News about Oracle's Solaris and Sun Hardware
System News
Feb 22nd, 2016 — Feb 28th, 2016 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 216, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle News
Oracle Enables Mobile Operators to Securely Increase Network Coverage and Capacity Using Wi-Fi and the Internet
Oracle, February 22nd, 2016
Consumer use of mobile devices continues to expand at a breakneck pace, which makes it challenging for mobile network operators to deliver the coverage and capacity required for a high quality customer experience. To address this challenge, Oracle announced that Oracle Communications Mobile Security Gateway provides new ways to help communications service providers (CSPs) cost effectively expand network coverage and increase capacity by safely and securely incorporating Wi-Fi and the internet into the mobile core. In addition, the newly introduced support for Wi-Fi calling allows CSPs to leverage Wi-Fi to address problematic indoor voice coverage problems to provide customers with a consistent mobile network experience even in areas that were previously dead zones in the network.
Oracle Delivers 10x Performance Improvement in Cloud Network Infrastructure
New Oracle InfiniBand Network Fabric Transforms the Delivery of Business-Critical Applications in the Cloud
Extending its commitment to helping organizations embrace cloud infrastructure, Oracle today announced Oracle Enhanced Data Rate (EDR) InfiniBand Fabric. The new software-defined networking-enabled, 100 GB/s converged fabric enables enterprise customers to securely accelerate application performance in order to quickly respond to changing business demands. These capabilities also provide the basis for future generations of highly converged Engineered Systems.
Big Thoughts on Big Data
What's Next for Customer-Centric Organizations?
Jeb Dasteel blogs, "Big data done right can deliver unprecedented operational and performance insights as well as provide a springboard for true innovation for industries across the board -- from financial services to higher education. As such, making the most of big data is at the forefront of business executives 'to-do' lists -- it's one of the areas that our customers ask us about most often..."
5 Steps To Start Your IoT-Enabled Service Strategy
By Daniel Foppen, Senior Principal Product Manager, Oracle Service Cloud
Daniel writes, "There is plenty of buzz around the Internet of Things (IoT). There will be over 25 billion connected things by 2020. Soon we will be coming across hundreds of connected devices in our homes, at work and on the street. The IoT is changing our lives. This is exciting of course, but for many service professionals the question of how to actually start leveraging the IoT is not that easy. Yes, we know there is a lot of devices that are connected - more every second - but how does the head of customer care actually set up an infrastructure that allows them to reap the benefits of IoT? As we are in the industry of delivering customer service experiences, we will focus on helping define a simple 5 step framework to start an IoT enabled customer service strategy.

So why IoT Enabled Service?..."

Next up in the Innovation Labs: BIG data
By Erika Noll Webb
Erika blogs, "We're rolling into March with our next hackathon. This time we're going to be running it on Big Data. Specifically, Big Data Insights.

Big data is everywhere. We've touched on it in our blogs about the IoT and Beacons. We have sensors everywhere now, collecting lots and lots of data. And companies are collecting lots and lots of data. Governments are also using and collecting big data. India is tackling a project to try to create accurate, detailed, and verifiable national records on its 1.25 billion citizens..."

Are We in Artificial Intelligence Winter?
Network World, February 22nd, 2016
"Can the development of artificial intelligence technology be kicked up a notch? Scientists at Intelligence Advanced Research Projects Activity (IARPA) certainly hope so and recently issued a Request For Information about how AI advances could be made more quickly and consistently..."
    MasterCard's Machine-Learning Network Thwarts ATM Attacks
    WSJ, February 23rd, 2016
    "MasterCard Inc. says new machine-learning technology has helped it quickly control three separate cyberattacks that targeted automated bank tellers, limiting the damage to about $100,000 each.

    The transaction-monitoring system, which also employs data visualization tools, caught the three attacks during the first two months of 2016..."

    This amazing art was created by neural networks, and now you can buy it
    CIO, February 26th, 2016
    "Neural networks are often used for image recognition, but it turns out they can create some pretty incredible images as well.

    On Friday evening, the Gray Area Foundation for the Arts and Research at Google will host 'DeepDream,' a special exhibit and auction in San Francisco featuring artwork made using neural networks..."

    TechCast Video about Xen and Oracle VM
    Friday Spotlight
    Zeynep writes, "Join Logan Rosenstein, OTN Systems Community Manager, as he chats with Kurt Hackel, Software Development Senior Director for Oracle VM Server and Private Cloud Appliance, and John Priest, Product Management Director for Oracle VM, about Oracle VM, the Xen Hypervisor, and working with the Open Source community..."
    IT - Storage
    Myth Or Fact: Flash Storage Tradeoffs
    Data Center Journal, February 22nd, 2016
    "It's pretty much the accepted wisdom in IT organizations that if you want something 'faster, better and cheaper,' you'll end up disappointed. It's possible to achieve one or sometimes two of these characteristics, but almost always at the expense of the third. It's called the Iron Triangle..."
      Have Hard Drives Jumped the Shark?
      Enterprise Storage Forum, February 23rd, 2016
      "Storage technology is evolving rapidly. New types of storage, new storage solutions and new storage tools that hold a great deal of promise for pushing storage technology forward are being developed. It is extremely likely that some current technologies may not survive in their current form. Which technologies may jump the shark is the subject of this article.

      Taking current trends and making predictions from them is always a dicey proposition. However, there are some trends that will have a clear impact on hard drives..."

        Java Technology
        Java EE 7 Proves Effective for Mission-Critical E-Payment Systems
        By Reza Rahman
        Reza writes, "One of the most important things to do at this stage of the life-cycle of Java EE is highlight successful adoption stories at a regular cadence. We have been doing just that for a long time through our adoption stories blog, this humble blog as well as JavaOne. Indeed JavaOne 2016 was particularly good in this regard. We had a number of solid adoption stories submitted that we could select from. We will highlight all of those stories here. A very nice adoption story presented at JavaOne 2016 was from the TAS Group. The session was presented by Andrea Folli, the CTO of the cashless business unit of the TAS group that recently re-architected their legacy systems using Java EE 7..."
        Online Java Hands-On
        By Yolande Poirier
        Juergen blogs, "Oracle Technology Network invites you to watch the replay of technical sessions and hands-on labs from the last Virtual Technology Summits. Learn from Java specialists including Java Champions and Oracle engineers about the entire Java platform as well as the development tools. The sessions are accessible without registration..."
        Get Ready for Java 9
        By Yolande Poirier
        Yolande blogs, "Java 9 will introduce modularity, which will be a major change to the Java platform. To help you understand those changes Alan Bateman and Alex Buckley presented a series of sessions about Java 9 at JavaOne. In the 'Prepare for JDK 9' presentation, Alan describes JDK 9 changes and their implications in existing code and future development..."
        IT - Technology
        Most anticipated tech of 2016 (Slideshow)
        CNET, February 26th, 2016
        "Plenty of new gadgets are on deck for 2016. Some are official, some are inevitable sequels -- but here's everything we know so far..."
          At-a-Glance Guide to the OTN Virtual Technology Summit
          Oracle Technology Summit Virtual Technology Summit for March / April 2016
          Bob Rhubart blogs, "On March 8th the Oracle Technology Summit Virtual Technology Summit for March / April 2016 gets underway. Here's an at-a-glace guide to the event..."
          IT - Bitcoin
          Bitcoin Splitsville: Hard Forks and Heart Breaks in Technology
          CryptoCoinsNews, February 23rd, 2016
          "With Bitcoin, we have finally arrived. Blockchain technology is now front and center. Big finance, and by way of, big money is now involved. Pandora's Box is wide open and the new path forward wears a suit and carries a nice leather briefcase. Although this may not sit well with Tech Libertarians (or various degrees of this school of thought), this is velocity and trajectory that capitalism creates. The mainstream love that blockchain is receiving will, of course, affect the choices being made within Bitcoin..."
          Tony Robbins : Governments Can't Control Bitcoin
          NEWSBTC, February 21st, 2016
          "Money is the driving force of life in today's world. Those who do not agree and say money can't buy everything, it is time for them to revisit the age-old psychological theory established by Abraham Maslow. The Mallow's pyramid, also known as Mallow's hierarchy shows the fundamental needs of humans and how it will contribute towards their self-actualization.

