News about Oracle's Solaris and Sun Hardware
System News
Jun 22nd, 2015 — Jun 28th, 2015 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 208, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Extends World's Most Comprehensive Enterprise Cloud Portfolio
New platform and infrastructure services enable developers, IT professionals, and business users to drive innovation and accelerate digital transformation
Oracle Executive Chairman of the Board and CTO Larry Ellison announced new additions to the Oracle Cloud Platform, a comprehensive, integrated suite of services that make it easier for developers, IT professionals, business users and analysts to build, extend and integrate cloud applications. With more than 24 new cloud services, the Oracle Cloud Platform extends Oracle's leadership with the world's broadest and deepest portfolio of SaaS, PaaS and IaaS. Newly available Oracle Cloud services include, Oracle Database Cloud - Exadata, Oracle Archive Storage Cloud, Oracle Big Data Cloud, Oracle Integration Cloud, Oracle Mobile Cloud, and Oracle Process Cloud.

The Oracle Cloud Platform helps customers build new applications, extend existing ones, and easily move existing on-premises workloads to the cloud with no application changes.

10 Facts Worth Knowing About Google Deepmind
TechWorld, June 24th, 2015
"You may have heard one or two rumblings about a UK artificial intelligence company called DeepMind after it was bought by Google last year.

Here's 10 things worth knowing about the new Google division that's aiming to 'solve intelligence' ..."

AI's Next Frontier: Machines That Understand Language
Wired, June 24th, 2015
"WITH THE HELP of neural networks - vast networks of machines that mimic the web of neurons in the human brain - Facebook can recognize your face. Google can recognize the words you bark into an Android phone. And Microsoft can translate your speech into another language. Now, the task is to teach online services to understand natural language, to grasp not just the meaning of words, but entire sentences and even paragraphs..."
How Artificial Intelligence Is Working In The Enterprise
eWeek, June 26th, 2015
"The story of artificial intelligence inside the enterprise has been a complicated one. Twenty years ago, businesses and governments were spending billions of dollars on AI; they were convinced we would enter the 21st century surrounded by machines with human intelligence. However, what generally resulted were some mildly entertaining apps, such as a system that could play chess (Deep Blue) and robots that struggled to walk down hallways. However, it is now clear that we are entering a new era in this sector..."
    Will Google Artificial Intelligence Run An IT Help Desk?
    Information Management, June 25th, 2015
    "A robot could answer your next call to tech support, thanks to new artificial intelligence research at Google. The company taught computers how to have context-sensitive discussions with people about issues ranging from philosophy to humdrum IT help-desk tasks. It was outlined in a research paper published by the company last week.

    Unlike traditional 'chatbots,' Google's system is built without hand-coded responses or assumptions about the world, and instead learns to model language and conversation based on examples seen in corporate or public documentation. 'Even though the model has obvious limitations, it is surprising to us that a purely data-driven approach without any rules can produce rather proper answers to many types of questions,' according to the research paper..."

    Cognitive Robotic Process Automation Poised To Disrupt Knowledge Worker Market
    SearchCIO, June 25th, 2015
    "KPMG's Cliff Justice lays out a vision for the future with the work of 110M to 140M of knowledge workers handled by cognitive robotic process automation technology...

    Over the next 10 years, the work of 110 million to 140 million knowledge workers around the globe may be handled by cognitive robotic process automation systems. That's according to KPMG's Cliff Justice, citing research from McKinsey Global Institute last week at the World BPO/ITO Forum's Global Sourcing & Cloud Summit in New York..."

      Google Made A Chatbot That Debates The Meaning Of Life
      Wired, June 26th, 2015
      "Google detailed its project earlier this month in a research paper published to Arxiv, a popular repository for academic research. Other 'chatbots' can carry on (somewhat) reasonable conversations with humans. But this one is a little different. There wasn't a team of software engineers who meticulously coded the bot to respond to certain questions in certain ways. Google researchers Oriol Vinyals and Quoc Le built a system that could analyze existing conversations - in this case, movie dialogue - and teach itself to respond..."
      Portic Barcelona Logistics Services
      Oracle SuperCluster Transformational Architecture
      Portic Barcelona manages logistics through a technological platform that facilitates interaction between its members through its information services to logistics agents and other customers. Portic deployed Oracle SuperCluster with Oracle Solaris to multiply the number of commercial transactions that the e-commerce platform can manage by a factor of six - equivalent to a 32x performance increase - enabling Portic to process up to 26,000 service requests per hour and 500 messages per minute, with room for future expansion...
      Uganda Revenue Authority and Oracle SuperCluster:
      Achieves 99.9% Service Uptime for Government Ministries and Services
      Among its objectives, URA was established to improve the standard of tax administration and correct the weaknesses that characterized the older tax administration. One of the major drivers for deploying Oracle solutions was to reduce the frequent downtime previously experienced due to poor database performance and to rectify a reduction in peak-time response.

      URA worked with Oracle and its implementation and logistical partner Technology Associates to deploy a robust, scalable, high-availability database solution that includes software and hardware engineered together, as it felt that having a single vendor for both hardware and software would be advantageous. To that end, URA deployed Oracle SuperCluster, Oracle Solaris 11, and Oracle Database.

      IT - Storage
      The Rise Of SSDs Over Hard Drives, Debunked
      ComputerWeekly, June 23rd, 2015
      "Solid-state drives will gain capacity and get cheaper, but won't overtake hard drives anytime soon..

      In spite of a recent report to the contrary, solid-state drives (SSDs) will not surpass hard disk drives (HDDs) in either price or capacity any time soon, according to industry analysts.

      In fact, hard drives will remain the dominant mass storage device in laptops and desktops for years to come..."

        Software-Defined Storage Buying Guide
        Enterprise Storage Forum, June 24th, 2015
        "Earlier articles in this series have focused on the definition of Software-Defined Storage (SDS) as well as tips on how to implement it. Now we review some of the vendors involved, beginning with what the leading storage vendors are up to in this space. We're also covering some of the challengers and startups who aim to shake things up in SDS..."
        When Will Your Hard Drive Fail?
        IT World, June 22nd, 2015
        "One storage provider compiles failure rates for major hard drive vendors and a pattern emerges...

        It's only appropriate that I found a story idea on storage failure right as I experienced the worst hard drive failure of my life. Long story short, after two days of agony, I lost some downloaded files, nothing I can't live without, and my entire Outlook contact list. Years of building up contacts, all gone. So it was a brutal weekend. In 25 years of PC ownership I've never experienced a drive failure anywhere near close to this.,,"

          SSD Prices In A Free Fall
          Network Computing, June 19th, 2015
          "With the prices of solid-state drives expected to reach parity with hard-disk drives next year, are HDDs doomed?

          Hard-disk drive vendors point to the higher price of solid-state drives as a reason to keep on buying hard drives, but as Bob Dylan sang, "The Times They Are a -Changin'." The advent of 3D NAND has become a game-changer for the storage industry by increasing SSD capacity and dropping SSD prices.

          By packing 32 or 64 times the capacity per die, 3D NAND will allow SSDs to increase capacity well beyond hard drive sizes. SanDisk, for example, plans 8 TB drives this year, and 16 TB drives in 2016. At the same time, vendors across the flash industry are able to back off two process node levels and obtain excellent die yields..."

          IT - Technology
          NASA: 'Wild' Technology Will Transform Aviation
          Network World, June 22nd, 2015
          "NASA: Artificial intelligence, electronic propulsion just a couple new aviation technologies under study ...

          It's not often you see a button-down organization like NASA call something 'wild' but that's what the space agency is calling six concepts - ranging from adding artificial intelligence to unmanned aircraft to using electricity for propulsion -- it has picked to study to revolutionize the aviation world..."

            The Mainframe Lives On: An Industry Perspective
            Government Technology, June 23rd, 2015
            "Call it the mainframe renaissance. In an era of rapid delivery of applications, tight budgets and a new generation of IT personnel, the answer to many IT problems may be found inside Big Iron.

            The strategic decisions public-sector CIOs must make over the next six to 18 months are being shaped by three realities:.."

              9 Ways Technology Is Slowly Killing Us All
              InformationWeek, June 24th, 2015
              "The cost of technology addiction goes beyond pricey gadgets. Connectivity also affects vision, memory loss, weight gain and self-esteem...

              When we were young, technology addiction didn't merit as much concern as scraped knees and broken Legos. For today's youth, however, digital starts to take its toll as early as infancy.

              If you haven't yet seen the development of tech addiction among today's youth, visit a family restaurant. Kids are fighting over iPads and iPhones, or silently engrossed in their own devices. Parents often stick a smartphone, or "digital babysitter" under the eyes of rowdy children to calm them down..."

                Researchers: Graphene Could Help Increase Chip Speed By 30%
                Network World, June 22nd, 2015
                "Here's another use for graphene - wrap transistor wires with it and boost computer chip speeds.

