News about Oracle's Solaris and Sun Hardware
System News
Jun 15th, 2015 — Jun 21st, 2015 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 208, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Database Insider
June 2015 issue now available
The June issue of the Database Insider newsletter is now available. Content includes:

  • Live Webcast: Larry Ellison Unveils New Oracle Cloud Platform Services
  • Kscope 15: What Not to Miss at the Annual ODTUG Conference
  • Harvard Business Review Analytic Services Report Finds That Cloud Computing Is Entering Its Second Act
  • Top Five Reasons to Join Oracle User Groups
  • Video: Oracle Cloud Analyst Summit: Oracle Customers Discuss Platform as a Service and Infrastructure as a Service (31:29)
  • Webinar Series: Oracle Cloud

See online version.

Database Administrators
The Undercover Security Superheroes
Troy Kitch writes, "Over the past five years, while enterprise IT departments were focusing on the rise of cloud, mobile, and social technologies, a lucrative black market emerged around the acquisition and sale of information. Today, this includes personal data, intellectual property, financial details and almost any form of information with economic value.

It suffices to say that when it comes to data security, businesses now find themselves under assault like never before, and are in dire need of leadership to help overcome this systemic problem. Step forward the database administrator; the person with the knowledge and power to help secure sensitive data on behalf of the organization and its employees..."

Take This Template And Shove It: How We See Managing Millennials
By Mark Hurd
Mark Hurd writes, "I'm a big believer that he who hath the best people usually wins.

Nothing original there - except if that were the case, by definition, only one company would ever have the best people. The nuance here is that what you really want are the people best suited to work within the operating model you've put in place to execute your company's strategy.

That's a tough assignment in the easiest of circumstances. But these are far from the easiest of circumstances..."

The Future of AI: A Non-Alarmist Viewpoint
Dice, June 16th, 2015
"There has been a lot of discussion recently about the dangers posed by building truly intelligent machines. A lot of well-educated and smart people, including Bill Gates and Stephen Hawking, have stated they are fearful about the dangers sentient Artificial Intelligence (AI) poses to humanity. Elon Musk even donated 10 million dollars to a research fund to look into ways of ensuring AI benefits the world. While these are all extremely smart and knowledgeable individuals, I can't help thinking they've watched too many Hollywood movies..."
    Intro To Machine Learning Algorithms For IT Professionals
    SearchDataCenter, June 17th, 2015
    "Machine learning -- supervised and unsupervised -- tracks data patterns that help businesses build improved predictive models and make smarter IT decisions.

    Our data center machines, due to all the information we feed them, are getting smarter. How can you use machine learning to your advantage?

    Machine learning is a key part of how big data brings operational intelligence into our organizations. But while machine learning algorithms are fascinating, the science gets complex very quickly. We can't all be data scientists, but IT professionals need to learn about how our machines are learning..."

    How Artificial Intelligence Explains Analytics
    ComputerWorld, June 19th, 2015
    "Steve Lohr recently wrote an interesting article titled 'If Algorithms Know All, How Much Should Humans Help?' for The New York Times that examines our ability to collaborate with and trust the increasingly intelligent systems that are entering both the workplace and our homes. He noted that without some level of transparency into the reasoning done by these systems, we are going to be forced to simply have faith in the output of 'black boxes'..."
      Sinosure Core Business System Excels on Oracle SPARC T5 and Solaris
      By Parnian Taidi
      China Export & Credit Insurance Corporation (SINOSURE) is China's only policy-oriented insurance company specializing in export credit insurance. It began operations on December 18, 2001. Since then SINOSURE has formed a nationwide service network.

      SINOSURE Core Business System 6.0 is the main platform for insurance product operation & risk control, covering the execution & management of all of the insurance business.

      Recently Oracle and SINOSURE worked together to test and certify SINOSURE Core Business System 6.0 on Oracle Solaris 11 and SPARC T5.

      Test Drive a Fujitsu M10 Server at No Cost
      By Carl Hill
      Carl Hill writes, "A customized server for up to 2 months at zero cost can reduce the risk to your IT modernization projects. Customers don't often get to try out such powerful servers before buying. Fujitsu maintains a loaner pool for the specific purpose of allowing qualified prospective customers and Oracle partners to run proof-of-concept projects and experience the high-performance Fujitsu M10 server in advance of a final acquisition.

      Fujitsu has announced a number of successes for its server evaluation program for Fujitsu M10 systems, allowing customers to experience the high-performance server in their own datacenter..."

      IT - Storage
      Hyperconverged Storage Challenges The SAN Paradigm
      SearchDataCenter, June 17th, 2015
      "HCI makes local storage cool again -- and it keeps pace with how VMs access and store data better than some traditional storage architectures.

      A new generation of hyperconverged infrastructure is challenging the data center model of standalone servers networked to a scale-up storage array.

      Virtual storage area networks (virtual SAN, server SAN or SAN-free storage) use locally attached flash and hard disk drive storage..."

      Flash + Object - The Emergence Of A Two Tier Enterprise
      Storage-Switzerland, June 15th, 2015
      "For as long as there has been data there has been a quest to consolidate that data onto a single, consolidated storage system, but that quest seems to never be satisfied. The problem is that there are essentially two types of data; active and archive. Active data typically needs fast I/O response time at a reasonable cost. Archive needs to be very cost effective with reasonable response times. Storage systems that try to meet both of these needs in a single system often end up doing neither particularly well. This has led to the purchase of data and/or environment specific storage systems and storage system sprawl..."
        Your 'Offline' Storage May Be Putting You At Risk
        InfoWorld, June 16th, 2015
        "I've been talking a lot lately about hidden IT risks that can sneak up on you and your company. These are threats that can lie dormant for months or even years. Once the threat materializes and reveals the weakness, the outcome can be devastating. This column is going to continue that thread by discussing an incredibly common practice that almost no one fully understands the impact of: so-called offline assets that really aren't offline..."
          Virtual SAN Software Isn't A Storage Savior
          Search Server Virtualization, June 17th, 2015
          "In a storage market where products can often be overhyped, virtual SAN is one of the top offenders. Based on the idea of the hyper-converged system, virtual SANs are touted as a way to avoid all the woes of SANs and storage appliances. Still, we have to look past the hype and see if the claims are real and if the virtual SAN value proposition really has a place in the data center..."
          Java Technology
          The Ghosts of Java EE 7 in Production: Past, Present and Future
          By Reza Rahman
          Reza Rahman writes, "For those unfamiliar the three ghosts analogy comes from the Charles Dickens' classic A Christmas Carol. I hope the real message of the analogy is an entertaining but insightful literary puzzle for you to figure out, not to mention the far less imaginative opening quote largely along the same lines :-).

          In the past few days I've seen a certain predictable group of folks on the Interwebs feigning concerns over the viability of using Java EE 7 in production. I have to be honest in that I think it is fairly obvious these concerns are more -ahem- opportunistic than sincere or well-intentioned..."

          IT - Technology
          Mx3D Is To 3D-Print A Steel Bridge Over Water In Amsterdam
          Phys,org, June 14th, 2015
          "MX3D is an R&D startup focused on 3D-printing metals and resin in mid-air, without the need for support structures. They pride themselves in 'robotic technology with which we can 3D print beautiful, functional objects in almost any form.' Now they say 'We are going to print a steel bridge in Amsterdam.' The robots will be printing in steel and the robots will print that bridge over water in Amsterdam. The project team sees the metal bridge as serving as a showcase for present-day capabilities in software, engineering and design...
            Airbus Shows Off Nearly Silent Electric Plane
            ITProPortal, June 15th, 2015
            "If you thought cars were the only means of transport being pressed hard by the 'green' idea of lowering Co2 emissions, you were terribly wrong.

            Even though they're not exactly the centre of attention, airplane makers are also looking for ways to switch to electric-powered engines, and now Airbus has unveiled an interesting two-seater.

            During the Paris Air Show, it unveiled the E-Fan 2.0 prototype aircraft. The all-electric vehicle claiming to be a 'plug-in' plane that has a wingspan of 31 feet..."

