News about Oracle's Solaris and Sun Hardware
System News
May 11th, 2015 — May 17th, 2015 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 207, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Collaborates with Mirantis to Bring Database as a Service
Powered by Oracle Multitenant to OpenStack-Based Private Clouds
Ahead of the OpenStack Summit in Vancouver, British Columbia, Oracle announced a collaboration with Mirantis to enable Oracle Solaris and Mirantis OpenStack users to accelerate application and database provisioning in private cloud environments via Murano, the application project in the OpenStack ecosystem. This effort brings Oracle Database 12c and Oracle Multitenant deployed on Oracle Solaris to Murano - the first Oracle cloud-ready products to be available in the catalog.

Oracle OpenStack for Oracle Solaris combines the advanced security, enterprise class reliability, and ease of administration of the Oracle Solaris operating system with the agility of OpenStack to create the premier, comprehensive cloud platform for running enterprise applications and Oracle Database.

Oracle Virtual Compute Appliance backup white paper
Oracle Whitepaper - 14 Pages
"Oracle's Virtual Compute Appliance (VCA) is an integrated hardware and software system designed to reduce infrastructure complexity and deployment time for virtualized workloads. It is a complete platform for a wide range of application types and workloads, with built-in compute, storage and networking. VCA automatically discovers components and configures them to work with one another, reducing design and administrative effort, eliminating potential errors, and speeding time to application deployment. It enables virtualization life cycle management using Oracle VM.

This document reviews Virtual Compute Appliance architecture, describes automated internal system backups of software components, and describes how to backup data to external storage, Oracle VM repositories and database, and virtual machine contents, and how to perform recovery of those components..."

Oracle for SAP Technology Update
Annual Publication
Parnian Taidi writes, "Oracle and SAP have had an ongoing commitment to tens of thousands of joint customers for over 27 years. Deploying SAP applications on Oracle platforms delivers end-to-end SAP infrastructure solutions that improve productivity and performance, increase system utilization, and create an eco-friendly data center. The two companies recently renewed their longstanding reseller and support agreements to provide enhanced access to Oracle Database technology and world class customer support.

The Oracle for SAP Technology Update is an annual publication that provides updates and information about Oracle products and services for SAP customers..."

Oracle OpenWorld + JavaOne 2015
Latest updates
Register Now and Save

You're sure to discover new ways to optimize your systems, new solutions that will help you take your business to the next level, and new practices that will make you more successful in your job and in your industry. Registration for Oracle OpenWorld and JavaOne is officially open! Don't forget that you can save $600 to $800 off the onsite price by registering before May 31!

"Reports of My Demise Are Greatly Exaggerated," said the CIO
By Jim Lein
Jim Lein writes, "As you know, that headline paraphrases an infamous Mark Twain misquote.

I've read countless accounts of how CIO's are being bypassed in IT business solution decision-making. It conjures up an image of a CIO bursting into the CFO's office and tattling on some line of business manager who allegedly has purchased and deployed a one off solution without IT's blessing.

My reaction to these reports has typically been that of skepticism..."

How We See Managing Millennials
By Mark V. Hurd
Mark V. Hurd writes, "I'm a big believer that he who hath the best people usually wins.

Nothing original there - except if that were the case, by definition, only one company would ever have the best people. The nuance here is that what you really want are the people best suited to work within the operating model you've put in place to execute your company's strategy.

That's a tough assignment in the easiest of circumstances. But these are far from the easiest of circumstances..."

    Hybrid clouds: Fujitsu servers use Oracle Solaris
    Oracle Solaris 11.2
    Mattias Drefs writes, "Fujitsu will in future be equipping its M10 series servers with Oracle Solaris 11.2. The Unix operating system is designed for business-critical tasks and brings with it complete enterprise distribution of the free cloud software OpenStack. The combination of server and Solaris 11.2 enables companies to build an IT infrastructure in which cloud and on-premises applications can run in parallel on the same system. Users can therefore move their IT activities to a hybrid cloud, and thereby retain their local applications..."
    Oracle Exalogic-based Big Data strategy
    Capgemini whitepaper
    In this whitepaper, Capgemini provides a high-level blueprint on how acquisition of streaming data can be achieved with an Oracle-based Big Data strategy. Compared to home grown solutions, Oracle technology - namely, the portfolio of Oracle engineered systems - offer much greater deployment and management ease as well as lower total cost of ownership. Capgemini provides a large portfolio of services and solutions in the field of Big Data with multiple vendors among which Oracle is one of the key technology partners...
    VENOM vulnerability affects various virtualization platforms
    Security Alert CVE-2015-3456 Released
    "Oracle just released Security Alert CVE-2015-3456 to address the recently publicly disclosed VENOM vulnerability, which affects various virtualization platforms. This vulnerability results from a buffer overflow in the QEMU's virtual Floppy Disk Controller (FDC).

    While the vulnerability is not remotely exploitable without authentication, its successful exploitation could provide the malicious attacker, who has privileges to access the FDC on a guest operating system, with the ability to completely take over the targeted host system. As a result, a successful exploitation of the vulnerability can allow a malicious attacker with the ability to escape the confine of the virtual environment for which he/she had privileges for. This vulnerability has received a CVSS Base Score of 6.2..."

    Oracle VM VirtualBox 4.3.28
    Maintenance release
    "Oracle has just released Oracle VM VirtualBox 4.3.28, a maintenance release of VirtualBox 4.3 which improves stability and fixes regressions.

    See the Changelog for a complete list of changes. Binaries can be downloaded here (at or here (Oracle Technology Network)..."

    + The Oracle VirtualBox Team

    Secrets of Storage Repositories with Oracle VM
    Insider information for those using Oracle VM
    Antoinette O'Sullivan writes, "Here is some insider information for those using Oracle VM.

    You use repositories in Oracle VM to store virtual resources such as ISO files, virtual disks and assemblies. Indeed you must have at least one repository to store the configuration files of your virtual machines.

    Creating and populating your Oracle VM repositories is straightforward. Relocating repositories is a bit more involved.

    You might want to answer the following questions:..."

    IT - Storage
    Scaled Storage Boosts Climate Modeling Efforts
    Enterprise Tech, May 11, 2015
    "Climate research projects based on big data analysis increasingly rely on big storage to track historical patterns and extrapolate future trends in a research area with countless variables. The open source nature of climate data has made access to huge volumes of archival a key challenge for storage technology.

    Hence, IBM and other storage vendors are frequently working with research institutes and commercial weather forecasters to get a handle on vast quantities of climate data. In the latest instance, IBM said it is working with the German Climate Computing Center to manage the world's largest climate simulation data archive..."

    SSDs Can Lose Data In Seven Days
    TechEye, May 11, 2015
    "Solid State Drives (SSD) can start to lose their data and become corrupted if they are left without power for as little as a week, according to a new Joint Electron Device Engineering Council (JEDEC) report.

