News about Oracle's Solaris and Sun Hardware
System News
Apr 27th, 2015 — May 3rd, 2015 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 206, Issue 5 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Oracle
x
Opera Software Closes their Financial Books Nearly 3x Faster
Ensures Scalability and High Availability with Oracle Managed Cloud Services
Opera Software plans to use Oracle Financials to enable its accounting and financial teams to improve financial analysis and reporting and accelerate internal monthly and quarterly close cycles, so the process is completed in just 4 days instead of 11 days.

Oracle Managed Cloud Services provides Opera with unlimited IT scalability, high-availability and optimum applications administration to support business growth.

Features
x
Oracle Going All-In On The Cloud, Significant Share Upside
By Brian W. Wu
Brian W. Wu writes, "Oracle's (NYSE:ORCL) co-president and co-CEO Mark Hurd recently told Bloomberg that the giant database management software maker plans to have 95% of all its products available on the cloud by the time it holds its annual Oracle OpenWorld Conference in October this year, as opposed to 65% of Oracle's products currently running on the platform. In other words, the company has given itself an ambitious 6-month timeline to achieve an almost 100% cloud transformation.

Oracle's announcement is hardly surprising, considering that the company's cloud segment is its fastest growing. Oracle's SaaS and PaaS revenue grew 30% during its latest quarter while IaaS grew 28%, bringing total cloud revenue during the quarter to $408 million. In comparison, the company's overall revenue remained flat at $9.3 billion. Oracle's cloud revenue is still a small part of the company since it currently accounts for just 6% of overall revenue.

Why Transitioning To The Cloud Is Important..."

SPARC
x
Oracle SPARC Processor Documentation
Includes SPARC Legacy Processor Documentation
Documentation for SPARC Legacy Processors has now been posted on-line.

  • Ultra SPARC Architecture 2007 (privileged edition)
  • SPARC T3 Implementation Supplement
  • UltraSPARC T2 Implementation Supplement
  • UltraSPARC Architecture 2005 (privileged edition)
  • UltraSPARC T1 Implementation Supplement
  • Joint Programming Specification 2
  • UltraSPARC-IV User's Manual
  • UltraSPARC-IV+ User's Manual
  • Joint Programming Specification 1
  • UltraSPARC-IIIi User's Manual
  • UltraSPARC-III User's Manual
  • UltraSPARC IIi User's Manual
  • UltraSPARC-IIe User's Manual
  • UltraSPARC User's Manual, UltraSPARC-I, UltraSPARC-II

(PDF documents)

Exadata
x
Information Mosaic's IMSecurities Achieves Oracle Exadata Optimized, Oracle SuperCluster Optimized and Oracle Exalogic Optimized, Status
Tuesday, 14th April 2015
Information Mosaic (IM), a market leader in global post-trade securities processing solutions, announced it has achieved Oracle Exadata Optimized, Oracle SuperCluster Optimized, and Oracle Exalogic Optimized status for its IMSecurites version 7.0.4 solution through Oracle PartnerNetwork (OPN). Information Mosaic is a Gold level member of Oracle PartnerNetwork.

IMSecurities, IM's robust end-to-end securities-processing solution, allows clients to automate the entire securities-processing lifecycle, including trade capture and processing, trade settlement, position and cash management, corporate actions processing, investment accounting, and risk management.

Oracle Exadata Optimized, Oracle SuperCluster Optimized , and Oracle Exalogic Optimized, are part of the Oracle Exastack Optimized program which allows partners, such as Information Mosaic, to leverage OPN enablement resources and dedicated lab environments to help develop, test and tune applications on Oracle Exadata Database Machine, Oracle SuperCluster, Oracle Exalogic Elastic Cloud, Oracle Exalytics In-Memory Machine, Oracle Database Appliance and Oracle Big Data Appliance engineered systems.

New IDC White Paper Evaluates Integrated Systems
Addressing increased IT productivity and cost reductions when certain measures are taken
Javier Puerta writes, "Check out the new IDC white paper, 'Assessing the Business Value of Integrated Systems,' addressing increased IT productivity and cost reductions when certain measures are taken. It also features SuperCluster and a major Oracle on Oracle customer, Specialized Bicycles.

This brief leverages IDC's research among users of integrated systems and quantifies the business benefits they reported, as follows:

  • 46.7% IT staff productivity improvement
  • 60.7% increase in speed of application deployment
  • 47.7% reduction in datacenter-related IT spending

Download the solution brief. In addition, a webcast based on these findings will be held on May 14 at 10am PT that will include both IDC and Specialized Bicycles..."

Oracle Exalogic Elastic Cloud Software (EECS) for Oracle SuperCluster
EECS for SuperCluster has two distinct parts
This blog post is brought to you by Sachin Pikle of the Exalogic Product Management team.

"We usually get a lot of questions on Oracle Exalogic Elastic Cloud Software (EECS) for Oracle SuperCluster - what is it, where can we use it, how do we install it, etc. Just recently someone asked me, 'We have procured a new SuperCluster T5-8 rack. We also have EECS licenses. Now what do we do next? How do we get EECS up and running on this rack?'. In general, there seems to be some mystery surrounding EECS for SuperCluster. This post will help address questions like these.

Oracle Engineered Systems are designed and optimized to run specific workloads. Oracle SuperCluster is our SPARC-based Engineered System that combines the power of Oracle Exadata for running the database tier, and Oracle Exalogic for running the application tier in a single rack. SuperCluster integrates with optional EECS to run business applications and middleware components better and faster.

So what is EECS for SuperCluster? Simply put, EECS for SuperCluster has two distinct parts:..."

IT - Storage
x
Cloud Represented 32% of Total EMEA Storage Capacity in 4Q14
Storage Newsletter, May 1, 2015
"According to the newly introduced EMEA data portion of the International Data Corporation (IDC) WW Quarterly Cloud Infrastructure Tracker, IT infrastructure spending (server, disk storage, and ethernet switch) for public and private cloud in Europe, the Middle East, and Africa (EMEA) grew by 27% to reach $1.1 billion in revenue in 4Q14 and totaled around $4.1 billion for the whole year, with 28% growth over 2013. The cloud-related share of total EMEA infrastructure expenditure on server, disk storage, and Ethernet switch grew by 3 percentage points to exceed 17% in 2014..."
Everything You Need to Know About Flash Storage Performance
InfoWorld, April 28, 2015
"Due to the unique characteristics of flash, performance validation testing is immensely challenging and critically important; follow these best practices...