              Bright Visible Light Emission From Graphene
              Science Daily, June 15th, 2015
              "Scientists have demonstrated -- for the first time -- an on-chip visible light source using graphene, an atomically thin and perfectly crystalline form of carbon, as a filament. They attached small strips of graphene to metal electrodes, suspended the strips above the substrate, and passed a current through the filaments to cause them to heat up..."
                12 Of The Biggest PC Myths That Just Won't Die
                How To Geek, June 15th, 2015
                "Computers are like anything else. Myths and urban legends have built up over time, passed from person to person. Some myths once had a grain of truth, but are no longer true thanks to technological progress.

                A few myths are simple misunderstandings, while others exist to help people make money from you..."

                  State Farm And AiG Are Testing These 7 Drones
                  Insurance Networking, June 16th, 2015
                  "Insurers including State Farm and AIG are among the very first companies to receive clearance from the Federal Aviation Administration to use drones for commercial purposes. The drones come in a variety of sizes and types, each suited to different purposes and conditions..."
                    IT - Bitcoin
                    Some Movie Theaters Will Start Accepting Bitcoin
                    CINEMABLEND, June 15th, 2015
                    "If you don't entirely understand exactly what Bitcoin it, you're not alone. Regardless of that, you'll soon be able to use it to purchase movie tickets, starting with this weekend's wide release of Sundance Film Festival hit Dope.

                    According to a press release, Open Road Films, which landed the distribution rights to Dope back in January, has partnered with and GoCoin to begin accepting Bitcoin at participating theaters across the nation..."

                    Bitcoin Network Growth Metrics And The Next Mega Price Rally
                    Crypto Coin News, June 15th, 2015
                    "Network growth has been steadily growing larger and stronger over the last two years. While many people only look at the value of bitcoin, they are failing to see the adoption rate. The bitcoin price may have dipped slightly recently, and the record all-time high price of $1,124 USD of late November 2013 may now seem like a long way off..."
                    Living Room Of Satoshi Launches 'Pay Anyone' Bitcoin Payment Service To Any Australian Bank Account
                    Bitcoin Magazine, June 15th, 2015
                    "Australian Bitcoin payment company Living Room of Satoshi announced that its new 'Pay Anyone' service allows Australians to pay bitcoin directly to any bank account.

                    'Bitcoin users can now pay their friends, tradesmen and anyone else; even if the recipient has no knowledge about bitcoin,' says Living Room of Satoshi CEO Daniel Alexiuc..."

                    "This is a vital piece of payment infrastructure that is now available to all Australians.'

                    Banks Who Choose The Block Chain Can Save $20 Billion Per Year
                    Crypto Coin News, June 16th, 2015
                    "One of the less-discussed features of digital currencies are how they can help existing financial institutions.

                    In the crypto world, we like to talk more about how Bitcoin and others enable us to have no need of the banks. More recently, there has been a lot of buzz around how the real winner of the cryptocurrency movement has been the revolution of block chain technology, the decentralized ledger which underpins Bitcoin and others and is integral to its function. Without the block chain, there is nothing special about Bitcoin, and without bitcoins, say many, there is no incentive to utilize the block chain..."

                    Commentary: Bitcoin Adoption In The United Kingdom
                    Bitcoin Magazine, June 19th, 2015
                    "Following mentions of U.K. chancellor George Osborne's desire to make Britain a Bitcoin Capital last year and proposing a government investigation into the potential of the cryptocurrency and related technology, 2015 would appear to be an exciting time for Bitcoin in the United Kingdom.."
                    The Bitcoin Startup That Helps Muslims Get Loans Without Breaking Islamic Law
                    Motherboard, June 17th, 2015
                    "Matthew J. Martin is a 30-year-old who grow up in Earlville, New York as the son of a teacher and a skilled blue collar worker. He now lives in San Francisco, where he is building a business around using Bitcoin to allow Muslims around the world to participate in finance without breaking Islamic law.

                    As you may know, Islamic law prohibits Muslims from trading through interest-based markets or companies. Martin - who converted to Islam five years ago while he was working deep in the financial tech world - is trying to change that with his startup Blossom Finance..."

                    Canadian Senate Says No To Regulating Digital Currencies
                    Bitcoin Magazine, June 19th, 2015
                    "The Canadian Senate's Banking, Trade and Commerce (BTC) committee released its final report Friday asking the federal government to use a 'light touch' in dealing with digital currencies..."
                      IT - FOSS
                      Open Source: Big Benefits, Big Flaws
                      CSO Online, June 15th, 2015
                      "While open source is now a dominant force in IT, experts warn that the things that make it attractive - it is free, open, customizable and overseen by a community of users- can also make it risky. In short, it may not be for everyone

                      Given the dominance of open source in the IT marketplace, any significant debate over its value might be considered moot..."

                      As Eric Cowperthwaite, vice president, advanced security and strategy at Core Security, told CSO recently, 'Open-source code has conquered the world.'

                      OpenSSH Security Best Practices
                      HowtoForge, June 16th, 2015
                      "SSH (Secure Shell) is a cryptographic network protocol for initiating text-based shell sessions on remote machines in a secure way. OpenSSH is the standard SSH client and server used by most Linux Distributions. It is a connectivity tool that most administrators rely on to work on their Linux and *BSD servers. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. So in other word 'OpenSSH ensures that the connection to your server is secure'..."
                      5 Reasons Open Source Software Is Good For Your Business
                      Business 2 Community, June 20th, 2015
                      "In recent years, open source software has become more frequently used by businesses and individuals alike. Why is this, and what makes open source solutions so increasingly popular? Below I list five reasons why open source software can be good for your business..."
                      IT - DevOps
                      Continuous Integration Is A Gateway And Enabler For Devops
                      CIO & Leader, June 15th, 2015
                      Organizations want agility from their IT without sacrificing quality. How does one maintain and verify quality from the developer's machine to the production server? How does one ensure that not only does the code have as few bugs as possible, but also does what it was specified to do? Enter the concepts of Continuous Integration and DevOps.
                      Diving Into DevOps Details
                      CIO, June 18th, 2015
                      "The basic idea behind Dev and Ops is to get the two roles working together. This sounds obvious, but think for a moment about how the roles have traditionally been implemented. Operations is responsible for uptime and reliability; the simplest way to keep systems up and running is to lock 'em down and prevent change. The job of a software developer is to create change. From the beginning, the incentives for one role are misaligned with the other. The first part of DevOps, the very inkling of an idea, is to break down the walls between the roles..."
                      MySQL Workbench 6.3.4 GA
                      GA release for MySQL Workbench 6.3
                      MySQL Workbench is a unified visual tool for database architects, developers, and DBAs. MySQL Workbench provides data modeling, SQL development, and comprehensive administration tools for server configuration, user administration, backup, and much more. MySQL Workbench is available on Windows, Linux and Mac OS X.

                      The MySQL developer tools team announces 6.3.4 as our GA release for MySQL Workbench 6.3.

                      EBS 12.2 Certified on Linux
                      Oracle Linux 7 and Red Hat Enterprise Linux 7
                      Oracle E-Business Suite Release 12.2 is now certified on Oracle Linux 7 (64-bit) and Red Hat Enterprise Linux 7 (64-bit).

                      Installations of the E-Business Suite 12.2 on these operating systems require the application of the 12.2.3 Release Update Pack (RUP3) or higher. Cloning of existing EBS 12.2.3 or higher Linux environments to these new operating systems is also certified using the standard 12.2 Rapid Clone process.

                      IT - Cloud
                      Cloud Whispering: Beyond Force-Feeding IT Staff
                      InformationWeek, June 15th, 2015
                      "Are there still doubters in your IT organization when it comes to cloud computing? It's not unusual. Here are more tips to help overcome that doubt.

                      My column IT Staff Fearful Of Cloud? Try Cloud Whispering a few weeks ago gave advice from my experience in dispelling IT staff's fear of cloud. Dispelling, rather than demanding, is really important, because you simply cannot force innovation..."

