News about Oracle's Solaris and Sun Hardware
System News
Nov 16th, 2015 — Nov 22nd, 2015 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 213, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle News
Marketers Optimize the Customer Experience with New Oracle Marketing Cloud Enhancements
New innovations enhance sales enablement, improve cross-channel orchestration and demonstrate marketing's impact on business results
To help marketers deliver a more consistent customer experience across paid, owned and earned media, Oracle has introduced a series of new innovations within the Oracle Marketing Cloud. The new innovations enable marketers to orchestrate relevant mobile interactions for consumers and salespeople, clearly attribute revenue to marketing activities and optimize the experience for individual customers.

Marketers must adopt and embrace digital technologies in order to meet the skyrocketing expectations of digitally-savvy customers. For many marketers, this will require rethinking existing processes, as according to Forrester Research, more than three-quarters of marketing leaders believe that the majority of their digital customer engagements are not optimized today.To optimize digital marketing activities and successfully meet the demands of today's customer-first business environment, marketers need to be able to quickly and easily embrace data, technology and content...

The CMO Club and Oracle Deliver New Solution Guide to Help CMOs Transform Their Marketing Organization
New CMO Solution Guide provides best practices to help marketers maximize business impact of data, technology and content
To help CMOs meet skyrocketing customer and boardroom expectations, The CMO Club, along with Oracle, today released 'The CMO Solution Guide for Building a Modern Marketing Organization.' The guide, which is based on interviews with CMOs and digital marketing leaders from major brands including Dow Chemical, JetBlue Airways, MasterCard, PayPal, Quiznos, The Hershey Company and Viking River Cruises, includes insights and best practices that CMOs can apply to build customer-first marketing teams that drive measurable results.

Marketing leaders are faced with a perfect storm of business, consumer and technological change that is exponentially increasing the complexity of every single marketing activity.

Oracle Database Disaster Recovery on Public Cloud
By Okcan Yasin Saygili
Okcan blogs, "Oracle Databases are run in most, if not all, of the Fortune 500 and form the backbone of critical applications and business operations. Oracle Database High Availability was always a high priority for Oracle, as we understand that keeping business online 24/7, 365 Days a Year is vital. In any other case, the productivity would be interrupted, data could potentially be lost, but most importantly corporate image would be tarnished with unpredictable devaluation of share price.

Oracle Public Cloud is available for quite a while now, offering an extensive set of cloud services tailored to specific requirements:.."

What Does The Internet of Things Mean To You?
By Jim Lein
Jim Lein writes, "Oracle Profit magazine's Five Ideas recently featured the perspective of five Oracle experts on The Internet of Things (IoT) which I found to be thought-provoking because I get asked to define IoT several times per week. It's a term that means different things to different people. I confess, I sometimes use the phrase as a place to park my incomplete or immature musings on a subject, especially in conversations with people outside our industry, e.g. 'the Internet of Things means doing business the way your customers want and expect you to'..."
Artificial Intelligence? 97.4 Percent Of Computers Say They Still Us Need Humans
Forbes, November 16th, 2015
"A key trend for our 2016 technology landscape will be machine learning and artificial intelligence (AI), if it isn't a major driver in 2015 anyway that is. Right next to the term AI we will also find terms like deep learning, 'neural' networked computers and so-called cognitive computing..."
    Convergence Coming for Supercomputing, Machine Learning
    The Next Platform, November 20th, 2015
    "When it comes to traditional supercomputing, the tools, frameworks, and software stacks tend to be codified, especially within the various domains that use high performance computing. In recent years, a new cadre of large-scale data analysis tooling has come into the HPC fold, but until more recently, machine learning, deep neural networks, and other re-emerging artificial intelligence tools have not been looped into the supercomputing world.

    We have already described how machine learning and AI frameworks are using various elements of high performance computing, particularly on the accelerator side with companies like Nvidia dominating the computationally intensive training phase of machine learning via GPU acceleration and others, including FPGA maker, Xilinx, talking up the role of FPGAs for the inference portion of such workloads. However, outside of the use of these frameworks for hyperscale web companies, the connection between research-centric HPC and machine learning is still resolving..."

    Machine Learning Versus Machine Discovery
    TechCrunch, November 17th, 2015
    "Machine learning is hot. Where it applies, it heatedly enables data-rich and knowledge-lean automation of valuable tasks of perception, classification and numeric prediction. Its sibling, machine discovery, deals with uncovering new knowledge that enlightens or guides human beings. Let's consider where learning or discovery best applies - and why this matters for business..."
      Webinar replay: What happens when Software moves into Silicon
      By Cinzia Mascanzoni
      Cinzia blogs, "Oracle Academy is offering an exciting opportunity to learn about the design principles behind the revolutionary Software in Silicon technology which is at the core of Oracle's SPARC M7 microprocessor chip design. In a replay of a panel discussion with senior executives from the software and hardware side of Oracle's systems business, partners will gain insights into the strategy behind Oracle's dramatic computer chip redesign architecture, as well as hear the Q&A with the panel. Catch the replay..."
      Amazing Results on SPARC T7 by MSC Software
      By Mike Mulkey
      Mike writes, "Leo Kilfoy, General Manager at MSC Software, spoke to us on video at Oracle OpenWorld 2015 about the "amazing results" his company is seeing in recent tests on the Oracle SPARC T7 processor. MSC is seeing SPARC T7 throughput peaking out at over a 2x improvement over some of the SPARC and Intel processors they have used in the past.

      In recent tests with Oracle engineers, MSC Software was able to perform a remarkable 60,000 simulations in a single day by consolidating 12 instances of SimManager onto a single core of the SPARC T7 processor, which was also supporting the Oracle Database..."

      Oracle Delivers 'Software on Silicon'
      Doubles Down on Optimizing its Own Software with Latest Hardware
      "Looking at Oracle's latest iteration of its SPARC processor technology, the new M7 CPU, it is at first blush an excellent implementation of SPARC, with 32 cores with 8 threads each implemented in an aggressive 20 nm process and promising a well-deserved performance bump for legacy SPARC/Solaris users. But the impact of the M7 goes beyond simple comparisons to previous generations of SPARC and competing products such as Intel's Xeon E7 and IBM POWER 8. The M7 is Oracle's first tangible delivery of its 'Software on Silicon' promise, with significant acceleration of key software operations enabled in the M7 hardware..."
      IT - Storage
      Critical Capabilities for General-Purpose, Midrange Storage - Gartner
      Storage Newsletter, November 20th, 2015
      Infrastructure and operations leaders can improve the availability, agility and efficiency of storage infrastructures by mapping application needs to storage array capabilities. This research quantifies eight critical measures of product attractiveness across six midrange storage array use cases.
      2016 Storage Predictions from Active Archive Alliance
      Storage Newsletter, November 16th, 2015
      "Due to limited capabilities and increased risk within the public cloud, many organizations are integrating the private cloud within their computing architectures to form stable and efficient hybrid cloud systems. cloud data centers are consistently targeted and intermittently attacked by malware and hackers, making them the most threatened data centers. With the hybrid cloud, organizations can effortlessly adjust their public cloud resources to accommodate changes while they maintaining sensitive information within their private infrastructures..."
        Java Technology
        Deploying Java EE 7 Applications to Partitions from Eclipse
        By Steve Button
        Steve writes, "The new WebLogic Server 12.2.1 Multi-tenant feature enables partitions to be created in a domain that are isolated from one another and able to be managed independently of one another. From a development perspective, this isolation opens up some interesting opportunities - for instance it enables the use of a single domain to be shared by multiple developers, working on the same application, without them needing to worry about collisions of URLs or cross accessing of resources..."
        Catch the Java 9 Train
        By Yolande Poirier
        Yolande blogs. 'The goal of Java 9 is to increase developer productivity while retaining Java's key values of readability, simplicity, universality and compatibility' explains Mark Reinhold. In this video, he describes the Java 9 release that will introduce modules, addressing the complexity of class path and the monolithic JDK..."
        2015 JCP Award Winners Announced
        By Reza Rahman
        "An open standard like Java EE involves a lot of hard work from a lot of different groups of people. The hard work of these people, largely selflessly, benefit countless Java developers. For specification leads the work in the JCP is often far beyond just a job. I have seen the same to be true of many vendor experts on a specification. Especially admirable are the independents that contribute to specifications largely on their own time as well as Adopt-a-JSR participants. The annual Java Community Process awards is a small way of recognizing some of these great people and their work. There are four different awards:.."
        Modularity in Java 9
        By Yolande Poirier
        Yolande Poirier blogs, "Learn about Java 9 with four presentations from Alan Bateman and Mark Reinhold! In the 'Prepare for JDK 9' presentation, Alan describes JDK 9 changes and their implications in existing code and future development..."
        IT - Technology
        9 Research Projects that Could Transform the Enterprise
        InfoWorld, November 16th, 2015
        "If you take a look at the list of trending repositories on GitHub, you'll see amazing code from programmers who live around the world and efforts for firms big and small. But one thing you don't often see is work that comes from the university labs. It's rare for the next big thing to escape from an academic computer science department and capture the attention of the world..."
          Cheaper, Higher Performing LEDs
          Science Daily, November 17th, 2015
          "A team of Florida State University materials researchers has developed a new type of light-emitting diode, or LED, using an organic-inorganic hybrid that could lead to cheaper, brighter and mass produced lights and displays in the future..."
            The 10 Mightiest Supercomputers In the World (slideshow)
            Network World, November 16th, 2015
            "The latest Top500 supercomputer rankings are out today, to coincide with the annual SC15 conference, which is being held this year in Austin, Texas. While there are plenty of names familiar to Top500 watchers in the new top 10, there are also some new faces. Or, there would be if supercomputers had faces. Have a look..."
              The Top 3d Printers According to Make Magazine
              ComputerWorld, November 16th, 2015
              "Make magazine has released its 2015 3D buyer's guide ranking of 18 3D printers, and for the first time CNC milling machines.