All-flash storage arrays (AFAs) are receiving lots of attention these days and for good reason. Compared to spinning disks, AFAs provide dramatically better performance, take up less floor space, and even offer overall cost of ownership advantages. Nevertheless, the cost per gigabyte is still relatively expensive, which means that AFAs should not be deployed for every application workload. The obvious questions are which workloads are most cost-effectively deployed on flash storage and which vendor has the optimal flash storage product for your workloads..."

Fibre Channel Really is Dead
NetworkComputing, April 23, 2015
"Ethernet has overcome the problems that prevented converged compute and storage networks, speeding the demise of Fibre Channel. Last fall's release of a routable version of Remote Direct Memory Access over Converged Ethernet (RoCE) has led to a sea change in network convergence and data center architecture. This new routable RoCE specification overcomes the three problems that have prevented widespread adoption of converged compute and storage networks: ..."
Take Time to Get To Know the Flash You Think You Love
The Register, April 30, 2015
"We have looked at what workloads drive enterprise flash adoption and why picking the right storage medium for the job matters.

Unfortunately, the market doesn't always meet everyone's needs, so an understanding of what is available is important.

Flash comes in a variety of solutions, from the roll-your-own to the pre-packaged. Although the mental image of some poor tech having to crack open 5,000 servers and install SSDs is amusing, it is also fanciful.

In practice, flash in the enterprise is going to come pre-packaged. It comes not from flash vendors but from device vendors. You may like a particular flash vendor's NAND more than the next, but it may not be an option available from your device vendor..."

Virtual Storage And The Danger Of Data Loss
Network Computing, April 28, 2015
"Virtual storage like VSAN must take the storage part of the equation seriously and incorporate better resiliency to avoid data loss.

At the recent Storage Field Day 7, I got a chance to discuss the resiliency features of VSAN with VMware's Christos Karamanolis, VSAN's primary architect. As I reflected on the conversation, I realized that my differences with Christos were rooted in the basic difference in perception between folks that have spent their careers managing storage and those that have lived in the compute world..."

What are VMware VVOLs and how do they work?
Search Virtual Storage, April 30, 2015
"VMware's new Virtual Volumes allow virtual machines and applications to be better allocated to storage. The feature is now available in beta.

Virtual Volumes (VVOLs) are something new that VMware is working on to improve storage provisioning. Storage currently tends to be provisioned according to a gold, silver and bronze type of model that forces a virtualization administrator to pick the storage tier that most closely matches their needs..."

IT - Technology
x
3 New Types of 3D Printers
Network World, April 27, 2015
"New types of 3D printers include Disney's 3D-printed soft cuddlies from fabric, a 3D-printed 4D object that morphs when an actuator is exposed to external stimuli, and another with a retrofit kit to turn a 3D printer into a food printer..."
    Delivery Drone or Death Machine?
    InformationWeek, April 26, 2015
    "The Boston Athletic Association declared that the entire route of the 2015 Boston Marathon would be a "No Drone Zone."

    It advised the public not to operate "any type of drone (unmanned aerial vehicle), including remotely controlled model aircraft, over or near the course, or anywhere within sight of runners or spectators."

    Given the terror attack on the race two years earlier, the group's prohibition on drone usage is understandable..."

      IT - Bitcoin
      x
      10 Places with Strong Bitcoin Acceptance
      NewsBTC, April 27, 2015
      "For quite some time, bitcoin acceptance has been limited to the online world, with more e-commerce businesses allowing cryptocurrency payments. However, a few places have shown more openness to the digital currency lately and are becoming hubs for bitcoin adoption.

      Bitcoin acceptance can be judged based on the number of bitcoin ATMs or the number of establishments accepting cryptocurrency payments. Digital currency influence can also be seen via the collaborative coinmap.org, which indicates which cities or countries have places that accept bitcoin payments..."

      Post Bitcoin DevCore: Exclusive Interview With Patrick Murck
      CryptoCoinNews, April 27, 2015
      "Patrick Murck, until very recently, the Executive Director of the Bitcoin Foundation, where he has served as General Counsel and continues to advise as it undergoes its recent changes. Though we chatted during and after the DevCore event, it was not until the after-party, where I managed to get some quiet time with him for a chat and an interview.

      How successful do you feel DevCore London was?..."

      Blockchain to Revolutionize Healthcare
      NewsBTC, May 2, 2015
      "Healthcare is one of the industries that generate terabytes of data each day. Hospitals and healthcare services providers are investing thousands of dollars every year to manage patient information and other data. Even after all these, there is a disconnect between one healthcare provider and another. When a patient decides to switch his healthcare provider due to any reason, the patient's medical records have to be either migrated manually from the previous hospital/healthcare center or the patient will be forced to undergo a plethora of diagnostic tests to evaluate his or her medical condition..."
      CoinDesk Releases Cryptocurrency 2.0 Report
      CoinDesk, April 28, 2015
      "CoinDesk's latest research report, Cryptocurrency 2.0, is available to download from today.

      Next-generation cryptographic applications (NGDAs), commonly grouped under the term 'cryptocurrency 2.0', are a class of emerging projects seeking to expand blockchain technology beyond the storage and transfer of money.

      CoinDesk's 56-page report provides a snapshot of the fast-changing NGDA ecosystem and a Who's Who of the diverse companies contained within it..."

      Understanding Bitcoin and the Blockchain Protocol
      NewsBTC, April 30, 2015
      "Perhaps because the blockchain protocol is bitcoin's most defining feature, it's easy to interchange one for the other. However, industry experts have clarified that these two terms aren't necessarily synonymous, and distinguishing the two is important before the industry progresses.

      At the moment, what's holding bitcoin back is the prospect of stricter regulation exposing the anonymity promised by the blockchain, potentially destroying the very characteristic that makes the system function. Skeptics maintain that bitcoin will simply be used for illegal dealings, as money laundering operations will be easier to carry out using the cryptocurrency. On the other hand, bitcoin enthusiasts believe that the digital currency is integral in the global financial revolution..."

      MIT's First Digital Currency Director Talks Taking Bitcoin Mainstream
      CoinDesk, May 1, 2015
      "If you would have explained Uber or Lyft five years ago, you would have had to explain it as digital hitchhiking, because that's what it was."

      "That analogy, according to newly appointed MIT Digital Currency Initiative director Brian Forde, illustrates where bitcoin and the blockchain are today - struggling for a more colloquial definition that may only come when the technology delivers a consumer experience that communicates its societal value..."

      IT - FOSS
      x
      What is open source? Licensing, history, and more
      Opensource.com, April 27, 2015
      "Recently, I had the pleasure of attending a talk by Gina Likins from Red Hat at the 2015 Consortium for Computing Sciences in Colleges (CCSC): South Central conference about teaching open source.

      Open source is...