                      Six Ways To Make The Migration To Cloud Less Daunting
                      Continuity Central, June 15th, 2015
                      "Are you looking to utilise the business continuity and disaster recovery advantages that the cloud offers? Are you running out of data centre space? Do you need to reduce the time spent maintaining physical hardware? The reasons to transition to cloud continue to stack up, and stories about cloud benefits and successes are only becoming more prominent. Still, many organizations and IT teams continue to be wary of making the move because of the challenges associated with migrating their applications.

                      The good news? Cloud migration does not have to be as daunting as it once was. Others have helped pave the way, establishing best practices and systematic approaches to ease the process. Here are six tips to help make your migration a smooth one:.."

                      Nine Things to Expect From Cloud Service Brokers (CSBs)
                      Search Cloud Computing, June 16th, 2015
                      "The move to public and private cloud is a complex undertaking, merging a range of technical and business considerations and making cloud service brokers an important part of cloud adoption.

                      Although cloud tools, technologies and practices evolve at a rapid pace, cloud service brokers (CSB) play an important role, according to Dennis Smith, research director at Gartner, Inc., who discussed cloud management at length in his session here at the Gartner IT Infrastructure, Operations and Management Summit this week..."

                      The Pros And Cons Of Going Cloud-Native
                      InfoWorld, June 16th, 2015
                      "There are many advantages of leveraging cloud-native features in your IT systems. But they come with a cost, which varies greatly based on your applications and data. Sometimes being cloud-native doesn't make economic sense.

                      The pros of going cloud-native features include the following:.."

                        10 Online Cloud Computing Courses To Get Ahead
                        InformationWeek, June 17th, 2015
                        "The advent of cloud computing technology has led to a big buzz within enterprises, as well as increased demand for cloud-savvy IT professionals.

                        In fact, an April report from IDC finds that spending on cloud IT infrastructure will total about $32 billion this year, an increase of 21% from 2014. All told, cloud accounts for about a third of all IT infrastructure spending..."

                        CIO Must Focus on Software and Cloud to Drive Change as Hardware Era Ends
                        v3 co uk, June 17th, 2015
                        "Software is changing the role of chief information officers (CIOs), requiring them to use IT to drive, rather than simply support, a business, according to the CIO of Virgin Active.

                        Andy Caddy explained at Interop 2015 in London that the ability of modern software to replace the functions and capabilities of physical hardware means that CIOs no longer need to focus on maintaining systems or replacing legacy IT..."

                        IT - CxO
                        C-Level Relationships, Engagement Key To Cio Success
                        SearchCIO, June 16th, 2015
                        "As most CIOs know, success in customer engagement can have a great impact on the success of the business.

                        But engagement of a CIO's own peers -- at the C-level, in particular -- can be equally critical to a CIO's career and the goals he or she sets for the IT department. So said Nils Fonstad, research scientist at MIT's Center for Information Systems Research, while moderating a panel discussion on the influence of the digital age on CIOs at last month's MIT Sloan CIO Symposium in Cambridge, Mass..."

                        Staffing, Resources Major IT Challenges for Businesses
                        eWeek, June 15th, 2015
                        "Forty percent of all survey respondents reported staffing, resources and time as the three biggest challenges that IT operations face in 2015.

                        The majority (89 percent) of IT groups in mid-sized companies are still in the early stages of IT management maturity and focus on day-to-day IT management tasks that are often time-consuming and manual, according to a global survey of approximately 500 mid-sized companies. Kaysea, a cloud-based IT management software vendor conducted the survey..."

                        6 Breaches: Lessons, Reminders, And Potential Ways To Prevent Them
                        CSO Online, June 16th, 2015
                        "No organization wants to be the next headline, but looking at those who have been breached can help keep others out of the spotlight.

                        Though all vastly different in scale and impact, the breaches at the Office of Personnel Management (OPM), Sally Beauty Supply, Starbucks, Anthem, Adult Friend Finder, and Penn State teach valuable lessons and reminders about security vulnerabilities and the need to do more to protect against attackers..."

                        Digital Disruption Boosts Board Acclaim For The CIO Role
                        SearchCIO, June 16th, 2015
                        "What a difference a decade makes. Ten years ago, Jennifer Banner, who serves on the boards of two banks, would have been hard-pressed to pick out their CIOs in a lineup. 'If I'd been in an elevator with a CIO heading up to the board room, I don't know if I would have known [it],' she said. 'That's sad, but true.'

                        Today, she likens the CIO role to that of an army general, a leader of corporate Navy Seals, a rock star and an important collaborator. 'The CIO position is absolutely critical in helping the board move into that strategy vein,' said Banner, a director at Branch Banking & Trust Corp.; director at the Federal Reserve Bank of Atlanta's Nashville branch; and CEO at Schaad Companies LLC in Knoxville, Tenn..."

                        What Are The Biggest Problems Facing CIO's Right Now?
                        ITProPortal, June 16th, 2015
                        "With technologies like cloud systems and big data increasingly in demand the role of the chief information officer (CIO) is evolving and throwing up new problems all the time.

                        Enterprise search company Lucidworks has produced an infographic looking at the changes most affecting CIOs and what can be done to embrace them..."

                        Five Killer Competencies Your Digital Team Needs
                        Forrester, June 17th, 2015
                        "It's no great shocker that digital skills are in short supply. In our annual organizational and staffing survey of eBusiness and channel strategy professionals, we found that while eBusiness budgets have grown by more than 10%, finding the skills and capabilities to execute on a digital strategy is becoming harder and harder. Technology, development, and infrastructure makes up 19% of eBusiness teams' staffing allocation. Even with 69% of those surveyed outsourcing some technology roles, almost one-third of eBusiness teams are most understaffed in technology, development, and infrastructure, up from 18% in 2013..."
                        How About Renting A CSO?
                        CSO Online, June 17th, 2015
                        "At a time when cyber security threats continue to increase in sophistication and prevalence, there's a real shortage of experienced, skilled security leaders. What's a company to do? One thing to consider is 'renting' a CISO or other senior security executive.

                        The number of organizations taking on temporary security leadership is on the rise, experts say, to help address immediate security needs when organizations can't find someone to fill a full-time position - or in many cases when they can't afford to staff a C-level security position..."

                        How To Develop Your IT "High Potentials"
                        CIO, June 17th, 2015
                        "A few years ago, in 2012 Kim Stevenson, CIO of Intel, had a revelation: 'IT executives are leaders just like any other function, and conventional leadership development competencies apply, but there is something so unique about the way technology transforms the business that we need to give our IT leaders something more.'..."
                        IT Funding Potholes
                        ComputerWorld, June 19th, 2015
                        "Organizations should know how to budget and pay for IT products and services - they've been doing so for more than 50 years. This is not rocket science. Unfortunately, many organizations continue to make the same mistakes year after year.

                        Don't fall into these common funding potholes:.."

                          Legacy Tech Can Kill The CIO
                          ZDnet, June 15th, 2015
                          "The drag of legacy technology on innovation is one the primary challenges facing any CIO. This problem has three aspects:

                          Technical obstacles that interfere with the ability of IT to offer modern services to end-users. For example, allowing users to access all corporate services from mobile devices or providing them with sophisticated analytics tools can be difficult when the legacy infrastructure requires bolt-on products, patches, and workarounds. The CEO of Pegasystems, Alan Trefler, calls this the Frankenstack; similarly, the CEO of Workday, Aneel Bhusri, refers to it as Frankensoft, based on observations from ZDNet's Brian Sommer..."

                          10 Lessons From EU CIOs Of The Year And CIO City Summit
                          IT World Canada, June 16th, 2015
                          "I am reporting live from the field having completed chairing the debate session with the EU CIOs of the Year winners at the CIO CITY 2015 Digital Leadership summit in Brussels founded by CIONET with support from cegeka. In this 1 minute video, I overview the session conclusions.

                          The winners are:..."

                          Insurance CIOs Bogged Down By Maintenance?
                          Insurance Networking, June 17th, 2015
                          "What's keeping business technology leaders from really getting ahead in the digital game?