          One look at the pyramid is all it takes to realize that without money, there is no way one can satisfy any of the needs..."

            Bitcoin Core 0.12.0 Released: What's New?
            Bitcoin Magazine, February 23rd, 2016
            "Today marks the official release of Bitcoin Core 0.12.0, the twelfth generation of Bitcoin's reference client as first launched by Satoshi Nakamoto seven years ago. Developed by close to 100 contributors over seven months, the latest version of Bitcoin Core includes more than 20 improvements, particularly regarding performance, security and usability.

            These are the sixth most notable changes..."

            Ledger Presents Use Of Segregated Witness For Hardware Wallets
            CryptoCoinsNews, February 26th, 2016
            "Ledger, a provider of hardware solutions which offers the Ledger Nano hardware wallet, recently posted a blog on Medium addressing the use of Segregated Witness for hardware wallets. Pieter Wuille, a bitcoin core developer, presented his Segregated Witness proposal at the Scaling Bitcoin in Hong Kong..."
            Bitcoin Has No Leader, and Maybe That's a Good Thing
            CoinDesk, February 26th, 2016
            "Brian Hoffman is the CEO of OB1, the startup overseeing development of blockchain-based marketplace project OpenBazaar, and a former lead associate at Booz Allen Hamilton.

            In this opinion piece, Hoffman discusses the ongoing debate over how bitcoin should be scaled, and why the network's lack of leadership may be both a blessing and a curse..."

            IT - FOSS
            50 Open Source Tools Tech Companies Love
            Datamation, February 23rd, 2016
            "Over the last decade or so, many technology companies have begun embracing open source. Many use open source tools to run their own IT infrastructure and websites, some offers products and services related to or built on open source tools, and some are contributing to or supporting open source projects.

            A 2015 survey from Black Duck found that 78 percent of organizations use open source software, almost twice as many as said the same thing in 2010..."

            MySQL Enterprise Monitor 3.0.26 has been released
            By Andy Bang
            Andy Bang blogs, "MySQL Enterprise Monitor 3.0.26 is now available for download on the My Oracle Support (MOS) web site. This is a maintenance release that includes a few enhancements and fixes a number of bugs. You can find more information on the contents of this release in the change log.

            You will find binaries for the new release on My Oracle Support..."

            Cloud Computing
            Oracle Enables Communications Service Providers to Transform Business with Cloud-based Network Services
            Oracle unifies network and IT service delivery to accelerate cloud deployment of core network functions
            As communication service providers (CSPs) continue to evolve their networks to take advantage of new technologies to deploy innovative services such as voice over LTE (VoLTE) and voice over wi-fi (VoWiFi), they require agile, cost-effective solutions to address their customers' digital lifestyle expectations. To achieve these goals, CSPs are shifting more of their core network functions to the cloud. The latest version of Oracle Communications Network Service Orchestration Solution, accelerates this transition by providing key service orchestration capabilities that enable CSPs to rapidly design and automatically deploy, scale, heal and terminate services in the network core.
            Oracle Mounts Challenge to AWS in Massive IT Industry Shakeup
            By Eric Jacobsen
            Eric writes, "In an exclusive interview, Mark Hurd, CEO of Oracle Corp, details Oracle's cloud strategy and how it's mounting an aggressive challenge to public cloud service providers such as Amazon Web Services (AWS), Salesforce and Workday, while its enterprise competitors such as EMC and SAP scramble for survival in a cloud-centric world..."
            The Journey to the Cloud Starts at the Top
            Aberdeen Group Infographic
            A recent study from the Aberdeen Group found that while two-thirds of enterprise applications are currently implemented as virtualized workloads, 68% are still being executed on premises.

            The implication? Enterprises want to take advantage of the cloud's flexibility and cost-effectiveness-but aren't quite ready to relinquish control...

              IT - Cloud
              5 Major IT Headaches Solved by The Cloud
              memburn, February 23rd, 2016
              "Companies across South Africa and the world are discovering that cloud computing is a pretty neat way to procure the services necessary to do business. Cost consistently comes up as the primary advantage of cloud solutions - but they have many benefits beyond the price tag. Not only do cloud services solve problems for business people, they also address common gripes for those tasked with managing the IT department..."
              Four cloud container tips to make your life easier
              Search Cloud Computing, February 26th, 2016
              Cloud containers aren't going away any time soon. To adopt and keep your containers running efficiently, follow these four tips.
              IT - CxO
              Why CXOs Ignore Data Quality Problems
              TechRepublic, February 23rd, 2016
              "Too many CXOs ignore data quality problems until they result in catastrophe. Here's why, and how to avoid the mayhem..."
                Are CIOs Really Making Security a Top Priority?
                CIO Today, February 24th, 2016
                "CIOs repeatedly say 'Security is a top priority.' But, how can that be? The truth is that most apps out there are incredibly insecure. CIOs and developers are in a tight spot -- and why? -- because they know that security must be a focus, yet they aren't delivering it..."
                Is Your Unbiased IT Consultant Biased?
                Business 2 Community, February 24th, 2016
                "When you bring in an unbiased IT consultant, they're supposed to be completely unbiased. You're paying them to assess your IT systems, whether internal or outsourced and trusting their opinions and expertise. The idea with an external consultant is that in concept they have nothing to gain from any expertise or recommendations they provide, so it's a truly unbiased resolution of any issues that you're experiencing. But what if I told you that some consultants stand to gain something from the decisions you make with regard to your technology? That gain for them can come in a number of different formats. Let's explore some of that potential bias and suggestions we have for dealing with it..."
                  Business leaders struggle with cloud, big data and IoT security
                  CIO, February 26th, 2016
                  "New survey of enterprise leaders highlights concerns over security in new IT architectures as sensitive data moves to cloud, big data and IoT environments..."
                  What is bimodal IT and what does it mean for the CIO?
                  Information Age, February 26th, 2016
                  "Any CIO worth their salt will keep track of the latest technology trends analysts are discussing and exploring. Over the past year, those who listened to prophecies about the Internet of Things and big data analytics have started to reap the rewards these new technologies are beginning to bring to the business arena.

