News about Oracle's Solaris and Sun Hardware
System News
Feb 29th, 2016 — Mar 6th, 2016 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 217, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle News
Oracle Unveils First Data Protection Solution with Seamless Cloud Tiering
Oracle's StorageTek Virtual Storage Manager 7 System Provides Mainframe and Heterogeneous Storage with a Fully Integrated Cloud Strategy
Oracle announced the all new StorageTek Virtual Storage Manager (VSM) 7 System, the most secure and scalable data protection solution for mainframe and heterogeneous systems with the additional capability to provide fully automated tiering directly to the public cloud. Furthermore, Oracle's StorageTek VSM 7 System has been architected to seamlessly integrate with Oracle Storage Cloud Service - Object Storage and Oracle Storage Cloud Service - Archive Service and provides storage administrators with a built-in cloud strategy. With Oracle, cloud storage is now as accessible as on-premise storage.
Oracle Introduces Software Solution to Help Healthcare Organizations Optimize Performance and Enhance Innovation through Population Health Management and Precision Medicine
HIMSS Annual Conference & Exhibition - Las Vegas, NV - Mar 1, 2016
Healthcare organizations are navigating a shifting and complex environment. This requires everyone across the organization to synchronize efforts toward the common goal of delivering the right care, at the right time, with the right resources.

Focused on this goal, Oracle has introduced Oracle Healthcare Foundation (OHF), a next-generation version of Oracle Enterprise Healthcare Analytics, which provides healthcare organizations with a consistent, reliable, and complete, patient-centric view of their data across the enterprise, including clinical, financial, and genomics. Purpose-built for the healthcare industry, the modular data integration and analytics solution enables healthcare providers to leverage a single source of truth to measure and evaluate care outcomes, while sharpening operational efforts for the populations they serve - maximizing wellness and minimizing cost.

5 Things You Need To Know About A.I.: Cognitive, Neural And Deep, Oh My!
ComputerWorld, March 3rd, 2016
"There's never any shortage of buzzwords in the IT world, but when it comes to A.I., they can be hard to tell apart. There's artificial intelligence, but then there's also machine intelligence. There's machine learning, but there's also deep learning. What's the difference? Here are five things you need to understand...."
    Google AI Can Spot Image Location With 'Superhuman' Accuracy
    InformationWeek, March 1st, 2016
    "The human mind can't keep up with algorithms that tap vast data sets. The latest example is Google's convolutional neural network called PlaNet that can identify where photos were taken based on the pixels in the image.

    Humans should know better than to take on machines. John Henry managed to outrace a steam drill, as American folktales tell it, but his victory came at the cost of his life. Since then, we've accepted that machines dig faster than we can by hand...."

    RBS Builds 'Human' Ai Chat System Called Luvo To Handle Staff Questions, March 3rd, 2016
    "RBS has built an artificial intelligence (AI) engine called Luvo to handle problems raised by bank staff without the need for a human advisor. The bank believes that, if the trials are successful, the system could be used to handle direct customer queries as its intelligence and knowledge base increases.

    Luvo has been running in pilots for a few months with 1,200 staff who handle queries from small businesses customers usually concerning problems such as lost corporate cards or forgotten Pins..."

      Scaling Deep Learning
      insideBIGDATA, March 4th, 2016
      "Deep Learning is a relatively new area of Machine Learning research which has been introduced with the objective of moving Machine Learning closer to one of its original goals: Artificial Intelligence. The video presentation below is from the 2016 Stanford HPC Conference, where Brian Catanzaro from Baidu presents: 'Scaling Deep Learning.' ..."
      Oracle VM VirtualBox 5.0.16
      By Simon Coter
      Oracle has released VirtualBox 5.0 Maintenance Release 16.

      This release is a major improvement which include a large number of improvements and bug fixes; between the others we can find these important and very hot items:

      • Windows hosts/guests: properly sign binaries using a sha-256 certificate
      • PC Speaker passthrough: new experimental feature, available on Linux host only
      • Linux hosts: fixed the /sbin/rcvboxdrv script as well as the missing shebang in two scripts

      See all the details here with a complete list of bug fixes...

      IT - Storage
      SLC SSDs no More Reliable Than Lower End MLC Drives, March 4th, 2016
      "This report was written by Bianca Schroeder, University of Toronto, Raghav Lagisetty and Arif Merchant, Google Inc.

      Flash Reliability in Production: The Expected and the Unexpected

      This paper provides a number of interesting insights into flash reliability in the field. Some of these support common assumptions and expectations, while many were unexpected.

      The summary below focuses on the more surprising results and implications from our work:..."