                          A new survey of 200 CIOs sponsored by Brocade suggests it's legacy systems and the network. In particular, the survey suggests, they are 'distracted by the business of keeping the lights on. More than half spend the bulk of their days dealing with downtime and availability issues..."

                          Mastering IT Risk Assessment
                          Risk Management Monitor, June 15th, 2015
                          "The foundation of your organization's defense against cyber theft is a mastery of IT risk assessment. It is an essential part of any information security program, and in fact, is mandated by regulatory frameworks such as SSAE 16, SOC 2, PCI DSS, ISO 27001, HIPAA and FISMA.

                          Compliance with those frameworks means that your organization not only has to complete an IT risk assessment but it must also assess and address the risks by implementing security controls..."

                          Wed June 24th - vBeers @ Miami - Mike's at Venetian
                          6pm - 9pm (Sponsored Food and Beer)
                          Join us for the next vBeers @ Miami. We meet on the 4th Wednesday of each month in Miami, Florida, USA. Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida. Please RSVP at the vBeers South Florida page.

                          Register today so you can be a part of this great monthly event! Feel free to invite your friends and co workers who work in the IT industry! The South Florida Technology Alliance (SFTA) is managing sponsorships. Please contact Douglas Saenz for details.

                          There is $3 valet parking the 555 Venetia building. You must get your valet ticket stamped at Mike's to get the special rate. Drop your car off with the valet, enter the 555 building and take the elevator to the 9th floor and follow the signs for Mike's!

                          Mike's is a unique Miami experience. From the patio deck on the 9th floor, there is a great view of Miami and the port and the flatten remains of the old Miami Herald building.

                          Join us for one of the four South Florida vBeers events. Details @

                          VBeers @ PBG - Twisted Trunk
                          Wednesday, July 1st, 2015: 6:00 PM to 9:00 PM
                          Twisted Trunk - Palm Beach Gardens

                          Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida. Register today so you can be a part of this great monthly event! Feel free to invite all of your friends and co workers who work in the IT industry!

                          Register today so you can be a part of this great monthly event! Feel free to invite your friends and co workers who work in the IT industry! The South Florida Technology Alliance (SFTA) is managing sponsorships. Please contact Douglas Saenz for details.

                          IT - PM
                          5 Signs You Probably Don't Want That Project Management Job
                          CIO, June 15th, 2015
                          "Are you looking for a new job in project management? Are you trying to find just the right fit while advancing your career and possibly find some new challenges that will get you noticed and allow you to manage some projects with cutting edge technology from time to time?

                          Even if you are currently consulting and could very easily return to it and pick up where you left off or if you are currently unemployed and desperately seeking any employment out of shear financial need, no matter how good the job may sound, you still need to be careful. It may not necessarily be as good as it sounds. And you would hate to make an expensive move or dump good consulting clients for something that likely isn't what you really want and need..."

                          Change Management
                          Search CIO, June 18th, 2015
                          "Change management is a systematic approach to dealing with change, both from the perspective of an organization and on the individual level.

                          A somewhat ambiguous term, change management has at least three different aspects, including: adapting to change, controlling change, and effecting change. A proactive approach to dealing with change is at the core of all three aspects..."

                          What Advice Would You Give An Aspiring Project Manager?
                          CIO, June 16th, 2015
                          "I received an inquiry from an aspiring project manager. He was in his mid-20's, thinking about getting a bachelor's degree in project management and was asking questions about getting into the field and what to expect. I have no idea what the rest of his work background looks like. He had just read one of my articles and liked it and decided to start asking questions.

                          I thought they were pretty good questions so I'd like to post a bit of a summary of his questions and my responses here. Anything readers here can add or discuss would be great - I'd be happy to pass more information along to him..."

                          PPM (Project And Portfolio Management)
                          Search CIO, June 18th, 2015
                          "PPM (project and portfolio management) is a formal approach that an organization can use to orchestrate, prioritize and benefit from projects. This approach examines the risk-reward of each project, the available funds, the likelihood of a project's duration, and the expected outcomes. A group of decision makers within an organization, led by a Project Management Office director, evaluates the returns, benefits and prioritization of each project to determine the best way to invest the organization's capital and human resources..."
                          Webcast, June 25: Simplify Your Journey to the Cloud - Manage Hybrid Cloud as One
                          Introducing Oracle Enterprise Manager 12c Release 5
                          Introducing Oracle Enterprise Manager 12c Release 5

                          • Date: Thursday, June 25, 2015
                          • Time: 18:00 CET

                          With hybrid cloud uptake on the rise, the challenges involved with managing IT environments where public- and private clouds and on-premises infrastructure can thrive as one will become increasingly important.

                          Oracle is excited to announce the next release of Oracle Enterprise Manager, which will enable customers to leverage the deep management capabilities of Enterprise Manager against the Oracle Cloud Platform. For the first time, customers will be able to manage their hybrid cloud as one, from a single pane of glass.

                          OTN Virtual Tech Summit
                          July 2015 - Systems Track

                          Oracle Systems software is engineered for deployment in the most demanding IT environments. From Oracle Solaris to Open Stack to Oracle Linux, Oracle has engineered their systems platforms with security as an essential element.

                          The Systems Track in the next OTN Virtual Technology Summit will present sessions by Oracle security experts focused on the default security features and layers of defense built into Oracle Systems, and Oracle's defense-in-depth best practices.

                          Register Now! AMER: July 14, 2015 9:00am - 12:30pm PT

                          IT - Networks
                          Free SSL/TLS Certificate Project Moves Closer To Launch
                          Network World, June 16th, 2015
                          "Let's Encrypt, a project aimed at increasing the use of encryption across websites by issuing free digital certificates, is planning to issue the first ones next month.

                          Digital certificates are used to encrypt data traffic between a computer and a server using SSL/TLS (Secure Sockets Layer/Transport Layer Security) and for checking that a website isn't a spoof.

                          Let's Encrypt is run by the Internet Security Research Group (ISRG), a new California public-benefit corporation. Its backers include Mozilla, the Electronic Frontier Foundation, Cisco and Akamai..."

                          Internet2 Pilots SDN Operating System
                          GCN, June 17th, 2015
                          "Internet2 has deployed a new software defined networking operating system on a 'virtual slice' of its national education network.

                          The Open Source SDN Network Operating System (ONOS) went live in December, and since then various use cases have been implemented on it, including a graphical user interface that provides a view of the multi-layer network and 'northbound abstractions' that allow applications and orchestration systems to program the network and request services from it..."

                          4G Data Traffic To Dominate The Market
                          TechEye, June 18th, 2015
                          "Adoption of 4G data services is eclipsing revenues from mobile voice revenues, which are in decline.

                          And it won't be long before the difference between 4G and 3G widens to such an extent that by 2020 the newer standard dominates the market..."

                            10 Questions To Ask Your SDN Vendor
                            NetworkComputing, June 16th, 2015
                            "Despite all the talk about software-defined networking, actual SDN adoption has been slow. But there are signs that may be changing. According to a survey earlier this year of midsize and large North American enterprises by market-research firm IHS, nearly 80% of organizations are planning to implement SDN by 2017."

                            "The solutions have started to mature," said Clifford Grossner, analyst for IHS. "The use cases are becoming more well-defined."

                            Understanding Tomorrow's Ethernet Speeds
                            Search Data Center, June 17th, 2015
                            "New standards mean more bandwidth and versatility for tomorrow's Ethernet networks, whether in 25, 40, 50 or 100 GigE deployments.

                            In the IT industry, where lifecycles are often just a few years, few technologies have proven as ubiquitous, resilient and extensible as Ethernet. It's been around for 40 years and no one is writing its epitaph anytime soon.

                            Ethernet is pushing a half century in data center networks, but the ubiquitous technology is still learning ways to run faster, and smarter..."

                            IT - IoT
                            No End In Sight For Exposed Internet Of Things, Other Devices
                            Dark Reading, June 17th, 2015
                            "New data from an Internet-scanning project shows vulnerable consumer and enterprise systems remain a big problem on the public Net.

