News about Oracle's Solaris and Sun Hardware
System News
Feb 1st, 2016 — Feb 7th, 2016 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 216, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle News
New Oracle PartnerNetwork Program Drives Partner Success in the Cloud
Oracle, February 2nd, 2016
Oracle unveiled a new Oracle PartnerNetwork (OPN) Cloud Program to help partners accelerate the growth of their Oracle Cloud business by providing them with technical and go-to-market support. Through this new program, partners will be able to showcase their Oracle Cloud expertise, vertical market offerings, and success with customers through new tiers of recognition and progressive benefits.

'OPN now offers the most comprehensive portfolio of cloud programs available today,' said Shawn Price, senior vice president, Oracle Cloud. 'Our rapid growth and extensive SaaS, PaaS and IaaS cloud portfolio presents an unparalleled opportunity for partners and customers alike. We can now equip our highly experienced partners with the tools they need to successfully move their customers to modern business models. This vast partner community includes tens of thousands of implementation experts with transferable skills who can help our customers navigate their transition to the cloud.'

Mark Hurd's Cloud View: 5 SWOT Observations
Rob Preston, Forbes, February 4th, 2016
Mark Hurd is never one to mince words. So in two separate interviews over the past couple of weeks, it was no surprise that the Oracle CEO was succinct and direct in sizing up the fast-growing cloud sector. Consider these five excerpts, something of a SWOT (strengths, weaknesses, opportunities, and threats) analysis of current cloud dynamics.
Oracle NoSQL BulkPut
By Anand Chandak
Anand blogs, "Our customers have often asked us 'what's the fastest and most efficient way to insert large number of records in Oracle NoSQL database? ' Very recently, a shipping company reached out to us with specific requirement of using Oracle NoSQL database for their ship management application,which is used to track the movements of their container ships that moves the cargo from port to port. The cargo ships are all fitted with GPS and other tracking devices, which relays ship's location after few seconds into the application . The application is then queried for 1) The location of all the ships displayed on the map 2) A specific ship's trajectory over a given period of time displayed on the map too.As the volume of the location data started growing, company is finding hard to scale the application and is now looking at a back-end system that can ingest this large data-set very efficiently..."
Digital Transformation Becomes Mainstream: Profit Magazine 2016 Trends
By Jim Lein
"Being 'trendy' isn't always a good thing, especially if that's not your style. But when it comes to business, being behind on the times is an almost certain recipe for disaster.

By now, you might be sick of the buzzwords 'Digital Transformation' and/or 'Disruption'. Call them what you want but nothing has changed in 2016 except the innovation associated with those two buzzwords..."

    The CMO Revolution: 10 Challenges That Will Rock The Marketing World In 2016
    Bob Evans writes in Forbes
    Bob Evans writes, "Fortified with unprecedented analytical tools and deep insights into customer behavior, charge-leading, business-model-upending CMOs in 2016 will claim new responsibilities for revenue, seize ownership of the end-to-end customer experience, and take leading roles in the digital transformations of their organizations.

    No doubt, some people will think that's sheer madness, and that the purely numerical change in budget allocations from 2015 to 2016 will mean nothing more than the CMO still runs events, still oversees advertising spending, still defines the brand image the company wishes to project, and still is forced to rely on too much guesswork and not enough precision..."

      How a Spin-Off Spun Up Laser Fast
      Forbes, February 2nd, 2016
      "Every corporate spin-off is complex in its own right, but when financial high-wire acts meet national security, that complexity ratchets up to ten.

      That was the case when optical communications technology company JDSU decided to split itself in two. One of the newly formed companies, Lumentum, consolidated the former JDSU high-speed optical communications products for telecom, data, and laser solutions for materials processing, into a new standalone business. Lumentum's product exports are highly regulated by the US and countries around the world because of their potential military uses. Rather than use JDSU's old trade management software to manage the compliance aspects of the business, executives decided to try something new..."

      IT - AI
      Machine Learning Is A cHamp At Fixing Buggy Code
      ComputerWorld, February 2nd, 2016
      "Here's yet another new application of machine learning: MIT has developed a system for fixing errors in bug-riddled code.

      The new machine-learning system developed by researchers at MIT can fix roughly 10 times as many errors as its predecessors could, the researchers say. They presented a paper describing the new system, dubbed "Prophet," at the Principles of Programming Languages symposium last month.

      Essentially, the system works by studying patches already made to open-source computer programs in order to learn their general properties. Prophet was given 777 errors and fixes in eight common open-source applications stored in the online repository GitHub..."

        Computers Are Learning To Tell Jokes
        Datamation, February 2nd, 2016
        "Teaching a computer to tell jokes may seem like a silly exercise. But humor is an effective way to engage with people, and it forces regionalization of marketing concepts and messages. Computers can do a lot of things, but they have, until recently, been unable to execute in ways we believe are creative other than through scripting.

        Humor isn't a purely numerical problem..."

          A.I. Inside: How Machine Intelligence Might Save Lives
          CIO, February 2nd, 2016
          "Much as Intel processors are the power inside PCs, A.I. algorithms may emerge as the power behind some advanced medical applications.

          Virtual Radiologic, a U.S. company that provides diagnostic services to thousands of hospitals and medical facilities around the world, is developing a deep learning algorithm to review CT images taken in the emergency room. The company, also known as vRAD (an affiliate of MEDNAX), is grooming the algorithm to find signs of intracranial hemorrhage. The algorithm is designed not to diagnose but to prioritize CT images for review by neuroradiologists in the vRAD network. Patients with intracranial hemorrhage, for example, due to stroke or trauma, such as a car accident, require immediate treatment to prevent brain damage or death..."

          Architecting Predictive Algorithms for Machine Learning
          insideBIGDATA, February 4th, 2016
          "In the presentation below, Seth Juarez of DevExpress discusses architecting predictive algorithms for machine learning. Machine learning is one of the most important tools in a Data Scientist's arsenal. In this talk, you will learn key architectural principles and frameworks for creating practical approaches to solving the prediction problem. Interactive demonstration of various popular machine learning algorithms based on these principles and frameworks will be included..."
            To Keep AI Safe - Use AI
            Re/code, February 4th, 2016
            "Software is already pervasive in our society, but artificial intelligence software raises unique concerns even among the technological elite. The recent announcement that tech titans, including Elon Musk, have committed $1 billion to an artificial intelligence research center out of concern for what AI may become denotes an important question: Will AI software obey the law of the land and adhere to our ethical standards?

            It is true that AI software is increasingly autonomous and potentially self-modifying, but it is our view of AI as a hegemonic, monolithic entity that drives our fear of it. Just as there is no one 'software' entity, there will be no one AI entity. So here is a new viewpoint on how AI will be kept in check - more AI..."

              IBM Java Applications Taking Advantage of SPARC Hardware Encryption
              By Eric Reid
              Eric Reid blogs, "We've been talking recently about IBM's GSKit, through which many IBM applications can automatically take advantage of SPARC Hardware Encryption (including the latest SPARC M7-based systems). We've since been asked whether this was also possible for Java-based IBM applications (such as WebSphere Application Server) or other applications written against IBM's SDK Java Technology Edition to take similar advantage. This post is written to help answer those questions.

              IBM has traditionally licensed Oracle's Java Runtime Environment and Java Developer Kit, modified it slightly, and released it as the IBM SDK. This combination of Java Runtime and Developer Kit is designed to support many IBM products, and can also be used for new development (although the recommended Java platform on Solaris is Oracle's own Java Runtime Environment and Java Developer Kit). Oracle Solaris ships with both Java 7 and Java 8, but most IBM apps include the Java 7 version of their SDK..."

              IT - Storage
              Q&A: As prices fall, flash memory is eating the world
              ComputerWorld, February 2nd, 2016
              SanDisk's top strategy guru talks about the expanding role of flash in the enterprise and how emerging storage techs like 3D NAND will change the future.

              "Sadana says SanDisk has driven the pricetag of flash below a dollar per gigabyte and, with compression and dedupe, flash costs are now only 20 cents per gig. He also discussed the emergence of so-called storage-class memory (a new tier in the traditional memory architecture) and SanDisk's work developing 3D NAND. Sadana also talked about how flash will help customers capture the real promise of big data and the Internet of things, and how they'll need to be prepared for even more buyouts and mergers in the storage market..."

              Phones Will Drive Internet Traffic Past the Zettabyte Mark This Year
              Re/code, February 3rd, 2016
              "It's no real secret that the rise in the world's Internet traffic in recent years has been driven by growth in the use of mobile smartphones. Today's forecast from Cisco Systems, the world's largest supplier of the routing and switching gear that constitutes much of the world's Internet infrastructure, is an interesting milepost on the digital journey the world has been traveling since the Internet's earliest days.

              The Visual Networking Index, a survey of global Internet traffic trends, predicts that the total amount of Internet traffic will break the zettabyte barrier this year, and will double again in 2019..."

              The End Of The High-End Storage Array Era
              Network Computing, February 4th, 2016
              "I came to the realization recently that one of the big changes in the storage business over the past few years has been the bifurcation of storage system size and speed. Where high-end arrays were once the answer for capacity and speed, they've now been topped by all-flash arrays in performance and object storage for capacity.

              Today we buy high-end storage systems like EMC VMAX, Hitachi Data Systems Virtual Storage Platform, and HPE 3PAR because they provide the highest levels of resiliency, availability and serviceability (RAS) for our most critical applications. Back in the age of spinning disks, these steadfast champions of enterprise storage were not just the safest place to store your data, but held the capacity and performance crowns as well..."

              IT - Technology
              VR headset shipments are about to skyrocket
              PC World, February 2nd, 2016
              "In the next year or two, millions of gearheads will strap on VR headsets to explore their alter-egos, play games and view 3D content.

              Shipments of virtual reality and augmented reality headsets will balloon this year to 1.4 million, up from just 140,000 in 2015, Gartner predicted Tuesday. In 2017, shipments will soar to 6.3 million.

              VR systems were a hot-ticket at this year's CES, and products like the Oculus Rift, Sony's PlayStation VR, Microsoft's HoloLens and HTC's Vive are all expected to ship this year. That will fuel the initial boost in shipments, said Brian Blau, research director at Gartner..."

              Bluetooth wireless range, speed to continue improving
              ITWorld, February 2nd, 2016
              "Soon, turning off the heat and lights before leaving your house could be as simple as turning a key in a Bluetooth-equipped lock.

              This scenario may be possible with the latest Bluetooth wireless technology, which could start appearing in products next year. With the improvements, devices will be able to communicate directly over a longer range and at faster speeds than with current technology.

              The range and speed of Bluetooth will continue to increase in coming years as the markets for home automation and IoT grow, said Mark Powell, executive director at standards-setting organization Bluetooth Special Interest Group (SIG)..."