              The third annual guide called out top-performing 3D printers, including LulzBot's Taz 5, SeeMeCNC's Rostock Max, PrintrBot Play, Ultimaker 2 Extended, as well as CNC (Computer Numerical Control) mills such as the ShopBot Desktop and the CrawlBot..."

                IT - Bitcoin
                Konrad S. Graf: 'Bitcoin Is Among The Greatest Inventions In History'
      , November 15th, 2015
                "When I initially got into Bitcoin, the first thing I did was apply the new digital currency to the Austrian economics I had learned in the past. Determined to learn the value of Bitcoin and whether or not it was actual money, I spent hours arguing about the subject throughout online forums. Diving down the rabbit-hole of crypto, through droves of academic literature and Internet research, I came across someone who explained these theories like no other..."
                Bitcoin Is Growing up - an Infographic of the Bitcoin Ecosystem
                Bitcoin Magazine, November 18th, 2015
                "On January 3, 2009, the Genesis block, or the first block in the Bitcoin blockchain, was created. In the coinbase parameter, there was a simple message: 'The Times 03/Jan/2009 Chancellor on brink of second bailout for banks.' From that one block, Bitcoin was born.

                Bitcoin has come a long way from that initial statement by Bitcoin's pseudonymous founder, Satoshi Nakamoto. The technology is growing up and changing from its early days as a project adopted by impassioned technologists and libertarians to a technology widely researched and used by financial institutions worldwide..."

                2016 will be 'The Year of Bitcoin' and here's why (Op-Ed)
      , November 13th, 2015
                "You cannot build a house unless you have a strong foundation. After years of mockery and ignorance about Bitcoin and anything related, 2015 has proven to be a lengthy procession of plaudits for Bitcoin's foundation, the ledger know as the blockchain. Being a former banker myself, I marvel at the double-talk lobbied by mainstream economic leaders like Jamie Dimon of J.P. Morgan Chase, but maybe I shouldn't be so surprised at all..."
                Bitcoin, Paris and Terrorism: What the Media Got Wrong
                CoinDesk, November 20th, 2015
                "Due to their status as both an emerging payment method and payments technology, global authorities have long sought to ensure safeguards are in place to prevent digital currencies from being abused by cybercriminals and terrorists seeking to take advantage of their cash-like features.

                This narrative was given new prominence this week following the terrorist attacks in Paris last Friday, which left more than 100 people dead and that have found law enforcement agencies and politicians seeking to take aggressive measures to bolster security in their wake..."

                The Dark Web - The Bitcoin Slang Market
                NEWSBTC, November 19th, 2015
                "Many people believe that search engines, especially Google, can index most of the pages available on the web for a given search query. Nonetheless, the truth is that there is a massive part of the internet that cannot be accessed by Google's crawling spiders. This part of the web is known as the 'Dark Web' and it is a place where cryptocurrency, namely bitcoin, is the official currency.

                What is The Dark Web?..."

                Is Bitcoin Anonymous? A Complete Beginner's Guide
                Bitcoin Magazine, November 18th, 2015
                "Bitcoin is not anonymous, but, rather, pseudo-anonymous. By now, most Bitcoin veterans know this. It's less obvious to many, however, why Bitcoin is not really anonymous by default, and what can be done to de-anonymize Bitcoin users - and what Bitcoin users can do to reclaim their privacy.

                Below is an advanced beginners guide to get a better understanding of the nuances of Bitcoin and anonymity..."

                The Banking System Is Obsolete: Bitcoin and the Blockchain Are the Future
      , November 15th, 2015
                "The current banking system and fiat currencies are obsolete. They are unfit to support the new economy. Banks are intermediaries and, as such, they can hinder or delay the free flow of businesses. Banks are expensive, especially for the poor. People lose money at banks, due to outrageous fees.

                People are fearful of putting their money in banks in countries such as Argentina, Cyprus, and Greece. History has proven those people right. And, in the U.S., what would have happened if taxpayers had not bailed out the banks and other big financial institutions during the 2008 financial crisis?..."

                  IT - FOSS
                  11 New Open Source Development Tools
                  Datamation, November 17th, 2015
                  These tools were first released or open sourced within the past couple of years and are worth checking out.

                  • .net
                  • Bazel
                  • Falcor
                  • Jsonnet
                  • Neovim
                  • Nuclide
                  • Office UI Fabric
                  • Parse SDKs
                  • React
                  • Sleepy Puppy
                  • YAPF

                  Read on.

                    IT - DevOps
                    Four CIO tips for implementing DevOps
                    ComputerWeekly, November 20th, 2015
                    "Esure CIO Mark Foulsham shares his advice for IT leaders about successfully implementing DevOps methods to become a more agile organisation

                    Mark Foulsham describes himself as 'busy'; it is an apt description. The group CIO of insurance specialist esure is overseeing an IT transformation plan to help future-proof the organisation against the fast-evolving nature of modern business technology..."

                    DevOps - right now, or later?
                    jaxenter, November 19th, 2015
                    "How do you get started with DevOps? And more importantly when do you get started? DevOps pros Peter Roßbach (bee42 Solutions), Bethany Macri (Etsy), Paul Stack (OpenTable) and Sascha Möllering (Zanox AG) trade tips with Sebastian Meyen (S&S Media) in this video panel discussion..."
                    What is DevOps? Executives' Perspective
                    Dzone, November 21st, 2015
                    "The pervasiveness of software is driving the dynamics of business transactions everywhere. We live in a time of a highly competitive and truly global economy where the question being answered among businesses now is 'who can innovate the fastest?'

                    To keep pace with the increasing velocity of software updated being introduced to the market, enterprises embrace DevOps and Continuous Delivery practices, along with implementing a fully-automated software delivery process, in order to keep up with the demand to go faster..."

                    Connector/Net joins MySQL products on Github
                    By MySQL Connector/Net team
                    "We are very pleased to announce that the MySQL Connector/Net source code has been added to GitHub. All of our versions can be found at MySQL Connector/Net repository, under the umbrella of the MySQL organization. This repository will expose the source code of the latest generally available (GA) releases. Same versions that are available in the official MySQL download site..."
                    Cloud Computing
                    New Oracle Database Hybrid Cloud e-Book
                    By Javier Puerta
                    Just released: Oracle Database Cloud e-Book!