    Seagate's Alvin Cox, who is also chairman of the Joint Electron Device Engineering Council (JEDEC), wrote that the time that data will be retained on an SSD is halved for every 5 degrees Celsius (9 degrees Fahrenheit) rise in temperature in the area where the SSD is stored..."

    IT - Technology
    GE 3D Prints A Working RC Jet Engine
    ComputerWorld, May 12, 2015
    "General Electric this week revealed that it has completed a multi-year project to print a working jet engine.

    The engine, small enough to fit in a backpack, was built by a team of technicians, machinists and engineers at GE Aviation's Additive Development Center outside Cincinnati. The lab is working with additive manufacturing as a way to produce next-generation jet parts using a technique known as (DMLM)..."

      Self-Driving Trucks Are Going To Hit Us Like A Human-Driven Truck, May 14, 2015
      "Late last year, I took a road trip with my partner from our home in New Orleans, Louisiana to Orlando, Florida and as we drove by town after town, we got to talking about the potential effects self-driving vehicle technology would have not only on truckers themselves, but on all the local economies dependent on trucker salaries. Once one starts wondering about this kind of one-two punch to America's gut, one sees the prospects aren't pretty..."
        Brain-Like Circuit Could Drive Artificial Intelligence
        ComputerWorld, May 13, 2015
        "Scientists are working on a circuit that mimics the human brain in an effort to dramatically boost artificial intelligence and machine learning.

        Researchers at the University of California at Santa Barbara said this week they have created a circuit running about 100 artificial synapses that was able to perform a simple image classification..."

          UX is UI
, May 15, 2015
          "A meme can travel halfway around the world while nuance is putting on its shoes.

          Ideas bounce around the Twitters, endorsed and adopted wholeheartedly through fear, surprise, or a fanatical dedication to the church of UX. Mobile-first, responsive over m-dot, prototypes over wireframes. These truths we hold to be self-evident. Complex and contextual ideas, reduced to tweetable dogma..."

            RAM For The Rich And Nerdy: 128Gb DDR4 Memory Kits
            PC World, May 15, 2015
            "Sure, you'll have to sell both your kidneys to buy it, but at least now you can finally have 128GB of cutting-edge RAM in your PC.

            This week, Corsair announced it is now selling two 128GB DDR4 RAM kits while Kingston touted that its upcoming big-ass set will hit speeds of 3000MHz..."

            IT - Bitcoin
            Peter Diamandis: Blockchain Technology Will Enable Extraordinary Transformation
            Bitcoin Magazine, May 14, 2015
            "Renowned futurist Peter Diamandis, the author of 'Abundance - the Future is Better Than You Think' and 'Bold - How to Go Big, Create Wealth and Impact the World,' has written a thoughtful post on Singularity HUB with 8 predictions for the next ten years. He is persuaded that we'll see extraordinary transformation in the next decade and that blockchain technology will be one of the enablers..."
              Russian Court Overturns Ban On Access To Bitcoin Websites
              Bitcoin Magazine, May 16, 2015
              "Interest in bitcoin and blockchain technology by business and governments around the world increased in the past months. However, many governments have yet to take an official stance on digital currencies while some have placed restrictions or regulations on the use of Bitcoin. Russia was one of these countries, as it blocked access to websites with information about Bitcoin..."
              Blockchain Tech Could Improve Banking, Says Eba Report
              CoindDesk, May 13, 2015
              "Blockchain technology has the potential to reduce costs, improve product offerings and increase speed for banks, according to the most recent report from the Euro Banking Association (EBA).

              Founded in 1985 and supported by the European Commission, the EBA is a practitioner's body for banks and other service providers that promotes a pan-European payment system and business practises..."

                Nasdaq Becomes Latest Firm To Trial Blockchain Technology
                CoindDesk, May 11, 2015
                "Nasdaq OMX Group Inc is reportedly exploring how a blockchain-based solution could change the way shares are transferred and sold manually.

                The company will trial the technology in Nasdaq Private Market, a capital marketplace launched in January 2014, which sets out to connect private companies and global investors, allowing the latter to purchase shares which may eventually go public before they do so.

                Nasdaq chief executive Robert Greifeld told The Wall Street Journal: 'Utilising the blockchain is a natural digital evolution for managing physical securities'..."

                  Could Cryptocurrencies Bring The World A Universal Basic Income?
                  Crypto Coin News, May 16, 2015
                  "Could cryptocurrency bring a basic income to the people of the world, relieving them of their day-to-day quest for survival, and leaving them to ponder more philosophical questions about their existence and reaching new heights of productivity? Some in the cryptocurrency space believe so..."
                    Denmark Central Bank To Stop Printing Money: Shops Can Refuse To Accept Notes And Coins
                    Crypto Coin News, May 12, 2015
                    "The Denmark Central Bank, National Banken, will be discontinuing the printing of new fiat in 2016. They will be outsourcing the printing of money to a private business or businesses, this part remains unclear.

                    Their reasoning for this is because more and more people are using digital payment systems. Such as cards, online payments, third party platforms, and to a minor extent (yes, we are still relatively very small), cryptocurrency. Shop owners can even refuse to accept notes and coins from 2016..."

                    Germany To Ban Paper Money And Dry Out The Drugs Market
                    Crypto Coin News, May 17, 2015
                    "Germany might be the next country to take definitive steps towards the removal of hard currency. The economist Peter Bofinger has been campaigning for the abolition of cash in Germany.

                    His primary merits for the removal of hard currency apparently targets the markets for undeclared work, those earning a little cash in hand and wanting to avoid declaring this and being taxed..."

                      Passcard: Using Blockchain Technology To Store Identities
                      NEWSBTC, May 14, 2015
                      "Onename, a blockchain technology startup, unveiled its new product called the Passcard. This makes use of a blockchain-tied profile to create a secure identity, which can possibly replace passwords, keys, or even ID information.

                      The company makes use of blockchain technology, which is often associated to verifying bitcoin transactions and being stored in a public ledger, to create a digital identity with access control..."

                      IT - FOSS
                      Cloud Security Alliance, Waverley Labs Collaborate On Open-Source Software-Defined Perimeter Spec
                      Dark Reading, May 13, 2015
                      "The Cloud Security Alliance (CSA), a group that promotes security best practices for cloud computing, is making progress on its plans to develop a software-defined perimeter (SDP) framework for protecting Internet-connected systems against a range of security threats.

                      The non-profit group has teamed up with Waverley Labs to work on an open-source SDP framework that it says will give organizations a very different approach to protecting on-premise and cloud-based applications than traditional perimeter tools offer..."

                      Six Ways Open Source Benefits Your Business
                      IT Business Edge, May 13, 2015
                      "Open source software projects ensure transparency, enabling community collaboration to improve overall quality. However, the guarantees that come with vendor-backed software projects help ease IT concerns and greatly benefit end users. To maximize business potential, companies are now turning to commercial open source options.

                      In commercial open source, backing from a vendor ensures the availability of product support and lets users know that the product is suited for commercial use, even for non-technical end users..."