                Scientists have discovered that replacing tantalum nitride, the existing wire sheathing material between transistors, with graphene allows chips to exchange data faster..."

                  Microscale 'Transformer' Robots Are Joining Forces To Break Through Blocked Arteries
        , June 27th, 2015
                  "Swarms of microscopic, magnetic, robotic beads could be scrubbing in next to the world's top vascular surgeons - all taking aim at blocked arteries. These microrobots, which look and move like corkscrew-shaped bacteria, are being developed by mechanical engineers at Drexel University as a part of a surgical toolkit being assembled by the Daegu Gyeongbuk Institute of Science and Technology (DGIST) in South Korea..."
                    Breakthrough May Double Speed Of Fiber Optics Networks
                    Sci-Tech Today, June 26th, 2015
                    "An engineering breakthrough by researchers at the University of California, San Diego, has the potential to double the speed of fiber optic networks. The findings, reported by a team of photonics researchers in the June 26 edition of the journal Science, could dramatically increase the maximum power capacity of signals sent through fiber optic cables.

                    Although not every user connects to the Internet through an optical cable, fiber optics do serve as the primary infrastructure for much of the Internet. Increasing the speed of those key connections would significantly increase speeds for all Internet users, regardless of the type of service they have..."

                    Oneweb Satellite Broadband Effort Gets $500M
                    TechZone360, June 26th, 2015
                    "OneWeb, intent on building a 900 satellite Low-Earth-Orbit (LEO) broadband network encompassing the globe, released a flurry of information today. The company announced it secured $500 million in A-round funding, with participants including Airbus Group, Bharti Enterprises, Hughes Network Systems, (Hughes), a subsidiary of EchoStar Corp., Intelsat, Qualcomm Incorporated, The Coca-Cola Company, the Virgin Group, and Totalplay, a Mexican broadband provider. It also signed contracts for a whopping 21 launches through Arianespace and 39 LauncherOne missions from Virgin Galactic..."
                      IT - Bitcoin
                      Leading Silicon Valley Vc Firm Shifts Its Focus Toward Bitcoin
                      Bitcoin Magazine, June 22nd, 2015
                      "Kleiner Perkins Caufield and Byers (KPCB), a Silicon Valley venture capital firm best known for its investments in Google, AOL, Twitter, Uber and Amazon, has introduced a fund called the Edge Seed Fund, which is set to focus on helping early stage Bitcoin- and blockchain-based startups.

                      The Edge fund, led by Kleiner Perkins partners Mike Abbott and Anjney Midha, plans to offer investments of $250,000 to support selected startups in developing and programming platforms, products and services..."

                      How Silicon Valley And Wall Street Arrived At A New Gold Rush Called Bitcoin
                      Ars Technica, June 21st, 2015
                      "For the last few years now, non-tech-oriented friends and family occasionally ask me: "So what do you think of Bitcoin?" My answer is nearly always the same: "It's intellectually interesting, but not really practical."

                      Yes, the blockchain is a neat idea. But unless you're regularly buying stuff on Silk Road copycats, or if you live in a country with currency controls, or if you're a hardcore libertarian, I've yet to hear a good reason why Bitcoin makes practical sense for most people in everyday life. Put another way: it doesn't yet have a clear killer app..."

                      The Blockchain Meets Big Data And Realtime Analysis
                      Bitcoin Magazine, June 24th, 2015
                      "Big Data. It's a popular buzzword that you've seen all over the Net the past few years. It's a very serious billion-dollar industry now - with front runners from all different niche avenues of data collection and analytics. With the number of unique data sources available to these data-focused companies, the possibilities for analytics and selling that service to others seems exponential. And, with the rise of worldwide ledger-based systems like that of Bitcoin and other blockchain-based technologies, the lines are blurring between what's kosher in extrapolating data from the public domain and what isn't..."
                      Bitcoin ATMs 101: What You Need To Know About This Growing Business Opportunity
                      Crypto Coin News, June 27th, 2015
                      "Interested in becoming a bitcoin ATM operator? ATM Marketplace, an ATM industry resource, has released a 40-page guide on bitcoin ATMs that explores every aspect of the business opportunity. The report is titled, 'Bitcoin ATMs 101: Opportunities for the IAD.' IAD stands for independent ATM deployment.

                      The guide, the first to examine the emerging cryptocurrency ATM market, notes bitcoin ATMs offer an efficient and secure way for people to buy and sell bitcoins. ATMs are an alternative to bitcoin exchanges that many believe are more susceptible to hacking and fraud. Bitcoin ATMs shoulder the credit, counterparty and volatility risk associated with bitcoin exchanges.

                      The guide includes an overview of bitcoin for readers who may be completely new to cryptocurrency..."

                      Barclays Experimenting With Bitcoin Blockchain In Everyday Banking
                      ITProPortal, June 23rd, 2015
                      "Bitcoin might still be seen as a gamble to traditional banks, but the core functionality of the anonymous payments system is something most banks want to integrate into everyday banking, due to the massive potential savings.

                      Barclays is the latest bank in the UK to start working on Bitcoin blockchain for everyday banking. Blockchain is a software algorithm allowing the system to keep tabs on payments, without having a centralised regulating authority..."

                      Canada's Senate Votes Against Bitcoin Regulation
                      NEWSBTC, June 22nd, 2015
                      "While most governments have been taking steps to regulate the bitcoin industry and others declaring a completely close-minded stance against digital currencies, Canada's Senate decided to vote against bitcoin regulation. The Canadian Senate's Banking, Trade and Commerce (BTC) committee released its findings last Friday and asked the federal government to use a 'light touch' in dealing with digital currencies.

                      The report indicated that legislators have acknowledged that the bitcoin industry is still young and developing so they'd like to see a more nurturing environment instead of one that discourages innovation..."

                      Bitcoin Success Hinges On Cios Embracing Open Platforms, Apis
                      Wall St. Journal, June 24th, 2015
                      "CIOs investigating bitcoin and other digital currencies must consider how willing they are to embrace a more open IT architecture, as well as a growing number of service providers, says a security chief at one bitcoin startup.

                      'It comes down to understanding and embracing more of an open source mentality when it comes to software, and really going to more of a service-oriented architecture that looks to utilize a lot more APIs and plug into a lot of different pieces,' said William Dennings, security chief at bitcoin startup Bitreserve. APIs, short for application program interfaces, are a set of tools that allow applications to communicate and share data with one another..."

                      Nasdaq Selects Bitcoin Startup Chain To Run Pilot In Private Market Arm
                      Bitcoin Magazine, June 25th, 2015
                      "Nasdaq has partnered with San Francisco-based bitcoin API startup Chain to implement the Bitcoin blockchain technology in its newly launched marketplace, Nasdaq Private Market.

                      Previously reported by Bitcoin Magazine, Nasdaq announced its plans to implement Bitcoin's blockchain technology into its pilot test, where shares of private companies are handled and traded as smart assets on the blockchain..."

                      IT - FOSS
                      Can Libreoffice Successfully Compete With Microsoft Office?
                      CIO, June 25th, 2015
                      "It's hard to imagine an open source project more likely to fail than one that attempts to go toe-to-toe with Microsoft's Office productivity suite.

                      That's because, as the de-facto standard used by businesses, educational establishments and government departments around the world, Office is a product that's exceptionally hard to compete against. In fact, history is littered with examples of productivity suites that no longer exist, blown out of the water by the Microsoft Office dreadnought...."

                      The Third Platform: The Time For Open Source Is Nigh
                      Data Center Journal, June 22nd, 2015
                      "Traditional application architectures are falling into obsolescence in the world of exponentially growing technology change. A new platform is emerging that is far better suited to the demands of today's IT. The 'third platform,' also called by the acronym SMAC, comprises social media, mobile, analytics/big data and cloud technologies. It is the model of the future, and companies must be willing to openly examine where they are now, where they want to be and how they want to get there. The enterprises that will succeed are those that empower themselves now with the right processes, tools and culture.

                      This is where open source comes in. Open-source deployments provide a number of important advantages..."

                      If We've Won, Why Are We Still Explaining Open Source?
            , June 25th, 2015
                      "At the most recent Apple World Wide Developers Conference, Apple announced they would "open source the next version of its programming language Swift." This minimally means they will publish the source code to Swift using an Open Source Initiative (OSI) approved open source license. That's all really..."
                      Open Source History: Why Didn't Bsd Beat Out GNU And Linux?
                      The VAR Guy, June 26th, 2015
                      "If you use a free and open source operating system, it's almost certainly based on the Linux kernel and GNU software. But these were not the first freely redistributable platforms, nor were they the most professional or widely commercialized. The Berkeley Software Distribution, or BSD, beat GNU/Linux on all of these counts. So why has BSD been consigned to the margins of the open source ecosystem, while GNU/Linux distributions rose to fantastic prominence? Read on for some historical perspective..."
                      The Solaris 10 Recommended patchset really does contain ALL available OS security fixes!
                      By Gerry Haskins
                      Gerry Haskins writes, "Apologies for the rather exasperated tone of this post, but if I had a $1 for every time a 3rd party security scanning tool falsely reported that we're missing a security fix in the Solaris 10 Recommended patchset...