      Gina started by asking the audience how many people in the room teach open source? No one raised their hand!..."

      Solaris
      x
      Solaris Running Mission-Critical Applications: Real Life Examples
      113 examples
      Giuseppe Facchetti writes, "The majority of Oracle's top enterprise customers run their most mission-critical applications on Oracle Solaris today. Solaris is the vehicle by which Oracle customers leverage the power of the SPARC microprocessor - delivering world-record performance, maximum scalability, and continuous reliable service.

      There are 113 examples of this on the Oracle customer & partner success portal. Take a look! ..."

      MySQL
      x
      MySQL Enterprise Monitor 3.0.21 has been released
      Now available for download on the My Oracle Support (MOS) web site
      Andy Bang writes, "We are pleased to announce that MySQL Enterprise Monitor 3.0.21 is now available for download on the My Oracle Support (MOS) web site. It will also be available via the Oracle Software Delivery Cloud in a few weeks. This is a maintenance release that includes a few new features and fixes a number of bugs. You can find more information on the contents of this release in the change log..."
      Oracle Enterprise Manager for MySQL v2 Is Now Available!
      Official MySQL plugin for Enterprise Manager 12c
      Matt Lord writesm "We're very happy to announce the general availability of the next release of Oracle Enterprise Manager for MySQL, version 12.1.0.2.0 (see the full changelog). This is the official MySQL plugin for Enterprise Manager 12c, offering a fully supported and integrated solution that is included with your MySQL Enterprise Edition subscription..."
      Cloud Computing
      x
      What is the Power of Cloud? (to the Business)
      How do you explain the cloud to other?

      Dave Berry writes, "Of course many readers, technologists and businesses are acutely aware of the value prop of the cloud but what about the rest of the "majority" of people who don't? If you do a search on this topic, you will mostly get links to marketing materials that are fairly high level and full of the usual buzzwords with more links to lengthy case studies. As a business technology enabler, there needs to be a simpler message or elevator pitch that is easy to understand yet convincing. Ah, the simplicity or less is more approach rears it's beautiful head once again. Below are some recipes to draw from for an elevator ride of any duration..."

        Linux
        x
        Oracle Linux Advanced Administration Training Online
        With Training-on-Demand you can start training within 24 hours of registration
        You can now take the Oracle Linux Advanced Administration training course online as a Training-on-Demand offering.

        With Training-on-Demand you can start training within 24 hours of registration, following lecture delivery by an expert instructor at your own pace and booking time to perform hand-on exercises when suits your schedule.

        The Oracle Linux Advanced Administration course is ideal for experienced administrators who need to learn more about advanced features of Oracle Linux.

        Learn about Docker and Oracle Linux!
        May 7, 2015 Webcast
        Chris Kawalek blogs, "Docker has been an extremely interesting technology for Linux users, but how do you get started with it? We have a very cool webcast coming up that you won't want to miss titled 'Getting Started with Oracle Linux and Docker.'

        Featuring Oracle Director of Product Management Avi Miller, the webcast will describe how Docker can be used with Oracle Linux to simplify your application deployment. Avi has a wealth of experience with Linux, Docker, and many other technologies and will take you through the nuts and bolts of using Docker with Oracle Linux..."

        Friday Spotlight: Optimizing Oracle Database Performance on Oracle Linux with Flash
        White paper (19 Pages)
        Chris Kawalek writes, "This week, I'm dipping into the archives for a really interesting white paper, 'Optimizing Oracle Database Performance on Oracle Linux with Flash.' It talks about one of my favorite benefits of running Oracle Linux or Oracle Solaris with Oracle database called Database Smart Flash Cache. From the summary of the paper:.."

        "This document explains how to increase Oracle database performance and improve user response time by deploying Oracle's Flash Accelerator hardware with Oracle's Database Smart Flash Cache feature. Oracle's Database Smart Flash Cache feature is supported only on Oracle Linux and Oracle Solaris operating systems beginning with Oracle 11gR2..."

        IT - Cloud
        x
        Cloud Tools Help Harley-Davidson Leave Legacy IT In Its Dust
        v3 co uk, April 23, 2015
        'Motorcycle giant Harley-Davidson has adopted ServiceNow's cloud platform in a bid to move away from on-premise IT systems and embrace cloud-hosted services.

        Speaking at ServiceNow's Knowledge 15 event in Las Vegas, Shannon Weiss, IT asset manager at Harley-Davidson, explained how moving to the cloud was part of the modernisation the 100-year-old motorcycle company has been undergoing.

        "Transformation was happening all over the company. We realised that with the changes that were going on [that] our current tools and business processes weren't really going to cut it. We needed to look at modernising them," she said.

        "We know that cloud, big data, Internet of Things, is the way we're going, but we had an on-premise [system] that was far from that; it was very thick, clunky, and it was not used around the world."

        How Do I Ensure Hybrid Cloud Security and Performance?
        Search Cloud Computing, April 28, 2015
        "Deployment is only half of the hybrid cloud battle. How can I guarantee my hybrid environment is secure and high-performing?

        Following the major breaches at retail giants Home Depot and Target, cloud security typically tops an organization's list of concerns. And while cloud wasn't directly responsible for these breaches, it's critical to secure sensitive data within the hybrid cloud -- especially if that data is stored or processed in the public cloud. Security breaches damage a company's image, deter customers and result in significant penalties, so it's..."

        Solution Architect, Reinvent Yourself for the Cloud
        InfoWorld, April 30, 2015
        "Solution architects are facing extinction unless they reexamine and reinvent themselves

        The role of the SA (solution architect) is a prestigious one. Responsible for the design, planning, deployment, and management of enterprise solutions, the SA is a seasoned veteran with deep knowledge and a broad range of skills.

        Sad to say, the role of the SA may become obsolete in a cloud-oriented world where everything is turned over to the vendor (be it Microsoft or otherwise) to handle the network infrastructure, data management, and other core services. Whereas a solution architect would typically determine the technology foundation for any new deployment, drawing on a wealth of experience and research into best-of-breed options, the cloud vendor is making these calls now. Welcome to the McDonald's "choose a value meal" approach to modern, cloud-based solution design..."

        The Week Cloud Computing Took Over the World
        Top 10 CIO/CTO Concerns, April 27, 2015
        "Earnings reports from Amazon and Microsoft conclusively confirm what we should have already known: cloud computing is on a rampage.

        If you had any lingering doubts that cloud computing was dominating the world of information technology, last week's quarterly earnings reports from Amazon and Microsoft should have obliterated them. Both companies announced big-time growth and revenue from their cloud operations..."