                      Open Source A Clear Choice For CMS Development
            , May 14, 2015
                      "My digital agency opened its doors in January of 1996. Back then, there were no proprietary Content Management Systems. Microsoft was still dismissing the notion of the web as a viable platform for business or e-commerce activity. If a website needed functionality, unless we could find something at Matt's Script Archive to accomplish the task, we built most of it from the ground up in Perl..."
                      Free Software And Free Culture: Open Source's Influence On Society
                      The VAR Guy, May 14, 2015
                      "In an age when Microsoft (MSFT) is floating the idea of open-sourcing even Windows, it's clear that open source has pretty much conquered the world of software - or the parts of it that matter, at least. But, in a lot of ways, the weight of open source is now extending into many other realms, defining how people interact and collaborate well beyond the context of computers. That's a fascinating issue, and it gives the key to understanding what could be the ultimate legacy of the free and open source software movements..."
                      How Open Source Apache's 'Survival Of The Fittest' Ethos Breeds Better Software
                      ZDNet, May 12, 2015
                      "From HTTP Server, to Hadoop and Cassandra, there's no doubting the effectiveness of the Apache Software Foundation in fostering open-source innovation.

                      Yet the other side of its collaborative, consensual approach is the freedom it gives people to duplicate software engineering efforts, which in other contexts might be seen as wasteful..."

                        Cloud Computing
                        Harvard Business Review: Cloud Computing Comes of Age
                        Cloud computing is evolving. Are you?
                        Learn how businesses today are:
                        • Driving speed and agility - with 40% and 64% achieving gains, respectively - by turning to the cloud
                        • Collaborating with IT to deploy and integrate cloud solutions, delivering long-term value
                        • Deploying more and more cloud services across core functions
                        • Tackling cloud concerns surrounding security, compliance, reliability and cost

                        Oracle has sponsored a global study conducted by Harvard Business Review titled: "Cloud Computing Comes of Age." The report shows how organizations are under pressure to identify new business opportunities and innovate faster as cloud computing evolves...

                        Oracle Public Cloud Webinar Series
                        Webinars highlighting the Oracle Public Cloud
                        Wondering how you are going to transform your IT environment with a database cloud to maximize the benefits of the shared database infrastructure as well as simplified and centralized database management?

                        Oracle University has an upcoming series of webinars highlighting the most important use cases for running databases and applications in the Oracle Public Cloud. Mark you calendar to join live or watch them later on-demand...

                        The 4 Smartest Things I Heard At Oracle's CloudWorld San Jose
                        By Jeff Erickson
                        Jeff Erickson writes, "When you're an enterprise technology company substantially living off of licensed software running onsite at your customers' data centers, how do you dare call yourself a 'cloud company'?

                        That thought might have been going through some minds as Silicon Valley types recently filed into a downtown hotel in San Jose, California, to hear Oracle executives share the latest about the company's enterprise cloud offerings..."

                        A Brief Chat with the Linux Foundation
                        By Rick Ramsey (Podcast)
                        Rick Ramsey writes,"I recently got to chat with Jim Zemlin, Executive Director of the Linux Foundation. In case you were just rescued from a buried time capsule as part of a fraternity pledge, you probably already know that the Linux Foundation is a non-profit trade association that fosters the growth of Linux. It supports the Linux kernel development community, provides services to help companies adopt Linux, and hosts collaborative projects to solve problems in an increasing range of fields. It is supported by leading Linux and open source companies, including IBM, Intel, and Oracle..."
                        IT - Cloud
                        The Ins And Outs Of Cloud Bursting
                        CIO, May 12, 2015
                        "Cloud bursting - the dynamic deployment of applications that normally run on a private cloud to a public cloud - gives companies a new option for expanding their capacity to meet peak demands when the resources of their private clouds are not adequate. It's an important technology because the use of private clouds is expected to increase in the 40 to 50 percent range over the next five years,1 and cloud bursting can make these private clouds much more cost efficient. The reason is simple..."
                          20 of the Greatest Myths of Cloud Security
                          CIO, May 14, 2015
                          "Back in 2011, while reporting at the annual information security RSA Conference held in San Francisco, I asked attendees, 'What's the most over-hyped issue in security?'

                          Universally everyone responded, 'The cloud.'

                          The cloud might have been hype four years ago, though today it's a necessary business driver. Unfortunately, confusion on its effective use has given rise to a series of industry myths, often imbuing fear in many CIOs.

                          What are the cloud security myths that keep circulating and what are their realities? Here's what industry experts had to say:..."

                          Cloud's ROI Is More Than A Numbers Game
                          CIO Insight, May 12, 2015
                          "For companies that are not born in the cloud, moving to a cloud-centric delivery model involves choreographing a complex migration of many parts, each with its own associated risks and rewards. Calculating the return on investment (ROI) for making these moves involves measuring the cost, the benefits and how those will change over time for both a traditional on-premises solution and one or more potential cloud solutions. While figuring cloud ROI is not easy, it is a critical calculation that will inform decisions about how IT delivers value to the business and how the business invests in IT..."
                            Cloud, Big Data Take Center Stage At Enterprise HPC
                            Enterprise Tech, May 15, 2015
                            "Their work environments spanned industries from aerospace and defense to pharmaceuticals, retail, and government, but Enterprise HPC attendees have many challenges, opportunities, and concerns in common.

                            Often working far removed from IT oversight or expertise, HPC implementations typically fall under the jurisdiction of business users, be they engineers, scientists, or researchers, according to many executives. Some organizations do include HPC under IT's jurisdiction..."

                            High Availability For Mere Mortals
                  , May 15, 2015
                            "When architecting a system, how often do you start with availability requirements or service level agreement (SLA)? Most of us don't. And most of us shouldn't, because trying to build high availability into a system early on may slow things down and lead to over engineering. Yet, we should consider eventual desired level of availability and ensure that we can grow our system into it when the time comes..."
                              IT - CxO
                              CIO As Maestro: How Automation Is Turning The CIO Into A Business Visionary
                              Information Age, May 13, 2015
                              "Trends such as the Internet of Things (IoT) are set to exponentially increase the volume of data that businesses have to manage. Certainly IT infrastructure will need to be updated to enable and secure the myriad of new devices wishing to connect.

                              However, for CIOs, improving IT infrastructure alone is no longer enough. Instead, they need to step up and work with their IT departments to employ effective strategies to analyse and extract value from the data available. This will ensure their business is in the best possible position to both compete and succeed in their relevant markets..."