                            HD Moore has been scanning the Internet for more than three years now in search of exposed devices and systems, and his latest research has one big takeaway: these sitting-duck systems are more widespread than ever..."

                              Living Services Sprouting In The Wake Of The Internet Of Things: Accenture
                              Datamation, June 15th, 2015
                              "The Internet of Things (IoT) is poised to have a dramatic impact not only on the lives of consumers, but also on how companies operate, according to a new report from Accenture, a global consulting and technology services.

                              A new report from Accenture Interactive, The Era of Living Services (PDF), explores how the IoT will change daily life with personalized services that intelligently adapt to the user. Although tech companies have tried before, the IoT's scale will help push intelligent services into the mainstream..."

                              IT Opportunities From The Next Phase Of IoT: Living Services
                              The VAR Guy, June 16th, 2015
                              "The connected devices, sensors, cloud, data and analytics that make up the Internet of Things (IoT) will work together to deliver a new set of personalized services that intuitively learn a person's habits, tailor offerings to changing or personalized needs and react to fluctuations in the environment or behavioral patterns - all in real time...."
                              Why Security Determines Success In The Internet Of Things
                              ITProPortal, June 16th, 2015
                              "As with any new invention, hype and expectation can overshadow practicalities. The Internet of Things (IoT) will be one of the most transformative technological trends to impact global society, perhaps since the invention of the World Wide Web. But there is a less sexy element that will underpin its success. Security.

                              To give some impression of the scale, 6.5 billion objects are expected to be connected to the Internet and cooperate partially without human intervention by 2015..."

                              Alabama Researcher Devises A Way To Harness Unused IoT Power
                              ComputerWorld, June 17th, 2015
                              "In the future, smart home appliances could work in harmony to make money, or to provide more computing capacity, for their owners.

                              A computer science researcher at the University of Alabama at Birmingham has devised an architecture, called Aura, that would let people harness all the unused computer cycles generated by their smart home devices.

                              With Aura, 'everybody will become a cloud services provider,' said Ragib Hasan, an assistant professor and director of the university's Secure and Trustworthy Computing Lab (SECRETLab)..."

                                IoT Is The Password Killer We'Ve Been Waiting For
                                ITWorld, June 17th, 2015
                                "IoT, with its tiny screens & headless devices, will drive an authentication revolution. It's a short leap from the kind of two-factor authentication used on the Apple Watch to proximity-based authentication that does away with any user interaction. Passwords are just the canary in the coalmine..."
                                Open Source Licensing Important For Future Of Internet Of Things
                      , June 17th, 2015
                                "Cat Robson is a user experience strategist and manager working on the Red Hat user experience team. Since arriving at Red Hat in 2012, she has influenced the design of the JBoss Developer website, JBoss EAP, JBDS, and other products. She helps teams see how a user experience focus can improve the quality of their offerings. She teaches each part of the organization to become passionate about the user experience..."
                                4 IoT Skills IT Pros Need
                                InformationWeek, June 19th, 2015
                                "A study from Accenture and Fjord provides advice for those looking to make inroads on better design of Internet of Things (IoT) products. If enterprises adopt these guidelines, or head in similar directions, it could fundamentally change the way you go about your job as an IT pro. It's time to start rethinking your skillset for the coming decade..."
                                IT - Linux
                                Choosing The Right Linux Desktop Environment Might Be Difficult, But It's Fun And Educational
                                Softpedia, June 15th, 2015
                                "No matter if you're using a GNU/Linux operating system for some time now or you've just started discovering the wonderful and diverse world of Open Source technologies, you will eventually find out that the choices are overwhelming.

                                And I'm talking about everything, from a simple audio player to a more complex desktop environment or even the Linux kernel-based operating system. Everyone knows that Linux is all about choice, that everything is free, and you can choose to install whatever you think is best for you at a certain point in time..."

                                What Will Happen To Linux When Linus Torvalds Quits?
                                ITWorld, June 17th, 2015
                                "Linus Torvalds is undoubtedly one of the most powerful 'geeks' in the world today. His software is used in almost every aspect of our lives, often without us realizing it.

                                When we hear the word Linux, we think of those command line operating systems that we tried back in 2004 and abandoned. The fact is 'almost' everything around us that has some kind of computing power, is powered by Linux. Whether it be the router that connects you to the super Internet; the printer that fires up every time you send a print command; the coffeemaker that kickstarts your morning; your Android phone; Kindle; Roku; Amazon Fire TV; Netflix; Spotify; Facebook; stock exchange; NASA rockets; banks; drones or supercomputers..."

                                7 command line tools for monitoring your Linux system
                                Network World, June 18th, 2015
                                "One of the great things about Linux is how deeply you can dive into the system to explore how it works and to look for opportunities to fine tune performance or diagnose problems. Here is a selection of basic command line tools that will make your exploration and optimization easier..."
                                IT - Operations
                                Six Ways To Lower IT Infrastructure Costs
                                SearchDataCenter, June 17th, 2015
                                "It's the right time for another round of IT cost-saving initiatives, and here are six areas where data center managers can reduce IT expenses.

                                The recession of the last decade led to enormous cost-saving projects as businesses tightened belts and weathered the economic storm, with projects including virtualization and consolidation, exploration of fledgling cloud technologies, centralizing data centers, rethinking the way software is developed and more..."

                                  Sysadmin Brain Food: 10 Useful Tools For Becoming A Smart Sysadmin
                                  Data Center Journal, June 17th, 2015
                                  "The life of a sysadmin can sometimes feel like Groundhog Day. Monitoring the same aspects of your IT environment on a daily basis is a valuable but also repetitive process. Although non-IT departments tend to spice things up by offering access to unique and exciting training events, it is less of an occurrence for IT professionals. But one could make a strong argument that IT employees are the most deserving of external educational resources. Online self-learning tools can provide you with new skills (which you may not learn from your manager/supervisor) that can have a direct benefit to the health of your IT environment..."
                                  IT - Security
                                  3 Keys For More Effective Security Spend
                                  Dark Reading, June 15th, 2015
                                  "New study models security costs to show how variables can affect the risk to ROI equation over time.

                                  Security teams could get a whole lot more bang for their buck if CISOs spent their budgets more strategically. A recent study by RAND Corporation sponsored by Juniper Networks pinpointed a number of areas that IT security can adjust to reduce the overall cost of managing risk in the enterprise..."

                                  Be Paranoid: 10 Terrifying Extreme Hacks
                                  InfoWorld, June 15th, 2015
                                  "Any device with a computer chip can be hacked, but not all hacks are created equal. In fact, in a world where tens of millions of computers are compromised by malware every year and nearly every company's network is owned, truly innovative or thought-provoking hacks are few and far between.

                                  These extreme hacks rise above the unending morass of everyday, humdrum hacks because of what they target or because they employ previously unknown, unused, or advanced methods. They push the limit of what we security pros previously thought possible..."

                                  Best Tools For Single Sign-On
                                  Network World, June 15th, 2015
                                  "Since we last looked at single sign-on products in 2012, the field has gotten more crowded and more capable. For this round of evaluations, we looked at seven SSO services: Centrify's Identity Service, Microsoft's Azure AD Premium, Okta's Identity and Mobility Management, OneLogin, Ping Identity's Ping One, Secure Auth's IdP, and SmartSignin. Our Clear Choice test winner is Centrify, which slightly outperformed Okta and OneLogin..."
                                  Lessons Learned From The Ramnit Botnet Takedown
                                  Dark Reading, June 15th, 2015
                                  "While most organizations won't find themselves in similar circumstances, there are important takeaways they can apply to any security program.

                                  In the security community, there is a popular adage that says, 'It's not a matter of if you'll be breached, but when.' This statement is meant to remind us that our focus should not only be on preventing a breach, but must also include strategies to detect and remediate incidents when they occur..."