                    Javier blogs, "This new Database Cloud e-book provides you with a comprehensive look at Oracle Database Cloud solutions which offers full portability between your on-premises and cloud environments. Businesses want to capitalize on new business opportunities quickly and bring new products to market faster. These 'time to market demands' are driving IT innovation and change. Database Clouds promise greater agility, lower risk and cost over traditional IT environments..."

                    Best Videos about Oracle Linux from OOW15
                    By Zeynep Koch
                    Zeynep writes, "There's something better about hearing a topic in a video, it is as if you have been transported to that location without interruptions from other elements. You also get to know the presenter at a different level; how he gets excited about his products, his projects or the environment around him. For this reason, we wanted to dedicate this Friday to all the Oracle OpenWorld videos that feature Oracle Linux. It will give you an amazing insight and transport you to San Francisco, to that moment!..."
                    IT - Cloud
                    15 Cool Cloud Companies and Their Even Cooler Products (Slideshow)
                    CRN, November 16th, 2015
                    "Discussions about the cloud usually veer toward hyper-scale providers or popular Software-as-a-Service applications.

                    But there's a wave of innovative companies -- many startups, some longer in the tooth -- launching products that are reshaping the way business customers interact with and take advantage of their public and private cloud environments. They're making clouds more manageable, agile, visible, affordable, insightful and secure -- and easier to adopt..."

                      CIO Insight: Trainline CTO On Firm's Journey to the Cloud And Analytics Future
                      v3 co uk, November 18th, 2015
                      "Mark Holt has had a highly varied career in the IT industry, with roles at organisations including The Financial Times, Capital Radio, Avis and even NeXT Software during its acquisition by Apple in 1996.

                      The latest stop on his journey is Trainline. He joined in March 2014 when the chairman of the company, someone he'd known for 20 years since his time at Capital Radio, asked him to come aboard as chief technology officer..."

                        How Tesco Bank has Adopted AWS Cloud as 'Business as Usual' in Eight Months
                        ComputerWorld UK, November 17th, 2015
                        "Tesco Bank's head of transformation, Allan Brearley, reveals how to gain backing from your business to adopt cloud quickly

                        While certain industries have warmed to the public cloud at a fast pace, the more conservative finance sector has traditionally lagged behind.

                        However this is beginning to change. At AWS Summit in London today, Tesco Bank's head of transformation, Allan Brearley, revealed the company has gone from little or no cloud usage to it being 'business as usual' within just eight months..."

                        Managing The Data Deluge For National Security Analysts
                        Science Daily, November 17th, 2015
                        "National security analysts often find that available data is growing much faster than their ability to observe and process it. Sometimes they can't make key connections and often they are overwhelmed struggling to use data for predictions and forensics. A research team has developed solutions that will enable analysts to work smarter, faster and more effectively when looking at complex data in real-time, stressful environments..."
                        No, Containers Are Not the Future of the Cloud
                        InfoWorld, November 20th, 2015
                        "Containers are a great path to better applications, both in the cloud and on-premises, but they are not the cloud itself

                        I'm speaking at the New Structure Conference in San Francisco this week, and the common themes are the cloud and containers -- often interwined. The sense is that containers are exploding in use, with Docker, CoreOS, and Mesos becoming the new rock stars of cloud computing..."

                        IT - CxO
                        7 Keys to Better Risk Assessment
                        InfoWorld, November 17th, 2015
                        "... here is a point of diminishing returns in network security. A threshold which, when crossed, your network's security posture begins to recede.

                        You know what I'm talking about. Here are some examples:.."

                        CISOs Learn 5 Tough Lessons about Conveying Security Risks
                        CSO Online, November 19th, 2015
                        "A CISO at a large manufacturing company walked out of a board meeting last year fully expecting to be fired after giving a presentation on security.

                        He had spent about a year in the CISO role and had gone into the board meeting thinking he was doing the right thing - giving members the brutally honest truth about what was wrong with the company's information security..."

                        Customer Analytics Key to Top 10 Critical Business Success Factors (Slideshow)
                        Information Management, November 16th, 2015
                        "A new report from Forrester Research reveals that those organizations that best use customer data and analytics will have a major competitive edge in 2016. What does that mean for the CIO and CDO?

                        Here are the firm's 'Top 10 Critical Success Factors' that will determine who wins and fails in the 'Age of the Customer'..."

                        Want to Hire the Best and the Brightest? Use an Algorithm
                        Information Management, November 18th, 2015
                        "People want to believe they have good instincts, but when it comes to hiring, they can't best a computer. Hiring managers select worse job candidates than the ones recommended by an algorithm, new research from the National Bureau of Economic Research finds.

                        Looking across 15 companies and more than 300,000 hires in low-skill service-sector jobs, such as data entry and call center work, NBER researchers compared the tenure of employees who had been hired based on the algorithmic recommendations of a job test with that of people who'd been picked by a human..."

                          IT - DR
                          The Worst Data Disasters from 2015
                          HelpNet Security, November 19th, 2015
                          "What's stronger than a speeding locomotive and can survive the heat of a fire? Data. The device that contains that data is a different story.

                          Each year, Kroll Ontrack - which performs over 40,000 data recovery jobs each year around the world - collects and publishes a list of the toughest physical and logical data losses from its global offices..."

                            IT - Networks
                            Network Security Primer: What is Access Control?
                            Network World, November 17th, 2015
                            "During its testimony on security weaknesses among federal agencies this week, the Government Accountability Office detailed a number of critical elements that make up effective protection systems.

                            Among the systems the watchdog agency detailed was the key components in access control which is typically the technology an enterprise uses to regulate who has access to what resources..."

                            The Case against SDN Implementation
                            Search SDN, November 18th, 2015
                            "Networking expert and SDN enthusiast Patrick Hubbard plays devil's advocate, arguing against SDN implementation and exploring why it may be a bad idea.

                            If you're reading this, it's probably safe to assume you're following the topic of software-defined networking (SDN) and are likely eager to see broad SDN implementation. Full disclosure, I'm also a huge proponent of SDN, as evidenced by the past guest posts I've written covering its challenges, as well as its considerable potential to transform the way we deploy and manage our networks..."

                            VLAN Implementation Guide: The Basics
                            NetworkComputing, November 17th, 2015
                            "If you're just getting started in the world of network administration and architecture, there's no better place to begin than with a solid understanding of virtual LANs (VLANs.)

                            In order to understand the purpose of VLANs, it's best to look at how Ethernet networks previously functioned. Prior to VLANs and VLAN-aware switches, Ethernet networks were connected using Ethernet hubs. A hub was nothing more than a multi-port repeater. When an end device sent information onto the Ethernet network toward a destination device, the hub retransmitted that information out all other ports as a network-wide broadcast..."

                            IT - IoT
                            Internet of Things: 5 Real-World Reasons It's not Going Away
                            NetworkComputing, November 13th, 2015
                            "The Internet of Things is here to stay. That means a major transformation for many things, including the data center market, technologies, customers, and sales and marketing models -- not to mention the vast amount of revenue that will be generated by IoT product and service providers, which are projected to exceed $300 billion in 2020, according to Gartner.

                            That will include an estimated 26 billion installed units -- such as devices, sensors, and many categories of connected things that don't even exist yet. And if that doesn't convince you, IDC forecasts that the worldwide market for IoT solutions will grow from $655.8 billion in 2014 to $1.7 trillion in 2020..."

                            Five key strategies for IoT success
                            ComputerWeekly, November 20th, 2015
                            "Companies need to be agile because in some IoT systems, it will be a question of the winner taking it all, according to Kent Eriksson, IoT business consultant at PTC

                            There are five key strategies for success in projects using internet of things (IoT) technologies, according to Kent Eriksson, IoT business consultant at PTC..."

                            Internet of Things: Why IoT is here to stay within the enterprise
                            Enterprise AppsTech, November 20th, 2015
                            "The Internet of Things (IoT) has made a name for itself in the consumer sphere. From fitness trackers like Fitbit to Amazon's Dash buttons for one-touch product ordering, the average person can tangibly embrace IoT in everyday life. New cars have been outfitted with IoT technologies, such as Apple's CarPlay, making driving to work a technological affair of 'thing' proportions..."
                            IT - Linux
                            A Look At The New Features Of The Linux 4.4 Kernel
                            Phoronix, November 15th, 2015
                            "If all goes according to plan, the Linux 4.4 kernel merge window will end today with the release of the 4.4-rc1 kernel. As all of the major subsystem updates have already landed for Linux 4.4, here's my usual look at the highlights for this kernel cycle.