                  The next big development looming on the horizon is bimodal IT..."

                  South Florida Technology Alliance: Cracking the Code on Tech Talent
                  @Citrix, W. Cypress Creek Rd
                  Hear from Leading CEOs and Student Interns who have worked at Google, VMware, Modernizing Medicine and 3Cinteractive! Learn about implementing company internship programs; the hottest skill sets; companies and talent in South Florida; the real deal behind internships - and how to crack the code on tech talent.


                  IT - Wireless
                  Don't Believe the Hype! 5G Wireless Is Still Years Away
                  CIO, February 23rd, 2016
                  "Some leading wireless carriers and device makers, including Verizon and Nokia, want you to believe next-generation 5G mobile Internet is right around the corner. However, the reality is that 5G is still on the distant horizon..."
                    VBeers @ Palm Beach Gardens - Twisted Trunk
                    Wednesday, Match 2nd: 6:00 PM to 9:00 PM
                    Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida.

                    Register today so you can be a part of this great monthly event! Feel free to invite all of your friends and co workers who work in the IT industry!

                    Twisted Trunk

                    RSVP at

                    Sponsorships for the vBeers events are through the South Florida Technology Alliance (SFTA).

                    John Mclaughlin, SFTA

                    IT - DR
                    Lessons Learned in Business Continuity Planning
                    GCN, February 22nd, 2016
                    "Many government IT managers today are being tasked with developing and testing business continuity plans for payroll, email, financial and other key administrative systems. In 20 years of developing such continuity plans, we've seen areas that many IT managers overlook or underestimate, and which end up adding insult to injury when disaster finally occurs. Some of these areas include:..."
                    Create a Data Recovery Plan and Secure Your Network
                    Network World, February 22nd, 2016
                    "We discussed building malware defenses the last time out, but today we're going to focus on Critical Security Controls 10, 11, and 12 covering data recovery, secure network configuration, and boundary defense.

                    It's unrealistic to think that you can completely avoid cyberattacks and data breaches, so it's vital to have a proper data recovery plan in place. You can also tighten your defenses significantly by ensuring all of your network devices are properly configured, and by putting some thought into all of your potential network borders..."

                    Two key disaster recovery colocation questions to ask
                    Search Data Center, February 25th, 2016
                    "Choosing a disaster recovery colocation provider may seem daunting. However, knowing what to look for beforehand can help you make the right choice..."
                    IT - PM
                    Project Leadership vs. Just Being Loud
                    CIO, February 22nd, 2016
                    "We've all dealt with the loud leader. Are they really respected and followed? Here are the top four traits I believe a true leader should bring to the table..."
                      OpenProject: An Open Source Project Management Solution
            , February 23rd, 2016
                      "Trying to track a complex project without drowning in too much information is still a challenge for many of us. To solve this, we developed OpenProject, a web-based open source project management tool that supports teams throughout the entire project life cycle. It is licensed under GNU GPLv3 and written in Ruby on Rails and AngularJS.

                      OpenProject offers work packages tracking (e.g. tasks, risks, bugs, requirements), a Scrum board, timelines, document management, a project wiki, meeting management, time and cost reporting, and much more..."

                      4 Ways Good Project Leaders Create Cultures of Success
                      CIO, February 23rd, 2016
                      "People are not machines. They can't be programmed to simply do as they're expected. People are complex, dynamic and intuitive, and they bring education, experience and emotions to work every day - all of which plays a role in their interactions and contributions. These factors have the potential to make people - employees, consultants and management alike - either the best assets or the biggest liabilities to any project..."
                      The Tao of project management
            , February 25th, 2016
                      "The Tao Te Ching, believed to have been written by the sage Lao Tzu in the 6th century BCE, is among the most widely translated texts in existence. It has inspired everything from religions to funny movies about dating, and authors have used it as a metaphor to explain all kinds of things (even programming).

                      This text is what immediately comes to my mind when thinking about project management in open organizations..."

                      IT - Networks
                      Network Automation with Ansible: 5 weeks of Work Reduced to 4 Minutes of Joy
                      ESG, February 23rd, 2016
                      "ESG recently completed research on network automation, and that reminded me of a talk presented by Adam Mills of Riot Games at a Juniper meetup last year, where we learned that a build out of datacenter in Japan got compressed from 5 weeks down to 4 minutes..."
                        Get Ready for Faster-Than-5G Wireless
                        Network World, February 22nd, 2016
                        "For those waiting for 10Gbps to 20Gbps 5G wireless, possibly due around 2018 on millimeter frequencies, think again, what you're really going to want is 6G. It'll be faster.

                        And 6G may be on the horizon. A terahertz (Thz) transmitter is being developed that scientists say will transmit data at over 10Gbps using 300GHz frequencies. The 300GHz band is higher-up the spectrum than 5G is likely to use..."

                          Demystifying the 10x Network Engineer
                          NetworkComputing, February 23rd, 2016
                          "The 10x engineer is an old, yet controversial idea. Frederick Brooks Jr. first used the term in the 1975 classic 'The Mythical Man-Month,' where he proposed that the best software engineers were 10 times more productive than the worst engineers. I rejected the 10x theory outright when I first heard it. I couldn't see how any engineer could be 10 times better than the worst engineer..."
                            Researchers create super efficient 'Passive Wi-Fi' which consumes 10,000 times less power than conventional methods
                            Tech Worm, February 24th, 2016
                            "Using Wi-Fi consumes a significant amount of energy, draining the batteries on all those connected devices. A team of computer scientists and electrical engineers from University of Washington have demonstrated that it is possible to generate Wi-Fi transmissions using 10,000 times less power than conventional methods..."
                            OpenDaylight Brings Enterprise-Level Features to Beryllium Release
                            eWeek, February 26th, 2016
                            "The OpenDaylight Project this week launched the fourth release of its network virtualization platform that group officials say addresses the growing demand from users who are deploying the technology for more enterprise-ready capabilities..."
                              IT - IoT
                              Internet Of Things Startups Pushing The Limits Of Innovation
                              Network Computing, February 23rd, 2016
                              "The Internet of Things (IoT) is clearly one of the fastest-growing areas in the technology industry. According to the latest forecast from IDC, IoT spending will likely grow from $698.6 billion last year to nearly $1.3 trillion in 2019, for a compound annual growth rate of 17%..."
                              Gartner's top 10 Internet of Things Technologies for 2017 and 2018
                              Information Age, February 23rd, 2016
                              "Analyst firm Gartner has highlighted the top Internet of Things (IoT) technologies that should be on every organisation's radar through the next two years.

                              The technologies and principles of IoT will have a very broad impact on organisations, said Gartner, affecting business strategy, risk management and a wide range of technical areas such as architecture and network design..."