                              When To Keep, Upgrade Or Replace Enterprise Software
                              CIO, May 12, 2015
                              "Suppose needs have changed and existing software is no longer a good fit. Maybe the current software version is getting too old. Perhaps it's time to consider the cloud. How do you decide if enterprise software should be kept, upgraded or replaced? Ultimately, it boils down to how well the current software meets organizational requirements, compared to how well the upgraded or replacement software would meet those same requirements..."
                                Ten Traits Effective CIOs Have In Common
                                CIO Insight, May 12, 2015
                                "There's an awful lot of talk these days about the changing role of the CIO - and that's a good thing. As the authoritative voice of the IT department, CIOs no longer are dismissively perceived as merely keepers of the infrastructure. Nor are they confined to an operational 'keep the buses running on schedule' role anymore. For certain, they're actively involved with whether their organization's 'IT stuff' is working - but they're immensely focused on how digital assets and initiatives are working to contribute directly to business outcomes..."
                                The Measures Of A Manager
                                ComputerWorld, May 11, 2015
                                "In my years as an IT management consultant, I've had the opportunity to ask one simple question of a wide variety of managers - seasoned and new, at large organizations and small; in the private sector, government and educational settings; and in numerous countries around the world. And the answers have been remarkably consistent, with rare exceptions..."
                                Overcoming It Gravity
                                Forrester, May 12, 2015
                                "Why do CIOs not become CEOs? What prevents them from achieving at the highest organizational levels? It's because they don't have their hands on revenue, unlike CMOs, CFOs, brand marketers, and strategists.

                                But now we are entering an era where CIOs must manage two agendas: 1) the internal systems (IT), and 2) the systems, processes, and technologies to win, serve, and retain customers, what we call business technology (BT)..."

                                  How To Respond To A Data Breach
                                  Information Age, May 15, 2015
                                  "Hindsight can be a wonderful thing, but when it comes to data security and potential breaches, it's best to ensure that your security policies and tools are able to protect your organisation.

                                  Yet, despite the regular headlines caused by high-profile data breaches, many organisations still do not know how best to react once breached or, indeed, follow best practice to prevent a breach from happening in the first instance..."

                                  Pros And Cons Of Converging The Roles of CIO And CTO
                                  The Enterprisers Project, May 15, 2015
                                  "Can one executive handle the roles of both CIO and CTO? Yes, says Justin Lundy, who is co-founder, CTO and CIO of cloud security company But it can be a challenge. In an interview with The Enterprisers Project, he explains how he makes it work..."
                                  3 Offensive Moves To Help CIOs Defend Digital Security
                                  The Enterprisers Project, May 12, 2015
                                  "Managing one's state of digital security (or more accurately, insecurity) today is really built on three pillars...

                                  There is no doubt that hackers are attacking my network of 30 colleges every day. We catch some of those attacks; others, we don't. The sheer volume of these exploits is driving a shift in the industry from detection to response. And that's where winners in online security are being separated from losers right now. The question is not how quickly can we sense an attack, it's how difficult can we make it for the attackers so that they move on to somebody else, and how rapidly we can respond when something does happen..."

                                  A Two-Word Strategy For CIOs' Digital Ambitions: Carpe Diem
                                  ZDNet, May 11, 2015
                                  "Amidst all the bluster and hype about digital enterprise, the role of chief information officer has been murky. Some analysts and pundits say the CIO's role with technology is being eclipsed by marketing executives, or by emerging positions such as chief digital officer. The speculation is that the CIO's stake will be pushed back to more of a back-end support role, keeping things up and running, while others pursue the more visible business side of things.

                                  The folks at Accenture, however, have another message for CIOs: carpe diem, or seize the day. And they mean, literally, the day -- from day one, get out on front of and start advancing the organization's digital strategy..."

                                  Wed May 20th - vBeers @ Boca - Biergarten Boca
                                  6pm - 9pm (Sponsored Food and Beer)
                                  Please join us for vBeers @ Boca. We meet on the 3rd Wednesday of each month in Boca Raton, FL. Please RSVP via

                                  The meeting will be at Biergarten Boca, which is located in on US 1, just South of Palmetto Park and East of I-95.

                                  This event will be sponsored by Volico Hosting. Get a couple of tickets and exchange them for beers!

                                  The South Florida Technology Alliance (SFTA) is managing sponsorships. Please contact Douglas Saenz for details.

                                  $5 burger/fries and $3 featured drafts during happy hour! (We may have an additional sponsor, so the food may be sponsored as well.)

                                  Join us for one of the four South Florida vBeers events!

                                  Wed May 27th - vBeers @ Miami - Mike's at Venetian
                                  6pm - 9pm (Sponsored Food and Beer)
                                  Join us for the next vBeers @ Miami. We meet on the 4th Wednesday of each month in Miami, Florida, USA. Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida. Please RSVP at the vBeers South Florida page.

                                  Register today so you can be a part of this great monthly event! Feel free to invite your friends and co workers who work in the IT industry! The South Florida Technology Alliance (SFTA) is managing sponsorships. Please contact Douglas Saenz for details.

                                  There is $3 valet parking the 555 Venetia building. You must get your valet ticket stamped at Mike's to get the special rate. Drop your car off with the valet, enter the 555 building and take the elevator to the 9th floor and follow the signs for Mike's!

                                  Mike's is a unique Miami experience. From the patio deck on the 9th floor, there is a great view of Miami and the port and the flatten remains of the old Miami Herald building.

                                  Join us for one of the four South Florida vBeers events. Details @

                                  Oracle and Intel Engineers Share their Stories
                                  Zeynep Koch writes, "Intel and Oracle have worked together for over 20 years to ensure that hardware and software are optimized to work together for maximum performance and reliability. In this podcast, listen as two engineering experts from Oracle Linux team and Intel discuss how they work closely together to solve problems and create opportunities for their customers with co-developed technologies.

                                  In this podcast, Guru Anbalagane, Director of Linux Kernel Development at Oracle, and Dave Hansen, Kernel Engineer at Intel's Open Source Technology Center, trade stories about how the two companies draw on deep co-engineering relationships to deliver mission-critical-ready engineered solutions..."

                                  IT - DR
                                  10 Tips To Ensure Your Company's Business Continuity
                                  Information Age, May 14, 2015
                                  "Information technology provides enormous value for organisations, but it can also represent a tremendous point of weakness. When markets are global, employees work around the clock and business is effectively always on, and any interruption to application availability can quickly lead to lost revenue, productivity and brand value, and regulatory problems.

                                  Taken to the extreme, extended downtime can even threaten the survival of a business. So how should organisations deal with this type of existential threat? As it stands, the painful reality is that most organisations do not deal with it well..."

                                    IT - PM
                                    Inside P3O - Why PMO Practitioners Take The Training
                                    Business 2 Community, May 16, 2015
                                    "Back in 2008 the PMO community saw a new guidance emerge which was focused on Portfolio, Program and Project Offices (P3O). The guidance was seen as a great step forward in giving PMOs more exposure within the program and project management world. The guidance, since 2008, has already been refreshed and updated. Over the last seven years PMO practitioners have also chosen to undertake the accompanying training and examinations..."
                                    IT - Networks
                                    Insecure Routers Hacked Yet Again
                                    ComputerWorld, May 13, 2015
                                    "The sorry state of consumer (a.k.a. SOHO) routers has reared its ugly head again. This time it came from a report issued by Incapsula called 'Lax Security Opens the Door for Mass-Scale Abuse of SOHO Routers'

                                    At the heart of the report is a familiar idea: routers configured with default passwords. Even worse, the malware-infected routers that Incapsula discovered were accessible from the Internet using both HTTP and SSH on their default ports. Bingo! You just can't make a bigger security mistake than to enable remote administration with default passwords..."