                            As noted yesterday, Linux 4.4 is currently around 20.8 million lines or an increase of about 200 thousand lines of code/documentation and a few hundred new files after Linus accepted around 12,000 commits for this merge window. In my close monitoring of the mainline Git code and mailing lists over the past few weeks, the items of Linux 4.4 that have caught my attention include:.."

                            10 offbeat, odd, and downright weird places you'll find Linux
                            ITWorld, November 12th, 2015
                            "Let's just get this out of the way: this isn't the year of Linux on the desktop. That year will probably never arrive. But Linux has gotten just about everywhere else, and the Linux community can take a bow for making that happen. Android, based on the Linux kernel, is so prevalent on mobile devices that it makes the longstanding desktop quest seem irrelevant...."
                            IT - Operations
                            Five Apps for Benchmarking Your Hardware
                            TechRepublic, November 17th, 2015
                            "Whether you want to play the latest first person shooter game or perform some hard core data analytics, having the right hardware can make all the difference in the world. That's where system benchmarking comes into play. Benchmarking allows you to quantify your PC's performance to make sure it's up to the task at hand. This article discusses five benchmarking tools..."
                            IT - Security
                            Inside the Largely Unexplored World of Mainframe Security
                            HelpNet Security, November 18th, 2015
                            "The security of mainframe computers - the so-called "big iron", which is mainly used by large organizations for critical applications, bulk data and transaction processing - is not a topic that has garnered much interest from the public. And, according to Phil "Soldier of Fortran" Young, the security community has not shown much interest so far, either..."
                            Organizations Sloppy about Securing Privileged Accounts
                            CIO, November 17th, 2015
                            "While most companies have processes in place for managing administrative and other privileged accounts -- the sorts of credentials frequently used in high-profile data breaches for the past several years -- most do a poor job of enforcing those processes...

                            Companies' haphazard processes for managing administrative or other privileged accounts are putting them at risk of security breaches, according to a new global security survey..."

                            The Dark Side of Layered Security
                            CSO Online, November 13th, 2015
                            "Layered security is currently considered a best practice for enterprises, since a single layer of defense against attackers is no longer enough. Sometimes, however, these layers can have unintended consequences and even make a company less secure than before..."
                            The Eyes Have It When It Comes to Biometric Accuracy
                            Information Management, November 17th, 2015
                            "Iris recognition is the most accurate biometric modality available in the market today, scanning more than 250 signature points to collect data from a source while competing systems scan less than a 100, according to a report from Frost & Sullivan. But questions remain on the technology's ability to succeed in the face of the rising popularity of fingerprint recognition solutions, the report says..."
                              Tips from a Hacker to Improve Network Security
                              Information Management, November 19th, 2015
                              "Aaron Hayden is an information systems analyst with CliftonLarsonAllen, a large certified public accounting firm. He's also an ethical hacker, one of 40 in the organization. And they are 100 percent successful hacking any business except a bank..."
                                When It Comes to Enterprise Network Security, Less is More
                                Network World, November 13th, 2015
                                "You remember those classic Get Smart scenes where Agent 86 and the Chief would have something so secret to talk about they would go to Control headquarters in the bowels of the Pentagon, push the button, and the Cone of Silence would drop down over their heads? Inside the Cone they could have a private conversation. Outside the Cone, no one can hear you. At least, that was the idea. Sounds perfect. The problem? It never worked! So, out of frustration, 86 and the Chief resorted to ducking under the Cone and shouting to each other, ensuring everyone could hear them.

                                Who would have thought Maxwell Smart could have taught us so much about network security?..."

                                IT - Careers
                                12 Travel-Friendly Tech Gifts You'll Want to Take With You
                                PC World, November 17th, 2015
                                "Technology that's easy at home can become a burden on the road - whether it's too big, too heavy, or helpless when you're away from a speedy Internet connection. The travel-friendly tech in this gift guide can save your favorite frequent flier some stress on their next trip. Whether it's a clip-on camera accessory or a great organizer, it's all worth taking with you..."
                                  Follow These 9 Steps to Ask for What You Want (and Actually Get It)
                                  Success, November 17th, 2015
                                  "The world responds to those who ask. When you begin to ask for what you need and want, you've taken control of your life - you are proactively steering its direction. Many wonderful and great things come to you as a result.

                                  But just how do you go about getting started asking? Here are the primary action steps to take:.."

                                    How 4 Organizations Connect Veterans to IT Jobs
                                    CIO, November 19th, 2015
                                    "Making the transition from the military to civilian employment can be difficult. According to the Department of Veterans Affairs, more than half of returning, post-9/11 veterans will experience a period of unemployment. Here are four organizations working to help returning service members leverage their skills and training to gain IT employment..."
                                      How to Get People to Agree With You
                                      Fast Company, November 16th, 2015
                                      "You know your idea is good. You've done your homework, and your arguments are well researched and founded. So why isn't your client or coworker agreeing?

                                      Fear of change is the gorilla in the room, says Rob Jolles, author of How to Change Minds: The Art of Influence Without Manipulation..."

                                        3 must-have soft skills required for success in IT
                                        The Enterprisers Project, November 16th, 2015
                                        "Most IT employees know that success at their jobs is entirely dependent on their skills. But they think of these skills in terms of software development know-how, proficiency with coding tools or databases, knowing how to use the latest Web functions, and so on. Soft skills - the kind that help you interact with colleagues whether they're in IT or not - have always come lower on the list.

                                        That's a mistake..."

                                          IT - Social Media
                                          Anonymous Just Might Make All the Difference In Attacking ISIS
                                          Network World, November 16th, 2015
                                          "In the wake of the horrific attacks in Paris, military operations against ISIS terrorist strongholds have increased. When someone hits you, it's natural to hit back. But can you win by killing an enemy that seeks death - and when those who are killed inspire desperate others to replace them?..."
                                            IT - Virtualization
                                            How to Solve today's Top Three Virtual Environment Challenges
                                            Network World, November 13th, 2015
                                            "Virtualization is a mature technology but if you don't have a virtualization wizard on staff managing the environment can be a challenge. Benefits such as flexibility, scalability and cost savings can quickly give way to security risks, resource waste and infrastructure performance degradation, so it is as important to understand common virtual environment problems and how to solve them.

                                            The issues tend to fall into three main areas: virtual machine (VM) sprawl, capacity planning and change management. Here's a deeper look at the problems and what you can do to address them:..."

                                            IT - Email
                                            5 Email Helpers You Need to Install Right Now
                                            CIO, November 18th, 2015
                                            "Email overload is a fact of daily business life. Or is it? While plenty of applications promise to help you manage the morass of messages munging up your mailbox, these five may actually deliver on those promises...

                                            Email is causing too much overload. According to productivity expert Nathan Zeldes, we spend about 20 hours per week processing email. Of that, at least one third of that time is spent dealing with unimportant messages. There has to be a better way, right? ..."

                                              DOD's Anti-Phishing Policy Disables Links in Outside Emails
                                              DefenseSystems, November 16th, 2015
                                              "In an effort to help users avoid phishing scams and other potential threats, the Pentagon is instituting a policy of disabling HTML links in emails that come from outside the .mil domain.

                                              Sean Lyngaas of sister publication FCW reports that the policy is being established gradually but is already in place for most Defense Department users. Richard Hale, DOD deputy CIO for cybersecurity, told FCW that the policy is a coordinated effort between his office and the U.S. Cyber Command, and is part of a larger effort to tighten DOD's network defenses..."

                                              Security and Privacy Need to be Core to IoT Design, Say Industry Leaders
                                              ComputerWeekly, November 18th, 2015
                                              "The best way of tackling security and privacy concerns around the internet of things is to focus on both from the design phase, say industry leaders

                                              Large companies such as Bosch and General Electric (GE) are exploring the huge potential benefits of technologies enabling an internet of things (IoT), but they agree that security and privacy are important elements..."