              10 of today's really cool network & IT research projects
              ITWorld, February 1st, 2016
              "New enterprise and consumer network technologies are coming fast and furious these days via well-heeled startups, and yes, even more established tech players. But further back in the pipeline, in the research labs of universities and colleges around the world, that's where the really cool stuff is happening.

              Take a peek at some of the more intriguing projects in areas ranging from wireless to security to open source to robotics and cloud computing..."

              MIT's 168-core chip could make mobile devices, robots smarter
              ITWorld, February 3rd, 2016
              "Unlike Facebook, a smartphone can't recognize and tag you in a selfie. A new brain-like chip developed by researchers at MIT could change that.

              The 168-core prototype chip called Eyeriss will be able to tap into memory to instantly recognize faces, objects and even sounds. The chip is designed for use in smartphones, self-driving cars, robots, drones and other devices.

              Eyeriss is among a handful of chips being developed so devices can do more things without human intervention. Qualcomm is making chips so mobile devices can learn about users and anticipate actions over time. Nvidia offers a computer for automobiles with its Tegra chip so self-driving cars can recognize signals and street signs..."

              Five Enterprise Technology Trends to Watch (Slideshow)
              Data Center Knowledge, February 3rd, 2016
              "Technology is the lifeblood of business and government organizations as they strive to transform operations and increasingly become digital entities. The cloud and fiber networks are being woven into the central nervous systems of these organizations to operate more efficiently, deliver new service models and enhance the experience of customers.

              This market landscape is pushing organizations to examine and adopt new enterprise technology approaches at an accelerating rate. Working against this backdrop, here are five business tech trends to watch:.."

                Poor quality USB Type-C cables can fry your gadgets
                ZDNet, February 5th, 2016
                "Think that there's no difference between a cheap cable and a quality cable? Think again! Poor quality USB-C cables can easily destroy your devices..

                Google engineer Benson Leung has been busying himself testing USB-C cables and adaptor for quality and compliance with the standard. While testing a cable the other day he managed to blow up his test gear.

                The cable in question was a USB 3.1 Type-C SuperSpeed cable from a company called Surjtech (this is not a company I've ever heard of previously, and the cable is no longer available on Amazon). Leung connected the cable up to his test gear and thanks to what appears to be sloppy soldering and the use of an incorrect resistor, the cable instantly destroyed a Chromebook Pixel 2 and both of his USB power delivery analyzers..."

                IT - Bitcoin
                Why Bitcoin and Blockchain Are Just Getting Started
                CoinDesk, February 1st, 2016
                "Dan Elitzer is a member of IDEO Futures, where he leads IDEO's Bits + Blocks coLAB, an innovation lab exploring blockchains and related technology in collaboration with Citi Ventures, Fidelity Labs and Nasdaq.

                This article was written by Elitzer in conjunction with his colleagues at IDEO Futures - Joe Gerber, Reid Williams, Diego Rodriguez, Piper Loyd, Ted Ko and Eric Chan.

                In the opinion piece, the team looks at recent challenges facing bitcoin, and express their belief that bitcoin and blockchain hold as much promise as they did a year ago..."

                Bitcoin Developer Eric Lombrozo on Five Benefits of Segregated Witness
                Bitcoin Magazine, February 2nd, 2016
                "Segregated Witness has become the most talked-about breakthrough in Bitcoin development since the concept was presented in early December to the Scaling Bitcoin Workshop in Hong Kong by Bitcoin Core Developer Pieter Wuille. One of the men that Wuille thanked in the last slide of that presentation was Bitcoin Developer and Ciphrex CEO Eric Lombrozo..."
                PwC and Blockstream Announce Strategic Partnership on Blockchain Tech
                CryptoCoinsNews, February 3rd, 2016
                "As momentum continues to build for mainstream adoption of blockchain tech, PwC and Blockstream recently announced a strategic partnership to 'bring blockchain technology and services to companies around the world.'

                This partnership comes on the heels the close of a big round from Digital Asset Holdings and a noteworthy announcement of further exploration and excitement of the technology within the context of greater fintech from Goldman Sachs..."

                  Commonwealth Pushes Member Countries to Declare Bitcoin Legal
                  CoinDesk, February 3rd, 2016
                  "The Commonwealth of Nations has released a new report that calls on its 53 member countries to speak out about the legality of bitcoin and other digital currencies.

                  Published on 3rd February, the report is the result of nearly a year of research conducted by the Commonwealth through its Working Group on Virtual Currencies. The group was commissioned following a roundtable event convened last February by the Commonwealth Secretariat, its main governmental body..."

                  Bitcoin, Blockchain, the SEC and Equity Crowdfunding
                  NEWSBTC, February 4th, 2016
                  "The SEC has just made equity crowdfunding legal. Here's our take on how this applies to bitcoin and the blockchain...

                  Last October, the US Securities and Exchange Commission released this update, which detailed the adoption of the final rules surrounding equity based crowdfunding offerings. The concept was first addressed as part of the Jumpstart Our Business Startups (JOBS) act way back in 2012, which was signed in by Barack Obama, as a tool that would facilitate the process through which small and medium business enterprises gain access to operating and development capital..."

                  IT - FOSS
                  6 Benefits of Using Open Source Software in Government
                  Government Technology, February 1st, 2016
                  "Open source software thrives in government and is in some ways a technical expression of democracy: engineers building common ground and forging a more open and free future for all.

                  But it's also often misunderstood in parts of the public sector, seen as a time-consuming and unsupported solution. So if you're on the fence about open source, keep reading to learn about benefits, evaluation methods, support tools and a few packages to consider right away.

                  Let's start with the benefits of open source software - why should agencies even consider it?..."

                  10 Mistakes to Avoid to Make Open Source More Secure
                  eWeek, February 4th, 2016
                  "It's no secret that open source is becoming more popular in the enterprise. Organizations from service companies to manufacturers to banks are tapping open source to take advantage of factors such as lower development costs, faster time to market and simplified application deployment through containers. Mission-critical performance is no longer a major hurdle. But there's another issue with open source that is sticking in enterprises' craw - and will continue to stick throughout 2016 and beyond. That issue is security. More than 6,000 new open-source vulnerabilities have been reported since 2014..."
                  Focus on Oracle Solaris Security at the OTN VTS Event
                  By Glynn Foster
                  Glynn blogs, "Every few months, the folks from the Oracle Technology Network host a Virtual Technology Summit (VTS). This is an opportunity to watch a bunch of technical demos and participate in hands-on-labs delivered by Oracle product experts, Oracle ACE's, and Java Champions. There are a variety of tracks including Systems, Database, Java and Middleware.

                  In the next VTS event, we'll be focusing on security your data center with some of the integrated security technologies included in Oracle Solaris and SPARC systems leveraging Software in Silicon..."

                  The Best UNIX Operating System Out There
                  Mark Hurd Video
                  Glynn blogs, "Worth checking out Mark Hurd, Oracle CEO on how he considers the Sun Microsystems acquisition to be 'fabulous' - not just for Java, but for Solaris, the best UNIX operating system out there. Nothing comes close to the amount of innovation included in this integrated platform that can run your mission critical (and non-mission critical) applications securely and reliably. Sun's technologies were very much the foundation for Oracle's current Engineered System strategy. Watch it now!..."
                  IT - DevOps
                  IT DevOps: One Size Does Not Fit All
        , February 3rd, 2016
                  "As absurd as this may seem, some in IT may be longing for the good old days of the mainframe. After all, the hulking machine, with its dumb terminals and thousands of punch cards, gave IT complete control. No citizen developers or business analysts allowed.

                  Things got more complicated with distributed desktop computing and its different operating systems and requirements. Server-based web apps simplified things once again, but now mobile has made development more complex than ever. Instead of just updating the server, you also now have to update each mobile device-creating apps that work on each and getting changes out to the entire mobile population.

                  What's IT to do? Applied properly, DevOps can help..."

                  Best Agile Method For Your Team: Scrum Vs. Kanban
                  Information Week, February 4th, 2016
                  "What's the best way to bring Agile to your team? The answer depends on just what you want to transform.

                  These days, the decision to go Agile doesn't put a company in select company. It seems like just about every organization that's doing more than simply maintaining an existing IT platform has adopted some variety of the Agile philosophy. Once you decide to go Agile, though, you've still got to figure out precisely how you're going to put the Agile discipline into practice..."

                    Diversify Your DevOps Tools List for Best Results
                    SeachDataCenter, February 2nd, 2016
                    "Most organizations would appreciate a faster response from those in charge of the IT platform. Although IT is critical to enterprise operations, it can be far more of a business constraint than an enabler.

                    Waterfall approaches to business-critical application development provide an answer that is too late to solve the problem. DevOps is a methodology that aims for greater speed of response. Developers push code into the operations infrastructure more quickly, enabling IT to respond to problems and opportunities as they happen..."

                    DevOps in 2016: Mainstream Momentum Ahead
          , February 4th, 2016
                    "I believe that 2016 will be the year that DevOps takes mainstream foothold in the enterprise. And I base this assertion on seven sweeping changes that - from my vantage point - are taking hold and dramatically changing the digital world...

                    • The Job of IT Will Change From Infrastructure to Innovation
                    • Continuous Delivery (CD) Will Become Ubiquitous
                    • The Public Cloud Will Triumph in the Enterprise
                    • Peace Will Break Out Between Developers and Security / Compliance Officers
                    • Executives Will Move Into the DevOps Tent
                    • Container Technology Will Be Improved and Grow Even More

                    Read on for details.

                    DevOps Stack on a Shoestring Budget
          , February 5th, 2016
                    "There are competing products, both open source and licensed, in any DevOps area that you can think of. The Operations groups in companies tend to accumulate such applications over time as determined by ongoing projects. Team members' familiarity with a certain application could be a factor in adding it to the tools stack.

                    Companies, therefore, end up with a mixed bag of freeware, open source or community versions of applications and software licensed from the get-go. In a startup environment where the Operations group might be on a shoestring budget, it might make sense to build the DevOps infrastructure on the cheap; using open source software (OSS) products would be one way to achieve that goal..."

                    MySQL Enterprise Backup (MEB) and Oracle Storage Cloud
                    By Sahil Binani
                    Sahil blogs, "MEB 3.12.0 and above support cloud backup and restore using OpenStack-compatible object stores ("Swift"). This allows MySQL database users with Oracle Storage Cloud account to take backups and store them directly in the cloud and restore them from there.

                    The following steps illustrate how to set up and use MEB with Oracle Storage Cloud: ..."