      Demartek Evaluation Of Gen 6 Fibre Channel Products From Emulex And Brocade
      Demartek, March 1st, 2016
      "Large enterprises choose Fibre Channel (FC) storage networking because of its proven performance, reliability and scalability for mission-critical workloads. Fibre Channel is seeing renewed interest from customers who have deployed other storage technologies. This comes as no surprise since Fibre Channel was purpose-built for storage - it delivers consistently high performance, does not drop packets, and has deep ecosystem support from all of the major operating system (OS) and hypervisor vendors..."
      Fibre Channel Is Still Alive And Kicking
      Network World, March 1st, 2016
      "In 1897 the great American author, Mark Twain was rumored to have stated, 'the reports of my death are greatly exaggerated'. In the tech industry, Fibre Channel could make the same statement. It seems that for years, the death of Fibre Channel has been speculated, as Fibre Channel over Ethernet (FCoE) or even IP networks would be the death knell for the more traditional storage protocol..."
      Hard-Core Data Preservation: The Best Media And Methods For Archiving Your Data
      PC World, February 29th, 2016
      "A lot is written about the importance of backing up data, but the media and methodologies proposed aren't generally suitable for archiving. Securing your data for posterity, i.e., archiving, requires a different approach, where shelved media life and future file compatibility trump the speed and convenience that make backup palatable to the average user.

      We'll discuss methodology later, but here's the low-down on the media types available for backup and archival purposes..."

        Samsung Enterprise 2.5-Inch SSD With Huge 15TB Shipping, March 4th, 2016
        "Samsung Electronics Co., Ltd. is shipping the industry's largest SSD - the PM1633a, a 15.36TB drive.

        First revealed at the 2015 Flash Memory Summit in August, the 15.36TB SSD is based on a 12Gb SAS interface, for use in enterprise storage systems.

        Because the PM1633a comes in a 2.5-inch form factor, enterprise storage managers can fit twice as many of the drives in a standard 19-inch, 2U rack, compared to an equivalent 3.5-inch storage drive..."

        SDS And Flash: Better Together
        Network Computing, March 3rd, 2016
        "Software-defined storage is the delivery of various enterprise data storage services and functionality 'decoupled' from the underlying hardware. In many SDS use cases, enterprises can download their storage tiering capabilities or copy data management (CDM) solution, for example, load these onto an available server or even virtual machine, and turn them on.

        It might appear that by its very nature SDS isn't inclined to establish strong relationships with its hardware partners, or even care much about them. Both SDS and flash are changing traditional storage architectures, but with outwardly nothing in common, you might think of SDS and flash as strange storage bedfellows. This is far from true..."

        SSD Prices Plummet Again, Close In On HDDs
        PC World, March 3rd, 2016
        "The price computer makers paid for solid-state drives (SSDs) dropped by as much as 12% over the last quarter, and the most popular drives are now within striking distance of their hard disk drive (HDD) counterparts.

        In the first quarter of this year, MLC-based and TLC-based SSDs respectively saw price declines of 10%-to-12% and 7%-to-12%, respectively, according to DRAMeXchange, a division of TrendForce..."

          IT - Technology
          Biological Supercomputer Uses The 'Juice Of Life'
          ComputerWorld, March 4th, 2016
          "Using nanotechnology, proteins and a chemical that powers cells in everything from trees to people, researchers have built a biological supercomputer.

          The supercomputer, which is the size of a book, uses much less energy, so it runs cooler and more efficiently, according to scientists at McGill University, where the lead researchers on the project work..."

            Five Things You Need To Know About Ransomware
            Network World, March 4th, 2016
            "Over the past few years millions of PCs from around the world have been locked or had their files encrypted by malicious programs designed to extort money from users. Collectively known as ransomware, these malicious applications have become a real scourge for consumers, businesses and even government institutions. Unfortunately, there's no end in sight, so here's what you should know..."
              Meet The World'S First Truly Universal Cable
              Scientific American, March 1st, 2016
              "The best new technology of the past year wasn't some phone or an app.

              Believe it or not, it was a new kind of USB cable.

              Now, before you suspect that I've inhaled a bit too much of that new-tablet smell, consider:

              The new cable, called USB Type-C (or USB-C), is the same on both ends, so you never have to fiddle with it. The connector is also identical on both sides - there's no upside down..."

                New Displayport 1.4 Standard To Support 8K Displays, Work With USB-C
                PC World, March 1st, 2016
                "Big changes are coming to the popular DisplayPort display standard, with version 1.4 promising support for 8K displays.

                DisplayPort 1.4 will allow 8K displays to hook up to laptops, smartphones and other devices via a USB Type-C port. The new standard was announced by VESA (Video Electronics Standards Association) on Tuesday.