                                              IT - Database
                                              How to Use SANless Clusters to Protect SQL In the Cloud
                                              Network World, November 18th, 2015
                                              "Adding SANless clustering to your Windows Server Failover Clustering environment makes it possible to synchronize storage among physical, virtual and cloud servers...

                                              While cloud computing has proven to be beneficial for many organizations, IT departments have been slow to trust the cloud for business-critical Microsoft SQL Server workloads. One of their primary concerns is the availability of their SQL Server, because traditional shared-storage, high-availability clustering configurations are not practical or affordable in the cloud..."

                                              IT - Backup
                                              Understanding the 4 Most Common Types of Data Backup
                                              Business 2 Community, November 18th, 2015
                                              "The saying 'always have a backup plan' is never more true than when it comes to your work files. Backing up computer files should be an ingrained routine in your business because the alternative could mean a loss of valuable work product, money and jobs. Especially if you are dealing in e-commerce, the potential for disaster resulting from a loss in data could be crippling for your business..."
                                                Why SMBs Should Consider Hybrid Cloud Backup
                                                Data Center Knowledge, November 19th, 2015
                                                "If you're looking to build a backup solution that is scalable, cost-efficient and allows multiple disaster recovery scenarios, then switching to a hybrid cloud backup strategy is for you.

                                                Hybrid solutions work in conjunction with your existing backup applications and policies. Local on-premise data can remain local if required and still have the flexibility of expanding onto cloud storage should you require additional capacity. Utilizing this cost-effective storage means you can store a full copy of all your backups on the cloud in the event of a site disaster..."

                                                IT - Mobile
                                                Mobile Users Continue to Put Personal and Corporate Data At Risk
                                                HelpNet Security, November 19th, 2015
                                                "Blancco Technology Group surveyed over 1,400 mobile users in the United States, Canada, UK and Australia, and found that inadequate security precautions taken by mobile users not only put their personal information at risk, but also leave corporate data exposed and susceptible to cyber theft.

                                                Despite consumers and legislative authorities demanding more data management responsibility and accountability from companies, close to one-third (29 percent) of the surveyed consumers admit they do not know when their personal information has been accessed without their consent..."

                                                Mobile Device Management and Mobile Security
                                                Virtual-Strategy Magazine, November 16th, 2015
                                                "A recent survey by International Data Corporation (IDC), predicts that the number of mobile workers in the U.S. will increase from 96.2 million in 2015 to 105.4 million by 2020. It is projected that by this time mobile workers are estimated to make up 73% of the U.S. workforce. While this is an astonishing prediction, confirming that our world and workforce is becoming ever-more increasingly mobile, how can companies control who has access to data in remote locations?..."
                                                IT - Big Data
                                                2016 Predictions: All That Data Will Finally Drive Business Action
                                                Forrester, November 9th, 2015
                                                "Do you consider yourself 'data-driven'? If you're like most business and technology leaders, you do. But the reality is that most businesses have only scratched the surface when it comes to transforming all of that data into insight that drives real business action. In our 2016 predictions report, my colleagues Brian Hopkins, Jennifer Belissent, PhD., and I predict what will happen in the hottest areas of big data, analytics, business intelligence, and systems of insight - and tell you what to do about it. Here's a sneak at just a few highlights:..."
                                                Drop the Obsession with Big Data, Zero Days and Just... Help the Business
                                                The Register, November 16th, 2015
                                                "Haroon Meer, founder of applied research company Thinkst, opened the Black Hat Europe conference last week with a keynote attacking the fashionable obsessions of the security businesses, including blind faith in Big Data and an obsession with zero-day vulnerabilities.

                                                The keynote, entitled What Got Us Here Won't Get Us There*, exhorted conference attendees to roll their sleeves up and focus on deliverables and assisting their businesses rather than aiming for an unachievable security nirvana using Big Data and other fashionable technologies. Security pros face big trouble on the horizon with a crisis of both relevance and confidence..."

                                                Insider Threats: 10 Ways to Protect Your Data
                                                InformationWeek, November 18th, 2015
                                                "While IT focuses on outside threats, danger lurks from within -- your employees. Whether intentional or unintentional, data breaches resulting from workers mishandling data can be prevented. Here's a look at 10 ways it can be done effectively...

                                                With so much attention placed on protecting corporate infrastructure from external threats, it often comes as a surprise to IT leadership that over 40% of data loss is the direct result of internal threats. While we must generally think of our employees as trusted individuals, their mishandling of data -- both intentional and unintentional -- is a tremendous risk in the world of IT security..."

                                                Mastering the Finer Points of Big Data Success
                                                Information Management, November 17th, 2015
                                                "Most industries have been disrupted, or are in the process of being disrupted, by accelerating changes in their markets. Shifting consumer behaviors, enabled in part by digital technologies and the Internet of Things, are the prime movers of the headwinds many companies now face. Enormous amounts of new data are being generated and coming online every day, that presents the opportunity to do something differently and move the needle on business performance..."
                                                Why aren't Insurers Doing More with Their Data Strategy?
                                                Insurance Networking, November 17th, 2015
                                                "While the business intelligence space has matured greatly in the last decade, it has been and remains an area where insurers need to work with a variety of platforms and tools to build out their capabilities. This requires a mix of technical skillsets, business expertise, and vendor relationships. While few efforts at an insurer are more complex or time consuming as a core system replacement, a major BI initiative will eventually touch all aspects of an organization. I will be presenting more on this topic in a webinar on December 1, 2015..."
                                                  IT - BYOD
                                                  Three BYOD Scenarios that Require Remote Wipe
                                                  entech, November 17th, 2015
                                                  "Bring Your Own Device (BYOD) became a business buzzword in 2009 and has completely revolutionized the way that employees are conducting business. BYOD can save organizations money. A comprehensive BYOD campaign can save an organization up to $1,300 per user per year. It's more than saving money, though. BYOD is about bringing flexibility to your employees by allowing them to work on a device that they're familiar with in order to make them more productive. In fact, according to Forbes, 49% of users say that they are more productive when using their own devices..."
                                                  3 Tips For Managing BYOD At Your Small Business
                                                  Forbes, November 16th, 2015
                                                  "When was the last time you met someone who doesn't check work email on his or her personal smartphone? As more businesses allow employees to connect their devices to company infrastructure, bring-your-own-device (BYOD) culture has quickly become the norm..."
                                                  Top Ten Articles for last few Issues
                                                  Vol 213 Issues 1, 2; Vol 212 Issues 1, 2, 3 and 4; Vol 211 Issues 4 and 5
                                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                  • SPECjbb2015
                                                  • When is the next Java update?
                                                  • Oracle VM VirtualBox 5.0.10
                                                  • Virtual HBA in Oracle VM Server for SPARC
                                                  • SPARC M7 Software In Silicon
                                                  • Learn About Using DTrace with Oracle Linux
                                                  • Webcast replays: SuperCluster M7 & T7/M7
                                                  • Oracle Solaris Cluster Manager
                                                  • Unbreakable Enterprise Kernel Release 3 Quarterly Update 7
                                                  • NetBeans IDE 8.1 Plugins

                                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                                    IT - Encryption
                                                    How to Deal With the Blind Spots In Your Security Created by SSL Encrypted Traffic
                                                    Network World, November 17th, 2015
                                                    "SSL/TLS encryption is widely used to secure communications to internal and external servers, but can blind security mechanisms by preventing inspection of network traffic, increasing risk. In fact, Gartner predicts that in 2017 more than half of network attacks targeting enterprises will use encrypted traffic to bypass controls.

                                                    With attackers preying on the security gaps created by encrypted traffic, let's examine the five most common network traffic inspection errors made today:.."

                                                    Why the CIA Wanting Encryption Backdoors Is a Failure Of Leadership, Not Intelligence
                                                    ZDnet, November 17th, 2015
                                                    "Analysis: The question shouldn't be if encryption should have backdoors, but why intelligence agencies have begun shifting the blame onto those who push for privacy...

                                                    It took about three days for the CIA director and former intelligence officials to reignite the debate over the use of encryption, with some speculating that it may have been the reason why French and other Western intelligence agencies were unable to prevent the Paris attack earlier this month..."