                    MySQL 5.7 European Tour: Learn and Have Fun at User Groups!
                    By Bertrand Matthelie
                    Bertrand writes. "Want to learn about MySQL 5.7 & JSON and get all your questions answered? Morgan Tocker is currently visiting many European cities and talking at user groups. Morgan was previously Community Manager and recently joined the MySQL Product Management team at Oracle. He's got a very busy schedule and was last night in Helsinki after a weekend at Fosdem in Brussels and a user group meeting the following day in Amsterdam (hosted by"
                    Cloud Computing
                    Oracle Building New Cloud Partner System
                    Partners have never played a more important role in our global economy
                    Looking to drive its already accelerating cloud business into 'hyper-growth,' Oracle announced on Tuesday a program to help partners deliver its cloud software, platform, and infrastructure services to customers worldwide.

                    The new Oracle PartnerNetwork (OPN) Cloud Program is open to the company's 25,000 current OPN partners, including consultants, integrators, and value-added resellers, as well as to new partners. Benefits to partners include access to Oracle Cloud demonstration environments, Oracle expertise, and joint marketing. For Oracle, the program will bring increased scale and speed to market, as well as local and industry-specific know-how. The cloud program should also help Oracle, known for serving large enterprise customers, move further downstream to small and midsize businesses...

                    Oracle Big Data Preparation Cloud Service
                    Webinar Replay
                    Madhu Nair blogs, "In case you missed the recent executive webcast on Big Data Preparation Cloud Service, do not worry you can watch the replay here.

                    Senior Vice President of Development, Amit Zavery outlines the importance of cloud based data integration technologies and the emphasis that Oracle is placing on enabling not just the IT but also the business analysts with cutting edge requirements. He lays out the importance of streamlining the data preparation and data wrangling process to not just be a necessary step towards analytics, but an enriching and empowering step towards self service data preparation..."

                    IT - Cloud
                    Four Paths to a Cloud Bursting Architecture
                    SeachDataCenter, February 2nd, 2016
                    "The lack of capable infrastructure hinders a typical cloud bursting architecture. Choose one of these four paths to better implement cloud bursting...

                    While most CIOs like the hybrid cloud approach, pesky realities are sneaking in issues that are anything but minor -- such as underinvestment in fiber connections by U.S. and some E.U. telco operations. Welcome to the network limbo that a cloud bursting architecture experiences..."

                    Cloud is Key: How Companies Can Get the Most From Mobile Technology
                    ITProPortal, February 1st, 2016
                    "Many companies have incorporated mobile technology into their day-to-day processes, benefiting from the added level of portability, ease of use and cost-effectiveness these devices can add to the workplace.

                    This is doubly true for businesses who have embraced the idea of Bring Your Own Device (BYOD), which involves employees utilising their own devices in the office. But with a higher variance of devices, unlikely to be connected to a landline work network, how can these companies ensure a smooth and seamless IT infrastructure?

                    The answer could lie in the cloud..."

                    7 Attributes of Highly Successful Cloud Security Deployments
                    Virtual-Strategy Magazine, February 4th, 2016
                    "Cloud is the backbone of many, many enterprises around the world. In 2019, IDC expects service providers will spend $33.6 billion on IT infrastructure for delivering public cloud services, while spending on private cloud IT infrastructure will reach $19.4 billion.

                    At the same time, the past few years have seen some of the largest and most public security breaches in history. The Ponemon U.S. Cost of Data Breach study estimates that average total cost of a data breach rose to $3.8 million in 2015.

                    With the ever-growing use of private and public cloud and the unending attacks by hackers, organizations of all sizes have to protect their critical data wherever it is.

                    To successfully secure cloud deployments - and deliver the experience an enterprise user expects - IT teams that pay attention to a new hierarchy of the following 7 cybersecurity needs will stay one step ahead of hackers and take good care of their enterprise data..."

                    Are Any of These 6 Roadblocks Standing in the Way of Your Cloud Security?
                    Business 2 Community, February 5th, 2016
                    "Sometimes it feels like achieving security in the cloud comes with more roadblocks than a presidential motorcade on Election Day. As the platforms, devices and compliance requirements proliferate, picking the right tool(s) for your specific company and industry turned into a really complicated ordeal. You have to deal with data that comes in every shape and size, individual privacy and compliance needs and the explosion of BYOD culture. Where to even start?..."
                    Multicloud Computing Demands Careful Planning, Management
                    SearchCloudComputing, February 5th, 2016
                    "When planning for a multicloud deployment, be sure to account for the various management and integration issues that can arise.

                    Editor's note: This article is part two of a three-part series on multicloud strategies. Click here to read part one.

                    Multicloud computing -- when organizations use a mix of cloud computing services from different vendors -- offers a number of advantages. But multicloud users must also be careful to avoid unnecessary complexity and costs. While most companies are long-term multicloud candidates, few will balance their applications and planning across all of their cloud choices.

                    The first step in effective multicloud planning is to pick the primary cloud model for your business..."

                    IT - CxO
                    Ex-CIA Chief Tells CIOs Not to Rely on Government for Security
                    eWeek, February 2nd, 2016
                    Gen. Michael Hayden tells CIOs: "This [cyberspace] is the largest ungoverned space in recorded human history. There is no rule of law up here."

                    "So the government wants to help enterprises achieve totally tight data security. Fine. But is that the good news or the bad news?

                    The Cybersecurity Information Sharing Act (CISA) is a newly enacted U.S. federal law designed, in its own words, to "improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes." The law allows the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies..."

                    The Five Factors to De-risking Your Technology Projects
                    Information Age, February 2nd, 2016
                    "IT projects always come with an element of risk, but there are huge gains to be had if we can just avoid some of the factors that contribute frequently to project failure

                    Fewer than 1 in 3 software projects produce successful outcomes, according to the Standish Group's Chaos report for 2015; 66% end in partial or total failure. This paltry rate of success, based on analysis of 50,000 projects worldwide, is broadly unchanged over the last five years.

                    Whatever the reasons for failure, it seems that project teams aren't learning from their mistakes..."

                      CIO Explainer: What Is Blockchain?
                      Wall St. Journal, February 2nd, 2016
                      "Known by many as the technology underpinning the bitcoin digital currency, blockchain has acquired a new identity in the enterprise. At a time when companies face new challenges in data management and security, it's emerging as a way to let companies make and verify transactions on a network instantaneously without a central authority. Today, more than 40 top financial institutions and a growing number of firms across industries are experimenting with distributed ledger technology as a secure and transparent way to digitally track the ownership of assets, a move that could speed up transactions and cut costs while lowering the risk of fraud. Some companies see an opportunity to use blockchain to track the movement of assets throughout their supply chains or electronically initiate and enforce contracts..."
                      Hey - Where's My Desk Gone?
                      ZDNet, February 2nd, 2016
                      "In my last blog we looked at the case for creating a flexible work strategy for employees, and the fundamental business benefits - which includes an increase in employee engagement, loyalty, and diversity.

                      But if you can work flexibly, there's no need for a permanent desk any more. In fact the budget assigned to the technology and business change - required to drive flexible working - might well have come from the reciprocal decrease in office space expenditure..."

                        Top 4 Compliance Mistakes and How to Prevent Them
                        The Data Center Journal, February 2nd, 2016
                        "According to Verizon's 2015 PCI Compliance Report, a staggering 80 percent of retailers fail to pass interim PCI compliance assessments. This failure can lead to a number of challenges and consequences, not the least of which is vulnerabilities related to malware, infections and attacks. Separate research from Verizon, the 2015 Data Breach Investigations Report, found that data breaches continue to rise. For about 60 percent of the 2,100 confirmed breaches considered, hackers were able to infiltrate the victim company in a matter of minutes. 'Businesses across nearly every industry have dealt with increasing threats in recent years, making compliance crucial'..."
                        How to Embrace Rogue IT (Slideshow)
                        CIO Insight, February 2nd, 2016
                        "You might as well embrace rogue IT, or shadow IT, which will continue to grow in importance, and its impact will be felt globally, according to Tim Kelleher, vice president of IT Security Services at Century Link. Rogue IT might just lead to innovation and competitive advantage, he says. Employees increasingly will bypass corporate IT by subscribing to new collaboration, analytics or other cloud services to get work done, he says. Others will build homegrown applications via the cloud and other development platforms. This trend to remove power from corporate hands is enough to strike fear in any CIO because security risks and bandwidth restrictions can accompany each new project..."
                        5 Reasons You Need To Hire a Chief Privacy Officer
                        CSO Online, February 1st, 2016
                        "Businesses are increasingly relying on data, but they're overlooking another key aspect of data: privacy. In order to keep up with the growing regulations surrounding data privacy, it may be time to hire a Chief Privacy Officer...

                        As data becomes a fundamental part of operations in nearly every industry, businesses are finding that privacy measures are becoming equally as important. Unfortunately, research suggests that businesses don't understand how vital privacy practices are and treat it an afterthought..."

                          IT Spend To Near $3T by 2019
                , February 5th, 2016
                          "Worldwide IT spend will hit $2.8tn by 2019, driven by an increasing use of software tools that improve business operations, especially within medium-to-large organisations, according to analyst house IDC.

                          The firm provided the figures in its latest semi-annual IT spending guide, which predicts North America will remain the dominant spender on IT, passing the $1tn mark by 2017. Europe, Africa and the Middle East (EMEA) will be second, followed by Asia Pacific and then Latin America.

                          By business size the bulk of spending, 40 percent, will come from very large businesses of more than 1,000 employees, while very small businesses, of between one and nine employees, will account for 25 percent of spend..."

                          4 Things Employees Hate About IT (and how to fix them)
                          CIO, February 4th, 2016
                          "When it comes to gripes about IT, CIOs need to go back to basics to address the needs of their most important customers -- their internal users...

                          Every company is an IT company these days, but some organizations seem to squeeze more value out of their IT departments than others. What's the secret? Simon Chapleau, CEO and founder of management consulting and user satisfaction survey software company Green Elephant, wanted to find out. Chapleau's team used its PÜLS software, which delivers monthly user satisfaction surveys, to poll nearly 100,000 IT users globally, at all levels of responsibility, to find out what their biggest IT complaints were, and how businesses could address them to derive more value. The results were published in Green Elephant's IT User Satisfaction Annual Report. It turns out, getting back to basics is the key..."

                          VBeers @ Broward
                          Wednesday, February 10th, 2016: 6:00 PM to 9:00 PM
                          • Funky Buddha Brewery
                          • 1201 Ne 38th St # A1, Oakland Park, FL

                          Join us for the next vBeers South Florida. vBeers events happen four times a month:

                          • vBeers @ Palm Beach Gardens 1st Wednesday of Month
                          • vBeers @ Broward 2nd Wednesday of Month
                          • vBeers @ Boca 3rd Wednesday of Month
                          • vBeers @ Miami 4th Wednesday of Month

                          This will be a non-sponsored event so bring your wallet, your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community (including YOU!).