        IT - CxO
        x
        Having 'The Ear of the CEO' Is Key to Battling Cyberthreats
        CIO, April 23, 2015
        "Former FBI director stresses the importance of an enterprise-wide approach to cybersecurity, while Congress considers legislation to promote sharing threat information.

        When a cyberattack comes, organizations need to have in place a solid tech team that reaches to the highest levels of the enterprise, former FBI Director Robert Mueller cautioned at a recent government IT event.

        The potential for hacks and data breaches amounts to "an existential threat to the corporation, and there needs to be someone in charge," Mueller says, "someone who has the ear of the CEO."

        How Much Does a Data Breach Cost?
        Government Technology, April 24, 2015
        "Cybersecurity attacks and attempts to thwart them will only grow in number as the world becomes increasingly digital. So on April 22, the U.S. House of Representatives passed an extensive cybersecurity measure that would encourage companies to share their networks with federal investigators. If the bill is passed by the Senate, it would be the federal government's most aggressive response yet to the growing online threat that has in recent years manifested in the form of data breach and denial-of-service attacks costing corporations and individuals billions..."
          10 Ways our Data Overlords Could Serve Us Better
          InfoWorld, April 30, 2015
          "I honestly believe data can save the world if we get out of its way. This getting out of the way of data goes by another name: transparency. While I deeply respect the people who still fight the battle for our privacy, privacy and the Fourth Amendment are pretty much dead. The "man" will always be watching and will always find a way to justify a search or seizure. We, the people, might as well enjoy some of the benefits of our burgeoning, "1984"-ish surveillance state..."
            20 Great Ideas to Steal In 2015
            InformationWeek, April 27, 2015
            "You hear the words a lot: big data analytics, the Internet of Things, mobile-first development, personalization. This slideshow brings those and other tech innovations to life, with 20 real-world projects from companies on the 2015 InformationWeek Elite 100 ranking.

            In analytics, ConocoPhillips is using data to analyze how to most efficiently use new hydraulic fracturing techniques, and that work is helping tap new energy resources..."

            7 Important Points In Preparing For The Internet of Things
            Forbes, April 28, 2015
            "The Internet of Things sounds more like J.J. Abrams' next sci-fi thriller than a major inflection point in business technology. Which makes the fact that IoT is about to invade the business landscape on a massive scale somewhat ironic - and wholly appropriate.

            Enterprises have been tossed by some momentous technology waves in the last few years, such as big data, the cloud, mobility, and social networking. Yet the Internet of Things - connected, data-generating devices embedded in everyday objects - is more than just another wave..."

            CIO/CTOs' Top 10 Concerns
            Insurance Networking News, April 28, 2015
            "Security is the top concern of more than two-thirds of CIOs and CTOs, according to an annual review of CIO and CTO concerns by Janco Associates Inc., an international consulting firm. The rankings are based on interviews with 110 CIOs and CTOs, which were conducted over the past two months, Janco said, and three concerns: security, cloud computing and infrastructure were selected by as top concerns by half of participants.

            'Each of these top ten concerns is focused on the three legs of IT management: technology, people, and infrastructure,' said M. V. Janulaitis, president of Janco Associates. 'Security is the top issue with 68 percent of the top IT professional saying it is the one they lose the most sleep over..."

            Four Simple Steps to Ease an Employer-Employee Breakup
            TLNT, April 28, 2015
            "Terminating an employer/employee relationship has lots of parallels to terminating a romantic relationship.

            Yes, Every breakup has a dumper and a dumpee, and no one likes to get dumped.

            The story usually goes something like this:..."

              Guide to Managing Data Center Costs and the IT Budget
              Search Data Center, April 30, 2015
              "Without an up-to-date data center facility and IT equipment, an enterprise can fall behind and lose traction against competitors. Follow these tips to keep servers fresh and data center costs down...

              Escalating data center costs can bring IT pros down, so make sure you keep your IT budget down first.

              IT budgeting is a crucial and necessary process for enterprises. Your facility -- and everything in it -- requires refreshes at key times to enhance the business. Spending money is inevitable, but you can gain performance, reliability and agility from upgrades without emptying the coffers. To smartly budget IT purchases for new hardware or upgrades, plan, prepare and execute with metrics..."

              How One CIO Stays a Step Ahead of Cybersecurity Threats
              CIO, April 27, 2015
              "If you think cybersecurity is someone else's problem, think again. It's on the agenda of every board of directors meeting, and boards most often look to the CIO to explain the ever-increasing risk of security breaches and what their organizations are doing to prevent them.

              You need only look at the statistics to understand why the issue is critical. According to a report from the Identity Theft Resource Center the number of data breaches in 2014 increased 27.5 percent over the previous year. Health records are prime targets..."

              How To Get a Better Outsourcing Deal
              ComputerWorld, April 28, 2015
              "IT leaders can't expect to have the upper hand in an outsourcing negotiation. Whether you're negotiating the initial contract, an extension or a change order, the outsourcer normally has the advantage.

              hat's because outsourcers are involved in just such negotiations all the time. They understand the internal cost structure and frequently negotiate for the same set of services using the same pricing mechanisms and contract. You might level the playing field a bit if your company is large enough to have a dedicated IT vendor management group, but you will still be at a disadvantage..."

              Six Takeaways From Global eCommerce Events In New York
              Forrester, April 28, 2015
              "Last week there were a couple of great events related to global eCommerce here in New York - Borderfree had its annual Global eCommerce Forum and Adyen held a local merchant event. A few themes emerged:

              Omnichannel is now a must-have. At both events, omnichannel retail was front and center..."

                The No. 1 Reason Employees Leave their Jobs
                Employee Benefit News, April 30, 2015
                "Commentary: "I quit!" You've dreamed of all the possible ways you could convey that thought to your manager. Skywriting. A custom YouTube video. Or just the good, old-fashioned technique of walking up to your boss, saying those two powerful words, and breezing out the door..."
                  Boards are on High Alert Over Security Threats
                  CIO, April 27, 2015
                  "Fear of cyberattacks has corporate directors on edge. CIOs must paint a realistic view of the company's security posture and steer the conversation toward managing business risk...

                  When Anthem revealed in early February that hackers had breached a database containing the personal information on 80 million of its customers and employees, the news hit a little too close to home for Gary Scholten, executive vice president and CIO of Principal Financial Group. His first order of business that day was to gather all the information he could to reassure his board of directors that the financial services provider did not have similar vulnerabilities..."

                  vBeers-SF
                  x
                  vBeers @ Palm Beach Gardens - Wednesday May 6th
                  6pm to 9pm - Twisted Trunk Brewing
                  Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida. Register today so you can be a part of this great monthly event! Feel free to invite all of your friends and co workers who work in the IT industry!