                                                    IT - Server
                                                    10 Dumb Security Mistakes Sys Admins make
                                                    Network World, November 18th, 2015
                                                    "Do as I say, not as I do: Admin mistakes often surpass the severity of those made by users. Here are 10 of the most common -- and their remedies...

                                                    Security isn't merely a technical problem -- it's a people problem. There's only so much technology you can throw at a network before dumb human mistakes trip you up.

                                                    But guess what? Those mistakes are often committed by the very people who should know better: system administrators and other IT staff..."

                                                    IT - Developer
                                                    Microsoft Open Sources AI Toolkit
                                                    I Programmer, November 18th, 2015
                                                    "After waiting for a big open source toolkit, two come along at the same time. Microsoft follows Google in providing the world with a way to do advanced distributed AI. Earlier this month Google open sourced TensorFlow, the tool that it uses internally for a wide range of parallel computations, including implementing neural networks and other AI learning methods.

                                                    Shortly afterwards researchers at the Microsoft Asia research lab made the Microsoft Distributed Machine Learning Toolkit available on GitHub under an MIT licence..."

                                                    NetBeans IDE 8.1 Integrates with Chrome Browser
                                                    By Geertjan Wielenga
                                                    Geertjan writes, "With the release of NetBeans IDE 8.1, the NetBeans Connector plugin for Chrome has been updated. A frequently observed problem, whereby the plugin needed to be reinstalled whenever you deployed an app to Chrome, has been fixed. Everything works seamlessly now..."
                                                    Nexenta News
                                                    Nexenta Receives 2015 Cloud Storage Excellence Award from Cloud Computing Magazine
                                                    Nexenta, November 18th, 2015
                                                    Nexenta announced that TMC , a global, integrated media company, has named both NexentaStor and NexentaEdge with vCloud Air integration as 2015 Cloud Computing Storage Excellence Award winners presented by TMC's Cloud Computing Magazine.

                                                    The Cloud Storage Excellence Award recognizes companies that have introduced or improved cloud storage solutions...

                                                    Nexenta and Supermicro to Showcase Market Leading Joint Open Software-Defined Storage Solutions for High Performance Computing at SC15
                                                    Nexenta, November 16th, 2015
                                                    Nexenta the global leader in Open Source-driven Software-Defined Storage (OpenSDS), announced they joined Supermicro to showcase its unified product portfolio for file, block and object storage at SC15 , November 16-19 in Austin, TX. SC15 brought together the international supercomputing community to provide a unique venue for spotlighting HPC and scientific applications, and innovations from around the world.

                                                    Nexenta provided insight on its award-winning OpenSDS solutions, including NexentaStor, designed specifically for unified file and block storage; ranging from spinning disk to hybrid to all flash solutions. The collaboration between Nexenta and Supermicro offers customers high-performance SDS solutions and advanced technology integration for high performance data workloads of any scale....

                                                    Veritas News
                                                    Gartner Magic Quadrant for Enterprise Information Archiving
                                                    Veritas, November 18th, 2015
                                                    "Enterprise information archiving offers IT managers in organizations solutions for compliance and e-discovery, while reducing primary storage costs.

                                                    Gartner evaluates vendors offering products and services that provide archiving for email, social media, files and other content types..."

                                                    Cisco News
                                                    Cisco Introduces Breakthrough Software Solutions for Cloud-Scale Networking
                                                    Cisco, November 17th, 2015
                                                    Cisco introduced software and developer tools for cloud-scale networking that enable service providers and web companies to deliver cloud applications with greater agility, automation and simplicity, while reducing the cost of operating the networks that support them. Innovations to the Cisco IOS XR network operating system will deliver these benefits by enabling traditional and web service providers to converge their data centers and wide area network (WAN) architectures, by making networks more programmable, and by facilitating tighter integration with popular IT configuration and management tools...
                                                    Cisco Announces Intent to Acquire Acano
                                                    Cisco, November 20th, 2015
                                                    Cisco announced its intent to acquire Acano Limited, a privately held company based in London that provides collaboration infrastructure and conferencing software. Acano's hardware and software includes gateways, and video and audio bridging technology that allows customers to connect video systems from multiple vendors across both cloud and hybrid environments. This acquisition will accelerate Cisco's collaboration strategy to deliver video everywhere, providing the best collaboration experience across every endpoint, every screen, every workspace, and to every user.
                                                    Dell News
                                                    Dell Services Announces Launch of Internet of Things Insurance Accelerator
                                                    Dell, November 17th, 2015
                                                    Dell Services announced a new Internet of Things (IoT) insurance accelerator designed to help insurance companies quickly create vital new products and services to ensure they stay ahead in an increasingly competitive IoT-enabled market.

                                                    The accelerator provides insurers with a package of integrated tools, hardware, software, infrastructure and cloud, allowing insurers to quickly launch next-generation insurance products and services; improve underwriting, enhance loss management practices and connect and engage with customers in real time. It enables insurance companies to take advantage of the far-reaching benefits of IoT by providing them the ability to more accurately predict risk and take effective preventive measures by analysing historical and real-time data...

                                                    Dell Takes Endpoint Security to a New Level with Cylance Advanced Threat Protection Technology
                                                    Dell, November 17th, 2015
                                                    Dell announced a collaboration with Cylance to integrate its technology into Dell Data Security solutions. Starting in early 2016, Dell will be the only tier one PC vendor to offer a comprehensive security suite integrating Cylance technology with the introduction of Dell Data Protection | Endpoint Security Suite Enterprise.

                                                    Cylance is the cybersecurity company that uses artificial intelligence to proactively prevent, rather than just reactively detect, advanced persistent threats and malware. This collaboration builds on the Dell Ventures investment in Cylance earlier this year as part of its commitment to support new businesses that align with Dell's strategic direction.

                                                    Microsoft News
                                                    Microsoft empowers developers with new and updated tools spanning Android, Azure, iOS, Linux, Office and Windows
                                                    Microsoft, November 18th, 2015
                                                    Microsoft Corp. reinforced its commitment to providing the best experience for any developer, on any device or platform, with several new and updated developer tools and programs from Visual Studio, Azure, Office and Windows, including many new free offers.

                                                    'As a developer company we want to empower developers with open and flexible technologies that enable innovation on their terms,' said Scott Guthrie, executive vice president, Cloud and Enterprise Group, Microsoft. 'The additions of Visual Studio Code beta, the free Visual Studio Dev Essentials program, and .NET Core RC for Linux, OS X and Windows show that Microsoft is now the company working hardest for all developers.'

                                                    Hewlett Packard Enterprise and Microsoft deepen collaboration on Windows 10 offerings, announce Cloud Productivity and Mobility Solution Offerings
                                                    Microsoft, November 19th, 2015
                                                    Hewlett Packard Enterprise (HPE) and Microsoft Corp. announced the availability of their Cloud Productivity and Mobility Solution Offerings (CPM), which will create transformational consulting services and business applications for Windows 10. This expansion of their global partnership will help organizations worldwide better utilize cloud, mobile, digital and industry applications to dramatically improve business outcomes and improve customer satisfaction.

                                                    With CPM, HPE can now offer businesses a portfolio of tightly integrated services and solutions, designed to modernize enterprise workflows, drive digital transformation and accelerate innovation on top of Microsoft product offerings. The mixture of the Windows 10 platform, as well as the combined assets and capabilities of HPE and Microsoft, results in a deeper play into mobility delivering secured, seamless solutions to enterprise customers that are among the best in the industry.

                                                    Symantec News
                                                    Internet of Things
                                                    Symantec, November 18th, 2015
                                                    As the Internet of Things (IoT) begins transforming entire industries, threats are quickly evolving to target this rich and extremely vulnerable new landscape. With each industry embedding computing and connectivity into a wide variety of devices, such as cars, jet engines, factory robots, medical equipment, and industrial programmable logic controllers (PLCs), the consequences of security issues are increasingly serious. Consequences now include physical harm to people, prolonged downtime, and irreparable damage to capital equipment such as pipelines, blast furnaces, and power generation facilities, particularly in the industrial IoT. IoT systems are often highly complex, requiring end-to-end security solutions that span cloud and connectivity layers, as well as resource-constrained IoT devices often aren't powerful enough to support traditional security solutions. This is where Symantec can help...
                                                    IBM News
                                                    IBM and OpenPOWER Members Deliver Accelerated Technologies to Break Big Data Speed Barriers
                                                    IBM, November 16th, 2015
                                                    IBM and several fellow OpenPOWER Foundation members revealed new technologies, collaborations and developer resources to enable clients to analyze data more deeply and with incredible speed. The new offerings center on the tight integration of IBM's open and licensable POWER processors with accelerators, dedicated high performance processors that can be optimized for computationally intensive software code.