                                    Securing The IoT Device Landscape: A Complete Guide To Making Life Difficult For Hardware Hackers
                                    Information Age, May 14, 2015
                                    "The 'Internet of Things' is a buzzword which is becoming more and more prevalent in today's society. This is mostly due to the rise of crowd funding schemes and an insurgence of low power, highly capable microcontroller platforms such as Arduino. The Equity Kicker expects 33 billion devices connected by 2020 with a large portion of them falling under the IoT umbrella term and Forbes are predicting some pretty mind-bending revenue estimates over the next few years..."
                                    Give The Linux Quagga Router A Try For SDN
                                    Search Data Center, May 12, 2015
                                    "Quagga is an open source router that could set your data center up for software-defined networking.

                                    In most corporate data centers, hardware routers send packets from one network to another. Linux historically offers an alternative, and quagga is its routing stack that continues this technological roadmap..."

                                    IT - Linux
                                    2015 Is Shaping Up To Be The Year Of Ubuntu
                                    ITWorld, May 12, 2015
                                    "Ubuntu has been making big promises since 2011 when they chose Unity to be at the center of their universe. And while they failed to deliver on Ubuntu TV or Ubuntu for Android, they've got other tricks up their sleeves..."
                                      Is Linux Right For You?
                                      ITWorld, May 15, 2015
                                      "How do you know if you are a potential candidate to become a Linux user? It's this simple: What's the first app you fire up after booting into your system? If you said 'browser', then you are a potential Linux user..."
                                      Venom Vulnerability Could Violate Virtual Machines
                                      LinuxInsider, May 14, 2015
                                      "With Venom, a malicious user program with sufficient root privileges "could break through the isolation normally afforded by the hypervisor and reach into the memory space of its hosted peers, potentially corrupting the software stack running in the other VMs and gaining access to sensitive data and applications," said Bill Weinberg, senior director of open source strategy at Black Duck Software..."
                                      IT - Operations
                                      Moving From Infrastructure Automation To True Devops
                            , May 15, 2015
                                      "Deciding on two separate teams, or an integrated end-to-end team

                                      While a lot has been said about 'the right way' to do DevOps, what we're seeing in practice are two different approaches being tried to enable development and operations to work together as a team. On the one hand, there's the approach to create an end-to-end, integrated development team, which you might call 'Devops'. On the other, there's 'DevOps', featuring two development teams - one working on application code, with another developing a platform using Infrastructure as Code techniques in a virtualized environment..."

                                      Swim In The Devops Pool or Drown In Security Problems
                            , May 15, 2015
                                      "There has been a significant shift recently in security. Most security vendors and organizations recognize that the traditional model of keeping the bad guys out by detecting malicious exploits is flawed at best. The reality is that the bad guys are already inside the network using authorized credentials to bypass security controls and exfiltrate sensitive data. That sounds ominous but the silver lining is that DevOps changes the game and shifts the advantage back to the good guys..."
                                      Energy Exec: Cloud Services Not Like Datacenters
                                      Enterprise Tech, May 12, 2015
                                      "Simply eliminating the datacenter, embracing SaaS, and moving to cloud will not necessarily transform a company.

                                      That, at least, was the case for DrillingInfo, which morphed from an online permit and completion mapping-database company into a fast-growing global production data provider in the oil and gas industry. The firm, which today employs about 600 people, collects data from a wealth of often public sources to help oil and gas companies 'make good decisions,' said Mike Couvillion, chief technology officer, in a keynote presentation at Enterprise HPC 2015 in San Diego this week..."

                                      The Data Digest: Customer Service Has Gone Digital
                                      Forrester, May 15, 2015
                                      "In the past week, I have booked a flight using a travel voucher, questioned a charge on my credit card bill, and bought an electric toothbrush. What do these experiences have in common? In each case, I had a relatively complex question and I received a helpful answer - without talking to anyone in person or by phone. Instead, with a little online research, I was able to identify which blackout dates applied to my travel voucher, clear the charge on my credit card bill, and learn the best settings for my toothbrush..."
                                        Checklist of IT KPIs for responsive data center ops
                                        Search Data Center, May 15, 2015
                                        "The traditional focus on hardware and software monitoring is shifting to a business focus using key performance indicators (KPIs). IT KPIs gauge abstract targets, such as user experience or job ticket turnaround effectiveness.

                                        The difference between IT KPIs and common IT monitoring is the involvement of business leadership. Any organization can deploy tools to track the computing resources assigned to VMs or watch the bandwidth utilization on servers..."

                                        IT - Security
                                        Confronting The Widening Infosec Skills Gap
                                        CSO Online, May 15, 2015
                                        "Estimates of the shortage of qualified information security professionals needed to fill available jobs in the next several years range into the multiple millions. A number of organizations are trying to change that. But they say it will likely be years before the gap is closed..."
                                        Significant Virtual Machine Vulnerability Has Been Hiding In Floppy Disk Code For 11 Years
                                        CSO Online, May 13, 2015
                                        "CrowdStrike researchers announced this morning that they have discovered a buffer overflow vulnerability in many of today's most popular virtual machine platforms that could potentially allow hackers access to the host.

                                        They named the vulnerability VENOM -- Virtualized Environment Neglected Operations Manipulation -- because it takes advantage of long-neglected code, the virtual floppy disk controller..."

                                          Data Breach Costs Could Hit $2T By 2019
                                          Enterprise Tech, May 14, 2015
                                          "Data breaches focused primarily on 'traditional computing devices' rather than emerging connected devices are expected to increase the cost of cyber crime to an estimated $2.1 trillion by 2019, according to a new study of enterprise threats and mitigation strategies.

                                          The report released this week by Juniper Research found that 'the majority of these 'data' breaches will come from existing IT and network infrastructure'..."

                                          Security Is A Prisoner of The Network
                                          ESG, May 15, 2015
                                          "I have a very distinct memory about a conversation I had with a colleague in the mid-to-late 1990s about how NetWare worked. I told him that file and print services resided 'in the network' but he couldn't get his arms around this concept. He continually pushed back by saying things like, 'well the printers and file servers have to be plugged into the network so isn't NetWare just running on these devices?' ... His assumption was somewhat accurate since NetWare did control physical file servers and printers..."
                                            3 Ways Cyber Security Must Evolve
                                            Information Age, May 15, 2015
                                            "Cybercrime is a constantly evolving beast. In the past quarter century, the methods, motivations, and impact of cybercriminals have changed and developed - from bothersome worms and viruses to devastating DDoS attacks and advanced persistent threats (APTs).

