hall, April 20, 2015
                              "It's always shocking to me when I ask organizations if they know which of their job roles are most critical, and what the components of success for those roles are, and they don't have an answer. And by critical roles I don't just mean leadership. I mean the ones that have the greatest impact on revenue, performance, and customer satisfaction. First of all, they may not be the ones you think, and what makes someone good at them isn't always obvious.

                              I worked with an HR leader from a global auto rental company once, and his company realized that keeping its best customers happy meant that the only human they typically interacted with from the organization was the car-return agent..."

                              IT - Social Media
                              x
                              Feds Lay down Social Media Rules; Enterprises Should, Too
                              ComputerWorld, April 17, 2015
                              "The U.S. government is making it clear to federal employees what they can and cannot post or tweet about on their favorite social networks.

                              It's an idea that enterprises should note and use to put their own guidelines in place, according to industry analysts.

                              The U.S. Office of Government Ethics released the guidelines, dubbed Standards of Conduct and Social Media, last week. The rules cover not using social media during work time and on government property, as well as not using their official title, using social media to look for another job and not disclosing 'non-public information' to further private interests..."

                                Live Streaming Apps Like Meerkat and Periscope Pose Legal Risks
                                ComputerWorld, April 20, 2015
                                "Live video is messy. It's raw, unedited, and with new mobile apps, it's now capable of capturing many more people who aren't aware they're being recorded. And in some cases, that can add up to legal problems.

                                Meerkat and Periscope aren't the first tools to offer live-streaming capabilities, but they have captured attention due in large part to the ease with which they allow video to be recorded on the fly, from a smartphone, and shared publicly on Twitter. Twitter owns Periscope, while Meerkat is the indie player..."

                                  IT - Virtualization
                                  x
                                  How can Virtualization Reduce Power Consumption?
                                  Search Server Virtualization, April 23, 2015
                                  "Virtualization benefits the data center by increasing the utilization of computing resources that might otherwise be wasted. For example, a traditional physical server with a single workload might only use 10-15% of the server's processor cycles or memory space -- essentially wasting the remaining 85-90%. By applying a virtualization layer to the server, multiple virtual machines (VMs) can reside on the same server and each consume a portion of the available physical resources..."
                                    IT - Compliance
                                    x
                                    EU Data Protection Reform Triggers Privacy Warning
                                    ComputerWorld, April 21, 2015
                                    "European Union data-protection reform proposals could undermine basic privacy rights globally, a growing chorus of critics say.

                                    More than 60 civil rights groups from all corners of the world including Europe, Africa, the U.S, Central and South America, Asia and Australia are calling on the European Commission to stop what they said is an effort to undermine people's right to privacy..."

                                      IT - Email
                                      x
                                      HTTP/2 Is Speedy and Secure
                                      CA Security, April 20, 2015
                                      "There has been a lot of activity in the IETF HTTP Working Group, resulting in the February announcement that the next version of HTTP has been approved. This is big news because it means that major SSL/TLS performance improvements are on the way.

                                      When your browser connects to a website today, it most likely uses the HTTP/1.1 protocol that was defined in 1999 in RFC 2616. Over the past 15 years, HTTP/1.1 has served us well and many tweaks have been discovered to make the most of it. However, in that time the web has transformed into a platform for interactive content and applications. Today, browsers load much more data from many more sources to build the typical web page..."

                                      Making the Case Against Data Localization in China
                                      Privacy Association, April 20, 2015
                                      "There is an old saying in baseball that a strong defense is so fundamental that one does not appreciate or even notice it until the moment when one no longer has it. Likewise, free and unencumbered information flows over the Internet have become so fundamental to the way we now do business, find our news, learn new skills and even go on vacation that we no longer appreciate or even notice them.

                                      However, data localization policies are a recent international development that, if they take root in enough places, will teach us, well and truly, to notice and appreciate our access to information. And they will do so in vivid and painful fashion..."