                                  What Defines A Mature IT Security Operation?
                                  ComputerWorld, June 15th, 2015
                                  "RSA recently published their inaugural and aptly named Cybersecurity Poverty Index. This study is based on self-assessments by organizations who compared their current security implementations against the NIST Cybersecurity Framework. According to the report, almost 66 percent rated themselves as inadequate in every category. With all of the recent breaches in the news, part of me is astounded at this finding. The other part is not surprised, given that this matches what I see in the field every day..."
                                  How Can Organizations Get Control Over Privileged Identity Management?
                                  SearchSecurity, June 17th, 2015
                                  "Doling out too many admin privileges can lead enterprises astray when it comes to privileged identity management, but there are ways they can take back control.

                                  Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. After the Snowden incident I'm obviously leery about too many users with admin privileges. How do you recommend taking back control over system privileges without interrupting employee productivity?..."

                                  Why Are There Still So Many Website Vulnerabilities?
                                  CSO Online, June 19th, 2015
                                  "The cracks in the armor of most enterprise websites are many including recurring holes in OpenSSL, PHP, and WordPress and are largely due to a combination of extensive customizations paired with a shortage of testing and fixing of vulnerabilities when compared with that of long-standing commercial OS software.

                                  CSO Magazine traverses the treacherous terrain of the massive security craters present in today's websites. Find out what it takes to fix these holes from the start and throughout the development life cycle..."

                                  Critical Steps To Protecting Sensitive Data
                                  Information Management, June 15th, 2015
                                  "Not a week goes by without news of another high-profile cyber attack? Target, Sony, JPMorgan Chase, just to name a few. Not even the federal government is immune.

                                  Just this week, the U.S. government announced that hackers had accessed the personal data of more than 4 million current and former federal employees. And earlier this week the Internal Revenue Service announced that individuals used stolen data to gain access to the tax returns of more than 100,000 people through an application on the agency's own website..."

                                    New Malware Found Hiding Inside Image Files
                                    Dark Reading, June 16th, 2015
                                    "Dell SecureWorks CTU researchers say Stegoloader is third example in a year of malware using digital steganography as a detection countermeasure.

                                    Researchers with Dell SecureWorks' Counter Threat Unit (CTU) this week detailed the kind of Spy-vs.-Spy countermeasures malware authors come up with to evade detection in a new report on a little-known malware family it calls Stegoloader. Targeting organizations in healthcare, education, and manufacturing, Stegoloader uses digital steganography to hide malicious code inside a PNG image file downloaded from a legitimate website..."

                                    8 Facts That Have Emerged About The Federal Data Breach At OPM
                                    Business 2 Community, June 17th, 2015
                                    "On June 4, the Office of Personnel Management (OPM) announced that hackers working for the Chinese state had breached about four million records of current and former federal employees - the largest hack in recent years. The incident was the second major intrusion targeted at OPM by China and the second major breach against the U.S. by a foreign entity in recent months.

                                    Although the breach was traced back to December, the agency first identified it April as a direct result of investments in its cybersecurity infrastructure..."

                                    False Flags, Red Herrings And Wild Goose Chases: Why Unmasking Hackers Is Harder Than Ever
                                    ZDnet, June 18th, 2015
                                    "Working out who is behind a cyber attack is one of the hardest parts of dealing with any security incident - and it's getting a lot harder.

                                    While it might be all but impossible to bring hackers to justice, especially if they are in another country or even working for a foreign government, understanding who the attack is coming from is often the key to defending against it..."

                                    Is Your Security Operation Hooked On Malware?
                                    Dark Reading, June 16th, 2015
                                    "It may seem counterintuitive, but an overzealous focus on malware may be preventing you from detecting even bigger threats.

                                    Whether the goal of a malware attack is ad-clicks, creating a botnet, or doing something more damaging, no one can dispute that preventing and combating these infestations are an important focus for security groups. But too often, this battle can overshadow an even bigger threat to an organization: a targeted data breach, which takes a very different orientation and set of tools..."

                                    IT - Careers
                                    Why Agile Skills Are More Valuable Than Certifications
                                    CIO, June 15th, 2015
                                    "Businesses struggling to align their IT projects with larger business goals and strategies are emphasizing agile project management skills over traditional project management certifications.

                                    Demand for mission-critical IT projects is increasing as the economy improves, but the supply of resources available to handle those demands isn't keeping pace, according to the recent annual Project and Portfolio Management Landscape survey conducted by Innotas, a cloud portfolio management (PPM) solutions provider..."

                                    5 Best Practices For A Successful Job Search
                                    Business 2 Community, June 15th, 2015
                                    "If it's been a while since you've ventured into the job market, you're likely in for a few surprises. Many approaches and practices that used to work no longer do. In this post I am going to address five best practices that will not only differentiate you from the vast majority of today's job-seekers, they can also dramatically improve your chances of landing a new job in today's job market..."
                                      EU Faces IT And Digital Skills Shortfall Of 825,000
                                      CIO, June 18th, 2015
                                      "The European Union faces a huge shortfall of qualified IT staff in Europe by 2020, prompting EU countries to redouble efforts to offer technology training.

                                      There are not enough IT specialists graduating in Europe to fill all jobs, creating a digital skills gap that could lead to 825,000 vacancies in the sector five years from now, according to figures released by the European Commission today..."

                                        How Even Introverts Can Be Confident Public Speakers
                                        Fast Company, June 15th, 2015
                                        "For many people, public speaking tops their list of fears. And those fears can lead to unsettling experiences. Some speakers report that their body is failing them. They lack the breath they need; their voice quivers; their arms become clamped in a self-protective position; their ankles tremble. People tell me their minds go blank when they are on stage.

                                        The answer to such fears is not to shun the stage..."

                                          IT Security Pros, App Developers In Demand
                                          eWeek, June 15th, 2015
                                          "Specialists in big data and cloud computing fields also saw salaries go up, with cloud engineers pulling in between $108,000 and $142,000.

                                          Technology digital resourcing provider Mondo reported that CIOs and CTOs lead the list of the highest-paid technology professionals in 2015, with salaries ranging from $170,000 to $250,000 - an increase of approximately 9 percent from their salaries in 2014..."

                                          7 Tips To Get Recruiters To Look At Your Linkedin Profile
                                          CIO, June 19th, 2015
                                          "Your professional brand is a big deal, and it's more crucial to your job search than ever before. With one search, recruiters and hiring managers can quickly bring up your online presence and make snap judgments before they decide if you are worth a phone call. Cultivating a strong presence can mean the difference between having to search out job listings and having potential job opportunities come straight to your inbox..."
                                            IT - Social Media
                                            How To Turn Your Expert Reputation Into New Relationships (And Revenue)
                                            Business 2 Community, June 14th, 2015
                                            "Back in 2009, I ran an experiment. For six months, I dedicated myself to making a number of cold calls - every single day. It was dreary, mind-numbing work. I hated every minute of it. But it worked. Out of every 100 calls I made, I managed to connect with a 'live' voice around 20 times. And out of those 'connects,' I managed to secure a meeting or follow-up call in around 20%. In short, I managed to get four meetings for every hundred calls I made.

                                            Not too bad.

                                            In 2011, when I started a new business venture, I decided to 'go with what I know' and do the same thing again. But this time, results were very different. Out of every 100 calls I made, I managed to get exactly zero appointments.

                                            What had changed?..."

                                              What Your IT Guy Wishes You Knew About Social Media Privacy
                                              Global Knowledge, June 18th, 2015
                                              "To many of us, social media is second nature. We wake up and immediately check Facebook, Instagram and Twitter only to check it all again before even thinking about closing our eyes for bed. Social media is an integrated part of our lives, making it easy to overlook the security concerns it can bring, not only to ourselves but also for the organizations we work for. The privacy settings on these social channels are regularly overlooked, opening the door to strangers following our personal status updates, photo shares and work information..."
                                              IT - Virtualization
                                              Server Virtualization Technologies Under Siege
                                              SearchServerVirtualization, June 17th, 2015
                                              "No one is ready to declare virtualization technology dead, but some say it's beginning to smell funny.