                          RSVP at

                          Sponsorships for the vBeers events are through the South Florida Technology Alliance (SFTA).

                          John Mclaughlin, SFTA

                          IT - DR
                          Case Study: Kicking Dated DR to the Curb
                          Data Center Journal, February 4th, 2016
                          "Long Term Care Group (LTCG) is a leading provider of business-process outsourcing for the insurance industry. The firm provides insurers with expertise to help manage their complex long-term-care portfolios and maximize financial performance.

                          LTCG has more than 1,100 employees, and the majority of its business is in the United States. It serves 65 customers, including four Fortune 100 companies, and a total of nine insurance and health-care companies in the Fortune 400. LTCG has more than 1.4 million long-term-care policies currently under its management, representing nearly 20 percent of all active policies. The intricacies of the insurance and health-care market require LTCG to have a robust and reliable IT infrastructure that can change with evolving needs while supporting high-level service demands..."

                          4 Worst-Case Scenarios That Make the Case For Disaster Recovery
                          Xconomy, February 5th, 2016
                          "It's a topic frequently heard in board meetings and splashed across the news: storm-related data loss and downtime trigger threats to our IT environments. For instance, last winter in New England caused a scare among executives and IT professionals alike. Record-breaking snowfall and increased risks to regional business data created a huge buzz about the need for inclusive disaster recovery strategies..."
                          IT - PM
                          3 golden rules of successful project management
                          ITProPortal, February 4th, 2016
                          "Project management is one of the most integral elements to a business, whether for a technology implementation, a new business process or something else entirely. However, projects require a certain level of investment, so larger organisations (and an increasing number of high-growth firms) take project management very seriously as they seek to show return on that investment.

                          Strong and effective project management establishes processes that can be reused across the business, saving time and resources..."

                          IT - Networks
                          25 Gigabit Ethernet Forges a Path Forward
                          StateTech, February 2nd, 2016
                          "Since 2014, large network players such as Brocade, Hewlett Packard Enterprise and Microsoft have been working to develop a standard for 25 Gigabit Ethernet. According to experts, 2016 will be the year the technology finally makes its way into large data centers.

                          The emerging standard for 25 Gig-E addresses the need for speeds greater than 10 gigabits per second between servers and top-of-rack switches in what its proponents deem is a cost-efficient manner..."

                          8 New Network Standards You Need To Know (Slideshow)
                          Network Computing, February 2nd, 2016
                          "A fantastic way to project where the future of enterprise networking is headed is to monitor new standards that impact network hardware and software either directly or indirectly. For example, while changes to the 802.11 WiFi standard directly impact networking, new encryption standards and compression codecs have an indirect impact.

                          It's important to note how standards get started, and why they're necessary. For the most part, a new network or protocol standard comes about for one of two reasons. Either there is a new technology trend or an evolution in a preexisting technology that requires updates to an existing standard. IoT can be considered a new IT movement that is causing us to create new network standards that can handle the capacity and low-bandwidth communications of such devices. On the other hand, newly proposed WiFi standards are typically created to tear down limitations found in previous standards. Either way, standards are necessary so networking vendors can create hardware and software that are compatible with one another..."

                          VR headset shipments are about to skyrocket
                          Information Age, February 2nd, 2016
                          "For many years optical fibre for the LAN and data centre network came in only three flavours: very expensive single-mode and two diameters of multi-mode. Data speed limits of 1 Gigabit/second were more than adequate.

                          However, as recent years have passed, the need for bandwidth and data transfer volumes have accelerated alarmingly - driven by mobile devices, the increase in the use of video and by social/business media. Plus, now, the move in many businesses and organisations towards the capture, transfer and analysis of 'big data'..."

                          Why your network admins are nervous
                          Network World, February 3rd, 2016
                          "Network pros know that SDN promises to rock their world. But those who prepare for the change will find new opportunities. Here's how to help your staffers keep their skills ahead of the curve.

                          This past summer, the White Rose Academies Trust in Leeds, England, kicked off a project that represented the first step on a journey to a software-defined networking platform -- and the move precipitated some career changes, both positive and negative, for the IT staff..."

                          As 5G approaches, 3G and 4G are still getting faster
                          Network World, February 3rd, 2016
                          "Most of the excitement at Mobile World Congress this month will be about 5G, which won't officially exist until 2020. But vendors will also be showing off new ways to speed up the networks people are using now.

                          That means more than 4G, because while LTE gets a lot of press, older services are more common than you might think. Just over half of the world's mobile subscriptions (51 percent) are for 2G service only, according to Tolaga Research analyst Phil Marshall. Almost one-third are limited to 3G, while only 15 percent are 4G. Even in 2020, only 48 percent of subscriptions will be for 4G..."

                          SDN Is No Longer Just About the Hype, Quinstreet Survey Finds (Slideshow)
                          eWeek, February 4th, 2016
                          "Software-defined networking (SDN) and other network virtualization technologies have driven the conversation in the industry for the past several years. However, for all the talk about SDN, the hundreds of analyst reports and thousands of news stories written about it, the tech world is still in the early stages of SDN and network-functions virtualization (NFV). Analysts with Research and Markets expect the market to grow quickly over the next few years - to $11.5 billion between now and 2020..."
                          IT - IoT
                          Push is on to bring standardization to the Internet of Things
                          ZDNet, February 2nd, 2016
                          "Industrial Internet Consortium works with Object Management Group and other bodies to open up the world's devices to communication and data exchange.

                          OMG, Dr. Richard Soley is at it again. The chairman/CEO of the Object Management Group (OMG), which led the way in standardizing many of the web services seen in today's enterprise architectures, has set his sites on the next great frontier: the Internet of Things (IoT). He is also now executive director of the the Industrial Internet Consortium (IIC), a two-year-old organization which seeks to bring order and sanity to the chaos we associate with IoT..."

                          Just Because You can't see IoT doesn't mean it isn't there
                          ITProPortal, February 2nd, 2016
                          "A corporate-owned, agent-enabled laptop with an OS that's out of date - that's an obvious risk. But what about an agentless video surveillance system? That's a potential disaster you never saw coming. And that kind of threat - the threat from something you can't see - is the most dangerous of all..."
                            IoT security issues unplugged
                            Search Security, February 2nd, 2016
                            "A new ecosystem is needed for the Internet of Things and machine-to-machine communications, say thought leaders. But where does that leave security?

                            Internet of Things experts talk about two distinct problems when IoT security issues are brought up. There's the specter of hackable cars and escalators made murderous by malicious actors who've overridden the safety controls. Beyond that, Internet-connected machines and their data will lead to an exponential growth of the attack surface..."

                            IoT set to infiltrate law enforcement through to 2025
                            ITProPortal, February 3rd, 2016
                            "The Internet of Things (IoT) seems to be everywhere these days, proliferating our lives with more gadgets than anyone can possibly need. Just yesterday we saw smart refrigerators and washing machines announced by Samsung.

                            But what do all of these devices mean for law enforcement? No, the police won't be checking the food supply in the station's fridge, but getting technology that will better aid them while on the move..."

                            IT - Linux
                            14 Linux-based gifts ideas for your geeky valentine
                            CIO, February 2nd, 2016
                            "For Linux lovers, there is nothing better than getting a Linux running device. And if you're the Linux fan, what better opportunity to plant the seed of Linux in your valentine's heart? Here are 14 cool Linux-based devices that I would want to receive -- and I bet you will too..."
                            CentOS 7 Linux Server Cookbook, 2nd Edition
                            O'Reilly, February 2nd, 2016
                            • A practical guide to install, configure, administer and maintain CentOS 7 servers
                            • An in-depth guide to the CentOS 7 operating system, exploring its various new features and changes in server - administration
                            • Presents tricks and solutions to tackle common server issues with the help of practical examples and real-life scenarios

                            Who This Book Is For

                            This book is targeted at beginner and more experienced system administrators alike who want to use CentOS as their server solution. Readers do not need much pre-knowledge or experience at all to work with this book.

                              The top 10 Linux security distros
                              ITProPortal, February 2nd, 2016
                              "Linux distros can be used for a lot of things, from games to education, but when it comes to security, there's a whole mini-universe available.

                              Not only can you find distros made to protect your privacy, making sure you leave no trace as you move around the web, but also those that help you test your network and system security.

                              Here are the ten best Linux distros for privacy and security-conscious people..."

                              IT - Operations
                              Cloud Environments Accounted for Third of WW Spending on Enterprise IT Infrastructure in 2015 - IDC
                    , February 2nd, 2016
                              "According to the International Data Corporation's Worldwide Quarterly Cloud IT Infrastructure Tracker, total spending on IT infrastructure products for deployment in cloud environments will increase by 24.6% in 2015 to reach $32.8 billion.

                              This amount includes spending on servers, storage (excluding double counting between storage and server), and Ethernet switch products.

                              Spending on cloud IT infrastructure will grow from 28% of overall spending on enterprise IT infrastructure in 2014 to 32.9% in 2015..."

                              Three Pillars of Modern Data Center Operations
                              Data Center Knowledge, February 2nd, 2016
                              "Modern enterprise data centers are some of the most technically sophisticated business activities on earth. Ironically enough, they are also often bastions of inefficiency, with equipment utilization much below ten percent and 30 percent of the servers in those facilities being comatose (using electricity but performing no useful information services). The operators of these facilities also struggle to keep pace with rapid changes in deployments of computing equipment..."
                                IT - Security
                                Deconstructing the emergency incident response process
                                SearchSecurity, February 2nd, 2016
                                "Professional incident response providers can quickly bring the additional resources and the expertise that companies often need to handle a rapidly unfolding threat...

                                It's the middle of the holiday season and your servers and network are running at full capacity when you notice a domain controller suddenly acting weirdly. Soon, users start complaining about errors in accessing resources. Someone wants to know why users are getting locked out of their accounts. All sorts of suspicious login activity are going on across the network. Before you know it, there's a full-blown crisis on your hands that your security team cannot manage on its own..."

                                DDoS Attack Size Soars, Volumes Are Up, Arbor Networks Finds (Slideshow)
                                eWeek, February 2nd, 2016
                                "The threat of distributed-denial-of-service (DDoS) attacks remains a growing concern as the attack volume moves ever higher, according to Arbor Networks' latest Worldwide Infrastructure Security Report. The WISR is based on survey data collected from 448 service providers around the world and provides some noteworthy insights into the current state of DDoS attacks. The peak DDoS attack size increased to 500G bps this year, up 20 percent from last year's level, according to the annual study..."
                                New report shows the staggering scale of breaches due to human error
                                Information Age, February 2nd, 2016
                                "It's usually outsider attacks that grab the headlines, but new figures from Big Brother Watch really bring the impact of human error to the fore...