                                        The Internet of Things Doesn't -- and Shouldn't -- Exist
                                        InfoWorld, April 21, 2015
                                        "A highly connected world where devices of all sorts intelligently use sensor data to be more efficient, adjust to changing conditions, prevent or at least flag problems, and optimize performance of themselves, workflows, and even personal health -- that is the vision of the Internet of things.

                                        It's a great vision, but despite all the hype in the last year, it does not -- and may never -- exist..."

                                        IT - Mobile
                                        x
                                        What's the Future of Wearables? How Retailers Should Jump on the Wearable Technology Revolution
                                        Business 2 Community, April 19, 2015
                                        "Wearable technology may be niche now, but it offers big opportunities for retailers to improve customer experience and boost sales conversions. Here's why it must be taken seriously NOW...

                                        Wearable technology; perhaps two words no one would have imagined sitting together a few years ago. But wearable technology is increasingly showing its potential in the retail environment and big name retailers are already taking advantage..."

                                          What My Users Need to Know About BYOD
                                          IT Business, April 22, 2015
                                          "Whether businesses like it or not, bring your own device (BYOD), sometimes referred to as the consumerization of IT, is firmly entrenched in many companies. Employees are bringing their own phones, tablets, and laptops to the office, rather than merely accepting whatever their employers offer. The question is not when it will happen, but how to handle it in a way that serves both the business and the employee..."
                                          IT - Big Data
                                          x
                                          Cybersecurity, Data Science and Machine Learning: Is All Data Equal?
                                          ComputerWorld, April 16, 2015
                                          "In big-data discussions, the value of data sometimes refers to the predictive capability of a given data model and other times to the discovery of hidden insights that appear when rigorous analytical methods are applied to the data itself. From a cybersecurity point of view, I believe the value of data refers first to the "nature" of the data itself. Positive data, i.e. malicious network traffic data from malware and cyberattacks, have much more value than some other data science problems. To better understand this, let's start to discuss how a wealth of network traffic data can be used to build network security models through the use of machine learning techniques..."
                                          Big Data makes NSA Dysfunctional
                                          IT Web, April 16, 2015
                                          "A former director of the National Security Agency (NSA) Bill Binney says mass surveillance is a big problem, and covers the entire planet, including Africa and SA, with no exceptions.

                                          Stories about NSA surveillance programmes have littered the headlines since 2013, following the leaks of secret documents by famous whistle-blower Edward Snowden.

                                          However,.."

                                          Null Values in Your Data Warehouse?
                                          Information Management, April 20, 2015
                                          "If you're a business intelligence developer, you've likely had a customer ask why there are null values in their report -- and what the values mean.

                                          Unknown values in a data warehouse solution are common. A number of reasons can cause of them. Sometimes developers fix or hide these unknowns, but sometimes developers decide it's okay to just leave them alone. It all depends if the developer understands what's triggering this null value.

                                          With that as a backdrop, it is important that the developer consider a few rudimentary questions before making a decision on the next course of action..."

                                            With Data Analytics, No More Pontiac Azteks
                                            ComputerWorld, April 20, 2015
                                            "In their introduction to Arc 2.1: Exit Strategies, 'Escaping reality,' editors Simon Ings and Sumit Paul-Choudhury tell us that 'ninety-six percent of the cosmos is ineffable' - incapable of being expressed or described in words. In addition to reminding us of the widely accepted scientific fact that 96% of our universe is made up by yet-to-be-explained dark matter and dark energy, their point - I think - is that it is in our imagination (our ability to make stuff up) that the future lies..."
                                              IT - BYOD
                                              x
                                              Day by day: Enterprise mobility, BYOD and PCI DSS Compliance
                                              TechRepublic, April 21, 2015
                                              "The PCI Data Security Standard (PCI DSS) is a compliance standard designed to guard payment card security. A retailer violating PCI-DSS compliance faces fines and penalties not to mention the ensuing lawsuits that come from a security breach of customer personally identifiable information (PII). The growth of enterprise mobility and Bring Your Own Device (BYOD) can seem at odds with maintaining PCI compliance..."
                                              BYOD Done Right: The Mobile Workspace
                                              CIO, April 23, 2015
                                              "It all started when someone, somewhere, brought an iPhone to work. Then, someone else brought an Android device; then an iPad appeared. Just as a blizzard starts with a single snowflake, so the BYOD revolution began quietly, building gradually to the point of an irresistible force.