                      Let me assure you, the Solaris 10 Recommended patchset really does contain all available security fixes for the Solaris OS*.

                      * In deference to Murphy's Law, I'd better insert a disclaimer that I'm sure there'll be a security fix at some future point in time which is toxic and we may hold off including it until we mitigate its toxicity, but I can't think of a single case where that's occurred in the last 16 years, so let's call that a very rare corner case.

                      As explained in a previous post, we include the minimum patch revision required to address a security vulnerability..."

                      IT - DevOps
                      How ITIL Can Co-Exist With DevOps
            , June 24th, 2015
                      "The original ITIL framework definition was published in the 1980s, but contrary to many opinions, it has evolved since then, provided one takes a more flexible view. Fast forward to ITILv3, and the framework has been shifted to the view that IT is a service that needs to support business initiatives and strategy.

                      In parallel, the 'DevOps Movement' has continued to gain momentum, and is now the 'culture' at many forward-thinking organizations. So, that begs the question, 'Can I have my ITIL framework and still transform my IT Org to embrace DevOps?'

                      First, as a refresher, let me quickly outline the key components of ITILv3..."

                      Secure A Job On These DevOps Interview Questions
                      SearchDataCenter, June 25th, 2015
                      "Practice answering these questions to highlight your broad scope of experience, wide knowledge of tools, and multidisciplinary DevOps savvy during an interview.

                      DevOps isn't a standalone job and in fact, it isn't even a job; it's a new approach to interdisciplinary software engineering. IT professionals will likely take on some form of DevOps responsibilities during the course of their career, and the job listings are hot..."

                      Devops Personnel Expect Production Container Usage To Climb 69 Percent Over Next 12 Months
                      BusinessSolutions, June 17th, 2015
                      "Research Report Uncovers Key Barriers to Expanded Use of Containers in Production, Shows that Docker Owns the Overwhelming Share of DevOps Attention

                      In a first-of-its kind survey and research report commissioned by ClusterHQ and conducted by, it was revealed that 94 percent of organizations are using or investigating container technologies. Currently, only 38 percent of respondents reported using containers in production environments, but that number is projected to increase 69 percent over the next 12 months as organizations find news ways of addressing important barriers to adoption..."

                      Visualizing And Defining Requirements Comes To Devops
            , June 26th, 2015
                      "We have all seen the nice circular diagrams of a DevOps methodology for application lifecycle management (ALM) like the one above. We interject some automation, make the two halves work closer together, get some feedback loops going and go as fast as we can. But lets look at those first two steps in the diagram, the ones labeled consult and design. What and how do we accomplish this? ..."
                      How To Organise A Thriving Devops Team
                      Information Age, June 23rd, 2015
                      "DevOps brings together developers and operations to work closely together to benefit the business; when combined with a lean and agile approach it increases staff morale, productivity and leads to improved project success. However, many DevOps teams tend to be light on process and reliant on a flexible team that is emotionally and technically intelligent.

                      The agile DevOps process places more pressure on delivery teams than a project that runs along more traditional lines. The process is characterised by continual measurement, frequent demonstration and regular milestones, with constant approval or rejection. It's an environment where people who are egoless, talented and engaged will thrive..."

                      Enterprise DevOps, Open Source Hit Target's Bull's-Eye
                      SearchDataCenter, June 26th, 2015
                      "Pick up a cartful of DevOps advice from retailer Target, which moved to the DevOps culture in its data centers with a balance of stability and innovation.

                      No matter how many times we say DevOps is a culture and a mindset, it's hard to deny that it is also a fairly sizeable chest of tools.

                      Target operates two main data centers to support its retail locations as well as distribution centers. The retail giant moved to an enterprise DevOps model to empower the backend IT team to provide technology services in an entrepreneurial way..."

                      Building MySQL Crosstab and Subreports
                      Featured Database Articles
                      Rob Gravelle writes, "Unlike MS Access, which has the TRANSFORM...PIVOT statement, most relational databases - MySQL included - do not offer a mechanism for easily generating crosstab queries. I wrote back in 2010 that, left to their own devices, DBAs have had to be quite creative in designing crosstab queries.

                      Since crosstab queries are usually meant for displaying tabular data in reports, why not let the reporting tool assist you in the generation of crosstab reports?..."

                      Modirum Authenticates Transactions with MySQL
                      By Bertrand Mattheli
                      Modirum is a software and consulting company specializing in secure authentication software products, card payment solutions, consulting and SaaS hosted processing services. The company was founded in 1998 in Finland and has offices in Finland, Norway, Estonia, the UK and elsewhere.

                      Modirum has worked closely with organisations including Visa and Nokia for the development of authentication protocols such as the 3D-Secure protocol and mobile commerce projects over the years. 3-D Secure is an XML-based protocol designed to be an additional security layer for online credit and debit card transactions. It adds an authentication step for online payments.

                      Cloud Computing
                      New Oracle Commerce Cloud Helps Companies Quickly Build, Easily Optimize, and Nimbly Extend Selling Experiences
                      Designed to ignite business innovation and rapid growth for online businesses

                      Adding a key new piece to the rich Oracle Customer Experience (CX) applications portfolio, Oracle unveiled Oracle Commerce Cloud, a flexible and scalable SaaS solution built for the Oracle Public Cloud. Oracle Commerce Cloud features the latest commerce technology and is designed to ignite business innovation and rapid growth, while simplifying IT management and reducing costs.

                      Oracle Commerce Cloud's modern SaaS infrastructure emphasizes simplicity, allowing online businesses to quickly launch feature-rich, responsive storefronts across desktop and mobile devices without sacrificing features or brand control. No longer limited by cookie-cutter site options, marketers and merchants get a fully responsive, configurable storefront out-of-the-box with pre-integrated core commerce features including: search/navigation, recommendations, promotions, reporting, payments, design templates and SEO. Catalog, content, design and merchandising management is all at the business' fingertips in a unified experience management console.

                      New Oracle Data Center in Brazil Equips Latin American Companies to Transform Their Business with Oracle Cloud
                      Latest State-of-the-Art Facility Helps Ensure Customers' Data is Stable, Protected and Secure

                      Oracle is committed to helping companies throughout Latin America embrace cloud computing to reduce IT complexities and boost productivity. As part of this effort, Oracle plans to open its new data center in Campinas, São Paulo in August of this year.

                      This state-of-the-art facility also supports growing demand for Oracle's comprehensive cloud portfolio and was designed to help customers embrace Oracle Cloud Software as a Service (SaaS) offerings. Oracle Cloud SaaS applications are best-of-breed and integrated with social, mobile, and analytic capabilities to help companies deliver the experiences customers expect, the talent to succeed, and the performance the market demands.

                      IT - Cloud
                      Storage, Compliance, And Regulations In The Age Of Cloud
                      Data Center Knowledge, June 24th, 2015
                      "We all know that cloud computing has come a long way. We've got new ways to connect, new ways to deliver data, and a lot more user distribution. In an ever-connected world, the user and the organization are demanding a persistent connection regardless of device, location, or even data type. That means that both cloud and the data center model had to adapt to these new types of demands..."
                      IT - CxO
                      Why Businesses Need To Go Back To School On Cyber Security
                      Information Age, June 22nd, 2015
                      "Amid the hype around the technologies required to combat cyber threats, organisations are failing to pay enough attention to internal training and education

                      Cybercrime is one of the greatest challenges facing the business world today. The past 18 months have witnessed devastating data breaches at the likes of Sony, JP Morgan and Target. No amount of investment in technology, it seems, can prevent a cyber attack..."

                        CIOs Give Managed IT Services High Marks
                        CIO Insight, June 25th, 2015
                        "With a large share of organizations either outsourcing IT functions or considering doing so, an overwhelming majority pursuing managed services are satisfied with the outcomes, according to a recent survey from CompTIA. The resulting "4th Annual Trends in Managed Services" report indicates that managed services arrangements are either meeting or exceeding cost-savings expectations, and are covering essential needs such as tech troubleshooting, integration and cyber-security..."
                        Monitoring Your Privacy Program: Risk Assessments And Documentation
                        IAPP, June 26th, 2015
                        "So far in this exclusive series for The Privacy Advisor on monitoring your privacy program, three industry leaders - one from a consulting firm, one from healthcare and one from IT - have given valuable insights on how to effectively monitor your privacy program and what organizations should focus on when developing a comprehensive program. Now, Deidre Rodriguez, CIPP/US, summarizes major themes that have surfaced, regardless of industry..."
                        How Businesses Can Overcome The Risks Of Shadow IT
                        Information Age, June 23rd, 2015
                        "If shadow IT and the reasons for its implementation are ignored, the number of instances is likely to increase in the future - here's how to take it on...