                                                    The accelerated POWER-based offerings come at a time when clients are seeking the ideal server platform for Internet of Things, machine learning and other cognitive computing applications. Through an open, collaborative model, IBM and more than 90 members participating in the OpenPOWER Foundation's Accelerators Working Group are developing and delivering a wide range of accelerator-based solutions...

                                                    IBM Rallies Developers to Help Build New Cloud Apps for First Responders
                                                    IBM, November 17th, 2015
                                                    IBM announced that it is providing access to the IBM Cloud as part of the First Responder Application Challenge that runs through Dec.14. IBM and its partner Vencore, Inc., in coordination with USGIF and APCO, have teamed up to develop an application ecosystem that enables the development and delivery of predictive analytic and mobile applications that can significantly improve the operational capability of first responders, be built and delivered on the cloud, and apply data and innovation to solve real-world problems.
                                                    Fujitsu News
                                                    K computer takes first place in Graph 500 supercomputer ranking for second consecutive time
                                                    Fujitsu, November 18th, 2015
                                                    A collaboration between RIKEN, Tokyo Institute of Technology, University College Dublin, Kyushu University, and Fujitsu Limited has again won top place for the K computer in the November 2015 Graph 500 supercomputer ranking, demonstrating the Japanese supercomputer's prowess in the area of data-intensive processing. The results were announced on November 17 at the international conference for high-performance computing, networking, storage and analysis (SC15) in Austin, Texas.

                                                    The Graph 500 ranking is a relatively new benchmark, first issued in 2010, which seeks to gauge the ability of supercomputers on data-intensive loads rather than simple speed, with the goal of improving computing involving complex data problems in areas such as cybersecurity, medical informatics, data enrichment, social networks, symbolic networks, and modeling neuronal circuits in the brain.

                                                    Fujitsu Develops Optimized Software-Controlled Solid-State Drive for Big Data Processing
                                                    Fujitsu, November 19th, 2015
                                                    Fujitsu Laboratories Ltd. announced that it has developed a solid-state drive (SSD) in which flash memory can be directly controlled by software running on a server. By optimizing data positioning for access from an in-memory database, a world's first, it achieved a processing performance three times faster than that of ordinary SSDs.

                                                    With in-memory databases, which enable high-speed analysis by loading data onto servers on a type of memory called DRAM (Dynamic Random Access Memory), when the volume of data exceeds the capacity of memory, lags in access to storage and other factors reduce processing speeds. As a result, there has been a desire for technology that could expand memory using high-speed SSDs.

                                                    VMware News
                                                    Online Technology Forum: Nov. 25
                                                    VMWare, November 18th, 2015
                                                    Don't miss the VMware Online Technology Forum, the place to discover how your One Cloud IT architecture can deliver any application on any device, quickly and securely.

                                                    Wednesday 25 November, 2015

                                                    • 09:00 -13:30 (GMT)
                                                    • 10:00 - 14:30 (CET)

                                                    Join the free online VMware Online Technology Forum to learn more about a full range of solutions and developments in the unified hybrid cloud and other software-defined technologies, including our NSX, vCloud Air and EVO:RAIL products.

                                                    vCloud Air Disaster Recovery
                                                    VMWare, November 18th, 2015
                                                    VMware vCloud Air Disaster Recovery is a recovery-as-a-service offering. It provides simple, affordable protection in the cloud for your vSphere environment.

                                                    vCloud Air Disaster Recovery is a recovery-as-a-service solution built on vSphere Replication and vCloud Air - a hybrid cloud platform for infrastructure-as-a-service (IaaS). It leverages vSphere Replication to provide powerful, asynchronous replication capabilities at the hypervisor layer...

                                                    Red Hat News
                                                    The Friday Five
                                                    Red Hat, November 20th, 2015
                                                    The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.

                                                    CHECK IT OUT:

                                                    • 2016 Red Hat Summit call for proposals is open

                                                    IN THE NEWS:

                                                    • Forbes - Red Hat CEO and Microsoft EVP On The Evolution Of Open Source And Business

                                                    CHECK IT OUT:

                                                    • Red Hat case study - Red Hat integrates enterprise systems for a 360-degree view of customers

                                                    WATCH ON DEMAND:

                                                    • Secure Foundations for Today and Tomorrow | A Red Hat virtual event

                                                    IN THE NEWS:

                                                    • FedScoop - Mr. FedRAMP: Understand your data before you move to cloud

                                                    Read on for details.

                                                    Red Hat Releases Ansible Tower 2.4
                                                    Red Hat, November 18th, 2015
                                                    Red Hat announced the release of Ansible Tower 2.4. Ansible Tower 2.4 helps DevOps teams manage systems and optimize deployments by adding control, security and delegation capabilities to the simple, agentless, and powerful Ansible open source automation tool.

                                                    'Adopted by Fortune 100 companies and government organizations worldwide, Ansible Tower offers ease of integration across the board. The powerful identity management, authorization and session-related capabilities in Ansible Tower 2.4 - the Ansible team's first release since joining Red Hat last month - further enable IT organizations to simplify their IT management with simple, agentless, and powerful IT automation while keeping their environment's security requirements.' - Tim Cramerhead

                                                    Red Hat Expands Routes to Market for Red Hat Storage Portfolio
                                                    Red Hat, November 18th, 2015
                                                    Red Hat announced the availability of the Red Hat Storage portfolio of open, software-defined storage solutions on an expanded range of routes to market. By making Red Hat Ceph Storage and Red Hat Gluster Storage solutions part of the Red Hat Connect for Business Partners and Red Hat Embedded programs, and for Red Hat Certified Cloud and Service Providers in 2016, Red Hat partners can now create new business opportunities for today's and tomorrow's enterprise storage workloads.
                                                    Level3 News
                                                    Level 3 Joins ECTA CEO Council to Continue Net Neutrality Discussion
                                                    Level (3), November 16th, 2015
                                                    On November 16, 2015, the CEOs of ten ECTA member companies - 1&1, Eurofiber, EWE TEL, Fastweb, Iliad, Inexio, Level 3 Communications, Play, QSC, Tele2 - gathered in Brussels to establish a new high level advisory group: the ECTA CEO Council.
                                                    EMC News
                                                    EMC Recognized as a Global Leader For Climate Change Action
                                                    EMC, November 16th, 2015
                                                    EMC Corporation has been recognized for its actions and strategies to reduce greenhouse gas emissions and mitigate climate change by CDP, the international not-for-profit organization that drives sustainable economies (see related CDP news release here). EMC is among the top 5% to achieve A-List status of the thousands of companies that were independently assessed against CDP's methodology.

                                                    In addition, for the seventh time, EMC has earned its position on the Climate Disclosure Leadership Index (CDLI), which spotlights companies listed on the Standard and Poor's 500 Index (S&P 500) that have demonstrated a high level of transparency and data quality in their disclosure of climate change information. EMC scored a perfect 100, indicating the provision of robust climate data and a good understanding of corporate climate-related issues.

                                                    Wave of New EMC Offerings Deliver Cloud Integration Across the Data Center
                                                    EMC, November 17th, 2015
                                                    EMC Corporation announced the immediate availability of a broad range of products and solutions designed to seamlessly connect primary storage and data protection systems to private and public clouds. As a result, organizations will be better equipped to take advantage of both the agility and unlimited scalability of public cloud services and the control and security of a private cloud infrastructure.

                                                    As IT departments rush to keep pace with the demands of the rapidly changing business, they often rely on both the private cloud - because it is trusted, controlled and reliable - and the public cloud - because of its low cost and near limitless capacity. Cloud-enabled storage and data protection solutions, like those being announced by EMC today, empower customers to deploy a trusted storage environment where data can be automatically tiered to both public and private clouds...