                  This event is sponsored with and through the South Florida Technology Alliance (SFTA)

                  Location

                  • Twisted Trunk Brewing
                  • 2000 PGA Boulevard, Palm Beach Gardens, FL 33408 Date and Time

                  • Wednesday, May 6, 2015 - 6:00 PM to 9:00 PM

                  Please RSVP at meetup.com

                  vBeers @ Broward - Funky Buddha - Wed May 13th
                  6pm - 9pm (Sponsored Pizza and Beer)
                  Please join us for the next vBeers @ Broward. We meet on the 2nd Wednesday of each month in Broward County, Florida, USA.

                  The next Broward meeting will be at the Funky Buddha Brewery, which is located in Oakland Park, just a few minutes East of I-95.

                  Event sponsorship is now managed by the South Florida Technology Alliance (SFTA). Sponsors for this event include Volico and Nexenta. Volico Hosting will be buying the beers and Nexenta will provide pizza! Bring your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community. Please encourage to IT friends and colleagues to attend!

                  • Funky Buddha Brewery
                  • 1201 NE 38th St
                  • Oakland Park, FL 33334

                  Please RSVP at the vBeers South Florida meetup.com page.

                  The South Florida vBeers events happen four times a month (Palm Beach Gardens, Ft. Lauderdale, Boca Raton and Miami).

                  Details @ vbeers.org ...

                  IT - DR
                  x
                  Are Emergency Managers Making the Most of Mobile? (Industry Perspective)
                  Government Technology, April 23, 2015
                  "Emergency situations occur on a regular basis, whether that's a natural disaster, violence or a workplace medical emergency. Effectively handling these crises is a crucial communication task for state and local governments.

                  Yet managing emergency plans is complex. Paper-based systems, varying technologies, miscommunication between departments, narrow distribution channels and the inaccessibility of the plans themselves all present challenges to government administrators responsible for overseeing emergencies..."

                    Magic Quadrant for Disaster Recovery as a Service - Gartner
                    Storage Newsletter, April 28, 2015
                    "This report, Magic Quadrant for Disaster Recovery as a Service, has been written by Gartner Inc.'s analysts John P Morency, Christine Tenneson and published on April 21, 2015.

                    Summary: Among providers of disaster recovery as a service(DRaaS) there is wide variance in experience and service quality, together with other key differentiating factors. Data center managers should use this Magic Quadrant to help them evaluate providers of DRaaS services..."

                    IT - PM
                    x
                    5 reasons you should turn down an IT project
                    CIO, April 27, 2015
                    "Not all IT projects should be taken on. There are often good reasons to turn a project down. Being a smart project manager means knowing why and when to say no to a project...

                    All project work is good project work, especially if you're a consultant like me, right? Take on everything and see how it goes, since money is money. And if you're an employee, can you really say no to a project you're assigned?

                    Not so fast..."

                      Is Everyone a Project Manager?
                      Business 2 Community, April 25, 2015
                      "Most of us don't have project manager in our job title but that's not to say we aren't involved in managing projects. Personally on a day-to-day basis, I have to manage website updates, allocate tasks and actions to colleagues, prepare and implement marketing campaign plans, and supervise social media and advertising plans. I have never received formal project management training and would never describe myself as a project manager but managing projects is a key part of my role..."
                      Project Management: Why it pays to be agile
                      Business Reporter, April 28, 2015
                      "Imagine that you have to build a railway bridge. You draw up blueprints for the bridge, start welding and, just as you near the other side of the river, you realise that the bridge is not strong enough. Oh, and it should be carrying cars instead. And the bridge has gone way over budget already. Not so much a bridge, more of a pier..."
                      IT - Networks
                      x
                      IPv6: How to Get Started
                      NetworkComputing, April 23, 2015
                      "You can't just 'turn on' IPv6. Successful IPv6 deployment requires taking time to learn about the Internet protocol, work with it in a lab, and thorough testing.

                      IPv6 has been implemented on the Internet since 1999, but it's still called the new Internet protocol because it's not widely deployed. How different is IPv6 from IPv4? It's based on a colon-hexadecimal system, compared to IPv4 being dotted-decimal. It's also comprised of a 128-bit number vs. IPv4's 32 bits. It has no broadcast-type message; those messages you know as broadcast in IPv4 are now link-local multicast. IPv6 also has a few other operational differences from IPv4..."

                      SDN & UC Integration: A Work in Progress
                      NetworkComputing, April 27, 2015
                      "Microsoft has led the way in applying software-defined networking to unified communications with its Lync SDN API, but a networking expert says more work is required to make communications and SDN a truly powerful combination.

                      As organizations tackle software-defined networking and figure out ways the technology can help them, one use case emerged early on: helping overcome unified communications performance issues. Microsoft led the charge on this front with its Lync SDN API..."

                      Wi-Fi Woes Continue To Plague Infosec
                      Dark Reading, April 30, 2015
                      "Several pieces of research coincide to send the message that hotspot connectivity is probably always going to be a sore spot for security.

                      While protections and awareness around WiFi connectivity has certainly matured over the last decade, several pieces of research over the last month serve as a reminder of how user behavior and vulnerabilities in new mobile technologies ensures that the industry will never quite lick the inherent insecurity of public WiFi hotspots..."

                      Winds of change blowing in the WAN
                      Network World, April 23, 2015
                      "While enterprise computing has experienced major upheavals from cloud apps, Wi-Fi, mobility, and BYOD, the enterprise WAN has not evolved. Things are about to change.

                      In the past few years, enterprise computing has experienced major upheavals brought about by cloud apps, Wi-Fi, mobility, and BYOD. The enterprise WAN, meanwhile, has not evolved much since it was transformed into an MPLS Layer 3 VPN infrastructure more than a decade ago. Things are about change.

                      Based on my experience with customer deployments, more than 50% of enterprise traffic from branches is currently Internet-bound. This is due to outsourcing of utility applications, including email, search, voice, video and collaboration, not to mention cloud application use..."

                      IT - Linux
                      x
                      Debian 8: Linux's most reliable distro makes its biggest change since 1993
                      ars technica, May 1, 2015
                      "Debian 8- nicknamed "Jessie" after the cowgirl character in Toy Story 2 and 3- debuted last week, but it feels overdue. The release was in development within the Testing channel for quite a while, and, if you recall, Debian Linux consists of three major development branches: Stable, Testing, and Unstable. In order for a new iteration of Debian to officially go public, work must progress through each stage (starting in Unstable, ending in Stable). But it wasn't until the official feature freeze for this release in November 2014 that the contents of Testing really became what you'll actually find in Debian 8 today.