                                            The threat landscape as moved from an age of nuisance - created by lone, rogue coders motivated primarily by achieving notoriety - to a world in which organised gangs with political, socio-economic, or financial motivations precisely target weak points in specific organisations..."

                                              How Organisations Can Eliminate The DDOS Attack 'Blind Spot'
                                              Information Age, May 13, 2015
                                              "Online organisations need to take a closer look at the problem of business disruption resulting from the external DDoS attacks that every organisation is unavoidably exposed to when they connect to an unsecured or 'raw' Internet feed. Key components of any realistic DDoS defense strategy are proper visualisation and analytics into these security events..."
                                              Beyond The Page: Network Security At The Edge
                                              Search Security, May 12, 2015
                                              "Network security at many organizations has moved beyond 'four walls.' The traditional methods that used signature-based security technologies to lock down network perimeters to protect against threats from Internet connectivity and malicious traffic are no longer enough. The question for many enterprises now is what constitutes secure perimeter design in modern work environments? This Beyond the Page looks at enterprise strategies for network perimeter defense and next-generation tools such as network access control, single sign-on, encryption certificates and more. Is the concept of the network perimeter dead or is it being redefined?..."
                                              Getting The Cisos On Equal Footing With Other C-Level Positions
                                              Search Security, May 14, 2015
                                              "A survey conducted in July 2014 by ThreatTrackSecurity reported that 74% of the 203 U.S.-based C-level executives queried do not believe CISOs 'deserve a seat at the table and should not be part of an organization's leadership team.' This reinforces the notion that CISOs are primarily viewed as convenient scapegoats in the event of a data breach.

                                              Not all C-level positions are created equal. Depending on the CEO, the executive board makeup and manner of doing business, CxO positions exist to support the business, and to collaborate on and make decisions that best suit the enterprise to ensure viability, profitability and success..."

                                              How To Slow Down Adversaries With Offensive Countermeasures
                                              SearchSecurity, May 15, 2015
                                              "Ever wonder why it seems like the adversary always has the upper hand? It's because they do. Being on the offensive is always easier than being on the defensive. The offense only has to find one exposure to exploit, while the defense has to find them all.

                                              While we can't change this fact, we do not have to make it any easier for the adversaries. If you look at how most software is designed and built, it is almost as if we go out of our way to make it easier for them to break in..."

                                                Quantum Computing Is About To Overturn Cybersecurity's Balance Of Power
                                                Washington Post, May 11, 2015
                                                "'Spooky action at a distance' is how Albert Einstein described one of the key principles of quantum mechanics: entanglement. Entanglement occurs when two particles become related such that they can coordinate their properties instantly even across a galaxy. Think of wormholes in space or Star Trek transporters that beam atoms to distant locations. Quantum mechanics posits other spooky things too: particles with a mysterious property called superposition, which allows them to have a value of one and zero at the same time; and particles' ability to tunnel through barriers as if they were walking through a wall..."
                                                  IT - Careers
                                                  5 Need-To-Know Facts About Millennial Candidates
                                                  Business 2 Community, May 17, 2015
                                                  "'Gen X and Boomer hiring managers often emphasize things that entry-level hires don't care about, and the best candidates have other offers.' - Anne Fisher (@anbfisher), Columnist & Management / Workplace Contributor for Forbes

                                                  Millennials: They are still a bit of a paradox for HR pros and company leadership..."

                                                  4 Types of Geeks You Need And How To Recruit Them
                                                  CIO, May 14, 2015
                                                  "While recruiting and hiring focuses on matching individuals' unique qualities and qualifications with the needs of an open job, when it comes to hard-core tech recruiting, these 'geek" candidates tend to fall into one of four specific types, according to insight from Wisegate, an IT research services firm.

                                                  And while sweeping generalizations are typically frowned upon, it's helpful to understand that each type of technology professional shares some common characteristics, similar motivations and thus, specific recruiting strategies that can be used when bringing them on board, according to Elden Nelson, editor in chief, Wisegate..."

                                                    5 Ways To Refresh Your Job Search
                                                    Business 2 Community, May 17, 2015
                                                    "Picture the scene; you've reworked your CV to within an inch of its life, nailed your cover letter and been applying for jobs left, right and centre - but unfortunately nothing's happening. You're not really hearing back from many companies - and the scarce few who have replied are hardly forthcoming with any information regarding why they don't want to take your application further..."
                                                      How CIOs Can Ensure Their It Teams Are A Good Fit
                                                      CIO Insight, May 14, 2015
                                                      "Many CIOs struggle with the issue of succession planning. It's very difficult to both fill positions that have specific required competencies and experiences while concurrently keeping an eye towards the future.

                                                      Finding good people is challenging enough without trying to think about succession planning at the same time. Perhaps the best way to accomplish both objectives is to ensure that everyone you hire, regardless of their role, exhibits certain key competencies and behaviors..."

                                                        Bad Employee Handbook Policies Sure To Land You In Court
                                                        Business 2 Community, May 17, 2015
                                                        "An employee handbook serves as a guide for both employers and employees. It offers insight into company policies, discusses repercussions for stepping outside of those policies, and outlines employee benefits. However, if you're not careful, common mistakes within handbooks could lead to lawsuits. The wording in your handbook must be carefully crafted in order to avoid landing in court. We've compiled a short list of five policy mistakes you want to avoid at all costs..."
                                                          IT - Social Media
                                                          Posting To Social Media: Free Speech Vs Poor Choices
                                                          Business 2 Community, May 16, 2015
                                                          "Without a doubt, social media has forever changed the way we communicate. Whether we feel like sharing memes with our friends, or broadcasting our opinions to the world, many of us do so by posting to social media.

                                                          Social media provides any of us with the ability to share our words and thoughts instantly. A few keystrokes and BAM - our words are online - possibly for forever..."

                                                            IT - Virtualization
                                                            For Containers, Security Is Problem #1
                                                            ITWorld, May 11, 2015
                                                            "I get it. I really do. Containers let data-center and cloud administrators put two to three times more server instances on a given server than they can with virtual machines. That means fewer servers, which means less power usage, which equals -- Ka-ching! -- less spending on your IT budget. What's not to like?..."
                                                            IT - Email
                                                            5 Tips For Keeping Corporate Email Secure
                                                            Information Age, May 14, 2015
                                                            "As innovation drives the internet into every area of our lives, cybercriminals continue to find new ways to take advantage of its vulnerabilities. A perfect example is last year's catastrophic breach at Sony Entertainment, an event that underscores how no company is safe from attack.

                                                            For highly regulated industries like financial and legal services, the consequences of a breach can be disastrous. Email security solutions like email encryption are now a crucial asset for industry professionals, representing an important line of defence as well as facilitating compliance..."