                                              All of the major virtualization players have started to feel the tremors of change stomping their way. The change agents doing most of the stomping are armed with a variety of container technologies and revitalized approaches to bare-metal computing. This has forced companies, including VMware, IBM, Microsoft and Red Hat, to make significant course corrections in order to remain relevant..."

                                              Adding Flash To Your Virtualized Data Center
                                              Search Server Virtualization, June 18th, 2015
                                              "When adding flash to your data center a big challenge is making sure the rest of your infrastructure keeps pace. How the infrastructure needs to adapt depends largely on the type of flash implementation that's chosen. There are three basic choices: server flash with caching, shared flash arrays and hyper-converged flash..."
                                              IT - Email
                                              Digital Business Unhappy Over "Draconian" EU Data Protection Laws
                                              ComputerWeekly, June 16th, 2015
                                              "European business has raised concerns over the general approach agreed by the EU Council of Ministers to reforms of the region's data protection laws.

                                              The last phase of negotiation to agree a final text of the EU General Data Protection Regulation (GDPR) can now begin with versions previously being approved by the European Commission and the European Parliament.

                                              But European digital businesses are unhappy with the text agreed by the Council of Ministers, saying the 'blunt-instrument approach' in the current review threatens to hobble a sector that continues to show strong growth, without achieving meaningful privacy improvements for EU consumers..."

                                                Email Security And Spear Phishing Secrets Of An Ex-Hacker
                                                InfoWorld, June 17th, 2015
                                                "Technology and user training together can help CISOs protect their data against the attacks demonstrated by Kevin Mitnick

                                                The role of the chief information security officer (CISO) is evolving and expanding every day. What was once considered a side role of the CIO or the admin-focused CSO (who babysat firewalls and such), the CISO today has a much larger responsibility to ensure two key things take place in your organization:..."

                                                Here's How Password Recovery Scams Work
                                                CIOL, June 17th, 2015
                                                "An increasing number of social engineering attacks has been observed lately targeting unsuspecting users to gain access to their email accounts. The pattern of these kind of spear phising attacks are very convincing.

                                                The attacker just need to know the target's email address and mobile number. The attackers make use of the password recovery feature offered by many email providers, which helps users who have forgotten their passwords gain access to their accounts by, among other options, having a verification code sent to their mobile phone..."

                                                  IT - Database
                                                  Introduction To Database Security Tools For The Enterprise
                                                  SearchSecurity, June 17th, 2015
                                                  "You would think database security is the domain of the relational database management system (RDBMS) vendors. They are experts of their platforms and theoretically should be the go-to source for products that protect their databases. However, the reality is, RDBMS vendors only provide part of the database security picture.

                                                  Some critical security capabilities are bundled with relational database platforms: identity management, access control and network communication encryption are common examples..."

                                                  IT - Mobile
                                                  Mobile Management On The Rise, But Many Companies Still At Risk
                                                  ComputerWorld, June 15th, 2015
                                                  "There's a lot of confusion, disruption and even turbulence in the market for enterprise mobility management (EMM) software, which is used to manage smartphones and tablets and the data and apps running on them.

                                                  The EMM market is growing robustly eight years after the emergence of the first iPhone, with fewer than half of all U.S. workplace devices under management, according to a recent survey by analyst firm J. Gold Associates.

                                                  There are still dozens of small EMM vendors along with about 10 large ones, even after several consolidations in recent years..."

                                                  Saas Application Lifecycle Management For Mobile Apps
                                                  SearchCloudApplications, June 16th, 2015
                                                  "Three critical trends in application design are the cloud, mobile platforms and business agility. It's hardly surprising that these trends would combine in application lifecycle management, creating a cloud/SaaS model of ALM. Every developer and architect should consider SaaS-based ALM, but making the right choice demands a systematic approach. It is necessary to first determine if you're a SaaS ALM candidate. If you are, start by assessing your current application middleware and ALM strategies, then weighing the importance of all your application drivers, and finally picking the right approach and tools based on your needs..."
                                                  The Evolution Of Mobile Phones
                                                  Technology Pundits, June 17th, 2015
                                                  "Its fair to say in the past 42 years mobile phones have come a long way. The graphic below will take you back in time beginning in 1973 right up to what's happening in the future. The majority will look back and remember the late 1990's being the time they first owned a mobile phone with the Nokia 3210 being the iPhone of the era.

                                                  One thing that is fairly amusing is how the size of mobile phones has changed over the past decades. Mobiles have gone from starting of very large in size, to going as small as possible in the early 2000's and now because of smart phones the size is heading back to where they first started..."

                                                    IT - Big Data
                                                    How To Collect And Analyze Data From 100,000 Weather Stations
                                                    Network World, June 16th, 2015
                                                    "Want to know what it's like to analyze massive amounts of data under pressure? Talk to Bryson Koehler, CIO of The Weather Company (which owns the Weather Channel), who must interpret data sets from around the world to predict something as volatile as the weather..."
                                                    8 Ways To Make The Most Out Of Your Customer Data
                                                    CIO, June 15th, 2015
                                                    "Everyone talks about the importance of big data. But many organizations, although they collect and store customer data, do not put that data to good use - or they don't know how to.

                                                    So how can businesses leverage all that big data they've collected? Following are eight ways to make the most of customer and consumer data..."

                                                    Hadoop And Big Data: 60 Top Open Source Tools
                                                    Datamation, June 15th, 2015
                                                    "When it comes to tools for working with Big Data, open source solutions in general and Apache Hadoop in particular dominate the landscape.

                                                    Forrester Analyst Mike Gualtieri recently predicted that "100 percent of large companies" would adopt Hadoop over the next couple of years. A report from Market Research forecasts that the Hadoop market will grow at a compound annual growth rate (CAGR) of 58 percent through 2022 and that it will be worth more than $1 billion by 2020. And IBM believes so strongly in open source Big Data tools that it assigned 3,500 researchers to work on Apache Spark, a tool that is part of the Hadoop ecosystem..."

                                                    How To Address The Talent Shortage In Big Data
                                                    Information Age, June 15th, 2015
                                                    "One of the key consequences of our increasingly interconnected and technology-driven world is that we are creating new information 50 times faster than we did ten years ago. Some 2.5 quintillion bytes of data (or 2.5 exabytes) are created every day and the volume is growing.

                                                    Whilst the computing technologies needed to support these data are keeping pace, the human skills and talents business leaders required to leverage big data are lagging behind..."

                                                    Log Management Is Leading Use Case For Big Data
                                                    CSO Online, June 15th, 2015
                                                    "Companies that have deployed Big Data solutions are most likely to be using them for log management, according to a study released last week by the SANS Institute. This security use case was followed closely by data archiving, operational data storage, advanced analytics, data discovery, and search.

                                                    According to the survey of more than 200 professionals in IT, security and compliance, more than half of the 55 percent of organizations that have deployed Big Data projects use the technology for log management. In addition, of those who plan to deploy Big Data in the next two years, 58 percent said that log management is a priority..."

                                                    Big Data And Insight Advantage
                                                    ITProPortal, June 16th, 2015
                                                    "Investing in Big Data solutions is necessary for gaining insight advantage but it is not sufficient. There are a number of supplementary conditions which also need to be met.

                                                    The most important is that IT is seen as just one component of the solution, albeit an important one. All areas of the operating model need to be aligned for any technology project to work - processes, metrics, competencies, organisation design and culture. That means incorporating other functional areas - HR, Transformation, Analytics, etc. - in addition to IT..."

                                                    Create An Efficient Data Management Process In The Enterprise
                                                    SearchDataCenter, June 17th, 2015
                                                    "Big data can lead to bigger problems, as enterprises struggle to process, store and organize information of varying levels of importance and ownership.

                                                    Big data means big problems -- companies rapidly increase the volume of data stored and processed in the data center and scattered about on user devices.

                                                    Internet of Things initiatives also collect mass quantities of information from sensors and connected devices. The global big data storage and server market shows a compound annual growth rate of 31.87% from 2012 to 2016, according to market research firm TechNavio.