                      If all that sounds complicated and slow, that's because it is. In fact, that's kind of the point..."

                      IT - Operations
                      x
                      4 Signs Your IT Company Is in Over Their Head
                      Business 2 Community, April 26, 2015
                      "It's hard to admit when you're in over your head, right? We've all been there. As a small business, if you've put stock into another small business to manage your technology, you rely on them to make the best recommendations for your business. It's what allows you to rest easy and actually do the work that you love.

                      But what happens when that starts falling apart? There are a few warning signs that your IT company or 1-man shop is starting to fail you. Check out these reasons that your IT company' ego is interfering with your business:..."

                        Is Geothermal Cooling a Viable Data Center Option?
                        Search Data Center, April 30, 2015
                        "We are looking at a building surrounded by several acres of land for a new data center. Should we consider geothermal horizontal loops for cooling?...

                        Geothermal cooling is energy-efficient and environmentally responsible, but space is its biggest caveat. Horizontal loops occupy a huge area, especially when you're dissipating a data center's large cooling loads..."

                          IT - Security
                          x
                          3 Ways Security Risk Assessment goes Wrong
                          InfoWorld, April 28, 2015
                          "Computer security defenders are notoriously unsuccessful at defending, for a variety of reasons -- not the least of which is that they have all the accountability and very little authority.

                          It doesn't help that users seem to go out of their way to ignore the good advice they've been given or even actively work to circumvent controls. But it's too easy to blame the behavior of others for the mess known as the current state of computer security..."

                          6 Hard Truths Security Pros Must Learn to Live With
                          InfoWorld, April 27, 2015
                          "Caveat emptor: Security solutions will always fall short in addressing the fundamental flaws of securing IT systems

                          Nearly every company in the world has thousands of vulnerabilities that hackers can easily exploit. For anyone working in IT, this is not a bombshell announcement. It's business as usual.

                          The reality is that IT invulnerability is impossible at any price point. Instead, companies spend a major portion of their IT budgets on computer security defenses to prevent hackers from taking advantage of those same everyday vulnerabilities. The theory is simple: With enough layers of security, the bad guys will look elsewhere for easier targets..."

                          Can Internal Threats Be Distinguished from Outside Malware Coders?
                          Search Security, April 24, 2015
                          "Differentiating between insider and non-insider malware threats can be challenging. Expert Nick Lewis offers pointers for distinguishing malware coders from internal threats...

                          Is there any way to tell the difference between insider versus non-insider malware? Are there software products that can detect malware written by someone inside my organization?..."

                            CEOs, Boards Seek IT Security Status Updates
                            Information Management, April 27, 2015
                            "Nearly 70% of CEOs or boards of directors have asked their security teams about specific security policies and methods in the wake of recent high-profile breaches, according to a survey of 100 IT security professionals attending the recent RSA Conference, by cloud security company Netskope.

                            Of those respondents, 28% of boards and CEOs have asked specifically about security of cloud or software-as-a-service (SaaS) technologies, and 27% have asked about mobile device security and network security, showing that executives are not focused solely on one area of security, the company says..."

                            Cybersecurity: Don't Bank On it with 3rd Parties
                            Dark Reading, April 24, 2015
                            "Not knowing that a contractor's employee had access to system passwords is not a valid excuse when your client's records are stolen. The issue of cybersecurity vulnerabilities and third-party vendors comes to light, once again, in a new report from the New York State Department of Financial Services (NYDFS).

                            According to the NYDFS report, nearly a third of 40 banks surveyed don't require their third-party vendors to notify them in the event of an information security breach or other cyber security breach. Other findings include the following:..."

                            Data Security Breaches: Ugly Truths Exposed
                            Business 2 Community, April 23, 2015
                            "According to the Identity Theft Resource Center, data security breaches reached a record high in the U.S. last year, spanning some 675 million records. Over 30 percent of these breaches affected the business sector, including high-profile merchants like Neiman Marcus, Goodwill Industries, P.F. Chang's and Dairy Queen.

                            While some merchants are becoming more proactive about things like payment card industry compliance and security standards (PCI), are the standards enough? Why should they comply? More importantly, why is it so easy for hackers to find vulnerabilities and gain access to account information in the first place?..."

                            Don't Let Your Improper Handling of Digital Evidence Sink a Cybercrime Investigation
                            TechRepublic, April 24, 2015
                            "In Minnesota, when the snow and cold finally abate, neighbors tend to congregate in one or the other's driveway and catch up on things. One of my neighbors is a police digital-forensic investigator in the white-collar crimes division. I always have lots of questions for him, but most of the time, all I get is, "Can't talk about it."

                            That was not the case this past weekend. I noticed that same neighbor walking back from the nearby playground with his daughter. I waved and asked how business was. He said, "Too good."

                            It seems bad guys are getting smart and using pwned business computers instead of their own for data storage and communications -- keeping my neighbor very busy..."

                              High-Profile Data Breaches made Most CEOs Re-Examine Security Programs
                              HelpNet Security, April 24, 2015
                              "There has been increased board- and C-level interest in information security programs in light of recent high-profile data breaches such as those affecting Sony, Anthem and JP Morgan, the results of a Netskope survey have revealed.

                              As the severity and consequences of data breaches intensify, Netskope surveyed a hundred information security professionals attending RSA Conference 2015 and found the majority of respondents' board of directors and CEOs have taken active interest in understanding and improving their company's security programs..."

                              Practical Advice from an Information Security Incident Response Consultant
                              Network World, April 27, 2015
                              "When JAS Global Advisors gets called in to respond to an information security incident, what are some of the first steps your team takes?

                              Very often the first thing we do is work with the company's lawyers and senior executives to figure out their overall posture or desire with regard to the incident. What I mean by that is determining how to treat the incident. Some organizations just want to fix the problem and make it go away quickly and quietly. Many companies don't have that option because they have a regulatory requirement to report the breach to some government agency and/or to notify individuals who may be impacted by the data breach..."

                              To Evangelize Security, Get Out Of Your Comfort Zone
                              Dark Reading, April 28, 2015
                              "If security professionals want to change corporate attitudes and culture, they need to step out of the echo chamber

                              I'm not a security professional -- I can't configure a firewall or hack my way out of a paper bag -- but I've been lucky enough to live and work in the info security community for almost a decade now. For me, last week's RSA Conference in San Francisco was old home week; nearly everywhere I walked, I saw someone I knew. And I was able to participate in nearly every conversation, because the topics were well-known and familiar..."

                              Users should not take the rap for phishing attacks, says expert
                              ComputerWeekly, April 24, 2015
                              "Users should not be blamed for successful phishing attacks, says security awareness expert.