                                                    HP News
                                                    HP Inc. Unveils Most Affordable and Compact Integrated Large-Format MFP
                                                    HP, November 18th, 2015
                                                    HP Inc. unveiled five new HP DesignJet technical printers, including the flagship HP DesignJet T830 Multifunction Printer (MFP) and the HP DesignJet T730 Printer, helping mobile teams work together faster and easier. These printers, along with the HP DesignJet T930 and T1530 Printers and T2530 MFP, change how AEC and GIS firms collaborate from the office to the construction site, offering workgroups streamlined workflow and enhanced productivity.
                                                    HP Inc. Brings New Smart Accessories to Life through Engineered by HP Program
                                                    HP, November 16th, 2015
                                                    HP Inc. announced the expansion of its Engineered by HP program, collaborating with one of the world's leading watchmakers - Movado Group - to offer smart accessories with cutting-edge functionality, seamlessly integrated with beautiful design.

                                                    'Personal style is the ultimate self-expression, but some smart accessories on the market force consumers to sacrifice form for function,' said Sridhar Solur, General Manager, Wearables and Smart Platforms at HP Inc. 'Our legacy of innovation is helping fashion-forward brands infuse technology into their designs to give consumers the stylish timepieces they want, but that are more connected and responsive to the way they live today.'

                                                    Brocade News
                                                    Brocade Achieves Vmware Ready Status For Network Functions Virtualization
                                                    Brocade, November 17th, 2015
                                                    Brocade announced that the Brocade Virtual Evolved Packet Core has achieved VMware Ready status for Network Functions Virtualization (NFV). This designation indicates that after a detailed validation process, the BROCADE VIRTUAL EVOLVED PACKET CORE has achieved VMware's highest level of endorsement, and can be found on the VMWARE SOLUTION EXCHANGE (VSX).

                                                    "This certification demonstrates a strong commitment between VMware as the leading virtualization vendor and Brocade as the networking leader for the New IP," said Sachin Kapur, senior director, Software Engineering, Mobile Networking R&D, Brocade. "Brocade is one of the first to be certified by VMware Ready for NFV, and the certification builds on existing success Brocade and VMware have shared in delivering NFV solutions to the market."

                                                    Comcast News
                                                    Comcast Business Extends Advanced Fiber-Based Network to Sugar House Business District
                                                    Comcast, November 19th, 2015
                                                    Comcast Business announced a major expansion of its advanced fiber-based network to the Sugar House business district in Salt Lake City, Utah, providing a combination of national chains and small boutiques with a range of new technology services including high-speed Internet services delivered over fiber and coax, high definition TV and phone services. These high-capacity, reliable network services provided by Comcast were previously unavailable in the Sugar House business district.

                                                    'For our business district to continue to thrive in this digital era, it became clear that we needed to provide advanced network services that not only were cost-effective, but could also grow as required,' said Lane Beattie, President and Chief Executive Officer, Salt Lake Chamber. 'Through Comcast's vast investment into the Sugar House business district businesses can have the confidence that they will have the network infrastructure in place to provide new and better services to their customers while boosting their bottom lines.'

                                                    Hitachi News
                                                    Hitachi Debuts Carrier Ethernet Switches for North America
                                                    Hitachi, November 16th, 2015
                                                    Hitachi Cable America Inc. (HCA) announced the introduction of the ApresiaRM25000 Carrier Ethernet Switch Series targeting North America market.

                                                    The ApresiaRM25000 Series includes four 1RU L2/L3 switches with 10 port (ApresiaRM25000-10X/SA) and 24 port (ApresiaRM25000-24X/SA) models and optional interfaces for synchronization. Every port supports 1G / 10G dual-speeds (SFP/SFP+) and the switching capacities for the 10 port and the 24 port models are 200 Gbps and 480 Gbps, respectively.

                                                    The ApresiaRM25000 Series supports MPLS, VPLS, H-VPLS and Q-in-Q protocols. The 10 port model is temperature hardened, suitable for remote deployments in uncontrolled environments.

                                                    Hitachi Enters the North American Carrier Market, Appoints Senior Executive
                                                    Hitachi, November 16th, 2015
                                                    Hitachi Cable America Inc. (HCA announced the formation of the North American Carrier IP Networking Division, headquartered in San Jose, California. Concurrently, the company announced the appointment of the telecom veteran and senior executive, Ali Taslimi, as Senior VP and leader of the newly formed division.

                                                    Lynne Humenik, President and CEO of HCA said, 'We are very excited about entering the North American carrier market and are pleased to have someone of Ali's distinct background and caliber to lead our Carrier IP Networking Division.'

                                                    Windstream News
                                                    Windstream Named Finalist for 2015 MEF Excellence Awards
                                                    Windstream, November 17th, 2015
                                                    Windstream,a leading provider of advanced network communications, has been selected as a finalist for the 2015 MEF Excellence Awards, an annual program highlighting carrier Ethernet services and applications organized by MEF, a global industry alliance of more than 220 telecommunication organizations.

                                                    For the MEF Excellence Awards competition, Windstream will be compared to finalists in the 'Service Provider Awards' category; a category aimed to recognize companies that demonstrate leadership in the development and delivery of global, regional, retail and wholesale services, as well as excellence in carrier Ethernet innovation, marketing and network modernization. This announcement marks the first time Windstream has submitted an entry into, and been recognized by, the MEF Excellence Awards program.

                                                    F5 News
                                                    Where F5 Fits in a DevOps World
                                                    F5, November 16th, 2015
                                                    "I'm often asked after speaking at conferences just what dog F5 has in the race. Of late, that topic is usually DevOps or related to DevOps in some way.

                                                    The reality is that application-affine services like load balancing are being pulled toward toward applications, into the more agile, software-driven, and automated environment that makes up the application network. That's where compute and application centric systems like caches (think memcached and redis) and databases and containers are being deployed using CI/CD (continuous integration/continuous delivery) methodologies that rely on a whole lot of automation and orchestration..."

                                                    F5 Blog: Backseat Drivers, Your Wish Has Come True
                                                    F5, November 19th, 2015
                                                    When I was in college, I would drive the 1040 miles from Marquette Univ. in Milwaukee to my parents' house in Rhode Island for things like summer vacation and semester break. It seemed to take forever, especially through Pennsylvania where the state speed limit at the time was 55 mph. I always tried to complete it straight through yet would inevitably feel my head start to drop, meaning it was time to pull off at a rest stop in Connecticut for a nap, some 3 hours from my goal. This is back when they still had toll booths on the Connecticut turnpike.
                                                      Netapp News
                                                      NetApp Reports Second Quarter Fiscal Year 2016 Results
                                                      NetApp, November 18th, 2015
                                                      NetApp (NASDAQ: NTAP reported financial results for the second quarter of fiscal year 2016, ended October 30, 2015.

                                                      Second Quarter Financial Results

                                                      Net revenues for the second quarter of fiscal year 2016 were $1.45 billion. GAAP net income for the second quarter of fiscal year 2016 was $114 million, or $0.39 income per share , compared to GAAP net income of $160 million, or $0.49 income per share, for the comparable period of the prior year. Non-GAAP net income for the second quarter of fiscal year 2016 was $181 million, or $0.61 income per share, compared to non-GAAP net income of $226 million, or $0.70 income per share, for the comparable period of the prior year...

                                                      NetApp Delivers More Efficient, Affordable Enterprise-Grade All-Flash Storage
                                                      All Flash FAS Gives Customers Performance of Flash for Cost of Disk with Improved Efficiency Technology
                                                      "We have been running NetApp storage in our environment for more than 14 years with zero downtime,' said Alexander Harth, head of the User Support Division at Deutscher Wetterdienst (DWD), Germany's national meteorological service. 'When it came time to select a flash vendor, we knew that NetApp could deliver more than just speed. We could count on NetApp to deliver the data our customers need, whenever they need it.'

                                                      NetApp announced updates to its All Flash FAS (AFF) array series that drive down the cost of flash for mainstream data center applications and reduce capacity requirements by as much as 30:1.

                                                      Trending in
                                                      Vol 234, Issue 3
                                                      Trending IT Articles