                                Vast amounts of personal information are shared every day in exchange for better, more efficient services. From local authorities to restaurant chains, every organisation is keen to access our data.

                                Consumers in turn expect businesses to keep that information secure and ensure access is only granted for the purpose we intended. Yet a new report by the Big Brother Watch has revealed that this confidence is often misplaced..."

                                  What service providers won't tell you about their information security
                                  ComputerWorld, February 2nd, 2016
                                  "In the course of my business, I frequently ask IT service providers questions about their information security practices, either as part of a third-party review, or as due diligence before a vendor selection. I have developed a reputation for asking blunt questions, and really dissecting the answers I get. I frequently find that these answers gloss over significant security exposures, some of which can have a material impact on the customer..."
                                  The 8 Worst Data Breaches Of All Time
                                  Network Computing, February 5th, 2016
                                  "Data breaches in large companies are the new normal, and customers have grown accustomed to hearing about data leaks, information thefts, and loss of their personal information. But for enterprises, data breaches can be disastrous. IBM estimates the cost of an average breach at $3.8 billion. And damage to a company's reputation and level of customer trust can be immeasurable.

                                  According to the ITRC (Identity Theft Resource Center), there have been 5,754 data breaches between November 2005 and November 2015, exposing 856,548,312 records. According to their findings, 783 of those breaches occurred in 2014, the most in a single year to date. ITRC data also indicated that 29% of breaches involved hacking incidents in 2014, compared to just 14.1% in 2007. This shows an upward trend in the number of data breaches resulting from an outside cyber-attack..."

                                  Evolving Our Security in 2016
                                  Information Management, February 5th, 2016
                                  "With new technologies and products being developed on a continuing basis, at almost rapid speed, it's important that we be able to adapt accordingly. This idea is no more important than in the security of these technologies, when countless amounts of our personal data can become susceptible to hackers, thieves and all sorts of cyber-criminals.

                                  Let's take a look at some of the areas we'll need to focus on with greater emphasis in 2016:.."

                                  What Are Your Container Security Options?
                                  eSecurity Planet, February 3rd, 2016
                                  "When it comes to security, anything new is usually bad news. And for most organizations, containers are something new.

                                  That's a concern, as containers will likely come to your organization in the near future -- if they are not in use already. That may be in the form of Docker containers, CoreOS's rkt-based containers, or some other type - probably more generic containers that conform to the emerging Open Container Initiative standard that's based in Docker technology.

                                  Here's what you need to know about container security, and some initiatives that may help you improve your container security posture..."

                                  IT - Careers
                                  Top Hard Skills That Will Get You Hired Fast
                                  Business 2 Community, February 2nd, 2016
                                  "Google has never been able to figure out the social media space, but it's always been good at figuring out acquisitions. Pinterest has burst onto the scene, and it already has a sky-high valuation. Meanwhile, Google has an absurd amount of cash. Could this be a match made in heaven?

                                  Check out five reasons why Google should by Pinterest, thanks to Henry Blodget, Business Insider, with a bit of color from me..."

                                  10 Best Sites For Free Online IT Classes
                                  Network Computing, February 3rd, 2016
                                  "Recent years have seen a dramatic increase in online education. According to a February 2015 report, 70.8% of leaders at academic institutions say that online education is a 'critical component of their long-term strategy.' Many organizations have begun experimenting with Massive Open Online Courses, or MOOCs, as a new way to offer educational services. Millions of people, many of them non-traditional students, have participated in their courses as a way to improve their skills..."
                                    16 Employee Engagement Trends That Will Shake up IT in 2016
                                    CIO, February 3rd, 2016
                                    "In an era of Glassdoor-driven transparency, every corporate decision can now be put on public display for all employees and potential employees to view and consider. This kind of exposure is pushing organizational culture and employee engagement into the spotlight and making engagement a major competitive advantage, according to a recent Bersin report by Deloitte, "Culture and engagement: the naked organization."

                                    To grasp how this emphasis on employee engagement will affect organizations in 2016, survey and peer-to-peer recognition platform TINYpulse reviewed data from the more than 400,000 employees worldwide that use their solution. We spoke with TinyPulse leadership team to find out what this data means, highlighting 16 trends to watch for in the employee engagement space for 2016..."

                                      Why Formal Performance Reviews Won't Disappear (Slideshow)
                                      CIO Insight, February 5th, 2016
                                      "Be honest with us: Are there times when you'd rather go to the dentist than give another performance review? It's never easy, after all, to come up with a comprehensive summary of an employee's valued contributions, outstanding work qualities and "improvement areas." And then there are review sessions that can get emotionally charged - especially when the staffer in question strongly disagrees with your assessment. Given these and other factors, some organizations are moving toward dispensing with this tradition. But a recent survey from Eagle Hill Consulting sends a "not-so-fast" message to managers who are considering such a step. The report, titled "The Annual Performance Review: Old-School or Timeless Tool?"
                                      Manage Performance Before High Performers Leave
                                      Business 2 Community, February 3rd, 2016
                                      "After a few rounds of performance appraisals, you've been able to identify who your high performers are. Unbeknownst to you, these high performers are dissatisfied, and have one foot out the door. How do you solve a problem like this when the employee has already set their sights on another position at another company? You have to manage performance before high performers leave. Now, this doesn't mean 3 weeks before they leave you start kicking it into high gear; you have to manage performance for these high performers from the beginning.

                                      Here's how to do it right:..."

                                      The Best Jobs in America Are Often in IT
                                      The Enterprisers Project, February 4th, 2016
                                      "Glassdoor, the popular website where employees and former employees review companies and their management anonymously, recently released its list of '25 Best Jobs in America for 2016.' How do they determine what's 'best?' By weighing earning potential, career opportunities, and the number of current job openings.

                                      Given the extremely tight IT job market today, it's no surprise that 40 percent of the best 25 jobs are in IT. Here are three of our favorites, and some Enterprisers who work closely with these valuable hires..."

                                      Skimping on Background Checks Could Cost You $50,0000
                                      Business 2 Community, February 3rd, 2016
                                      "Is your organization or HR department avoiding or delaying background screenings for potential employees in order to save money? If so, take a moment to consider the direct and indirect costs of a bad hire.

                                      A recent CareerBuilder survey shows that 42% of U.S. employers responding to the survey experienced at least one bad hire within the preceding year that cost their company $25,000 or more, while 27% of respondents report bad hires that cost their company $50,000 or more in direct cash outlays..."

                                        IT - Social Media
                                        6 Social Media Platforms Your Business Should Be Using
                                        Business 2 Community, February 3rd, 2016
                                        "There is currently a plethora of social media platforms currently out these, it's mind-blowing! From networking, to hooking a spouse, writing blogs to comparing businesses, the list is exhaustive! I have worked with several small businesses and start-ups who want to step into the social media arena, but are unsure which one they need to target and any benefits to their business and growth plans.

                                        I have put together a list of the big 6 platforms which your company should have a presence on..."

                                          IT - Virtualization
                                          Kubernetes in 5 minutes
                                , February 2nd, 2016
                                          "Explain Kubernetes in just five minutes? Impossible, thought Jamie Duncan. But he did it anyway.

                                          In this video, Duncan says containers are 'making us rethink how we deliver software.' But they have their limits. Scaling them requires an important tool for extending their purchase: Kubernetes. To some, it's the future of IT - one in which containers play an increasingly important role..."

                                          Docker 1.10 Designed to Bolster Container Security
                                          eWeek, February 2nd, 2016
                                          "The open-source Docker container engine technology is set for a major boost this week. The expected release on Feb. 4 of Docker 1.10 includes new features and a strong focus on security, particularly with the integration of secure computing (or seccomp) and user namespace technology.

                                          Seccomp is a technology that is integrated into the mainline of the Linux kernel to provide granular security control. The Docker engine runs on top of Linux, and with Docker 1.10, there is now a default seccomp profile that will enable users to benefit from additional security..."

                                          IT - Email
                                          Cloud Email Gaining Popularity
                                          ITProPortal, February 1st, 2016
                                          "Cloud email services are still not as big as you'd expect, but they're growing stronger. Those are the results of an automated survey by market analyst Gartner.

                                          According to the survey, 8.5 per cent of public companies use cloud email service from Microsoft's Office 365, while 4.7 per cent use Google Apps for Work.

                                          The rest 87 per cent use either on-premises, hybrid, hosted or private cloud email, managed by smaller companies..."

                                          Here are The 12 Best Email Services Which Will Provide You Anonymity and Privacy
                                          TechWorm, February 1st, 2016
                                          "Electronic mail, most commonly called email or e-mail since around 1993, is a method of exchanging digital messages from an author to one or more recipients. We all use email for different purpose, some for business others for personal use. Email uses technology to communicate a digital message over the Internet. Users use email differently, based on how they think about it. There are many software platforms available to send and receive. Popular email platforms include Gmail, Hotmail, Yahoo! Mail, Outlook, and many others..."
                                            The State of Email, Or How to Catch the Lizard Brain
                                            Business 2 Community, February 5th, 2016
                                            "Doesn't it seem like email is always being declared dead? Just like paper books, people keep State of Email wanting to bury them; yet, like paper books, email lives on and thrives. Why? Because as long as we still depend on email for work, it is a great way to reach us. But, email marketing is different and trickier in 2016 then it has been in the past. Let's discuss how..."
                                              IT - Database
                                              How Data Center Trends Are Forcing a Revisit of the Database
                                              Data Center Knowledge, February 2nd, 2016
                                              "Data centers are like people: no two are alike, especially now. A decade of separating compute, storage, and even networking services from the hardware that runs them has left us with x86 pizza boxes stacked next to, or connected with, 30-year-old mainframes. And why not? Much of the tough work is done by software tools that define precisely how and when hardware is to be used..."
                                                IT - Backup
                                                Technavio Announces Top Five Vendors in the Global Cloud Backup and Recovery Software Market until 2020
                                                Technavio, February 4th, 2016
                                                "This market research report includes a detailed segmentation of the global backup-as-a-service market by product category (online backup and cloud storage). It includes the descriptive analysis of industry overview and types of deployment of backup-as-a-service. It outlines the market shares and growth landscape for key regions such as APAC, EMEA, North America, and the ROW. The key vendors analyzed in this report are IBM, Symantec, CommonVault, and Dell..."
                                                IT - Big Data
                                                Big Data: The Reality For Smart Businesses
                                                memeburn, February 2nd, 2016
                                                "Over the past couple of years Big Data has been part of every single conversation between business leaders, IT decision makers and public stakeholders.

                                                But Big Data is much more than a buzzword or the latest technology hype. It is now a reality. Businesses are doing their best to figure out how to harness, understand and most importantly to leverage it.