                              Ira Winkler, president of Secure Mentem, told attendees of the RSA Conference 2015 in San Francisco that humans represent only two of ten potential kill points for phishing attacks. A phishing attack can only be successful if eight possible layers of technological controls are missing or have failed. .."

                              IT - Careers
                              x
                              IT Certifications Guaranteed to Boost Your Career
                              NetworkComputing, April 21, 2015
                              "With rapidly changing technology, IT certifications have become more important than ever. Certifications can help act as a distinguishing factor for IT professionals to demonstrate their expertise, and provide opportunities for getting better jobs and better salaries. Deciding on the right certification is a strategic step for any IT pro, providing essential momentum towards growth and success.

                              In recent years, there has been an increase in demand for specialized skills for performing very specific tasks, from coding and project management to infrastructure management and deployment..."

                              IT - Social Media
                              x
                              5 Business Lessons We Can All Learn From Jurassic Park
                              Business 2 Community, April 30, 2015
                              "Everyone has seen Jurassic Park. Well, if you haven't seen it, we'd imagine that the majority of you reading this would have heard of it. If you haven't seen it; watch it. It comes recommended. Especially seeing as the latest instalment is due out in June this year. Also, this post does contain a number of spoilers so if you plan on watching the film, do it now then read this post. Go on, what're you waiting for?..."
                                How the Top Social Networks Compare On Privacy -- In One Handy Chart
                                IT World, April 27, 2015
                                "Nearly three-quarters of people with access to the Internet use social networking sites, a number that has skyrocketed since early 2005, according to the Pew Research Center. As social networks continue to permeate our everyday lives, so do the privacy and security risks associated with our accounts.

                                Here's a look at how Facebook, Twitter, LinkedIn and Google+ stack up on user privacy and security settings, plus instructions for finding and updating these options to maintain control over your account..."

                                IT - Virtualization
                                x
                                5 must-watch Docker videos
                                Opensource.com, May 1, 2015
                                "When you're interested in learning a new technology, sometimes the best way is to watch it in action - or at the very least, to have someone explain it one-on-one. Unfortunately, we don't all have a personal technology coach for every new thing out there, so we turn to the next best thing: a great video.

                                With that in mind, if you're interested in Docker (and these days, who isn't?), here are five great videos to get you started with the basics you should know..."

                                6 Tips for Implementing Data Virtualization
                                Government Technology, April 23, 2015
                                "A 2012 study of federal, state and local government IT decision-makers predicted virtualization could save government $30 billion by 2015. Whether those types of savings are realized by the end of this year remains to be seen, but more government agencies are moving to virtualization, primarily in an effort to save money and increase efficiency..."
                                  IT - Compliance
                                  x
                                  3 experts teach you how to properly scope your PCI assessment
                                  CSO Online, April 22, 2015
                                  "When it comes to PCI, getting your scope right is more important than just getting a cheaper, faster assessment. Learn how to do it right with insights from 3 experts.

                                  PCI is both a globally recognized standard and a lightening rod for discussion.

                                  In recent weeks, I've engaged in conversations exploring the scope of PCI assessments. On twitter, the discussion focused on the need to include everything in scope, as a means to force companies to improve security. Contrast that with a recent column explaining the benefit to speed, price, and quality of properly scoping your PCI assessment (read it here)..."

                                  IT - Email
                                  x
                                  Copyright Act Could Make It Illegal to Repair Your Own Car
                                  InfoWorld, April 24, 2015
                                  "Software is becoming integrated into everything we buy, but DCMA throws basic principles of ownership into question...

                                  hink you own that shiny new car you paid a bundle for? Not so fast.

                                  The software that runs on your car's computer still belongs to the manufacturer. And under the Digital Millennium Copyright Act (DMCA), attempting to repair or modify your car in any way -- say, to make it faster or more fuel efficient -- or even taking it to your neighborhood mechanic instead of a manufacturer-approved dealership, could land you in trouble..."

                                    Storage
                                    x
                                    ZFS Storage Appliance Benchmark
                                    Datasheets, benchmarks, reports

                                    Javier Puerta lists three ZFS resources:

                                    • Oracle ZFS Storage Appliance: Extreme Enterprise Efficiency and Performance at an Incredibly Low Price
                                    • Realizing the Superior Value of Oracle ZFS Storage Appliance with particular focus on performance
                                    • ESG Lab Brief: Oracle ZFS Storage ZS4-4

                                    Read on for links.

                                    It is the Dawning of the Age of the L2ARC
                                    Oracle has fundamentaly changed the L2ARC
                                    Roch Bourbonnais writes, "One of the most exciting things that have gone into ZFS in recent history has been the overhaul of the L2ARC code. We fundamentaly changed the L2ARC such that it would do the following:

                                    • reduce its own memory footprint,
                                    • be able to survive reboots,
                                    • be managed using a better eviction policy,
                                    • be compressed on SSD,
                                    • and finally allow feeding at much greater rates then ever achieved before.

                                    Let's review these elements, one by one..."

                                    IT - Big Data
                                    x
                                    5 Steps to True (Data) Love: From Big Data to Smart Data
                                    Business 2 Community, April 28, 2015
                                    "Big Data has become one of the key buzzwords for businesses everywhere over the last few years. With data of all kinds being produced in record amounts every year, collating and analyzing this information will give businesses more insights than ever before into their customers, their industries as a whole and perhaps even let them predict what might happen in the future..."
                                    Big Data & the Security Skills Shortage
                                    Dark Reading, April 29, 2015
                                    "Finding a security analyst with the data discovery experience to combat modern threats is like searching for the mythical unicorn. The person does not exist

                                    Recent high-profile, high-impact data breaches across industries, including financial, healthcare, and retail, prove that today's cybercriminals are adept at finding and fully exploiting even the smallest security gaps. Detection of their malicious activity often comes much too late - and at great cost for companies and their customers..."

                                    Big Data Must Haves: Capacity, Compute, Collaboration
                                    GCN, April 23, 2015
                                    "While big data researchers are pushing the boundaries of science, the less glamorous side of big data research - the network, computing and cloud architecture required to support their work - must be at the forefront of their minds.

                                    At next week's Internet2 Global Summit researchers will come together with network engineers, CIOs and technology leaders to discuss ways they can collaborate to advance research capabilities in IT infrastructure and applications..."