                        With so much attention being given to shadow IT - the phrase coined for the increasing trend of employees going against their company's IT policy to implement their own solutions and platforms - it would be fair to assume that the concept is a fairly new one.

                        As a problem faced by nearly all CIOs at various times, however, the challenge of shadow IT has a significant history..."

                          Four Steps To Managing And Driving Value From Your Assets
                          Information Management, June 24th, 2015
                          "In the current competitive business environment, your company is probably being challenged to improve productivity by optimizing asset reliability and operational performance. To help, technology gurus around the world are working hard and fast to develop next-generation Industrial Internet software to manage and analyze your asset and process data to help you gain value from it.

                          The problem is - it's all very confusing. It's hard to understand the functionalities of all this software - what all the individual pieces do and how they all fit together. What do you really need and when? How do you go about building a proper technology stack - in an organized and simple manner? In fact, how do you even get started? ..."

                          CIOs And Security: Time To Rethink The Processes?
                          InformationWeek, June 22nd, 2015
                          "Businesses need to develop new security responses to address gigantic attacks, and the CIO is in the best position to lead the way.

                          Target, Home Depot, and Sony have demonstrated how vulnerable businesses are to catastrophic data breaches. The ripple effects from massive strikes reverberated through these organizations, causing millions of dollars in damage.

                          Despite the headlines, most firms are not equipped to respond to such problems..."

                          How Does A Wholesale Data Center Differ From Retail?
                          Search Data Center, June 23rd, 2015
                          "One offers more control, while the other offers more flexible space. If you're considering a colocation facility, how do you decide between wholesale and retail?

                          The definitions of wholesale and retail data center space are shifting.

                          In a wholesale data center, a company rents out a fully provisioned facility for its own dedicated use. Retail colocation lets a company rent space in a larger facility, where it can place its own IT equipment within racks and rows..."

                            CIO-CMO partnerships: Getting past the Stereotypes
                            SearchCIO, June 22nd, 2015
                            "Anthony Christie, chief marketing officer (CMO) at telecommunications giant Level 3 Communications, sat down with executive editor

                            Linda Tucci at the MIT Sloan CIO Symposium in Cambridge, Mass., to talk about the impact of digitization on the enterprise. In part one of this two-part SearchCIO video, Christie, formerly the CIO and CTO at Global Crossing, talks about how his IT experience informs on his role as CMO, the importance of a strong CIO-CMO partnership, and why marketing and IT stereotypes are especially counterproductive in a digital economy..."

                            CIOs: Work with the Business to Prioritize IT Projects
                            The Enterprisers Project, June 22nd, 2015
                            "We interviewed Vincent Vitali, chief information officer of La Rabida Childen's Hospital, a pediatric acute care facility in Chicago about how he prioritizes IT projects with input from the business.

                            The Enterprisers Project (TEP): Is it getting easier or harder to judge the value of an IT investment?

                            Vitali: Generally it is more difficult...."

                              CIO Opportunity: Step Up And Serve The Finance Department
                              ZDnet, June 22nd, 2015
                              "New research offers Chief Information Officers an opportunity to drive value and relevance to the CFO. Now is the time for CIOs to meet this challenge...

                              Security, privacy, technical debt , two-speed IT budgets, digital skills gaps, and legacy technology are just some of the challenges that face almost every CIO.

                              Despite these challenges, modern organizations expect the CIO to innovate and provide tangible value quickly and with high responsiveness. Agility and responsiveness to business needs are primary for IT to maintain relevance in the enterprise..."

                              vBeers @ PBG - Twisted Trunk
                              Wednesday, July 1st, 2015: 6:00 PM to 9:00 PM
                              Twisted Trunk - Palm Beach Gardens

                              Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida. Register today so you can be a part of this great monthly event! Feel free to invite all of your friends and co workers who work in the IT industry!

                              Register today so you can be a part of this great monthly event! Feel free to invite your friends and co workers who work in the IT industry!

                              The South Florida Technology Alliance (SFTA) is managing sponsorships. Please contact Douglas Saenz for details.

                              IT - DR
                              3 Ways The Cloud Makes Disaster Planning Simpler
                              Business 2 Community, June 25th, 2015
                              "When it comes to disaster planning, business owners have a lot to be concerned about. From floods, hurricanes, tropical storms to electrical fires, and employee error - there's a lot in the air as far as valuable business data and assets go. That's why having a hurricane and disaster plan is so important. If it's starting to seem a little cumbersome to manage all of your technology, understand strategically how it can work together and still have a plan for what can happen, you're not alone..."
                                Disaster Preparedness Strategies For Recovery Assurance And Peace Of Mind
                                Data Center Knowledge, June 23rd, 2015
                                "The start of hurricane season is always a great reminder about the importance of having an iron-clad disaster recovery strategy in place to protect vital data, systems and infrastructure, and to maintain business continuity in the event of an outage. Even a small amount of downtime can be detrimental to a business. According to the 2014 State of Global Disaster Recovery Preparedness report, the cost of losing critical applications to system outages can be as high as $5,000 a minute..."
                                IT - PM
                                The Dirty Secrets Of Project Management Revealed
                                CIO, June 26th, 2015
                                "Thousands of project managers are in a mad rush to push IT projects live on July 1. Why are PMs more than willing to go over budget than miss a deadline?...

                                For business systems, the project go-live date really does matter - and project managers seem willing to sacrifice budget limits more often than they're willing to blow past a scheduled deadline..."

                                  Why Big IT Projects Fall Short Of Expectations
                                  CIO Insight, June 23rd, 2015
                                  "It can get pretty rough out there for CIOs who oversee large-scale IT projects: For projects requiring more than $10 million in investment, the chances of delivering on time and on budget, while meeting all needed objectives, is just one in 10, according to research findings summarized in a recent report from The Boston Consulting Group (BCG). And the cost of failure can amount to 100% or even 170% of the original investment cost..."
                                    Oracle FY16 Global Partner Kickoff
                                    Replays Now Available
                                    Roxana Babiciu writes, "Oracle's FY16 Partner Kickoff was a great way to start off the summer! In case you missed the live show, watch the replay and catch up on Oracle's cloud strategy and objectives for the upcoming year. If you're looking to view a specific segment, scroll down the page and make your selection beneath the Regional Resources Global tab..."
                                    IT - Networks
                                    Network Automation: More Than Scripting
                                    NetworkComputing, June 22nd, 2015
                                    "Automating rote network tasks isn't all script-driven. Network automation also can mean intelligent control and policy-based networking. Many companies today tout network automation capabilities in their hardware and software. Network automation means tasks are performed automatically. At the simplest level, it automates what used to be typed manually into command line interfaces (CLIs).

                                    Some people equate network automation with scripting, but it's a lot more. It can start with script-level automation, progress to intelligent network control, and at the highest level, translate network administrators' intent via policy.

                                    Here are some different types of network automation:..."

                                      5G Networks Look To New Frequencies To Deliver Gigabit Speeds
                                      Network World, June 25th, 2015
                                      "If operators are to build 5G mobile networks with download speeds at 10Gbps and above, they are going to need a lot more spectrum - but getting it won't be easy...

                                      The amount of spectrum allocated to 5G will determine how fast networks based on the technology will eventually become. Until recently, only frequencies below 6GHz have been considered for mobile networks, mostly because they are good for covering large areas. But there's now a growing need to unlock new spectrum bands in the 6GHz to 100GHz range too, attendees at the LTE and 5G World Summit conferences in Amsterdam heard this week..."

                                      Google's 60Tbps Pacific Cable Welcomed With Champagne In Japan
                                      CIO, June 23rd, 2015
                                      "With bottles of bubbly and a purification ceremony, a Google-backed undersea cable was given a warm welcome on a beach in Japan last week, a critical step in building the highest capacity data link in the Pacific ever created...

                                      The 9,000-kilometer FASTER cable will have a peak capacity of 60 terabytes per second (Tbps) when it enters operation next year, joining Japan with Oregon on the West Coast of the U.S..."

                                      Houston We Have A Problem . . . In The Networking Community
                                      Forrester, June 23rd, 2015
                                      "I noticed an interesting phenomenon at Interop which sparked my theory on new network technologies. New network technology maturity and its adoption correlate directly to the five stages of loss: 1) denial; 2) anger; 3) bargaining; 4) depression; and 5) acceptance. For example, Interop break-out sessions on cloud and bring your own device (BYOD) now mostly seemed to be mainstream initiatives compared to other technologies, such as software defined network or network functions virtualized..."
                                      Why The Wi-Fi Of Things Is The Connected Future
                                      Information Age, June 24th, 2015
                                      "The Internet of Things could be bigger than the internet, but without connectivity it is just a pile of silicon, plastic and metal

                                      When IBM PC launched in 1981, few businesses considered the PC a must-have for their employees. Yet in less than a decade, a PC was as fundamental to the workplace as pencils and paperclips.