                                                As the volume of data generated by companies, consumers or public services explodes (expectations are that by 2020 we will have 50 times more data than today - source: Cisco IBSG, April 2011), data strategies are being put in place by governments and businesses. Data officers have gained new seats at the highest level of governance. Today companies have access to an avalanche of data on customer behavior, brand perception, product information and issues - data on virtually everything that may have an impact on their business..."

                                                How to Best Use Customer Feedback: 3 Ways to Act on Big Data
                                                Business 2 Community, February 4th, 2016
                                                "For all its promise, and all its hype, big data has always had one inherent problem. You see, big data is ... well, big. And when you're facing something big, you may find it overwhelming. And when you find something overwhelming, you may find yourself in the fetal position.

                                                But let's get you off that cold linoleum floor and discuss how to best use customer feedback. Here are three best practices to help you turn big data into action..."

                                                Open Source or Open Architecture? Big Data Needs Both
                                                Data Center Knowledge, February 4th, 2016
                                                "The act of publishing source code, in and of itself, doesn't necessarily make a platform more useful. Making that source code extensible matters at least as much, especially in the era of open application programming interfaces (APIs), where many of the most useful apps are made so by other apps. Modern enterprises need both open source software and open architectures to take full advantage of Big Data.

                                                This article will focus on how we reached this point, and provide a blueprint for CIOs who are evaluating open source and Big Data tools..."

                                                The Surprising Truth about Big Data
                                                Datamation, February 2nd, 2016
                                                "Big Data gets a lot of headlines. If any technology can be called heavily hyped, Big Data earns the prize for most breathless predictions of enterprise influence.

                                                Typical of the rosy predictions is this from IDC: spending on Big Data-related infrastructure, software and services will grow at a torrid compound annual rate of 23.1 percent between 2014 and 2019, reaching a hefty $48.6 billion in 2019.

                                                For companies, it would seem, boosting revenue as easy as implementing a Big Data solution and hiring an accountant who can track your windfall profits..."

                                                IT - Mobile
                                                Smartwatch Demand Will Push Wearables Sales up 18.4% in 2016: Gartner
                                                Datamation, February 2nd, 2016
                                                "This year, gadget vendors will sell 274.59 million smartwatches, fitness bands and other wearable devices, generating revenue of $28.7 billion, predicts Gartner, an IT analyst firm. Smartwatches alone will account 50.4 million units sold and $11.5 billion in wearables purchases.

                                                Compared to last year, when just over 232 million units were sold, the wearables market will experience an 18.4 percent gain in sales, according to Gartner. In 2017, the analyst group expects sales to jump to 322.7 million units..."

                                                Security and privacy issues plague wearable fitness tracking devices
                                                Help Net Security, February 2nd, 2016
                                                "A new report is describing major security and privacy issues in several leading wearable fitness tracking devices and accompanying mobile applications. The research examined offerings by Apple, Basis, Fitbit, Garmin, Jawbone, Mio, Withings, and Xiaomi.

                                                The report finds that all studied fitness wearables except for the Apple Watch wirelessly emit a persistent unique identifier over Bluetooth. This leakage lets third parties, such as shopping centres or others interested in location-based monitoring, collect and map out people's movements over time..."

                                                IT trends in 2016: The evolution of enterprise mobility management
                                                ITProPortal, February 2nd, 2016
                                                "Mobility is always a hot topic; while it promises significant productivity benefits, it also brings security and management challenges to businesses. IT departments face a balancing act between empowering users and maintaining security. Users are bringing smart devices, such as phones, tablets and laptops into the office, which are neither owned nor managed by the company. While often improving personal productivity, these devices pose both security and data protection risks..."
                                                IT - BYOD
                                                Flexible Working & Working From Home: Securing Data And Networks to Protect Against Cyber Attacks and Data Breaches
                                                CBR, February 5th, 2016
                                                "Tube Strikes. The mere mention of those two words strikes fear, anger, annoyance and frustration into many a London worker. And let's be honest, Londoners, including me, do not take well to the strikes. Last summer London struggled through two 24-hour tube strikes, plunging the commuter population into abject chaos.

                                                I do not use the word chaos lightly, as I myself witnessed the queues to walk on pavements, Uber price surges adding to the gridlocked roads, and Boris bikes abandoned in bushes. I even saw a three-person argument over the last remaining Boris bike in Blackfriars quickly escalate with the two businessmen and woman having to be calmed and dispersed by City police..."

                                                  Top Ten Articles for last few Issues
                                                  Vol 215 Issues 1, 2, 3 and 4; Vol 214 Issues 2, 3, 4 and 5
                                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                  • Preparing for the Upcoming Removal of UCB Utilities from the Next Version of Solaris
                                                  • Oracle VM VirtualBox Takes the Spotlight
                                                  • Running OpenSCAP Compliance Checks on Oracle Linux
                                                  • Amazon Glacier is Overpriced!
                                                  • The UNIX-Based Cloud
                                                  • Oracle Introduces New Cloud Services for Hotels and Casinos
                                                  • FOSS Evaluation Packages
                                                  • Importing a zone into a zone cluster configuration
                                                  • Oracle To Open Data Center In United Arab Emirates Amid Cloud Growth
                                                  • Java Advanced Management Console 2.2

                                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                                    IT - Encryption
                                                    New Study Refutes Encryption Alarmists - But With a Concerning Twist
                                                    diginomica, February 5th, 2016
                                                    "Thanks to a new study, the encryption debate has taken an important/concerning twist. The report, issued by Harvard's Berkman Center for Internet and Society, counters those in the U.S. intelligence community who claim that end-to-end encryption on iPhones and Android devices poses a threat to anti-terrorist surveillance.

                                                    Unfortunately, the Harvard study's most persuasive argument carries troubling implications..."

                                                    How To Save $150 Billion: Move All App Dev And Testing To The Cloud
                                                    Forbes, February 3rd, 2016
                                                    "If you're going to convince Oracle CEO Mark Hurd of anything, you better bring some supporting data. Here are a few data points that have convinced Hurd that 100% of enterprise development and testing of IT systems - so-called dev-test - will be done using cloud-based platforms, infrastructure, and software within 10 years:

                                                    • $300 billion: That's about what enterprise IT organizations spent worldwide on dev-test last year.

                                                    • 50%: That's what Hurd considers a conservative estimate of how much of that $300 billion gets wasted in the typical on-premises dev-test process-by requiring in-house IT pros to buy, install, and configure the requisite servers, storage, databases, operating systems, and testing tools. All that setup and configuration must happen before the actual development and testing work starts.

                                                    • $150 billion: That's the size of the potential savings by moving to a cloud-based dev-test environment, in which a supplier does all that provisioning and operational work. Furthermore, cloud providers, given their expertise and scale, can often spin up a dev-test environment faster than enterprise IT shops can..."

                                                    Read on ...

                                                    IT - Java
                                                    Open source Java projects: Apache Phoenix
                                                    JavaWorld, February 4th, 2016
                                                    "Apache Phoenix is a relatively new open source Java project that provides a JDBC driver and SQL access to Hadoop's NoSQL database: HBase. It was created as an internal project at Salesforce, open sourced on GitHub, and became a top-level Apache project in May 2014. If you have strong SQL programming skills and would like to be able to use them with a powerful NoSQL database, Phoenix could be exactly what you're looking for!..."
                                                    IT - Developer
                                                    Divide and Conquer in Software Architecture
                                                    ComputerWeekly, February 2nd, 2016
                                                    "To innovate in customer engagement and to drive and adapt to digital disruption, enterprises must continuously change at increasing velocity.

                                                    Application development and delivery professionals must increase their velocity too, while also maintaining - better yet, improving - the quality and resiliency of what they deliver.

                                                    Large web-native and mobile-native players such as Netflix, Amazon, Google, PayPal, Uber, eBay and Yahoo, as well as startups and, increasingly, a broader community of enterprises are changing their software architectures to meet the challenge of continuous business innovation..."

                                                    Lessons Learned: IPv6 Addressing
                                                    By Rich Lewis
                                                    Rich Lewis, IPv6 Product Manager, blogs, "One of the biggest questions often asked about IPv6 is 'What is the killer app for IPv6?' But the answer is bigger than a single app, it rest in the sheer scalability with the number of apps and clients that can be directly addressed on the network. One of the best ways to realize and illustrate the potential of IPv6 is to build a foundation with an IPv6 Address Plan..."
                                                    IT - HPC
                                                    HPC Virtualization: Three Key Considerations
                                                    Data Center Knowledge, February 2nd, 2016
                                                    "In the past, many would say that you simply can't virtualize high-performance computing workloads. They require dedicated sets of resources, the workloads themselves are very heavy, and a lot of architectures never took virtualization into consideration.

                                                    Today, that view is pretty different. Virtualization technologies allow HPC and other workloads to leverage resources ever more efficiently and allow more scalability by bursting into the cloud..."

                                                    Create Mixed HPC/Big Data Clusters Today Says Bright Computing
                                                    HPCWire, February 3rd, 2016
                                                    "The latest version of convergence - blending traditional HPC and big data computing into a 'single' environment - dominates much of the conversation in the HPC today, including within HPCwire. Elegant unified solutions, certainly at the very high end, are still in the making. That said, Bright Computing is in the thick of efforts to transform clusters and clouds into 'unified' platforms comprised of hybrid resources that support both traditional HPC and big data today..."
                                                    Spring Boot Scenario with NetBeans IDE
                                                    By Geertjan Wielenga
                                                    Geertjan blogs, "Today Spring Boot guru Josh Long (@starbuxman) sent me a helpful scenario for getting started with Spring Boot. I've finetuned and translated some aspects to make everything work smoothly in NetBeans IDE.

                                                    So, let's get started. Go to, click 'Switch to the full version', and choose the 'H2', 'web', 'JPA', and 'REST Repositories' checkboxes. Alternatively, you can use the auto completing drop down on the right. You'll get a JAR-based Maven project. Instead, make sure where it says "Packaging" to select "War", as shown below..."

                                                    Nexenta News
                                                    Nexenta Extends Its Open Source-driven Software-Defined Storage Market Leadership via Next Generation Scale-Out Storage Software Platform
                                                    Nexenta, February 3rd, 2016
                                                    Nexenta, the global leader in Open Source-driven Software-Defined Storage (OpenSDS), announced that Business Intelligence Group, has named NexentaEdge as a winner in the 2016 BIG Innovation Awards.

                                                    Designed from the ground-up, NexentaEdge provides a multi-service, high performance scale-out storage solution that spans environments, deployments and platforms. By integrating data reduction with networking components, NexentaEdge reduces the network bandwidth utilized between servers in the scale out cluster. This not only increases performance for data transfers, but allows for a very high reach for data ingestion.