                                    The Data Scientist
                                    CloudTweaks, April 29, 2015
                                    "According to the Harvard Business Review, Data Scientist is the sexiest job of the 21st Century. Dry sounding as they are, competent data scientists are much sought-after, particularly as ingenuity, curiosity and creativity are attributes any successful data manager will need. In order to make the most of big data, companies first need to understand what they require from a data scientist, and then begins the difficult task of scouting the talent..."
                                    Top10
                                    x
                                    Top Ten Articles for last few Issues
                                    Vol 206 Issues 1, 2, 3 and 4; Vol 205 Issue 1, 2, 3 and 4
                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                    • Oracle Solaris Development Initiative
                                    • Energy Efficiency in the Data Center: Fujitsu M10 Servers Lower Power Consumption
                                    • Oracle's Hurd says 95% of its software will be cloud services this year
                                    • Better ways to handle crash dumps in Solaris
                                    • Deferred dump in Solaris
                                    • Digital Disruption: It's Not What You Think
                                    • Oracle Linux 7 - Optimizing Deployment Flexibility and Increasing ROI
                                    • LibreOffice 4.3.7
                                    • Capita IT delivers Private Cloud Services
                                    • eMerge Americas - May 3rd-5th

                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                      IT - Encryption
                                      x
                                      Key management is the biggest pain of encryption
                                      CSO Online, April 24, 2015
                                      "Most IT professionals rate the pain of managing encryption keys as severe, according to a new global survey by the Ponemon Institute.

                                      On a scale of 1 to 10, respondents said that the risk and cost associated with managing keys or certificates was 7 or above, and cited unclear ownership of keys as the main reason.

                                      "There's a growing awareness of the security benefits of encryption really accrue from the keys," said Richard Moulds, vice president of product strategy at Thales e-Security, the sponsor of this report. "The algorithms that encrypt the data are all the same -- what makes it secure is the keys."

                                      Lawmakers Criticize FBI's Request for Encryption Back Doors
                                      ComputerWorld, April 29, 2015
                                      "U.S. lawmakers are skeptical of an FBI request for Congress to mandate encryption workarounds in smartphones, with critics saying Wednesday that back doors would create new vulnerabilities that bad guys can exploit.

                                      t's currently impossible for smartphone makers to build in back doors that allow law enforcement agencies access to encrypted communications but also keep out cybercriminals, witnesses and lawmakers said during a hearing before the IT subcommittee of the House Oversight and Government Reform Committee..."

                                      IT - Server
                                      x
                                      Containers Vs. Virtual Machines: How To Tell Which Is the Right Choice for Your Enterprise
                                      IT World, April 28, 2015
                                      "Name a tech company, any tech company, and they're investing in containers. Google, of course. IBM, yes. Microsoft, check. But, just because containers are extremely popular, doesn't mean virtual machines are out of date. They're not.

                                      Yes, containers can enable your company to pack a lot more applications into a single physical server than a virtual machine (VM) can. Container technologies, such as Docker, beat VMs at this part of the cloud or data-center game..."

                                      Sysadmin
                                      x
                                      Oracle Innovates Secure Multi-Tenancy with Oracle SuperCluster
                                      Market leading performance, high availability, and extreme scalability
                                      Oracle SuperCluster delivers a complete set of integrated security controls, implemented as a comprehensive platform, to enable secure multi-tenancy for service providers. Unique in the industry, the Oracle SuperCluster multi-tenant architecture enables market leading performance, high availability, and extreme scalability while also satisfying key customer security requirements such as secure isolation, strong authentication and access control, end-to-end data protection, and comprehensive monitoring and compliance auditing. The security protections designed into the Oracle SuperCluster multi-tenant architecture span every layer of the IT stack from the compute hardware, virtualization, and operating system to networking, storage, database and applications.
                                      NetBeans
                                      x
                                      Lessons Learned from UML NetBeans Plugin Development
                                      easyUML - a UML plugin for NetBeans
                                      Zoran Sevarac writes, "The Open Source Software Development Center at University of Belgrade has released a new version of a UML plugin for NetBeans called easyUML. This plugin was created to facilitate the use of UML tools for teaching software design, but it is also a handy tool for developers. It helps developers with commonly used features by adding an easy-to-use UI.

                                      EasyUML supports class diagrams and the following features:

                                      • Drawing class diagrams
                                      • Generation of Java code from class diagrams
                                      • Reverse engineering from Java code to class diagrams

                                      The easyUML plugin is available for installation directly from NetBeans IDE Update Center, or as a download from NetBeans Plugin portal..."

                                      Nexenta News
                                      x
                                      Leading Insights on OpenStack, Today and Tomorrow
                                      Webinar - May 20, 2015 - *LIVE STREAM* 8 AM PDT -16:00 GMT
                                      Nexenta Software-Defined Storage solutions have been integrated into OpenStack since the Essex release and we continue to expand our support as OpenStack evolves, with the help of a leading portfolio of OpenStack ecosystem partners.

                                      Tune in to hear from thought leaders at the OpenStack Foundation, 451 Research, Solinea, Canonical, Mirantis, Wipro and Nexenta - all speaking live from the expo floor at OpenStack Summit Vancouver. OpenStack implementations are evolving and maturing, different partners are seeing the momentum in different ways, most importantly with new and growing customer deployments. Nexenta CEO & Chairman, Tarkan Maner, will moderate this panel of experts to deliver fresh insight on OpenStack today and in the future.

                                      Register

                                      Level3 News
                                      x
                                      Level 3 Reports First Quarter 2015 Results
                                      Level(3), April 30, 2015
                                      BROOMFIELD, Colo., April 29, 2015 -- Level 3 Communications, Inc. (NYSE: LVLT) reported results for the first quarter 2015.

                                      "Level 3 had a solid start to the year, progressing on integration and generating profitable growth," said Jeff Storey, president and CEO of Level 3. "Customers are seeing the benefits of the acquisition, including our differentiated products and solutions, expanded network footprint and customer-first approach."

                                      Total revenue was $2.053 billion for the first quarter 2015, compared to $2.003 billion on a pro forma basis, for the first quarter 2014, assuming the tw telecom acquisition took place on January 1, 2014.

                                      Secure Pipes: DDoS as an Illustrative Example
                                      Level(3), April 30, 2015
                                      "The Internet, as a communication medium, has been evolving. This evolution, unfortunately, has brought with it growth in Internet-based attacks, and corresponding growth in security technologies to fight these attacks. But, with this growth in security technologies, unintended complexity for security professionals has intensified. IBM has cited an example of one client with 85 different tools from 45 different vendors. The increasing complexity of network and information security is being addressed by security teams that are already overtaxed. As it relates to implementing cyber security, security professionals must feel, at times, less like they are managing and more like they are 'herding cats'..."
                                      Trending in
                                      Vol 233, Issue 3
                                      Trending IT Articles