                              IoT's New Supergroup Will Have One Code Base to Rule Them All
                              PC World, February 22nd, 2016
                              "The Open Connectivity Foundation plans to introduce a single open-source code base in place of the alphabet soup of standards for the Internet of Things.

                              It's an ambitious goal for the group, which was announced just last week, but it may be possible given the OCF's impressive list of members. Intel, Qualcomm, Microsoft, Samsung, GE and Cisco are among the initial members..."

                              The Lurking Threat
                              CloudTweaks, February 22nd, 2016
                              "What is lurking inside your company's systems that is making them vulnerable to attack? Hacking, phishing and other types of attacks are often considered to be externally driven, with gangs of anonymous hackers operating from halfway around the world using Internet connections to break in and wreak havoc. But surprisingly, a significant proportion of network security events happen on the inside..."
                              IoT Initiative Planning: 8 Tips
                              NetworkComputing, February 23rd, 2016
                              "Whether you want to streamline your supply chain, better manage your workforce or improve customer relationships, the Internet of Things is expected to transform how businesses operate. The idea is that with all things connected and capturing data, we can analyze and map it to business processes. The potential of IoT is tremendous, but the danger rests in poor implementation. If you don't properly plan and execute a sound IoT strategy, you risk your competition leaving you in the dust..."
                              Now is the time to explore the IoT supply chain
                              Search Manufacturing ERP, February 25th, 2016
                              "The Internet of Things will create profound and irrevocable changes to traditional supply chain management. Here's advice on how you can capitalize on the potential instead of being left behind to react..."
                              Internet of Things Enables 'As a Service' Economy
                              Information Management, February 26th, 2016
                              "In his 2014 Ted Talk on the Internet of Things (IoT), Dr. John Barrett - Head of Academic Studies at the Nimbus Centre for Embedded Systems Research at Cork Institute of Technology - said that by 2032 it is predicted that each of us could be in touch with up to 5,000 different smart 'things' each day. While reasonable minds can differ regarding the actual smart things we will interact with, there is little doubt that the IoT revolution is upon us. And, with it, the explosion of the 'As a Service' economy..."
                              IT - Linux
                              9 Linux Desktop Environments to Watch in 2016 (Slideshow)
                              CIO, February 22nd, 2016
                              "It's that time of the year when I return with some of the most exciting desktop environments to look forward to. The Linux world is extremely dynamic; a lot can happen within a year so it's interesting to see where these desktop environments stand today. For the sake of this story I tried out all these desktop environments in a virtual machine so that you don't have to..."
                              IT - Operations
                              Future-Proof Your Colo Data Center Choice
                              Search Data Center, February 21st, 2016
                              "Figure out which colo data center will meet your current and future needs. Be sure to take into account power draw, cost, security and additional services..."
                              Physical Security Has Many Holes to be Plugged
                              CSO Online, February 23rd, 2016
                              "Cybersecurity makes all the headlines these days but there are plenty of predators looking to scam unsuspecting employees at the physical plant...

                              'I can get into any facility in less than five minutes with the right tools,' says Sean Ahrens, global practice leader at AON Global Risk Consulting. That's sobering news for security professionals charged with protecting vital data centers and warehouses. Fortunately, sensitive facilities can improve by calling on the advice of AON and other specialized firms..."

                              How to Respond to a Cyberattack
                              ITProPortal, February 23rd, 2016
                              "Cyberattacks are dominating the headlines, and no business is safe from the havoc and damage they have the potential to wreak. As attack methodologies are becoming more sophisticated and those perpetrating them more organised, the stakes are rapidly rising. Even high profile targets such as banks and telecoms giants are finding themselves firmly in the firing line. However, the actual attack is just the start and unless the response is handled correctly, the resulting 'cyber-incident' may end up having a far larger impact than the perpetrator intended..."
                                How to succeed in an Ops career without really trying
                                Search Data Center, February 24th, 2016
                                "An Ops career can be stressful if you don't approach decision makers, vendors and end users with flexibility and realistic expectations..."
                                  Keeping Data Safe: How Comprehensive Data Center Protection Solutions Can Maximize System Reliability
                                  Data Center Journal, February 24th, 2016
                                  "Whether it's to check emails with our morning coffee, book a hotel room or run a global organization, everyone relies on the Internet, and its effective operation is now a crucial aspect of businesses around the world. With over three billion people online, the amount of data being generated is expanding exponentially, creating a huge increase in the demand for digital infrastructure..."
                                  Cause and Effect: The Hidden Risk in Your Data Center
                                  Data Center Knowledge, February 24th, 2016
                                  "We're constantly hearing about how the lack of rain in much of the Southwest has contributed to the worst drought in the history of the region, but the subject of water doesn't come up much with respect to data centers.

                                  However, it should garner just as much attention - specifically water treatment programs - according to Data Center World speaker Robert O'Donnell, managing partner of Aquanomix..."

                                    IT - Security
                                    Security Vendors Launch New Coalition for Cybersecurity Policy and Law
                                    Information Management, February 23rd, 2016
                                    "A group of cyber security products and services providers has launched the Coalition for Cybersecurity Policy and Law, an organization that will focus on education and collaboration with policymakers on the increasingly complicated legislative and regulatory policies related to information security.

                                    The founding members of the coalition include Arbor Networks, Cisco, Intel, Microsoft, Oracle, Rapid7 and Symantec..."

                                    Cyber-Criminals to Ramp Up Malware Sophistication in 2016: Report
                                    eWeek, February 22nd, 2016
                                    "Cyber-criminals increasingly used customized malware, software development expertise and knowledge of the financial system to make 2015 an extremely profitable year - a trend that will continue in 2016, according to IBM's annual threat report, published on Feb. 22..."
                                    What Users Love (and Hate) About 4 Leading Identity Management Tools
                                    CSO Online, February 22nd, 2016
                                    "Four of the top identity management products on the market are Oracle Identity Manager, CA Identity Manager, IBM Tivoli Identity Manager, and SailPoint IdentityIQ, according to online reviews by enterprise users in the IT Central Station community.

                                    But what do enterprise users really think about these tools? Here, users give a shout out for some of their favorite features, but also give the vendors a little tough love..."

                                    'MouseJack' Turns Wireless Mice, Keyboards Into Liabilities
                                    GCN, February 23rd, 2016
                                    "The 'MouseJack' is the latest attack vector for malicious actors to access computers and infiltrate networks.

                                    Wireless mice and keyboards often communicate with their paired PC via radio signals sent to wireless dongles. When unencrypted, non-Bluetooth signals are sent between peripherals and a dongle plugged into a PC, the dongle is unable to distinguish between packets transmitted by a mouse and those transmitted by an attacker..."

                                      Mastercard's Working on Selfie-Based Security for Online Payments
                                      PC World, February 23rd, 2016
                                      "Mastercard is working on a new app that provides extra security when buying things online. But instead of just demanding a password, the app will offer to verify your identify with a selfie.