                                      But at the same time that desktop PCs became a staple of the modern office, laptops were still a luxury. Fast-forward a decade: laptops are outselling desktop PCs and no serious mobile worker can be without one..."

                                      7 SDN Innovations
                                      NetworkComputing, June 23rd, 2015
                                      "Industry experts weigh in on the most innovative software-defined networking technology they've seen so far this year, including SD-WAN, ONOS, and OpenConfig...

                                      By taking a completely new approach to networking, SDN is all about innovation. Out with CLI, in with programming! In separating the data and control planes with an eye on making networks agile and flexible, software-defined networking is fundamentally cutting-edge technology..."

                                      IT - IoT
                                      These 4 Things Will Change Your Outlook On The Internet Of Things
                                      Business 2 Community, June 25th, 2015
                                      "Once proposed as a virtual representation of identifiable pieces of information from the Internet, the Internet of Things (IoT) is taking on an entirely new life of its own. Moving from a control of networks, it now signifies advanced connectivity among devices, systems, people, services, and things. And it is even reaching beyond machine-to-machine communication to cover a variety of processes, domains, and applications..."
                                      Sensors, Like Smartphones Before Them, Drive Mobile Market Growth
                                      Information Management, June 23rd, 2015
                                      "The U.S. mobile worker population will grow at a steady rate over the next five years, rising from 96.2 million in 2015 to 105.4 million in 2020, according to a new study by International Data Corp. (IDC).

                                      By the end of the forecast period, the firm expects mobile workers to account for nearly three quarters (72%) of the total U.S. workforce. The key drivers behind the growth in the U.S. mobile workforce include the increasing affordability of smartphones and tablets combined with the growing acceptance of corporate bring-your-own-device (BYOD) programs..."

                                      10 IoT Applications for SMEs
                                      ITProPortal, June 27th, 2015
                                      "Internet of Things is the 'quiet revolution - whose time has finally come' according to recent research from the Economist Intelligence Unit (EIU) which shows that nearly 100 per cent (96 per cent) of business leaders expect their businesses to be using IoT in one form or another by 2016.

                                      In addition, 60 per cent of the 779 global business leaders surveyed agree that companies that are slow to integrate IoT will fall behind their competition..."

                                      Breaking the IoT Connection
                                      Re/code, June 26th, 2015
                                      "In many ways, the current obsession with the Internet of Things is understandable. The tech press is constantly on the lookout for something cool and fresh to write about, and IoT is this year's hot topic. Plus, the idea of connecting essentially everything to everything is pretty compelling at a conceptual level.

                                      However, there are some harsh realities that really shouldn't and can't be ignored..."

                                      IT - Linux
                                      Five Security Tips For New Linux Admins
                                      Foss Force, June 22nd, 2015
                                      It's generally fairly easy for new Linux administrators to get up and running with the basics of installing, configuring and managing Linux systems at a basic level. Truthfully, though, it takes years to get the in-depth knowledge required in many server environments today. One thing I really recommend learning early on - i.e. from the beginning - is security.

                                      I participate in a group of professional penetration testers (the nice folks who help you test your security as if they were the bad guys) called Charlotte Hackers Anonymous. I asked the group what they thought were the most important tips for new system administrators, and below are their tips, along with my thoughts on each..."

                                      Linux Foundation Funds Internet Security Advances
                                      InformationWeek, June 25th, 2015
                                      "The Core Infrastructure Initiative, which the Linux Foundation uses to shore up key pieces of Internet open source code, is funding three new projects. The additions are all security oriented and will receive a total of $500,000..."
                                      What's Coming In Red Hat Enterprise Linux 7.2?
                                      ServerWatch, June 25th, 2015
                                      "One of the most popular sessions at any Red Hat Summit is the Red Hat Enterprise Linux Roadmap session, and the 2015 event held here is no exception.

                                      Denise Dumas, Vice President, Operating System Platform at Red Hat, detailed her company's Linux server plans for the upcoming Red Hat Enterprise Linux 7.2 cycle, Red Hat Enterprise Linux 7.2which includes technologies that improve server, networking and even desktop performance..."

                                      Is It That Hard To Use Linux As Your Main Computer Operating System?
                                      Softpedia, June 19th, 2015
                                      "Every once in a while, I find myself in a situation where I'm being asked by someone who wants to migrate from a Microsoft Windows operating system if Linux is indeed a new home for Windows refugees.

                                      Migrating from an operating system to a different one is not for everyone, no matter if you're switching from Windows to Linux, or from Linux to Mac, or from Mac to Windows, as it involves special hardware (in some cases) and a lot of time learning how the new OS works, something that we are short of these days..."

                                      Peazip - A Portable File Manager And Archive Tool For Linux
                                      Tecmint, June 20th, 2015
                                      "PeaZip is a free and open-source application software released under GNU Lesser General Public License. Written mostly in Free Pascal and available for all major platforms including Windows, Mac (under development), Linux and BSD.

                                      PeaZip currently supports 182+ file extensions and native archive format known as PEA archive format..."

                                      IT - Operations
                                      Identity Management Scalability And APIs Support Explosive Mobile App Growth
                                      Business 2 Community, June 26th, 2015
                                      "In the age of digital disruption, the new battleground for market leadership has shifted from price and product quality to customer experience. To deliver the convenient, high value experiences that customers have come to expect, businesses must consistently innovate and be able to roll out new services and apps quickly..."
                                        5 Reasons Why Google Data Centers Are Running Like Giant, Efficient Computers
                                        CRN, June 22nd, 2015
                                        "Google has spent tons of time solving problems associated with running global-scale services. In many cases, Google has had to invent technologies to address specific challenges simply because no one else has attempted to build services at the scale that it's focused on.

                                        In the past decade, Google has been developing its own networking software and hardware, and that has led to a 100x increase in data center capacity, Amin Vahdat, Google Fellow and technical lead for networking, said in a blog post Thursday..."

                                        Commodity Data Center Storage: Building Your Own
                                        Data Center Knowledge, June 23rd, 2015
                                        "It's becoming a really interesting topic out there. I very recently had a conversation with an administrator and a friend who asked me if it's a good idea to buy a commodity server chassis and fill it with Flash drives to create their own data center storage system. They argued that they can use a hypervisor or third-party software to manage it, create high availability, and even extend into the cloud.

                                        Does it make sense for everyone? What are the actual ingredients in creating your own commodity system?..."

                                        Boost For The Data Centre As Organisations Plan Spending Increase Despite Cloud Growth
                                        Information Age, June 26th, 2015
                                        "Growing investment in cloud and colocation is not resulting in lower data centre facility spending, according to 451 Research...

                                        New research has revealed that despite increased investment in cloud and colocation providers, 87% of data centre operators expect to increase their facility spending this year.

                                        451 Research's quarterly survey on data centre centres found that both medium-sized and large organisations expect to increase spending on data centres, with the most growth coming from healthcare and finance industries.

                                        The primary targets for this increased spending are rack and cabling, power equipment and data centre infrastructure management software (DCIM), according to the study..."

                                        15 Screen-Sharing Apps For Easy Collaboration
                                        Network World, June 22nd, 2015
                                        "Need to hold a virtual meeting complete with screen sharing? Or maybe you just need to remotely access a colleague's computer to help him with a quick fix. Here are 15 ways to get the job done -- for free..."
                                          A Peek Inside United's Greenfield Data Center Project
                                          Search Data Center, June 23rd, 2015
                                          "United Airlines' award-winning greenfield data center project shows off some of the latest energy efficiency tactics and IT management possibilities.

                                          The trip from nine data centers to a single greenfield facility for one of the country's legacy airlines involved a little midflight turbulence but resulted in a safe landing.

                                          United Airlines' data center consolidation project is one of the most energy efficient in the U.S. and even makes use of a Kyoto cooling wheel..."

                                          The Wonderful Madness Of Metrics: Different Things To Different Folk
                                          The Register, June 23rd, 2015
                                          "Managers and customers love statistics and metrics. Companies can live or die by how good their metrics are and the potential penalties for failing to meet the required service levels as defined in agreements.

                                          It can also be: 'Have my team met their SLA' or: 'What is the uptime on the server farm'.

                                          The dictionary defines the noun metric as: 'A standard for measuring or evaluating something, especially one that uses figures or statistics'..."

                                            IT - Security
                                            7 Things To Do When Your Business Is Hacked
                                            Network World, June 22nd, 2015
                                            "The first thing an IT security executive should do after the corporate network has been breached is fall back on the incident response plan that was put in place well before attackers got through the carefully constructed defenses.

                                            That's what should have happened, but even if it wasn't there are certain steps that anyone running an incident response team should follow in order to accomplish the main goal of any such cleanup: getting the network back to supporting business as usual as quickly as possible..."