                The USB Type-C connector is already gaining popularity, so DisplayPort 1.4 will be easy to implement in devices. There's another 8K connector called SuperMHL under development that requires new ports but can also be slapped on USB Type-C connectors..."

                  New Quantum Computer, Based On Five Atoms, Factors Numbers In A Scalable Way.
                  MIT News, March 3rd, 2016
                  "What are the prime factors, or multipliers, for the number 15? Most grade school students know the answer - 3 and 5 - by memory. A larger number, such as 91, may take some pen and paper. An even larger number, say with 232 digits, can (and has) taken scientists two years to factor, using hundreds of classical computers operating in parallel..."
                    March/April 2016 Virtual Technology Summit All track Agenda and Abstracts
                    March 8th, March 15th, April 5th
                    The Oracle Technology Network (OTN) is excited to invite you to the Virtual Technology Summit Series. Four times a year come and join us to learn first hand from Oracle ACEs, Java Champions, and Oracle product experts, as they share their insight and expertise on using Oracle technologies to meet today's IT challenges. Four main content areas covered will be Database, Java, Middleware and Systems.
                    IT - Bitcoin
                    Japan Debates Its Bitcoin Tax
                    CryptoCoinsNews, March 1st, 2016
                    "Japan is the only one among seven major industrialized nations to tax bitcoin. There is an increasing number of critics within the country arguing that the consumption tax hurts Japan's competitiveness, writes Toshihisa Kinouchi of Nikkei.

                    While Japan currently ponders deeming bitcoin and virtual currencies as currencies similar to conventional fiat currencies, there is another debate surrounding bitcoin that is being talked among regulators and politicians..."

                    Bitcoin Blocksize And The Future
          , March 3rd, 2016
                    "Today, one of BitGo's major customers complained to us that their transactions weren't getting confirmed. Why not? Well, because the blocks are full. They put the right fee on the transaction, BitGo's platform dynamically computes the right fee every time. But a sudden spike in demand left their transactions lingering for hours. It's not okay that our current, small Bitcoin exchanges are suffering due to Bitcoin Core flailing.

                    So I have a few things to say..."

                    40 Global Banks Run Blockchain Tests From Multiple Vendors
                    CryptoCoinsNews, March 3rd, 2016
                    "The R3-led blockchain consortium of the world's biggest banks has completed their second known proof of concept experiment of blockchain technology with trials spanning five different blockchain solutions.

                    Forty of the world's biggest banks that are partners in the private blockchain consortium led by New York-based blockchain-tech startup R3 have tested distributed ledger systems from five blockchain vendors as well as three cloud providers, according to The Wall Street Journal..."

                      Four Key Disagreements Between Bitcoin Classic And Bitcoin Core
                      Bitcoin Magazine, March 4th, 2016
                      "Bitcoin Core contributor Peter Todd was recently interviewed on episode 34 of The Bitcoin Game, and the longtime Bitcoin developer and researcher was able to explain some of the key disagreements between how the Bitcoin Classic and Bitcoin Core teams view the peer-to-peer digital cash system...."
                      IT - FOSS
                      6 More Must-Have Open Source Apps For Windows, Mac, And Linux
                      CIO, February 29th, 2016
                      "As I wrote back in October, 2015, I, like many of you, run a heterogeneous environment, picking the appropriate operating system or platform for the job. To have some level of consistency in my cross-platform workflow I choose applications that I can run on Linux, Mac OS X and Windows. And it's icing on the cake if these applications are open source.

                      In this follow up article, here are some more of the best open source and free apps I've found for my heterogeneous environment..."

                      Top 5 Open Source Command Shells For Linux
            , March 3rd, 2016
                      "There are two kinds of Linux users: the cautious and the adventurous.

                      On one side is the user who almost reflexively tries out ever new option which hits the scene. They've tried handfuls of window managers, dozens of distributions, and every new desktop widget they can find.

                      On the other side is the user who finds something they like and sticks with it. They tend to like their distribution's defaults. If they're passionate about a text editor, it's whichever one they mastered first..."