                                      The app is coming this summer for phones, tablets, and PCs..."

                                      A Proactive Approach to Incident Response: 7 Benefits
                                      Dark Reading, February 22nd, 2016
                                      "The concept of digital forensic readiness focuses on two basic principles: 1) to maximize an organization's ability to gather digital evidence and 2) to minimize the cost of investigations. Instead of the traditional reactive response to security incidents, digital forensic readiness acknowledges the fact that events will occur, and helps to make the most efficient use of electronically stored information (ESI) to mitigate data loss and risk.

                                      Here are six examples of how digital forensic readiness can enhance an organization's proactive approach to incident response..."

                                      Perceptions and Buying Practices of Infosec Decision Makers
                                      HelpNet Security, February 23rd, 2016
                                      "CyberEdge Group surveyed 1,000 IT infosec decision makers and practitioners from 10 countries, five continents, and 19 industries, and unsurprisingly, the news is not good. In fact, network breaches are rising, confidence is falling, the number of BYOD deployments is shrinking, and IT organizations are fed up with today's inadequate endpoint defenses..."
                                      Two-Factor Authentication not Secure, Say Researchers
                                      Network World, February 24th, 2016
                                      "Social engineering can be easily used to trick users into confirming authentication codes, says a computer science professor at NYU. Generally thought to be secure, the process whereby a verification code, usually delivered by e-mail or text, is sent to a user who's lost their password, can in fact be hacked.

                                      And the way it's done?..."

                                        IT - Careers
                                        A Step-By-Step Guide To Better One-On-Ones
                                        Business 2 Community, February 23rd, 2016
                                        "The one-on-one meeting is, in my opinion, the most important tool you have as a manager. It's the best way for managers and their employees to discuss issues, develop a relationship, and make sure an employee's goals are being met.

                                        In this guide, I'll break down everything you need to know about the one-on-one and I'll give you some helpful tools to use..."

                                          6 Tips to Engaging Your Uber Critical Frontline
                                          Business 2 Community, February 23rd, 2016
                                          "The business world has been having a talent war for years now. With so many similar products crowding the marketplace, organizations are struggling to differentiate themselves on their goods and services alone. They're realizing their people and the customer experiences they provide are what will help them stand out from the competition. This makes hiring great employees for your frontline paramount to success..."
                                            6 Strategies for Hiring People That Embody Your Values
                                            Business 2 Community, February 23rd, 2016
                                            "I've never been a big culture guy. Not because I don't believe in the importance of company culture, because I do. What I don't believe in is putting one's values up on the wall or posting a mission statement on the website. These public displays and declarations are meaningless unless every employee - from CEO to the most junior hire - acts on it daily..."
                                            7 Strategies to Prevent Bad Hires
                                            Business 2 Community, February 26th, 2016
                                            "What are the costs of a bad hire? Nearly everyone in business has a personal story to tell about the damage caused by someone they hired that did not perform as they expected. There are certainly many reasons for poor performance that are out of our control when we join a company, but bad hires are all too common when I talk to prospective clients..."
                                            IT - Social Media
                                            Taking A 'Leap' Of Faith With Your Social Media Strategy
                                            Business 2 Community, February 23rd, 2016
                                            "For many companies, breaking out of the norm and feeling inspired to change things up by taking that proverbial leap of faith - as it relates to their social media strategy - is easier said than tweeted (see what I did there?). But social media is an opportunity. A chance to position, promote and brand to the masses..."
                                              IT - Virtualization
                                              The benefits of Microservices and why you should implement them
                                              Jaxtenter, February 25th, 2016
                                              "In business, to complete a big project, we segment it into digestible parts. We break our big tasks into smaller autonomous pieces and split up teams by talent. We do this in our daily lives to stay on track and to make sure that we don't miss anything, so it's a no brainer that microservices are a rising trend in software development..."
                                                Docker Datacenter: A New Enterprise Product for Open Source Containers
                                                The VAR Guy, February 25th, 2016
                                                "If there was ever a question about how Docker, the open source container virtualization company, planned to generate revenue from the enterprise market, it was answered this week. The company has rolled out a new platform, Docker Datacenter, as a commercial product for on-premise or private cloud container deployment..."
                                                Virtualization requirements met by hyper-convergence
                                                Search Converged IT, February 26th, 2016
                                                "Changing virtualization needs make data center upgrades a necessity. Discover how hyper-convergence can help to solve storage needs in virtual environments..."
                                                  IT - Email
                                                  8 Reasons Cloud Email Is A Smart Move Now (Slideshow)
                                                  Information Week, February 22nd, 2016
                                                  "Earlier this month, Gartner reported that cloud email adoption is picking up significant steam in the enterprise..."

                                                  "If you've been dragging your feet on migrating your company's email to a cloud service, here's why it's time to reconsider..."

                                                  IT - Mobile
                                                  Enterprise Use of Hybrid Tablets Growing Fast
                                                  CIO, February 22nd, 2016
                                                  "Detachable tablets are gaining traction in the enterprise as traditional slate tablets and PCs dip in popularity...

                                                  IDC reported that in Q4 of 2015, shipments for detachable tablets reached 8.1 million, which was an all-time high, while slate tablets continued to decline..."

                                                  95 Per Cent of Enterprises Aren't Protected Against Mobile Malware
                                                  ITProPortal, February 23rd, 2016
                                                  Longer Online Version "Mobile enterprise security firm MobileIron today released its Q4 2015 Mobile Security and Risk Review, discussing the threats and risks that enterprises face in their mobile deployments.

                                                  The report reveals the worrying find that more than 50 per cent of enterprises have at least one non-compliant device, creating a broader attack surface for malware and data theft..."

                                                  Wearable Device Market Surged 171% in 2015: IDC
                                                  Datamation, February 25th, 2016
                                                  "Vendors shipped 27.4 million wearable devices worldwide during the fourth quarter of 2015, a 126.9 percent year-over-year gain according to International Data Corporation's (IDC) Worldwide Quarterly Wearable Device Tracker. For all of 2015, they shipped a total of 78.1 million units, a 171.1 percent increase over 2014's figures.

                                                  In short, wearables are well on their way to going mainstream..."

                                                  Report: 1,700 malware-infected mobile devices per company connect to networks
                                                  SC Magazine, February 24th, 2016
                                                  "A new study demonstrates the prevalence of many data breaches caused by employee mobile devices. The report, conducted by The Ponemon Institute and Lookout, polled 588 information technology and security professionals at Global 2,000 companies, and found that the economic risk of mobile breaches can be as high as $26.4 million..."
                                                  Smartphone users still taking cavalier approach to mobile security
                                                  ITProPortal, February 26th, 2016
                                                  "A new report from cyber security firm Proofpoint has revealed that Android users willingly downloaded over two billion malicious mobile applications last year.

                                                  The findings are from Proofpoint's annual Human Factor Report, which looks at the latest cyber security trends cyber across email, social media and mobile apps..."