                                            How CISOs can create security KPIs and KRIs
                                            CIO, June 25th, 2015
                                            "The Information Security Forum recommends that CISOs take a four-step approach to creating key performance indicators (KPIs) and key risk indicators (KRIs) to support informed decision-making...

                                            If your information security function is like most, it develops copious amounts of data about the business's security that it delivers on a regular basis. And typically it never gets read..."

                                            Common Cybersecurity Myths Debunked
                                            CSO Online, June 25th, 2015
                                            "One of the greatest challenges for organizations attempting to address cybersecurity risks is the number of fundamental security myths that cause organizations to incorrectly assess threats, misallocate resources, and set inappropriate goals. Dispelling those myths is key to developing a sophisticated, appropriate approach to information security..."
                                            Businesses Struggle To Counter Insider Threats
                                            eWeek, June 26th, 2015
                                            "Application users are most likely to cause a security breach because of negligence, as monitoring is mainly done by ad hoc or manual systems.

                                            While companies and their employees are becoming increasingly dependent upon applications to achieve business goals and increase productivity, the proliferation of applications is creating a serious security threat, according to a survey of 610 U.S. IT and IT security practitioners, sponsored by ObserveIT and conducted by the Ponemon Institute..."

                                            Three Simple Ways To Prevent A Data Breach
                                            Help Net Security, June 25th, 2015
                                            "With methods of cybercrime rapidly evolving, the number of headline-making data breaches continues to grow. Unfortunately, it has become clear that even advanced security measures can be easily bypassed and traditional defensive mindsets have proven to be inefficient.

                                            Companies are realizing the need to develop new security frameworks that will help them be more effective in fighting against cybercrime. The new trend in the IT industry suggests that companies need to eliminate blind spots in the IT environments and obtain access to actionable audit data about all processes that might impact security..."

                                            Top 3 Security Priorities For CIOs In 2015
                                            Information Age, June 23rd, 2015
                                            "How CIOs should prioritise their efforts around security, from budgeting and managing delivery of service through to working with the rest of the business

                                            When it comes to securing the enterprise, CIOs certainly have their hands full. Whether it's implementing new services, managing cloud computing and BYOD initiatives, tackling long-standing challenges like data protection, or protecting networks and applications against attacks, there's plenty going on to keep a CIO awake at night.

                                            However, the danger here is that when something like cloud computing or BYOD comes along and grabs the headlines, resources are directed away from serious security efforts, which puts the business in far more peril..."

                                            Is Cybercrime Going To Cause The Next Global Economic Meltdown?
                                            Information Age, June 22nd, 2015
                                            "Last year will be remembered as a pivotal moment for cybersecurity after a number of high profile breaches dominated the headlines. Such attacks will obviously have a lasting impact on a company's reputation, but the effect that this can have on the value of a company is often overlooked. A cyber attack could pull the proverbial rug from underneath the sustainable growth of a business.

                                            In our information age, a company's expansion plans will often require the digitalisation of certain key functions and processes to improve efficiency and, by extension, profit. If this digitalisation occurs without an accompanied investment in cybersecurity, the company could unknowingly open itself up to a cyber attack at the core of business operations..."

                                              Software Developers Are Failing To Implement Crypto Correctly, Data Reveals
                                              Network World, June 26th, 2015
                                              "Despite a big push over the past few years to use encryption to combat security breaches, lack of expertise among developers and overly complex libraries have led to widespread implementation failures in business applications.

                                              The scale of the problem is significant. Cryptographic issues are the second most common type of flaws affecting applications across all industries, according to a report this week by application security firm Veracode..."

                                              Six Criteria For Buying Data Loss Prevention Products
                                              SearchSecurity, June 22nd, 2015
                                              "Expert Bill Hayes lays out six steps to take in order to buy the right data loss protection (DLP) products for your organization...

                                              Data loss prevention (DLP) products allow organizations to protect sensitive information that could cause grave harm if stolen or accidentally exposed. Examples of sensitive information include intellectual property, customer and employee data such as Social Security numbers, personally identifiable information, personal health information, and financial data such as bank account numbers and payment card information (PCI). While almost every organization can benefit from some form of DLP technology, the financial, healthcare, manufacturing and government sectors in particular are likely to find DLP most beneficial..."

                                              How To Keep Track Of Sensitive Data With A Data Flow Map
                                              SearchSecurity, June 26th, 2015
                                              "Expert Bill Hayes describes how to create a data flow map to visualize where sensitive data is processed, how it transits the network and where it's stored...

                                              Data flow maps are a recognized method of tracing the flow of data through a process or physically through a network. For instance, beginning with version 3.0, Payment Card Industry Digital Security Standard paragraph 1.1. 3 started calling for the use of a continually updated data flow map that depicts the flow of credit card data inside and outside the cardholder data environment..."

                                              Prepare for the Big Digital Cert Swap -- or Else (SHA-2)
                                              InfoWorld, June 23rd, 2015
                                              "In a year or two, SHA-1 certificates will be rejected across the Internet. Now's the time to plan your migration from SHA-1 to SHA-2 and avoid a crisis...

                                              Those of us of a certain age remember the megaglitch known as Y2K. As you may recall, the date field in older software and systems was limited to a two-digit designation for the year, so when Jan. 1, 2000, rolled around, a ton of systems and programs would read '01-01-00' as '01-01-1900'..."

                                                FBI: Cryptowall Ransomware Plague Rising
                                                Network World, June 24th, 2015
                                                "As the sad and sometimes scary examples of the scam known as ransomware propagates, the FBI this week said the CryptoWall variant is rapidly becoming the swindle of choice by criminals.

                                                The FBI's Internet Crime Complaint Center said between April 2014 and June 2015, it received 992 CryptoWall-related complaints, with victims reporting losses totaling over $18 million. And its not just user PCs that are being targeted, a growing number of victims are being hit with ransomware that locks down mobile phones and demands payments to unlock them..."

                                                  IT - Careers
                                                  What The Best Hiring Managers Look For
                                                  Business 2 Community, June 22nd, 2015
                                                  "The main thing that the best hiring managers look for is culture fit. They'll check this both through a candidate's resume and through the interview process.

                                                  Usually, on the resume, it's a quick scan to make sure that you fit the job description and a general gut feeling based on what they see.

                                                  For the interview process, the main thing they're looking for is culture fit. Some hiring managers do this properly, while others don't have much of a process.

                                                  Having a solid hiring process and making sure that you're hiring the best people will increase employee engagement across the entire company. But hiring managers focus on a few core things both with the resume and the interview.

                                                  Let's go through both together..."

                                                    Top 10 Cities For IT Pros Looking To Make A Move
                                                    CIO, June 22nd, 2015
                                                    "Business is booming in 2015, and across the country IT organizations are loosening the purse strings and shelling out big bucks for critical IT talent. Here's a look at the 10 hottest cities for IT pay based on percent increase in salary, area home prices and median salary...

                                                    Relocation? If your answer is, "Yes, please," the timing is right. The Computerworld IT Salary Survey 2015 confirms that business is booming and salary increases are back in a big way. As budgets are loosened, organizations are shelling out big bucks to land top IT talent. This year 67 percent of respondents reported a raise, with only 4 percent reporting a pay cut, compared with 60 percent reporting a raise and 8 percent reporting a pay cut in 2014..."

                                                    Cover Letters Are Dead -- Send A Pain Letter, Instead
                                                    Forbes, June 27th, 2015
                                                    "Human beings are creatures of habit. If we've seen something once, we can't focus on it intently again. We think we already know all about it, so we don't pay attention. That's why busy humans ignore glorious sunsets and other amazing sights and experiences every day.

                                                    The cover letter format is over - it's done..."

                                                      How To Keep Your Job From Ruining Your Vacation
                                                      InformationWeek, June 26th, 2015
                                                      "Here's what you can do before, during, and after your vacation to make it restful and help you disconnect...

                                                      Work ruins vacations. Lucky is the IT pro who has not experienced this: You're on a long-awaited vacation and your phone rings. Your boss has a question, or needs your help. Maybe you do it to yourself. You check your email and spot an issue you know the folks at the office are trying to handle without you, but you can't enjoy yourself until you know it is fixed. How do you keep work from ruining your vacation?..."

                                                        The Labor Shortage Myth
                                                        Business 2 Community, June 25th, 2015
                                                        "Crisis or confusion: is there really a shortage of skilled talent?

                                                        Some business leaders, attempting to rationalize the difficulty to fill languishing job openings, have placed the blame on a supposed deficit of available talent with relevant skills - particularly those versed in science, technology, engineering and math (STEM)..."

                                                          How CIOs Can Create The IT Workforce Of The Future
                                                          CIO, June 25th, 2015
                                                          "Today's businesses are more dependent on technology than ever. For CIOs this is a change-or-be-changed scenario -- a call to action to guide their businesses and shape the IT workforce.