                                                            Encrypting Your Email: What Is PGP? Why Is It Important? And How Do I Use It?
                                                            Re/code, May 13, 2015
                                                            "In the summer of 2013, the U.S. woke up one morning to learn that NSA subcontractor Edward Snowden had dumped some of the federal government's biggest secrets on the front pages of newspapers worldwide. As we would later learn, Snowden's revelations became headlines because he was able to reach out to journalists using encrypted communications under the now-infamous nom de guerre 'Citizenfour'..."
                                                              Is Global Email An Enterprise Email Security Risk?
                                                              SearchSecurity, May 14, 2015
                                                              "Google recently introduced some language/character changes to make Gmail a more global email service. What are the security benefits of such changes? And what security implications could a global email application/service have on an enterprise?

                                                              The Internet is a global phenomenon, yet its standards are still mainly based on the English alphabet -- which less than half of the world's population uses..."

                                                              SanDisk's Lightning SSD compatibility
                                                              Oracle Solaris + SPARC T5 Servers
                                                              IT organizations across the world are facing critical challenges in management of data and fast and efficient delivery of services geared around business critical data. One easy and transparent way to improve I/O performance and reliability of any computing platform is to replace existing spinning disk drives with solid state drives (SSDs). This paper presents an overview of the tests conducted to verify the operational compatibility of SanDisk's Lightning SSDs with Oracle SPARC T5 server platforms using the Oracle HCTS hardware compatibility test suite.

                                                              Due to the diversity in components and variations in hardware platform architecture, it is very important to confirm if a product is compatible with the target server architecture...

                                                              Oracle ZFS Storage Appliance
                                                              RESTful API Examples

                                                              Jim Kremer writes, "The Oracle ZFS Storage Appliance added a RESTful API for managing storage in its OS8.2 release and this post tells you how to get some Python examples that call this new RESTful API.

                                                              The best place to get example code is through the ZFS Storage User Group (OZUG) hosted at Signing up is free. Just follow the OZUG signup instructions. Not only are there RESTful API scripts, but also workflow and CLI scripts shared by the OZUG community..."

                                                              IT - Database
                                                              The Great In-Memory Database Debate
                                                              ESG, May 14, 2015
                                                              "Recently the Hive hosted a panel discussion on the pros and cons of various approaches to in-memory databases. Yours truly served as moderator/referee as Oracle, MemSQL, IBM, Aerospike, and Pivotal sent their biggest brains. Check out who was on our eminent panel ...

                                                              Each was able to represent his thoughts on a wide range of questions, including:..."

                                                              IT - Big Data
                                                              Automation Accelerates Big Data Projects
                                                              CIO, May 13, 2015
                                                              "In a recent blog we discussed the remarkable return on investment of automated business process validation (BPV), and one area where BPV can provide enormous competitive advantage is in accelerating big data projects. Automated BPV can help companies address the 'three Vs' of big data: volume, variety and velocity..."
                                                              How To Use Big Data For A Good Cause
                                                              CIO Insight, May 15, 2015
                                                              "News of fraud and data breaches can shake confidence and cause legitimate concerns, but not all data stories have a foreboding end. Experian DataLabs wants to call attention to the good that data can do. To that end, it has launched its Data For Good Initiative, which reflects the company's belief that big data and insights derived from it are good for the economy, people and society. Chief Scientist of Experian DataLabs Shanji Xiong shares his tips for how to use big data to do good..."
                                                              Don't Throw Your Data Away - It Might Be Worth Something!
                                                              Information Age, May 15, 2015
                                                              "We've all been there. You've knuckled down, cleaned out the garage, the attic, and that cupboard under the stairs, thrown away a ton of stuff, only to need it again the very next week. Until recently, that's exactly what many businesses did with their data.

                                                              The data explosion has radically changed the how and where we accumulate data, and the way we approach the tough decisions about what data to retain longer-term and what data is of value. Businesses and consumers are producing data at levels never before seen..."

                                                                What's The Next Step For Big Data And The Media?
                                                                Information Age, May 15, 2015
                                                                "Big data is beginning to have a big impact on the broadcasting industry, increasing customer satisfaction, reducing churn and enabling broadcasters to more effectively monetise their services and content - however, it is also clear that the potential to the industry has not as yet been fulfilled.."
                                                                IT - Mobile
                                                                The Five Common Mobility Errors
                                                                CIO, May 14, 2015
                                                                "The mobile enterprise is the BYOD enterprise. That may be one reason some organizations have failed to take a comprehensive approach to enabling mobility. A few years ago, when a handful of people started bringing in their smart phones and tablets to work, IT managers responded in an incremental way - perhaps by adding a single MDM (Mobile Device Management) application or tweaking their firewall -- as soon as they found out. Many IT pros will tell you that when BYOD began, they did not know for several months that key staff were using their own devices..."
                                                                10 Steps To Swiftly Deploy Mobile Apps
                                                                CIO Insight, May 13, 2015
                                                                "To bridge the gap between mobile app supply and demand, speed is essential, and a Rapid Mobile App Development (RMAD) strategy helps IT teams meet the challenge. According to Gartner, 20 million enterprise apps will be built in the next five years. IT leaders are expected to speed up the development of enterprise apps, but also to balance users' demand and the needs of the IT team that develops and deploys these apps..."
                                                                The PC Lives - Particularly In The Enterprise
                                                                Data Center Journal, May 12, 2015
                                                                "Despite hackneyed headlines about the demise of the PC - something that the Data Center Journal has long criticized - this computing device continues to play an important role, especially in the enterprise. At InformationWeek, Andrew Froehlich offered eight reasons why the PC will live on, spanning the usual arguments of performance and upgradeability but adding others such as virtualization, offline capability and value. Of course, PC sales may still have some falling to do, but at present - and with Moore's Law against the ropes - the idea that a smartphone- and/or tablet-style device will replace the PC seems preposterous..."
                                                                Hello, Android, 4th Edition
                                                                O'Reilly, May 14, 2015
                                                                "Google Android dominates the mobile market, and by targeting Android, your apps can run on most of the phones and tablets in the world. This new fourth edition of the #1 book for learning Android covers all modern Android versions from Android 4.1 through Android 5.0. Freshly added material covers new Android features such as Fragments and Google Play Services. Android is a platform you can't afford not to learn, and this book gets you started..."
                                                                Mobile Payments Set To Bloom
                                                                TechEye, May 15, 2015
                                                                "Apple Pay appears to have spurred the company's competitors to get in on the mobile payment act and a report today said that global shipments of mobile phones using near field communications (NFC) totalled 400 million units last year.

                                                                That, according to research company Topology, is about 20 percent of total shipments worldwide last year..."