                                                  Five Ways Mobile Is Changing the World
                                                  Re/code, February 26th, 2016
                                                  Mobile is about more than a device or platform. The combination of immediacy, personalization, scale and global reach mobile provides has democratized content, commerce and culture. It has given unlimited power to consumers who spend on average 11 hours per day on mobile devices.

                                                  Those who view mobile as simply an extension of their advertising program are wrong.

                                                    IT - Big Data
                                                    4 Steps to Eliminate Data Silos and Unlock Your Data
                                                    Government Technology, February 22nd, 2016
                                                    "It's the age of big data, which means just about every business and organization under the sun is stocking up on massive amounts of it. What's worth noting, however, is that a shocking 88 percent of what's being collected is never analyzed.

                                                    A major contributor to this trend is siloed data - where one department 'owns' certain information and keeps it isolated from the rest of the organization. Like grain in a farm silo, this data is closed off from all outside elements..."

                                                    Today's CMO Needs A Few CTO Chops
                                                    Business 2 Community, February 25th, 2016
                                                    "The marketing industry has plunged headlong into a technological re-invention over the last decade. Software platforms, marketing automation, mobile ad exchanges, social media tools, and apps (of all descriptions for all kinds of purposes) have turned marketing departments into tech nerve centers..."
                                                      Is your big data effort a big deal?
                                                      CIO, February 26th, 2016
                                                      "Big data is a term that is tossed around quite a bit these days. In Gartner parlance, it's at the top of the hype curve. Mention 'big data' and people imagine answering impossibly hard JEOPARDY! questions effortlessly. The reality is that big data IS a big deal, but you need to invest significant effort to make sure that your company is getting valuable outcomes from this venture, not just hype..."
                                                      Hadoop Ecosystem Evolves: 10 Cool Big Data Projects (Slideshow)
                                                      InformationWeek, February 26th, 2016
                                                      "In the 10 years since developers created Hadoop to wrangle the challenges that came with big data, the ecosystem for these technologies has evolved. The Apache Software Foundation is teeming with open source big data technology projects. Here's a look at some significant projects, and a peek at some up-and-comers..."
                                                      IT - BYOD
                                                      Bringing Better Security to BYOD
                                                      ITProPortal, February 21st, 2016
                                                      "For most of us, our mobile and personal devices have become extensions of our lives and even bodies. Most of us carry our smartphones with us all the time, and when we can't find them, we feel lost.

                                                      We are essentially always on, always connected to the Internet. This notion of anytime, anywhere access has extended not only to our personal lives but also our professional..."

                                                        Top Ten Articles for last few Issues
                                                        Vol 216 Issues 1, 2 and 3; Vol 215 Issues 1, 2, 3 and 4; Vol 214 Issue 5
                                                        We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                        • KSplice Solves glibc Flaw with Zero-Downtime and No Disruptions
                                                        • Solaris 11.3 SRU 5.6: updates in ps(1) and /proc/<pid>/xxx
                                                        • Oracle CEO Safra Catz: Oracle Makes New Investments In India
                                                        • How To Tell If SPARC HW Crypto Is Being Used? (2016 Edition)
                                                        • 10 Reasons why Banks should move to Exadata
                                                        • In a nutshell: Oracle Zero Data Loss Recovery Appliance (ZDLRA)
                                                        • LibreOffice 5.0.5 'Still' Released
                                                        • Support for Unified Archive (UAR)
                                                        • Next Generation IDaaS: Moving From Tactical to Strategic
                                                        • Join us at Virtual Technology Summit in March and April

                                                        The longer version of this article has list of top ten articles for the last 8 weeks.

                                                          IT - Encryption
                                                          Five threats hiding in SSL traffic
                                                          ITProPortal, February 26th, 2016
                                                          "Ever since Edward Snowden's revelations in 2013, SSL encryption has become all the rage with application owners. Disclosures in 2014 that governments were injecting surveillance software in web traffic further heightened security measures within organisations. This in turn has lead to the rise of attacks hiding in SSL traffic.

                                                          Encryption today accounts for roughly one third of all Internet traffic. It's expected to reach two thirds of all traffic this year when Internet powerhouses like Netflix transition to SSL..."

                                                          How to encrypt everything
                                                          CSO Online, February 26th, 2016
                                                          "Encryption is a vital self-defense tool, so here's how to enable it on all your devices and computers running the major OSes..."
                                                          IT - Server
                                                          The Battle of The Reboot
                                                          ComputerWorld, February 22nd, 2016
                                                          "Patching has become routine, but patches don't take without a reboot. That's a problem when business units insist on zero downtime..."
                                                            IT - Java
                                                            Java 9 to Address GTK GUI Pains on Linux
                                                            JavaWorld, February 22nd, 2016
                                                            "Plans are afoot to have Java 9 accommodate the GTK 3 GUI toolkit on Linux systems. The move would bring Java current with the latest version of the toolkit and prevent application failure due to mixing of versions.

                                                            The intention, according to a Java enhancement proposal on, would be to support GTK (GIMP Toolkit) 2 by default, with GTK 3 used when indicated by a system property..."

                                                            IT - HPC
                                                            BeeGFS Parallel File System Goes Open Source
                                                            insideHPC, February 23rd, 2016
                                                            "ThinkParQ announced that the complete BeeGFS parallel file system is now available as open source. Developed specifically for performance-critical environments, the BeeGFS parallel file system was developed with a strong focus on easy installation and high flexibility, including converged setups where storage servers are also used for compute jobs. By increasing the number of servers and disks in the system, performance and capacity of the file system can simply be scaled out to the desired level, seamlessly from small clusters up to enterprise-class systems with thousands of nodes..."
                                                            Nexenta News
                                                            Nexenta's Head of Channels & Marketing Named by CRN as 2016 Channel Chief
                                                            Nexenta, February 22nd, 2016
                                                            Nexenta, the global leader in Open Source-driven Software-Defined Storage (OpenSDS), announced that CRN, a brand of The Channel Company, has named Don Lopes, Vice President, Marketing & Channels at Nexenta, to its prestigious list of 2016 Channel Chiefs. The executives on this annual list represent top leaders in the IT channel who excel at driving growth and revenue in their organizations through channel partners.

                                                            Channel Chief honorees are selected by CRN's editorial staff on the basis of their professional achievements, standing in the industry, dedication to the channel partner community and strategies for driving future growth and innovation. Each of the 2016 Channel Chiefs has demonstrated loyalty and ongoing support for the IT channel by consistently promoting, defending and executing outstanding channel partner programs.

                                                            Cisco News
                                                            Actility collaborates with Cisco to deliver IoT solutions using LoRa technology
                                                            Cisco, February 25th, 2016
                                                            Actility, the industry leader in Low Power Wide Area (LPWA) networks announced that it is collaborating with Cisco to help customers embrace digital transformation and accelerate the development of new business models based on the Internet of Things (IoT). Actility will join the Cisco Partner Ecosystem as a Cisco Solutions+ Partner for LPWA solutions for IoT. The collaboration will allow global service providers and other vertical industries to create added value far beyond simple connectivity, in both business markets such as smart cities, connected factories and industrial IoT, and high volume business to consumer applications.
                                                            Cisco Launches New Network Functions Virtualization Infrastructure Solution to Help Service Providers Run Network Services Better, Faster
                                                            Cisco, February 24th, 2016
                                                            Digitization is driving service providers to find new ways to do things better, faster and with lower costs. To get there, many are moving toward virtualization and simplified programmability solutions for their networks.