                                              Like a beleaguered public works department, IT has responded with a patchwork of policies and management tools. But the time for ad hoc responses is over. Continuous improvement of consumer devices has meant that the home user experience has become the standard by which corporate IT end-user services are measured. It's time to rethink the corporate computing environment..."

                                              Top10
                                              x
                                              Top Ten Articles for last few Issues
                                              Vol 206 Issues 1, 2 and 3; Vol 205 Issue 1, 2, 3 and 4; Vol 204 Issue 4
                                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                              • Training for Oracle Linux 7 and Earlier Versions
                                              • Solaris Swift All In One
                                              • Java Magazine New Edition
                                              • The Power of The Ksplice Feature of Oracle Linux Video
                                              • Perspectives on Docker
                                              • Faster Processors for Fujitsu M10-1 and M10-4 Servers
                                              • Why the Internet of Things should matter to you
                                              • First Bug Hunting Session For LibreOffice 5.0
                                              • Oracle OpenWorld and JavaOne 2015 Call for Proposals
                                              • Java EE 7/Bean Validation Adoption at Harvard University

                                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                                IT - Encryption
                                                x
                                                Use of Encryption Continues to Rise
                                                HelpNet Security, April 20, 2015
                                                "The use of encryption continues to grow in response to consumer concerns, privacy compliance regulations and on-going cyber-attacks and yet there are still major challenges in managing key across what are the mostly fragmented and tactical deployments of encryption technologies, say the result of Thales' 2015 Global Encryption and Key Management Trends Study, revealed at RSA Conference 2015.

                                                More than 4,700 business and IT managers were surveyed in the US, UK, Germany, France, Australia, Japan, Brazil, Russia and for the first time India and Mexico, examining global encryption trends and regional differences in encryption usage..."

                                                Crypto Gurus: The Government's Key Escrow Plan won't Work
                                                CSO Online, April 22, 2015
                                                "Cryptography experts at the RSA security conference on Tuesday picked holes in U.S. plans to require that law enforcers be given a way to break encryption to exercise lawful intercept rights.

                                                U.S. government officials have been increasingly hostile over the past year to the widespread use of encryption on mobile phones and online communications, arguing that a way needs to be found to provide law enforcement and intelligence agencies with lawful interception capabilities..."

                                                Panel Calls NSA Access to Encryption Keys a Bad Idea
                                                Network World, April 22, 2015
                                                "Some of the world's best known cryptographers - veterans of the crypto wars of the 1990s - say government access to encryption keys is still a bad idea, but is an issue that will never go away because it's something intelligence agencies crave.

                                                Speaking at RSA 2015's Cryptographer's panel, Whitfield Diffie, who pioneered public-key encryption, says key escrow schemes where government could gain access to encrypted data works mainly to the benefit of government. 'They want you to be secure but not against them,' he says.

                                                LibreOffice
                                                x
                                                LibreOffice 4.3.7
                                                Suggested version of the software for large deployments
                                                The Document Foundation announced LibreOffice 4.3.7 "Still", the seventh minor release of the LibreOffice 4.3 family, which is now the suggested version of the software for large deployments in the enterprise and for conservative users. LibreOffice 4.3.7 contains over 100 bug fixes.