                                                    Veritas News
                                                    Newly Independent Veritas Re-Launches as Information Management Leader
                                                    Veritas, February 1st, 2016
                                                    "Today, Veritas Technologies begins as a newly independent company. Led by new CEO Bill Coleman, Veritas is focused on solving organizations' exponentially growing data challenges. Veritas provides businesses with software and services to help them collect, protect, analyze and optimize their data, so organizations can make smarter decisions, manage risk and minimize expense growth. Today, Veritas is in the unique position of already protecting 86% of the global Fortune 500 and utilizing that visibility and intelligence to help drive better business results..."

                                                    'In the era of the cloud, many organizations won't own their data center and many might not even own their applications. Other than your team, data is the most critical asset of value in the 21st century,' said Bill Coleman, CEO, Veritas. 'We're in a unique position as the company that manages and protects the world's information, and I am honored to become part of the Veritas family to serve our customers and partners.'

                                                    Cisco News
                                                    Jasper Acquisition Will Bring A Complete IoT Service Solution
                                                    Cisco, February 3rd, 2016
                                                    Cisco announced its intent to acquire Jasper Technologies, Inc., a privately held company based in Santa Clara that delivers a cloud-based IoT service platform to help enterprises and service providers launch, manage and monetize IoT services on a global scale. Under the terms of the agreement, Cisco will pay $1.4 billion in cash and assumed equity awards, plus additional retention based incentives.

                                                    Jasper is the industry's leading IoT service platform in terms of number of enterprises and service providers; in fact, many of the world's largest enterprises and service providers are using the Jasper platform to scale their IoT services business globally. With Jasper, companies can connect any device - from cars to jet engines to implanted pacemakers - over the cellular networks of the top global service providers, and then manage connectivity of IoT services through Jasper's Software as a Service (SaaS) platform.

                                                    10th Annual Cisco Visual Networking Index (VNI) Mobile Forecast Projects 70 Percent of Global Population Will Be Mobile Users
                                                    Cisco, February 3rd, 2016
                                                    Since 2000, when the first camera phone was introduced, the number of mobile users has quintupled. By 2020, there will be 5.5 billion mobile users, representing 70 percent of the global population, according to a recent release of the Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast (2015 to 2020). The adoption of mobile devices, increased mobile coverage, and demand for mobile content are driving user growth two times faster than the global population over the next five years. This surge of mobile users, smart devices, mobile video and 4G networks will increase mobile data traffic eight-fold over the next five years.

                                                    Smart mobile devices and connections are projected to represent 72 percent of total mobile devices and connections by 2020 - up from 36 percent in 2015. Smart devices are forecasted to generate 98 percent of mobile data traffic by 2020. From an individual device perspective, smartphones are dominating mobile traffic. They will account for 81 percent of total mobile traffic by 2020 - up from 76 percent in 2015. The proliferation of mobile phones, including 'phablets' (a hybrid blend of smartphone and tablet features), is increasing so rapidly that more people will have mobile phones (5.4 billion) than electricity (5.3 billion), running water (3.5 billion) and cars (2.8 billion) by 2020.

                                                    Dell News
                                                    Dell Arms Security Channel Partners with New Privileged Password Management Solution
                                                    Dell, February 2nd, 2016
                                                    Dell announced that its newest Identity and Access Management solution, Dell One Identity Safeguard for Privileged Passwords, is available through Dell Security channel partners.

                                                    Dell Security is helping partners identify a significant customer opportunity by complementing and expanding their current network security portfolio so organizations of all sizes, especially small- and medium-sized businesses, get access to a complete suite of security solutions from one source. This is a natural extension of channel partners' security portfolio, as it can help further secure Dell SonicWALL next-generation firewalls (NGFWs) by locking down the privileged passwords associated with them. This is the first time Dell Security has offered an identity and access management solution through its channel partners at the initial product launch, further establishing a partner-led selling model across Dell Security solutions. It's also the first of many strategic announcements planned from Dell Security in the coming months to build out the connected security ecosystem.

                                                    CarePoint Health Upgrades IT with Dell Software-Defined Infrastructure and Services; Increases Performance and Enhances Business Continuity with Dell Hyper-Converged Appliance
                                                    Dell, February 1st, 2016
                                                    Dell announced that CarePoint Health, which operates three hospitals and more than 55 medical practices in Hudson County, New Jersey, has deployed Dell technology to provide medical staff with a highly-available, reliable solution that enables them to stay focused on patient care. Since deploying the end-to-end Dell solution one year ago, CarePoint Health has reduced capital expenses by $15 million, value which has been added back into the business.

                                                    CarePoint Health was formed in 2012 through the acquisition of three different hospitals, each with its own infrastructure and IT processes, many of which were out of date. In addition to addressing the complexity of integrating three separate systems, the company was focused on reducing operating expenses, ensuring business continuity and enhancing its disaster recovery plan.

                                                    Dell Makes the Most Secure PCs in the Industry Even More Secure With New BIOS Verification and Advanced Threat Protection Technology
                                                    Dell, February 4th, 2016
                                                    Dell announced the availability of the Dell Data Protection | Endpoint Security Suite Enterprise, which integrates Cylance technology using artificial intelligence and machine learning to proactively prevent advanced persistent threats and malware. As part of this solution, Dell also announced the availability of a new post-boot BIOS verification solution for Dell commercial PCs, which allows customers to ensure their device remains free from malware during the boot process. The post-boot BIOS verification solution will be integrated on Dell commercial PCs with the purchase of the Dell Data Protection | Endpoint Security Suite Enterprise license.
                                                    Microsoft News
                                                    GoPro and Microsoft sign licensing agreement
                                                    February 5th, 2016, 2016-02-05
                                                    On Friday Feb 5th, Microsoft Technology Licensing LLC announced a new collaborative patent licensing agreement with GoPro Inc. for certain file storage and other system technologies.

                                                    'This agreement with GoPro shows the incredible breadth of technology sharing enabled through patent transactions,' said Nick Psyhogeos, president of Microsoft Technology Licensing. 'Microsoft's licensing of personal wearable technologies is seeing strong demand as we partner with companies from all industries to optimize solutions for their customers around the globe.'

                                                    The terms of the agreement are confidential.

                                                    Microsoft Selects 10 Machine-Learning Startups for Fourth-Month Accelerator
                                                    Government Technology, February 5th, 2016
                                                    "The startups range from an artificial-intelligence-powered doctor bot to a university recruiting tool...

                                                    Microsoft is lending a hand to a set of startups working in the highly technical realm of machine learning.

                                                    The company on Thursday said it had selected 10 startups out of 720 applicants to participate in a four-month accelerator in and around Seattle.

                                                    Tech accelerators are designed to help new companies get off to a running start, offering guidance, networking and funding. Microsoft has gathered clusters of companies in Seattle since 2012, first in partnership with the Techstars accelerator organization, and later on its own..."

                                                    Symantec News
                                                    Symantec Announces $500 Million Strategic Investment by Silver Lake, Symantecgs Total Capital Return Program Increased to $5.5 Billion
                                                    Symantec, February 4th, 2016
                                                    Symantec Corp. (NASDAQ: SYMC) and Silver Lake, the global leader in technology investing, announced that Silver Lake will make a $500 million strategic investment in Symantec. In connection with Silver Lake's investment, the Symantec Board has increased the Company's total capital return program to $5.5 billion. Through this capital return, Symantec will return to its shareholders funds representing all of the after-tax cash proceeds from the recent sale of Veritas.

                                                    • The Symantec Board expects to complete the full $5.5 billion capital return by the end of March 2017 in the form of: $500 million accelerated share repurchase completed in January 2016;
                                                    • A special dividend of $4.00 per share, equaling $2.7 billion; and
                                                    • $2.3 billion in future share repurchases.

                                                    The $4.00 per share special dividend will be payable on March 22, 2016, to stockholders of record as of the close of business on March 8, 2016. The special dividend will be in addition to Symantec's quarterly dividend.

                                                    Symantec Reports Third Quarter Fiscal Year 2016 Results
                                                    Symantec, February 4th, 2016
                                                    Symantec Corp. (NASDAQ: SYMC) reported the results of its third quarter of fiscal year 2016, ended January 1, 2016.

                                                    Michael A. Brown, president and CEO, said, 'We are entering the second half of our transformation with a stronger foundation, evidenced by new products that are gaining mindshare among customers, better top-line performance, and a clear path to long-term profitability. I'm pleased with the progress we've made against our priorities, including strengthening our security portfolio, enhancing our go-to-market capabilities, improving our cost structure and efficiently allocating capital.'

                                                    Thomas Seifert, executive vice president and CFO, said, 'Our enterprise security revenue grew for the third consecutive quarter and we expect continued growth through FY17. We will return $5.5 billion in capital to shareholders by the end of March 2017. This total includes the $500 million accelerated share repurchase we have already completed, as well as a special dividend, equaling $2.7 billion, and $2.3 billion in share repurchases. Additionally, we will be implementing plans to achieve greater profitability through cost savings of approximately $400 million by the end of fiscal year 2018.'

                                                    IBM News
                                                    IBM Launches Cloud Data and Analytics Marketplace for Developers
                                                    IBM, February 4th, 2016
                                                    IBM announced a broad expansion of its Cloud Data Services portfolio with more than 25 services now available on the IBM Cloud. They are designed to help developers build, deploy and manage web and mobile applications and enable data scientists to discover hidden trends using data and analytics in the cloud. The hybrid cloud services can be deployed across multiple cloud providers and are based on open source technologies, open ecosystems that include company and third-party data, and open architectures that allows data to easily flow amongst the different services. In addition to self-service capabilities for everything from data preparation, migration, and integration, to tools for advanced data exploration and modeling, IBM introduced the following new cloud data services today:...
                                                    IBM Signs Agreement to Acquire to Deliver Stellar Customer Experiences
                                                    IBM, February 3rd, 2016
                                                    IBM has signed a definitive agreement to acquire -- a full-service digital agency headquartered in Dusseldorf, Germany. The proposed acquisition of extends the strategy and design expertise of IBM Interactive Experience (IBM iX) with new digital marketing, commerce and platform skills to accelerate clients' digital transformations.

                                           is a leading digital agency in Europe and one of the few specialized in implementation services across three of the leading commerce and customer platform software providers: Adobe, Sitecore, and SAP hybris. The hybris capability deepens IBM's longstanding relationship with SAP, and brings the value of design thinking to the companies' expansion in e-commerce.