                                                          Today, more than ever, businesses are dependent on technology to drive transformations that are anything but incremental. For CIOs, that means a tremendous opportunity to guide and help their businesses harness technology to realize the multiplier effect that new technologies offer as well as their digital ambitions..."

                                                            IT - Virtualization
                                                            The Virtualization Journey
                                                            Data Center Journal, June 23rd, 2015
                                                            "It's no secret that virtualization rules the data center-it just recently surpassed 50 percent of all server workloads and is expected to reach 86 percent by 2016. But although virtualized data centers have largely become mainstream, the majority of organizations are still in what might be considered the early phases of virtualization maturity.

                                                            So, how can businesses navigate this landscape to fully realize the benefits of advanced virtualization technology? ..."

                                                              Docker Rivals Join Together In Open Container Effort
                                                              ServerWatch, June 22nd, 2015
                                                              "The open-source container community is uniting today with the new Open Container Project (OCP), which is backed by the Linux Foundation. The OCP ends months of speculation and debate in the Docker community about container specifications and unite the biggest backers of containers behind a common purpose..."
                                                              Standards Are Coming For Containers
                                                              Network World, June 22nd, 2015
                                                              "A list of leading cloud, storage and virtualization companies are backing a new effort named the Open Container Project, which aims to create a set of standards for the fast-growing technology.

                                                              Containers have swept across the technology industry in the past year as a way for application developers to host code in operating system-level virtualization.

                                                              Containers can run on bare-metal servers or in virtual machines and have garnered much attention because of their potential to be portable across those environments. To achieve true portability, though, there needs to be some standards that vendors agree upon to define a container. The Open Container Project will attempt to make and govern those standards..."

                                                              IT - Email
                                                              Email 101: 11 Tips To Manage Your Email
                                                              CIO, June 24th, 2015
                                                              "If you're a college graduate entering the workforce, you may quickly find you aren't prepared for the volume of email that awaits you in the corporate world. These 11 tips will help you master forwards, filtering and more.

                                                              Let's face it, as much as we might complain about it, email remains an integral part of business communication - a form many college graduates are ill-prepared for. Rather than let it trip you up at the beginning of your career, or become a productivity killer every work week, try a handful of these tips and tricks and you'll zipping through your inbox in no time at all while minimizing electronic faux pas?..."

                                                                How Organisations Are Addressing The Fundamental Security Flaw In Email
                                                                Information Age, June 23rd, 2015
                                                                "Perpetrators of cyber crime are increasingly taking advantage of a brand's reputation to commit fraud through emails, which is damaging to both the brands themselves as well as their customers.

                                                                The Radicati group's Email Statistics Report of 2013-2017 shows that more than 196 billion emails are sent each day, demonstrating how this channel remains one of the most ubiquitous forms of communications that brands use.

                                                                Email continues to be one of the primary tools for exchanging information online, and the very nature of its pervasiveness means that perpetrators of cyber crime are increasingly using it to target customers - taking advantage of a brand's trusted reputation to commit fraud and target customers with spoof emails that appear to be legitimate..."

                                                                  Use Oracle Storage To Your Competitive Advantage
                                                                  New Video Series

                                                                  Roxana Babiciu writes, "We have four short videos highlighting Oracle Storage, featuring Kerstin Woods, Senior Principal Product Marketing Director, Oracle Storage. Partners can view, upload to your own website, or make a request to have a semi-customized video for your use - free of charge! Work with your Oracle Partner Manager if you would like to create a semi-customized video, and view our resource page for video specifics and order information..."

                                                                  IT - Backup
                                                                  How To Make Cloud Backup A No-Brainer
                                                                  InfoWorld, June 24th, 2015
                                                                  "The 3-2-1 rule is simple and easy to remember for your backup strategy: You want three copies of your data, in two different formats, with one of those copies offsite. Having three copies ensures redundancy (because they should be in different locations and formats). Using different formats goes back to the tape/disk/optical mindset of the past..."
                                                                  IT - Big Data
                                                                  4 Solutions To Bad Data For Sales Managers
                                                                  Business 2 Community, June 26th, 2015
                                                                  "Bad data is a challenge for all organizations, in all departments. As a sales manager, I see how it impacts the sales enablement process on a daily basis. For instance, when salespeople lack complete lead and contact record data, they aren't able to connect with potential buyers when those buyers are in need. In addition, bad data is a time suck. SiriusDecisions says that sales professionals spend an average of 30% of their time researching contact information and entering it into their CRM. Incomplete data is the number one reason that salespeople give up on their CRM.

                                                                  Here are some ways to solve the bad data issue for your sales team..."

                                                                    3 Reasons Your Big Data Isn't Making You Smarter
                                                                    Business 2 Community, June 22nd, 2015
                                                                    "With 1 billion devices and 2.9 billion people connected worldwide, IT systems are flooded with data. However, instead of bailing themselves out, some companies are embracing this information to drive business growth. On the other hand, there are others that are ignoring this opportunity altogether and unknowingly accepting unnecessary risk.

                                                                    But watch out: The Internet of Things has yet to produce the data tsunami it's capable of analytics generating - and it will soon happen..."

                                                                    Hadoop And Big Data: Ready To Cross The Chasm?
                                                                    Datamation, June 25th, 2015
                                                                    "It's rare for a technology and concept like Hadoop and Big Data to take off with the speed that they have, more so with a technology and concept as big and complex. Hadoop was an internal project at Yahoo just five years ago. Now, companies are betting their business on Big Data.

                                                                    The challenge, though, is for the products to mature. And much like those silly cheese commercials on TV, Hadoop needs to mature as well. It's one thing for techies with Java skills to download the source code from the Apache Foundation and conduct internal experiments. But if that's all there is, that would have guaranteed that Hadoop never got beyond the propellerheads..."

                                                                    10 Reasons Tape Backup Remains Important To The Enterprise
                                                                    eWeek, June 25th, 2015
                                                                    "Digital tape is about the hardest-to-kill storage IT there is, unless you count carving out data onto rocks, the way it was done hundreds of thousands of years ago. Tape technology celebrated its 63rd birthday on May 21; IBM first made available its IBM 726 Magnetic tape reader/recorder in 1952. Strangely, unlike later IBM tape drives, the original 726 could read tape backward and forward. Tape has managed to get better with age. When tape first went to market, the media itself weighed 935 pounds and held 2.3MB of data. In 2015, that much tape weighs closer to 12 pounds, and 2.3MB would comprise one large photo or a short pop song...."
                                                                    'Big Data' Has Lost Its Zing - Businesses Want Insight And Action
                                                                    Forrester, June 27th, 2015
                                                                    "I saw it coming last year. Big data isn't what it used to be. Not because firms are disillusioned with the technology, but rather because the term is no longer helpful. With nearly two-thirds of firms having implemented or planning to implement some big data capability by the end of 2015, the wave has definitely hit. People have bought in..."
                                                                    Drinking From The Data Firehose: Businesses Must Manage Their Data Volumes Or Sink
                                                                    Information Age, June 24th, 2015
                                                                    "As we enter the age of information mobility, Greg Hanson, vice president Business Operations EMEA at Informatica, examines how businesses can successfully capture, integrate, cleanse and analyse the flood of complex data that is in motion across the enterprise.

                                                                    Whilst data has always played a key role in informing decisions, previously much of this data came from transactional databases and unstructured sources like email. However, in a digital era, critical information often resides outside of company perimeters in conversations on social media, CRM software and cloud storage applications..."

                                                                      Big Data Moves Toward Real-Time Analysis
                                                                      InformationWeek, June 23rd, 2015
                                                                      "The data warehouse, as valuable as it is, is history. The most valuable data will be that which is collected and analyzed during the customer interaction, not the review afterward...

                                                                      It's clear there's a transformation in enterprise data handling underway. This was evident among the big data aficionados attending the Hadoop Summit, in San Jose, Calif., and the Spark Summit in San Francisco earlier this month..."

                                                                      Spark Big Data Framework Powers Speedy Analytics
                                                                      Search Business Analytics, June 24th, 2015
                                                                      "The Apache Spark engine can be a powerful tool for encouraging big data adoption among front-line workers thanks to its fast processing speeds...

                                                                      The Spark big data distributed computing framework generally gets a lot of attention from data engineers, but so far that's mainly where its appeal has stopped. But users are saying it has one major feature that should help it garner broader appeal: Speed..."

                                                                      What Should An IT Systems Analyst Learn About Big Data?
                                                                      SearchDataCenter, June 24th, 2015
                                                                      "The best way to learn big data principles is to start with how information systems work, particularly databases and infrastructure. It's also important to cover big data tools like Cloudera, Hadoop, Spark, Hive, Pig, Flume, Sqoop and Mesos before you start.

                                                                      A systems analyst should understand how to organize, manage and protect data. There are dozens upon dozens of data management products available on the market to help organize and manage data..."