                                                LibreOffice 4.3.7 and LibreOffice 4.4.2, announced in early April, include a security patch for CVE-2015-1774: OpenOffice HWP Filter Remote Execution and DoS Vulnerability, where an issue in OpenOffice's Hangul Word Processor (HWP) filter allows attackers to cause a denial of service (memory corruption and application crash) or possibly the execution of arbitrary code by preparing specially crafted documents in the HWP document format in versions from 1997 or older.

                                                Users are invited to update their version of LibreOffice to 4.3.7 "Still" or 4.4.2 "Fresh", in order to protect their system from the potential effects of this vulnerability.

                                                Developer
                                                x
                                                Mobile Cloud Service - Avoiding Apphazard Mobile Delivery
                                                By Ian Wallis, Moble Technical Director, Oracle EMEA
                                                Ian writes, "IT organizations are reporting that their traditional three tier architectures are straining to support the needs of mobile users both for customers and employees. And why is this you ask? Well I believe there are many factors causing mobile to stretch and stress traditional IT, a few are listed below:..."

                                                Change,Innovation, Connection, Personalisation, Communication, Speed of continuous delivery, Processing and battery life, Scale, Security...

                                                Security
                                                x
                                                What The Verizon Data Breach Report Means To Corporate Data Security
                                                Michael Hickins writing in Forbes
                                                Michael Hickins writes in 'url "http://www.forbes.com/sites/oracle/2015/04/21/what-the-verizon-data-breach-report-means-to-corporate-data-security/" "Forbes"', "Network security software is only 24% effective in fighting cybercrime, according to the most recent Verizon Data Breach Investigations Report.

                                                Paradoxically, however, corporate victims still spend two-thirds of their security budgets defending their porous perimeters, a strategy that does nothing to stop valuable data from being stolen - if it does anything at all.

                                                It's a well-known aphorism that there are two kinds of companies: those who know they've been breached, and those who've been breached but don't know it.

                                                Not that there's no good news out there - companies can protect their data, their customer data, and their good name. But there's a big if there: They have to focus on the data..."

                                                Nexenta News
                                                x
                                                Join Nexenta on Wednesday, May 13th at the Four Seasons during Citrix Synergy
                                                Stimulating networking, live entertainment, delicious cuban food, and a cigar roller!
                                                You're invited to enjoy an evening with Nexenta.

                                                Come join us during Citrix Synergy at the Four Seasons and enjoy an exciting evening of stimulating networking, live entertainment, delicious cuban food, and a cigar roller! Getting there is easy!

                                                Nexenta is providing complimentary transportation from the Hyatt Regency Orlando, Rosen Plaza Hotel and Hilton Orlando. Look for the Nexenta branded bus at each hotel.

                                                Nexenta: thrilled to continue our support of the community at OpenStack Vancouver!
                                                Nexenta OpenSDx VIP Reception: Tuesday: May 19, 2015 from 6:00pm - 9:00pm PDT
                                                We're thrilled to continue our support of the community at OpenStack Vancouver. Come join us for an evening of stimulating networking, delicious hour d'oeuvres, and cocktails!

                                                Nexenta Software-Defined Storage solutions have been integrated into OpenStack since the Essex release and since then have expanded in their functionality and support as OpenStack evolves. With OpenStack technology and the support of our partners, Nexenta enables enterprises to create optimized storage clusters for open, agile and secure OpenStack environments that scale quickly and easily.

                                                Walton EMC Runs on Nexenta Open Source-Driven Software-Defined Storage Solutions
                                                Cuts Data Center Costs without Sacrificing Performance for Highest Ratings in Customer Service and Satisfaction in the Industry
                                                "Georgia-based Walton Electric Membership Corp. uses NexentaStor, Nexenta's flagship OpenSDS platform, in conjunction with VMware to save on storage and maintenance costs. Walton Electric is one of the largest of almost 1,000 electric cooperatives in the country and supplies energy to more than 122,000 residential, business and industrial accounts in 10 northeast Georgia counties..."
                                                Trending in
                                                Vol 231, Issue 3
                                                Trending IT Articles