                                                                  Top Ten Articles for last few Issues
                                                                  Vol 207 Issue 1; Vol 206 Issues 1, 2, 3, 4 and 5; Vol 205 Issue 3 and 4;
                                                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                                  • Oracle VM Server for SPARC 3.2 now available for Solaris 10 control domains
                                                                  • Oracle Linux and Intel: The Power and Freedom to Innovate
                                                                  • Oracle Database 12c as a JSON Document Store
                                                                  • Leading Insights on OpenStack, Today and Tomorrow
                                                                  • The Wisdom of the PaaS Crowd
                                                                  • The Magic of SQL Channel Launches on YouTube
                                                                  • Why customers choose Oracle Cloud solutions for PaaS
                                                                  • Live Webcast with Oracle CIO, More: Introducing Documents Cloud Service
                                                                  • Webcast - Oracle Database Backup Service
                                                                  • EBS 12.1 Certified on Oracle Linux 7 and Red Hat Enterprise Linux EBS 12.1

                                                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                                                    IT - Encryption
                                                                    How To Solve Encryption Compatibility Problems
                                                                    StateTech, May 11, 2015
                                                                    "Encryption has many IT managers in a bind. The massive move of applications to the cloud has created a strong reliance on the Secure Sockets Layer/Transport Layer Security protocol and digital certificate infrastructure to secure traffic over the open Internet and maintain confidentiality of data.

                                                                    But SSL/TLS has recently been subject to some serious security vulnerabilities with a bevy of interesting names, such as FREAK and POODLE..."

                                                                    IT - Server
                                                                    Hyper-Converged Infrastructure Grows As New Systems Emerge
                                                                    Search Data Center, May 15, 2015
                                                                    "While IT pros aren't clamoring for hyper-converged infrastructure just yet, the market is beginning to take shape as more complete packages. EMC's VCE recently introduced VxRack, a broad converged infrastructure offering designed to simplify the deployment of mobile, cloud, and distributed Tier 2 applications.

                                                                    Hyper-converged infrastructure (HCI) puts server, network and storage hardware in a single chassis along with pre-installed virtualization and management software..."

                                                                    LibreOffice 4.4.3 Is Ready
                                                                    The third minor release of the LibreOffice 4.4 'fresh' family
                                                                    The Document Foundation announced LibreOffice 4.4.3, the third minor release of the LibreOffice 4.4 'fresh' family, with over 80 fixes over LibreOffice 4.4.2. New features introduced by LibreOffice 4.4 are listed on this wiki page:

                                                                    The Document Foundation suggests to deploy LibreOffice in enterprises and large organizations with the backing of professional support by certified people.

                                                                    Code Assistance in the NetBeans IDE Java Editor:
                                                                    A Reference Guide
                                                                    The purpose of any integrated development environment (IDE) is to maximize productivity and support seamless development from a single tool. This reference document describes useful code assistance features, customization options, and navigation capabilities of the NetBeans IDE's Java Editor.

                                                                    The NetBeans IDE's Java Editor helps you quickly complete and generate code through the "smart" code completion feature. In a general sense, code completion is very useful when you want to fill in the missing code, look at the options available in the context of your application, and generate blocks of code when needed. See below for examples of how to use code completion...

                                                                    Oracle Unified Directory 11gR2PS3
                                                                    All-in-one directory solution

                                                                    Etienne Remillon writes, "We have released Oracle Unified Directory 11gR2PS3 ( Oracle Unified Directory is an all-in-one directory solution with storage, proxy, synchronization and virtualization capabilities.

                                                                    While unifying the approach, it provides all the services required for high-performance enterprise and carrier-grade environments. Oracle Unified Directory ensures scalability to billions of entries. It is designed for ease of installation, elastic deployments, enterprise manageability, and effective monitoring..."

                                                                    Nexenta News
                                                                    Nexenta Announces General Availability of NexentaEdge
                                                                    Delivering Cluster-Wide Inline Deduplication and Enterprise Class Data Integrity to OpenStack Clouds
                                                                    NexentaEdge Delivers Industry's First Cluster-Wide Inline Deduplication, Compression, and Enterprise Class Data Integrity at Hyper-scale

                                                                    The award-winning Block and Object Storage platform offers high-performance, simplified management of petabyte-scale repositories, and is the first software-only scale out storage solution to deliver cluster-wide inline deduplication and compression. NexentaEdge is optimized to support OpenStack clouds, object based active archives and Big Data applications.

                                                                    Nexenta Open Source-driven Software Defined Storage Portfolio Are Verified as Citrix Ready
                                                                    Enabling Successful Cloud Deployments via Data Center and Desktop Virtualization
                                                                    NexentaConnect for Citrix XenDesktop and NexentaStor are Trusted to Enhance Citrix Networking, Virtualization and Cloud Infrastructure Solutions

                                                                    Nexenta announced that its NexentaConnect for Citrix XenDesktop and NexentaStor have been verified as Citrix Ready. The Citrix Ready program helps customers identify third-party solutions that are recommended to enhance virtualization, networking and cloud infrastructure from Citrix. NexentaConnect for Citrix XenDesktop and NexentaStor completed a rigorous verification process to ensure compatibility with Citrix XenDesktop providing confidence in joint solution compatibility.

                                                                    The Citrix Ready program makes it easy for customers to identify complementary products and solutions that can enhance Citrix environments. Customers can be confident that NexentaConnect for Citrix XenDesktop and NexentaStor have successfully passed a series of tests established by Citrix, and can be trusted to work effectively with Citrix XenDesktop in order to provide storage and acceleration of storage for VDI infrastructures...

                                                                    NexentaStor 5.0 Community Edition Early Access
                                                                    Allows Nexenta Community to become more familiar with this solution in a non-production environment
                                                                    This is a great way for the Nexenta Community to become more familiar with this solution in a non-production environment. As a reminder, NexentaStor Community Edition is designed and may only be used for educational, academic and other non-commercial purposes expressly excluding any commercial usage.

                                                                    The NexentaStor 5.0 Community Preview will allow you to get early access to bits with new functionality. These bits are under development: you may hit bugs and run into issues. We will post regular updates as we increase supported functionality. If you're interested in gaining early access, you will need to sign-up to participate in the NexentaStor 5.0 Community Preview and agree to provide feedback on the bits you will get access to.

                                                                    The NexentaStor 5.0 Community Preview will allow you to get access to early bits with new functionality. You will need to sign-up to participate in NexentaStor 5.0 Community Preview and agree to provide feedback on the bits you will get access to.

                                                                    Level3 News
                                                                    Level 3 and AT&T Enter Into Interconnection Agreement
                                                                    Bilateral interconnection agreement for their IP networks.
                                                                    Both companies issued the following statement:

                                                                    "Level 3 Communications (NYSE: LVLT) and AT&T (NYSE:T) have signed a long-term, bilateral interconnection agreement for their IP networks. This will result in improved efficiency of traffic exchange, and the additional capacity and new interconnection locations between the networks will allow customers to continue to experience high-quality performance and network reliability. As the Internet continues to evolve, Internet service providers are working together to allow the exchange of Internet traffic in a dynamic, robust and reliable manner."

                                                                    "This agreement will benefit Level 3's and AT&T's customers for years to come," said Anthony Christie, chief marketing officer for Level 3. "With customer needs at the forefront, you enable a growing, secure and resilient interconnection environment."

                                                                    Trending in
                                                                    Vol 235, Issue 3
                                                                    Trending IT Articles