                                                            Network functions virtualization (NFV) and software defined networking (SDN) are the popular software-based approaches that service providers are using to design, deploy and manage their networks and services.

                                                            Cisco today introduced its new NFV Infrastructure Solution (NFVI), combining virtual and physical environments, and providing all the necessary compute, storage, and networking infrastructure to run NFV network services.

                                                            MTS and Cisco Build the First Intelligent Network Self-adjusting to Subscribers' Demands in Russia
                                                            Cisco, February 24th, 2016
                                                            PJSC MTS, the leading telecommunications provider in Russia and the CIS, and Cisco announced the completion of the first phase of Cisco's Self Optimizing Network (SON) solution deployment for MTS networks, which allows MTS to automate network optimization in real time to improve the quality of voice and data services...
                                                            Dell News
                                                            Dell Strengthens Data Protection Portfolio with New Backup and Recovery Capabilities Spanning Client to Cloud
                                                            Dell, February 25th, 2016
                                                            Dell announced a series of new data protection solutions to help organizations better protect business-critical systems, applications, and data - either on premises or in the cloud...

                                                            These updates to the data protection product portfolio reinforce Dell's commitment to driving innovation and giving customers the choice and flexibility they need to quickly address evolving backup and recovery needs as they move data and applications to the cloud.

                                                            Dell Enters Embedded PC Market with New Embedded Box PCs, Helping Smart Systems Connect to the Internet of Things
                                                            Dell, February 23rd, 2016
                                                            Dell announced the launch of its first purpose-built industrial PC (IPC) products, Embedded Box PC 3000 Series and 5000 Series, aimed at taking the embedded PC market mainstream. Available this summer, the products are fanless, ruggedized and built to provide customers fast time to market. With a long history of rugged engineering innovation and extensive experience in OEM Solutions, the products expand Dell's Internet of Things (IoT) portfolio. Dell will bring the benefits of short lead times, enterprise-class lifecycle, stability, service and support to customers who may be underserved by current embedded solutions...
                                                            Dell and EMC Receive US Federal Trade Commission Clearance for Proposed Merger
                                                            Dell, February 23rd, 2016
                                                            Dell Inc. and EMC Corp. announced the expiration of the waiting period under the Hart-Scott-Rodino Antitrust Improvements Act of 1976, as amended, in connection with the companies' proposed combination. The expiration of the waiting period occurred at 11:59 p.m. EST on Feb. 22, satisfying one of the conditions to the closing of the proposed transaction. The transaction remains subject to approval by EMC's shareholders, regulatory clearance in certain other jurisdictions and other customary closing conditions...
                                                            IBM News
                                                            IBM and New York Genome Center to Create Comprehensive, Open Cancer Data Repository to Tap Cognitive Insights from Watson
                                                            IBM, February 25th, 2016
                                                            At the White House Precision Medicine Initiative Summit, the New York Genome Center and IBM announced that they are collaborating to create a comprehensive and open repository of genetic data to accelerate cancer research and scale access to precision medicine using cognitive insights from IBM Watson. Analyzing this data alongside the medical community's growing knowledge about cancer could help accelerate the ability of doctors to deliver personalized treatment to individual patients.

                                                            IBM and New York Genome Center are working together to build the capacity to house the contributed data, train Watson's cognitive computing capabilities for genomic analysis and enable the Center's member institutions and other research collaborators to sequence and analyze DNA and RNA from patients' tumors.

                                                            Check Point and IBM Security Form Threat Prevention Alliance
                                                            IBM, February 25th, 2016
                                                            Check Point Software Technologies and IBM Security today announced an expanded alliance, including the sharing of threat intelligence, as the security industry moves to a more collaborative approach to defend against cybercrime. Also, the companies announced a broad set of product integrations as well as expanded investment across IBM's consulting and managed security services...
                                                            Fujitsu News
                                                            Fujitsu Launches FUJITSU Network Virtuora SP, Software for Automating Network Operations and Maintenance
                                                            Fujitsu, February 24th, 2016
                                                            Fujitsu announced the launch of FUJITSU Network Virtuora SP, software that automates tasks such as network system operation and maintenance. Sales start in Japan from today. By turning expertise with regard to tasks such as network systems operation and maintenance into scenarios that allow those tasks to be automated, Virtuora SP greatly reduces the time to start providing services to customers, as well as reducing operating costs.
                                                            World's Most Admired Companies
                                                            Fujitsu Named to FORTUNE Magazine's 2016 List for Fourth Consecutive Year
                                                            Fujitsu announced that it has been named to FORTUNE Magazine's 2016 list of "World's Most Admired Companies," for a fourth consecutive year. In being selected for this year's list, Fujitsu ranked highly in such areas as Innovation, Global Competitiveness, Social Responsibility, Financial Soundness, and Quality of Products/Services.
                                                            VMware News
                                                            VMware Demonstrates Accelerating Momentum for vCloud NFV at Mobile World Congress
                                                            VMWare, February 23rd, 2016
                                                            At Mobile World Congress 2016, VMware, Inc., is showcasing the company's momentum in helping communications service providers (CSPs) adopt network functions virtualization (NFV) to deliver the unified, hybrid Telco Cloud. The company has experienced a significant increase in customer deployments and pipeline year over year, as customers accelerate adoption of the company's production-proven VMware vCloud NFV platform.
                                                            VMware: A Leader in the Rapidly Growing Hyper-Converged Marketplace
                                                            VMWare, February 26th, 2016
                                                            "What is hyper-converged infrastructure and who is a leader you can count on?

                                                            Hyper-converged infrastructure reduces IT costs and management complexity while achieving breakthrough performance. Count on VMware, a leader in hyper-converged software with vSphere, Virtual SAN and vCenter Server, to continue the winning trend:..."

                                                            Red Hat News
                                                            36 Percent of Line of Business Decision-makers see the Approach to Mobile App Development Being Business-led in the Next 24 months
                                                            Red Hat, February 25th, 2016
                                                            Red Hat revealed in a new mobile survey focused on line of business (LOB) decision makers that almost half (47 percent) see mobility as a means to automate existing business processes but only 26 percent of them cite the objective of mobile as changing the way they do business. IT decision makers, on the other hand, view mobile apps as more transformative (35 percent) for the business.
                                                            Red Hat and Amdocs Collaborate to Enable Open Innovation for Communications Service Providers
                                                            Red Hat, February 26th, 2016
                                                            Red Hat announced that Amdocs, the leading provider of customer experience solutions, has integrated Red Hat Enterprise Linux OpenStack Platform with the Amdocs Network Cloud Service Orchestrator - an open, vendor-agnostic, catalogue-driven solution designed to help communications service providers (CSPs) transition from physical networks to cloud service environments...
                                                            Friday Five - February 26, 2016
                                                            Red Hat, February 26th, 2016
                                                            The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.