                                                    This data sprawl requires a concerted effort by the data center team to catalog, categorize and contain business information. All enterprises need to take a disciplined approach to data management..."

                                                    IT Is Missing Real-Time Data Analytics Opportunities
                                                    CIO Insight, June 18th, 2015
                                                    "The vast majority of organizational decision makers are challenged by data issues, and very few believe their IT department is adequately supporting their need for real-time data analytics, according to a recent survey from Software AG. On the positive side, companies are increasing their data spend, with 23% in additional budgeting anticipated by 2016. However, organizations continue to struggle to rapidly take advantage of data to make effective, strategic decisions, findings show..."
                                                    Unstructured Data: Overcoming Challenges To Reap The Rewards
                                                    Big Data Quarterly, June 5th, 2015
                                                    "The popularity of social media, online shopping, online gaming, and smart devices, along with the massive growth of Internet of Things (IoT), is creating tremendous amounts of data - much of which is unstructured. Unstructured data presents many challenges - it's hard to manage, datasets can be extremely large, and it does not have a pre-defined schema.

                                                    Traditional tools such as relational database management systems (RDBMS) were not architected to store and retrieve unstructured data. Still, enterprises and service providers who manage to tame and mine unstructured data will have the ability to drive true business transformation based on the new insights it provides..."

                                                    Why Data Governance And Procurement Must Partner
                                                    Information Management, June 16th, 2015
                                                    "At first glance, it might seem that procurement is an unlikely partner for data governance. Many data governance staff members will likely have less-than-fond memories of past experiences involving procurement. Yet, there are good reasons for data governance professionals to proactively build a partnership with procurement. These chiefly revolve around working with data vendors - something that is becoming ever more common in many enterprises..."
                                                      Time To Focus On Data Integrity
                                                      Dark Reading, June 17th, 2015
                                                      "Information security efforts have historically centered on data theft. But cybercriminals who alter corporate records and personal information can also cause serious harm.

                                                      In today's digital world, protecting business and consumer data is critical for many enterprises. The goal of cybersecurity attacks is often to obtain confidential information, which can be held for ransom or sold to the highest bidders. Subsequently, companies spend billions of dollars on solutions to defend against cybersecurity attacks..."

                                                      IT - BYOD
                                                      Interview: BYOD And The Revolutionary Potential Of Ibeacon Technology
                                                      ITProPortal, June 15th, 2015
                                                      "We recently spoke with Phil Keeley, Principal Systems Engineer at Aerohive Networks, about how companies can develop an effective Bring Your Own Device (BYOD) policy and the revolutionary potential of iBeacon technology.

                                                      The full interview can be found below..."

                                                      Top Ten Articles for last few Issues
                                                      Vol 208 Issues 1 and 2 ; Vol 207 Issues 1, 2 and 3; Vol 206 Issues 2, 3, 4 and 5
                                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                      • Patching Solaris Systems
                                                      • Don't Call It Linux! And Other Things That Tick Off Richard Stallman
                                                      • Larry Ellison Unveils New Oracle Cloud Platform Services - June 22nd
                                                      • Oracle Sun Servers Line Card
                                                      • Zero Copy I/O Aggregation
                                                      • Understanding NVMe Support on Oracle Linux
                                                      • Solaris 11.2 proves to be a cloud-worthy Oracle OS
                                                      • Linux Powers DARPA Robotics Challenge Winner
                                                      • The Internet of Things Will Be Huge
                                                      • Saudi Arabia Public Pension Agency Implements Oracle SuperCluster to Support Database as a Service

                                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                                        IT - Encryption
                                                        Let's Encrypt Launch Date Set For September, Aims To Secure The Web
                                                        v3 co uk, June 17th, 2015
                                                        "The Let's Encrypt security standard will begin issuing free certificates under general availability from the middle of September as part of a major cross-industry effort to help create a more secure web.

                                                        Let's Encrypt officially launched in October 2014 with backing from numerous technology firms and organizations, including Cisco, Akamai, Mozilla and the Electronic Frontier Foundation (EFF).

                                                        The purpose of the standard is to create a system to issue free certificates for the Secure Sockets Layer/Transfer Layer Security (SSL/TLS) protocols used by websites and other services to encrypt data in an easy to deploy manner..."

                                                        IT - Server
                                                        How Facebook Is Eating The $140 Billion Hardware Market
                                                        Business Insider, June 14th, 2015
                                                        "It started out as a controversial idea inside Facebook. In four short years, it has turned the $141 billion data-center computer-hardware industry on its head.

                                                        Facebook's extraordinary Open Compute Project is doing for hardware what Linux, Android, and many other popular products did for software: making it free and 'open source.'

                                                        That means that anyone can look at, use, or modify the designs of the hugely expensive computers that big companies use to run their operations - all for free. Contract manufacturers are standing by to build custom designs and to build, in bulk, standard designs agreed upon by the group..."

                                                        30 Percent Of Servers Worldwide Sit Idle
                                                        eWeek, June 15th, 2015
                                                        "The 10 million "comatose" servers that deliver no data or services represent $30 billion in wasted infrastructure capital, according to researchers.

                                                        About 30 percent of servers in data centers around the world are sitting idly, wasting about $30 billion in infrastructure capital, according to a recent report.

                                                        In all, about 10 million servers are 'comatose' - sitting in facilities without delivering information or computing services for six months or more, according to the report by Anthesis Group, a sustainability consultancy..."

                                                        Using MPxIO and Veritas
                                                        in Ops Center

                                                        Doug Schwabauer writes, "Enterprise Manager Ops Center has a rich feature set for Oracle VM Server for SPARC (LDOMs) technology. You can provision Control Domains, service domains, LDOM guests, control the size and properties of the guests, add networks and storage to guests, create Server Pools, etc. The foundation for many of these features is called a Storage Library. In Ops Center, a Storage Library can be Fiber Channel based, iSCSI based, or NAS based.

                                                        For FC and iSCSI-based LUNs, Ops Center only recognizes LUNS that are presented to the Solaris Host via MPxIO, the built in multipathing software for Solaris. LUNs that are presented via other MP software, such as Symantec DMP, EMC Power Path, etc., are not recognized.

                                                        Sometimes users do not have the option to use MPxIO, or may choose to not use MPxIO for other reasons, such as use cases where SCSI3 Persistent Reservations (SCSI3 PR) is required..."

                                                        Nexenta News
                                                        Nexenta and Silicon Valley Education Foundation Partner to Support K-12 Education in Silicon Valley
                                                        Nexenta Extends its Market Leadership in Open Source-driven Software-Defined Storage in Education and Public Sector via Philanthropic Public-Private Partnerships
                                                        Nexenta announced that it was a lead sponsor for the Silicon Valley Wine Auction on Saturday, June 20th. In partnership with the Silicon Valley Education Foundation and Santa Cruz Mountains Winegrowers Association, 100% of the proceeds from this premier VIP event will benefit K-12 education in Silicon Valley.

                                                        About SV[e]F

                                                        Silicon Valley Education Foundation is a nonprofit resource and advocate for students and educators. We provide advocacy, programs and resources to help students reach their full potential in the critical areas of science, technology, engineering, and math (STEM).

                                                        Level3 News
                                                        Promedon Selects Level 3 to Connect its Medical Branches Around the World with Video Conferencing Services
                                                        Medical Technology Provider Leverages A Local Solution For Interoffice Communications
                                                        Level 3 Communications announced a new contract with Promedon, a leading medical researcher and provider of innovative medical technology, for its Enhanced Video Collaboration Solution. This new product, developed in Latin America by Level 3, offers enterprise video conferencing solutions that are accessible from any location through multiple devices and can be accessed from both private and public networks.

                                                        Promedon is expanding into new locations and needed a way to accelerate the flow of business information between offices. Level 3 will provide Promedon connectivity services and high definition video conferencing between its various locations to improve productivity and interoffice communications. Promedon is using the solution in locations across the globe.

                                                          Trending in
                                                          Vol 234, Issue 3
                                                          Trending IT Articles