                                                                      IT - Mobile
                                                                      Consumers Will Download More Than 226 Billion Apps In 2015
                                                                      Forrester, June 22nd, 2015
                                                                      "Apple and Google have recently announced the total number of app downloads from their app stores over the past 12 months. Apps downloaded by by iOS users crossed the 100 billion mark in June 2015 - 25 billion of those in the past 12 months - while Android users have downloaded more than 50 billion apps in the past 12 months. Google did not announce a cumulative download figure, although we know that app downloads passed 50 billion in July 2013..."
                                                                      7 Of The Biggest Smartphone Myths That Just Won't Die
                                                                      How To Geek, June 24th, 2015
                                                                      "Smartphones have only been mainstream for less than a decade, but myths have still built up over time. Some of these myths have been around for years and just won't go away.

                                                                      From software to hardware, these myths just won't go away. Yes, every type of technology has its myths - from PCs to Windows tweaking to smartphones..."

                                                                      Self-Driving Cars Ripe For Global Platform War
                                                                      InformationWeek, June 24th, 2015
                                                                      "Two distinct views of self-driving cars will be difficult to reconcile...

                                                                      There are two distinct and not entirely compatible philosophies when it comes to building self-driving cars, and these two "platforms" put regulators and manufacturers in quite a quandary when it comes to making policy..."

                                                                        Fingerprint Sensors On Their Way To More Smartphones
                                                                        Network World, June 22nd, 2015
                                                                        "Fingerprint authentication will become a lot more common on smartphones of all prices as sensors get cheaper - and Google's integration of the technology in the next version of Android will make it much easier for app developers and service providers to make use of them.

                                                                        Today, fingerprint sensors are mainly available on high-end models from Apple and Samsung Electronics. But that is about to change, according to sensor manufacturers Synaptics and Fingerprint Cards..."

                                                                        The Trouble With Mobile...
                                                                        TechWorld, June 22nd, 2015
                                                                        "A couple of weeks ago, I looked at mobile strategy and how it should play a fundamental part in the future of businesses. While developing a robust strategy will undoubtedly pay dividends and go a long way to secure relevance for the future, it's important to be realistic about the process of acting on the strategy and making the product work for both staff and customers.

                                                                        As with most technologies, the development process for a mobile product is likely to encounter issues and holdups..."

                                                                          IT - BYOD
                                                                          Overcoming BYOD Fear
                                                                          CloudTweaks, June 24th, 2015
                                                                          "While the popularity of the remote workforce has been on the rise, more and more people are returning to the office to work out of fear that their business data isn't secure, according to a Neustar report. A whopping 83 percent of respondents are worried about the security of their files, and 27 percent feel uncomfortable sharing data through emails.

                                                                          Despite popular belief, the convenience of implementing BYOD practices in enterprise businesses doesn't have to come at the cost of security or IT control. In fact, there are some simple solutions that can enhance mobility without compromising company data..."

                                                                          Forget The Device, Secure The Data
                                                                          CSO Online, June 24th, 2015
                                                                          "Last June, Wisegate, a crowd sourced IT research company, surveyed hundreds of its senior-level IT professional members to assess the current state of security risks and controls in business today. The respondents considered malware and breaches of sensitive data to be the primary security risks/threats, followed by malicious outsider risk..."
                                                                          Top Tips - How You Can Truly Embrace BYOD In The Meeting Room
                                                                          Information Age, June 26th, 2015
                                                                          "Now that companies are beginning to get their heads around the security issues, it's time to see what BYOD can do for your meetings..

                                                                          The rising trend of Bring Your Own Device (BYOD), whether as an official enterprise policy or an informal practice by employees, has resulted in additional devices being increasingly used in the workplace, with inherent benefits for employees and organisations. It makes mobile and flexible working more straight-forward and improves the opportunities for collaboration..."

                                                                          A Phobia Of BYOD? Here'd How Your Business Can Overcome Its Fear
                                                                          ITProPortal, June 25th, 2015
                                                                          "While the popularity of the remote workforce has been on the rise, more and more people are returning to the office to work out of fear that their business data isn't secure, according to a Neustar report. A whopping 83 per cent of respondents are worried about the security of their files, and 27 per cent feel uncomfortable sharing data through emails.

                                                                          Despite popular belief, the convenience of implementing BYOD practices in enterprise businesses doesn't have to come at the cost of security or IT control. In fact, there are some simple solutions that can enhance mobility without compromising company data..."

                                                                          Top Ten Articles for last few Issues
                                                                          Vol 208 Issues 1, 2 and 3 ; Vol 207 Issues 1, 2, 3 and 4; Vol 206 Issue 5
                                                                          We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                                          • Oracle Fiscal 2015 Q4 Results
                                                                          • Oracle Appoints David Donatelli to Lead Converged Infrastructure Business
                                                                          • Test Drive a Fujitsu M10 Server at No Cost
                                                                          • Using MPxIO and Veritas
                                                                          • Oracle Announces Annual Partner Kickoff
                                                                          • Database Administrators
                                                                          • Sinosure Core Business System Excels on Oracle SPARC T5 and Solaris
                                                                          • EBS 12.2 Certified on Linux
                                                                          • Take This Template And Shove It: How We See Managing Millennials
                                                                          • The Ghosts of Java EE 7 in Production: Past, Present and Future

                                                                          The longer version of this article has list of top ten articles for the last 8 weeks.

                                                                            IT - Encryption
                                                                            How Encryption Keys Could Be Stolen By Your Lunch
                                                                            PC World, June 22nd, 2015
                                                                            "Israel-based researchers said they've developed a cheaper and faster method to pull the encryption keys stored on a computer using an unlikely accomplice: pita bread.

                                                                            The new study builds on research into what can be learned from the electronic signals that waft from computers while performing computations, often referred to as side-channel attacks.

                                                                            By studying the electronic signals, researchers have shown it is possible to deduce keystrokes, figure out what application a person is using or discover the secret encryption keys used to encrypt files or emails..."

                                                                            IT - Developer
                                                                            MEAN vs. LAMP for the future of programming
                                                                            InfoWorld, June 22nd, 2015
                                                                            "LAMP diehards take note: The flexible simplicity of MongoDB, ExpressJS, AngularJS, and Node.js is no joke ...

                                                                            The transition from cutting-edge curiosity to practical workhorse is not one that many technologies make. Yesterday's precocious upstarts often fail to live up to their Version 0.1 promise -- not so for the technologies that make up the fiercely acronymized MEAN stack.

                                                                            It was only a few years ago that MongoDB, Express.js, AngularJS, and Node.js were raising eyebrows on their own. Now they've grown up and ganged up, and together they're doing serious work, poaching no small number of developers from the vast LAMP camp. But how exactly does this newfangled MEAN thing stack up against LAMP? When is it better to choose the well-tested, mature LAMP over this upstart collection of JavaScript-centric technologies?..."

                                                                            Take Early JDK 9 For A Spin In Early NetBeans 9
                                                                            By Geertjan
                                                                            Geertjan writes, "Here's a super cool new development for the true adventurer, the wild side walker, and the most cutting edge of cutting edge Java developers.

                                                                            Could this be you?

                                                                            From today, there's a brand new build of NetBeans IDE focused very specifically on giving you the tools you need for taking the early access build of JDK 9 for a spin:..."

                                                                            Nexenta News
                                                                            Nexenta OpenSDx Summit 2015
                                                                            Thursday, September 3rd - San Francisco
                                                                            On Thursday, September 3rd Nexenta will hold its annual, invitation-only Nexenta OpenSDx Summit 2015 in San Francisco at the St. Regis. As one of the technology industry's leading executive forums, Nexenta OpenSDx Summit will welcome an exciting keynote speaker, along with more than 500 CEOs, CIOs, investors, government agencies, and technology industry insiders.

                                                                            Held in conjunction with VMworld, Nexenta OpenSDx Summit will feature a full day of thought-provoking sessions and discussions - combined with stellar networking opportunities. If you'd like to be considered to attend this event, please sign up.

                                                                            Sign Up

                                                                            Level3 News
                                                                            Promedon Selects Level 3 to Connect its Medical Branches Around the World with Video Conferencing Services
                                                                            Medical Technology Provider Leverages A Local Solution For Interoffice Communications
                                                                            Level 3 Communications announced a new contract with Promedon, a leading medical researcher and provider of innovative medical technology, for its Enhanced Video Collaboration Solution. This new product, developed in Latin America by Level 3, offers enterprise video conferencing solutions that are accessible from any location through multiple devices and can be accessed from both private and public networks.

                                                                            Promedon is expanding into new locations and needed a way to accelerate the flow of business information between offices. Level 3 will provide Promedon connectivity services and high definition video conferencing between its various locations to improve productivity and interoffice communications.

                                                                              Trending in
                                                                              Vol 235, Issue 2
                                                                              Trending IT Articles