                                                    IBM Signs Agreement to Acquire Aperto to Meet Growing Client Need for Digital Transformation
                                                    IBM, February 2nd, 2016
                                                    IBM announced it has signed a definitive agreement to acquire Aperto - a digital agency with headquarters in Berlin. Upon completion of this transaction, Aperto will join the IBM Interactive Experience (IBM iX) team, supporting IBM's growth in the largest economy in Europe.

                                                    Aperto's 300-plus employees will continue to serve its roster of clients, which currently includes companies such as Airbus Group, Volkswagen and Siemens...

                                                    IBM Builds On Growing Social Business Momentum with New Clients and Services
                                                    IBM, February 1st, 2016
                                                    IBM announced continuing momentum for its social business offerings with clients around the world ushering in the next era of collaboration with IBM Verse and Connections. IBM also announced expanded capabilities in its collaboration portfolio with new innovations that make it easier for clients to gain and share business insights across teams. Social networks are fostering innovation by increasing collaboration across the enterprise, with one IBM survey showing that 64 percent of CIO respondents intend to invest in internal collaboration, social networking and cloud through 20191. As more organizations deploy collaboration tools such as Verse and Connections, businesses can gain greater visibility into sentiment, activities and behaviors. By infusing cognitive technology into these systems, IBM is helping clients listen to, reason and learn from data in new ways.
                                                    Fujitsu News
                                                    Tokyo Institute of Technology and Fujitsu Achieve Wireless Transmission Speeds of 56 Gbps, World's Fastest
                                                    Fujitsu, February 1st, 2016
                                                    Tokyo Institute of Technology and Fujitsu Laboratories Ltd. announced that, in an effort to further enlarge the capacity of wireless equipment, they have developed a CMOS wireless transceiver chip that can process signals at high speeds with little loss across a broad range of frequencies, from 72 to 100 gigahertz (GHz). They also developed technology to modularize it. With these developments, they succeeded in achieving wireless transmission speeds of 56 Gigabits per second (Gbps), the world's fastest.
                                                    Fujitsu Develops Technology for Instantaneous Searches of a Target Image from a Massive Volume of Images
                                                    Fujitsu, February 2nd, 2016
                                                    Fujitsu Laboratories Ltd. announced that it has developed technology that is installed on a server to specialize features with a specific functionality. In this way it is possible to search at high speed through an enormous archive to find even partial matches of a designated still image. It has confirmed that, compared to searches on general-purpose servers, the new approach resulted in an over fifty-fold improvement in processing time.
                                                    Red Hat News
                                                    Friday Five - February 5, 2016
                                                    Red-Hat, February 5th, 2016
                                                    The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.

                                                    • Red Hat Blog - Innovation, Disruption, Change and Unicorns: Understanding OpenShift's Strategy for 2016 and Beyond
                                                    • CIO - Using open source in the enterprise - 16 CIOs embracing free and open source software
                                                    • FlexJobs - 100 Top Companies with Remote Jobs in 2016
                                                    • East Carolina University prepares students for an open source world with Red Hat Academy
                                                    • Red Hat Blog - Red Hat Certified Professionals Weigh In on Value of Certification

                                                    Read on for details.

                                                    Level3 News
                                                    Level 3 Reports Fourth Quarter And Full Year 2015 Results
                                                    Level(3), February 4th, 2016
                                                    Full Year 2015 Highlights
                                                    • Grew Core Network Services revenue by 5.3 percent for the full year 2015, on a pro forma and constant currency basis
                                                    • Grew Enterprise Core Network Services revenue by 7.2 percent for the full year 2015, on a pro forma and constant currency basis
                                                    • Grew Adjusted EBITDA by 16 percent for the full year 2015, compared to the company's outlook of 15 to 17 percent
                                                    • Generated Free Cash Flow of $658 million for the full year 2015, which excludes accelerated cash interest payments of $32 million related to capital markets activity in the fourth quarter 2015, and was above the company's outlook range of $600 to $650 million
                                                    • Achieved approximately $216 million of annualized run-rate Adjusted EBITDA synergies since the close of the tw telecom transaction, exceeding the company's outlook of $140 million by the end of the first quarter 2016 and a total of $200 million

                                                    Level 3 Communications, Inc. reported results for the quarter and full year ending December 31, 2015.

                                                    "Our 2015 results demonstrate Level 3's solid execution and performance," said Jeff Storey, president and CEO of Level 3. "Demand for bandwidth remains strong and the proliferation of connected devices continues. These demand drivers are creating an enterprise networking opportunity that is well suited for the depth, scale and reach of Level 3's global network and capabilities. We believe we are well positioned to continue to take enterprise market share."

                                                    EMC News
                                                    Life beyond Vblock: VCE repositions as EMC's new converged division
                                                    SeachDataCenter, February 5th, 2016
                                                    "The maker of the Vblock, VCE, is securing its role within the EMC Federation after the Dell-EMC merger as a converged platform division with new offerings in the works.

                                                    EMC and VCE are gearing up to strike back at hyper-converged vendors such as Nutanix that have been eating up traditional server and storage sales.

                                                    Over the next two weeks EMC and VCE, now called the EMC Converged Platform Division, will unwrap a line of hyper-converged appliances called VxRail, to complement its higher-end Vxblock series of converged infrastructure (CI). Not to be outdone, VMware hopes to revive users' flagging interest in its hyper-converged products, debuting its next generation of its software-only converged product VSAN..."

                                                    HP News
                                                    Hewlett Packard Enterprise Introduces New Software to Help Organizations Tackle High-Stakes Compliance Risk
                                                    HP, February 2nd, 2016
                                                    Hewlett Packard Enterprise (NYSE: HPE) announced the availability of HPE Investigative Analytics, a new hosted software solution that enables financial institutions and other highly regulated organizations to identify and analyze risk events, and take action to prevent them.

                                                    Financial institutions are under more regulatory pressure than ever before. According to a 2015 Morgan Stanley report, global financial institutions have paid $260 billion in fines since 2009. Regulators are now on high-alert and new compliance guidelines and directives are being imposed on organizations every day. Failure to meet these regulations can result in significant material damage to the firm, in the form of multi-billion dollar fines and potential criminal prosecution.

                                                    HPE Acquires Data Protection Software Developer Trilead
                                                    CRN, February 3rd, 2016
                                                    "Hewlett Packard Enterprise has acquired a small data protection vendor that in some ways competes with more well-known applications like Veeam.

                                                    Trilead, an Altendorf, Switzerland-based developer of low-cost data protection software for VMware vSphere and ESXi and Microsoft Hyper-V virtualized environments, put a statement on its website home page that it was acquired by HPE.

                                                    Neither the timing of the acquisition nor the purchase price was addressed in the statement..."

                                                    Brocade News
                                                    CRN Exclusive: Brocade CTO Bets On Hyper-Converged Partnership With Nutanix To Drive Channel Sales
                                                    CRN, February 3rd, 2016
                                                    Brocade Communications is placing its bets on hyper-converged solutions quickly expanding into larger enterprises -- and says that growth will help fatten channel partners' wallets.

                                                    The San Jose, Calif.-based networking vendor has formed several strategic technology partnerships with the likes of hyper-converged leaders EMC with VSPEX Blue and most recently Nutanix. Because of its Nutanix alliance, forged last week, Brocade's switches and fabrics can be deployed alongside Nutanix solutions targeting enterprises and the data center.

                                                    "We are really very pervasive in this space as a networking underlay for these solutions," said Ken Cheng, Brocade's chief technology officer and senior vice president of corporate development and emerging businesses. "Hyper-converged is going to grow very dramatically."

                                                    Hitachi News
                                                    Hitachi Data Systems Delivers Next-Generation Hyper-Converged, Scale-Out Platform For Big Data, Powered By Pentaho
                                                    Hitachi, February 3rd, 2016
                                                    Hitachi Data Systems Corporation (HDS), a wholly owned subsidiary of Hitachi, Ltd. (TSE: 6501), unveiled the next generation Hitachi Hyper Scale-Out Platform (HSP), which now offers native integration with the Pentaho Enterprise Platform to deliver a sophisticated, software-defined, hyper-converged platform for big data deployments. Combining compute, storage and virtualization capabilities, the HSP 400 series delivers seamless infrastructure to support big data blending, embedded business analytics and simplified data management.

                                                    Modern enterprises increasingly need to derive value from massive volumes of data being generated by information technology (IT), operational technology (OT), the Internet of Things (IoT) and machine-generated data in their environments. HSP offers a software-defined architecture to centralize and support easy storing and processing of these large datasets with high availability, simplified management and a pay-as-you-grow model. Delivered as a fully configured, turnkey appliance, HSP takes hours instead of months to install and support production workloads, and simplifies creation of an elastic data lake that helps customers easily integrate disparate datasets and run advanced analytic workloads.

                                                    Windstream News
                                                    Windstream Announces Plans to Bring Kinetic TV Service to Sugar Land, Texas
                                                    Windstream , February 4th, 2016
                                                    Windstream (NASDAQ: WIN), a leading provider of advanced network communications, announced that Kinetic, Windstream's next-generation television service, will launch in Sugar Land, Texas in the second quarter of 2016. The new television service will be available to more than 30,000 homes in the Sugar Land area. Kinetic is a total entertainment option that leverages the company's existing 100 percent fiber-backed network to provide customers with a wide array of features that enables the highest quality video entertainment. Supported by the Ericsson Mediaroom platform, Kinetic offers an innovative experience that features HD channels with all packages, free whole home DVR, wireless set top boxes (for additional TVs), video on-demand and instant channel change. Windstream's expansion of Kinetic to Sugar Land is demonstrative of the company's continued commitment to the community, and is the third Kinetic market following its launch in Lincoln, Neb. and Lexington, Ky. in 2015.
                                                    Netapp News
                                                    NetApp Completes Acquisition of SolidFire
                                                    NetApp, February 2nd, 2016
                                                    NetApp announced it has completed the acquisition of SolidFire. SolidFire combines the performance and economics of all-flash storage with a webscale architecture that radically simplifies data center operations and enables rapid deployments of new applications.

                                                    Customers now have access to the industry's broadest all-flash portfolio to meet their needs for speed, scale and data services. Over time, SolidFire products will be incorporated into NetApp's Data Fabric strategy, delivering seamless data management across flash, disk and cloud resources.

                                                    NetApp Hosts Third Quarter Fiscal Year 2016 Financial Results Webcast
                                                    NetApp, February 4th, 2016
                                                    After market close on Wednesday, February 17, 2016, NetApp (NASDAQ: NTAP) will announce financial results for the third quarter of fiscal year 2016, which ended January 29, 2016.

                                                    NetApp executive management will host a conference call at 2:00 p.m. Pacific Time to discuss these results and provide their perspective on market dynamics. The call will be broadcast live via the Internet.

                                                    Trending in
                                                    Vol 235, Issue 3
                                                    Trending IT Articles