                                                            • Red Hat receives overall 'Positive' company rating in Gartner's 2016 Vendor Rating Report
                                                            • Red Hat Global Customer Tech Outlook 2016 reveals top enterprise technology trends and challenges
                                                            • Network World - Open source security is not as big of a concern as it once was
                                                            • IT Business Edge - Red Hat Puts Gluster Storage on Google Cloud
                                                            • CBR - Docker, Red Hat & Linux: How containers can boost business and save time for developers

                                                            Read on for details.

                                                            Level3 News
                                                            Level 3 Threat Research Labs Reveals New Timeline For Linux Mint Backdoor
                                                            Level(3), February 26th, 2016
                                                            Level 3 Communications (LVLT) has new details about the Linux Mint operating system backdoor incident on February 20. The company's threat intelligence and research arm, the Level 3 Threat Research Labs, investigated and confirmed the exact timeframe of compromise, revealing the impact was worse than reported by other sources.
                                                            EMC News
                                                            Dell and EMC Receive U.S. Federal Trade Commission Clearance for Proposed Merger
                                                            EMC, February 23rd, 2016
                                                            Dell Inc. and EMC Corp. announced the expiration of the waiting period under the Hart-Scott-Rodino Antitrust Improvements Act of 1976, as amended, in connection with the companies' proposed combination. The expiration of the waiting period occurred at 11:59 p.m. EST on Feb. 22, satisfying one of the conditions to the closing of the proposed transaction. The transaction remains subject to approval by EMC's shareholders, regulatory clearance in certain other jurisdictions and other customary closing conditions...
                                                            EMC Announces the EMC Provider Cloud System
                                                            EMC, February 24th, 2016
                                                            At Mobile World Congress EMC announced the new EMC Provider Cloud System (PCS), a software-defined Network Functions Virtualization Infrastructure (NFVI) reference architecture designed to enable communications service providers' (CSPs') to deliver distributed, multi-service, carrier-grade cloud solutions quickly and economically.
                                                            Brocade News
                                                            Fast-Expanding Atomy Revs Up Application Performance With Brocade Virtual Adc Solution
                                                            Brocade, February 25th, 2016
                                                            Brocade announced that its virtual Application Delivery Controller (VADC) solution has been successfully leveraged by South Korean beauty and wellness direct-selling company Atomy to support its rapid global expansion. With the Brocade® Virtual Traffic Manager (VTM) in place, Atomy has been able to increase its international market footprint, handling a steep rise in transactions without impacting its physical network even when the number of members accessing its online mall has tripled.
                                                            Comcast News
                                                            Comcast Business Expands High-Performance Communications Network to More Local Businesses in North Salt Lake, Utah 1
                                                            Comcast, February 23rd, 2016
                                                            Comcast Business announced the expansion of its advanced network to more than 450 local businesses in North Salt Lake, Utah. A wide range of organizations, representing national chains and locally-owned businesses, will benefit from the new high-performance network, which delivers data, voice and video to support Internet- and cloud-based operations...
                                                            Hitachi News
                                                            Hitachi Data Systems Improves Subscriber Retention For Telecom And Media Service Providers
                                                            New Hitachi Converged Infrastructure Solution Integrates SAP Predictive Analytics with Trusted Hitachi Technology to Help Forecast Customer Behavior, Minimize Churn and Increase Customer Satisfaction
                                                            Hitachi Data Systems Corporation (HDS), a wholly owned subsidiary of Hitachi, Ltd., announced a new Hitachi Unified Compute Platform (UCP) 6000 for Predictive Analytics solution, with integrated next-generation advanced analytics software that predicts customer attrition, commonly referred to as 'churn.'

                                                            The solution gives telecom and media service providers insight into customer behavior with predictive scoring for real-time decision making. It uses the open and scalable Hitachi UCP architecture, which is designed to support high-performance, mission critical workloads and scale without disruption. With the ability to proactively address customer attrition, service providers can gain competitive advantage and increase customer satisfaction and loyalty by identifying churn-prone subscribers and creating targeted retention offers before customers defect...

                                                            Windstream News
                                                            Windstream reports fourth-quarter, full-year 2015 results
                                                            Windstream, February 25th, 2016
                                                            Windstream, a leading provider of advanced network communications and technology solutions, today reported fourth-quarter and full-year 2015 results.

                                                            "Our year-end results reflect the strength and potential of our business and were in-line with our 2015 guidance. During the year, we made significant progress on our strategic objectives. We remain focused on stabilizing and improving Windstream's financial performance and advancing our network capabilities - all of which position the company for long-term success and shareholder value creation," said Tony Thomas, president and chief executive officer at Windstream.

                                                            Windstream Moves Up Vertical Systems Group Ethernet LEADERBOARD Rankings
                                                            Analyst Firm Recognizes Windstream's Strong Growth in U.S. Ethernet Market, which Reflects Company's Commitment to Innovation and Investing in its Local & National Fiber Networks
                                                            Windstream, a leading provider of advanced network communications, announced that it has been named one of the top Ethernet providers in the United States by the analyst firm Vertical Systems Group. The designation, part of the analyst firm's annual Carrier Ethernet LEADERBOARD rankings, is the result of Windstream's continued capital investments in its fiber networks that allow it to offer both higher-quality services and services in new markets.
                                                            F5 News
                                                            F5 Delivers Industry's Highest Performing Security Solutions for Next Generation Mobile Networks
                                                            Massively scalable platforms, virtual solutions, and new 100 GbE VIPRION blade support the Internet of Things and network migrations to 4G and 5G
                                                            F5 Networks announced new solutions that enable service providers to most efficiently scale and protect network architectures. As service providers evolve their networks to support 4G, 5G, and beyond, highly concurrent security platforms and scalable virtual network functions (VNFs) are needed to support new architectural footprints and deliver continuous protection for innovative services. F5 continues to extend its industry leadership by providing highly concurrent platforms, specifically positioning service providers to strengthen their overall security posture in next generation networks while maintaining high levels of availability, quality of experience for users, and investment protection for organizations.
                                                            Netapp News
                                                            Cisco and NetApp All-Flash Converged Infrastructure Removes Constraints for the Modern Enterprise Data Center
                                                            NetApp, February 26th, 2016
                                                            Customers recognize that flash equals speed. But as all-flash array pricing has come down, there's a growing recognition that flash provides significant management benefits as well, especially when integrated within the simplified operation of a converged infrastructure solution. Cisco and NetApp (NASDAQ: NTAP), the developers of the FlexPod converged infrastructure (CI) solution, have seen FlexPod partner and customer enthusiasm grow for the performance, agility and economic benefits of the all-flash data center...
                                                            Trending in
                                                            Vol 234, Issue 3
                                                            Trending IT Articles