                      Top Open Source Creativity Apps
                      Datamation, February 29th, 2016
                      "There is a common belief among non-Linux users that there aren't any good creative applications from the open source camp. In truth, this is absolutely false. The key is knowing which applications are needed to complete a specific task. In this article, I'll share my recommendations for the top open source creativity apps..."
                      IT - DevOps
                      Agile, Devops, & U.S. Fighter Pilots
                      Jaxenter, March 4th, 2016
                      "The same marketing hype that surrounded 'Agile' has now switched to 'DevOps'; the combination of the two is one way to solve all the issues that IT organizations have been known for. This has generated the chimera of the 'full stack' developer, which simply means that now a developer is expected to do it all. What else could it mean?..."
                      DevOps And The Near-Decapitation Of Variability
            , March 4th, 2016
                      "Not all automation scales. One of the chief impediments of delivering an enterprise-class DevOps service is the decentralization of tooling choices - or worse, the methodologies within the tool for delivering CI/CD. If the methods used to deliver automation are as varied as the last engineer who created them, the spaghetti that ensues will not scale much farther than previous methods did...."
                      Is DevOps The Holy Grail For Information Security?
                      CSO Online, March 4th, 2016
                      "DevOps is the computing philosophy that, through unified agile software development and business operations, you can improve your products and time to market. But does it actually improve information security?..."
                      Shippable Devops Platform Uses Containers To 'Automate Everything'
                      Container Journal, March 2nd, 2016
                      "Containers may still be maturing. But Shippable, a DevOps provider, is already taking a big bet on Docker containers by making them the center of the latest version of its developer productivity platform, which is out this week.

                      Shippable's pitch to developers is 'automate everything.' It promises a platform that lets DevOps teams move from development to testing to production quickly and seamlessly..."

                      MySQL Enterprise Monitor 3.1.3
                      By Andy Bang
                      Andy blogs, "We are pleased to announce that MySQL Enterprise Monitor 3.1.3 is now available for download on the My Oracle Support (MOS) web site. It will also be available via the Oracle Software Delivery Cloud in a few weeks. This is a maintenance release that includes a few new features and fixes a number of bugs..."
                      Cloud Computing
                      Securing Oracle Public Clouds
                      By Troy Kitch
                      Troy Kitch writes, "There is an incredible transformation we are all experiencing with cloud computing. The cloud truly is changing everything. It's changing how businesses run and people work; it's creating new categories, disrupting existing categories, and it's changing how we communicate and share. It's changing the economics of business forever. It's happening at a speed no one ever imagined and it means a new way of thinking for security practitioners.

                      When we look at the enterprise, we see that on every level, there are transformations that are encouraging a fluidity of boundaries..."

                      Why Choose Oracle for Your Private Cloud Infrastructure?
                      By Haiduong Vo
                      Haiduong Vo writes, "Walking out of the business review meeting, you feel great. You've just found out that you now have a budget to purchase a private cloud infrastructure. Getting the money was the easy part. Now comes the hard part: selection, evaluation and decision.

                      Let's start with your requirements: First, you need a private cloud infrastructure that will run the Oracle database and Oracle applications your company is using to run the business. There are few choices in the market. Which one should you choose?

                      Second, you have heard about private cloud, public cloud, and hybrid cloud. Your company can't move to public cloud right now. You need to plan for the consolidation of many physical servers first, virtualize to reduce costs and then plan for whichever cloud deployment that will not disrupt the business and profitability of your company. So, which cloud deployment to start?..."

                      TechCast Interview with Greg Marsden about UEK
                      By Zeynep Koch
                      Zeynep writes, "In today's Friday blog, we want to spotlight the TechCast video that our OTN community manager, Logan Rosenstein had recorded. In this interview, Greg Marsden, Software Development Senior Director for Oracle Linux Kernel Development, talks about the development of Unbreakable Enterprise Kernel, open source maintainers in Oracle and how kernel engineers work with the community. Don't miss this insightful interview..."
                      IT - Cloud
                      IT Pros Feel Data Is Safer In The Cloud Than On-Premise
                      ITProPortal, March 4th, 2016
                      "IT professionals believe their organisation's data is more secure in the cloud than in on-premise machines, a new survey by Evolve IP, entitled 2016 Cloud Adoption suggests.

                      To be more precise, private clouds are the most popular solution, followed by public clouds, followed by on-premise machines.

                      The survey polled more than 1,080 individuals and has unveiled that 91 per cent of all organisations have at least one service in the cloud..."

                        Top 12 Cloud Computing Threats In 2016
                        Help Net Security, March 1st, 2016
                        "The Cloud Security Alliance (CSA) Top Threats Working Group released at RSA Conference an important new research report about cloud computing threats, developed to serve as an up-to-date guide to help cloud users and providers make informed decisions about risk mitigation within a cloud strategy.

                        Today, the development of the cloud service model delivers business-supporting technology more efficiently than ever before - but with ease and convenience comes risk...."

                        Why Organisations Must Approach Integration And Security In The Cloud Differently
                        Information Age, February 29th, 2016
                        "Despite growing cloud adoption rates, many organisations still have concerns around security and integration

                        It's clear that enterprise cloud technology has reached a new level of maturity. The questions around cloud adoption are no longer if, or even how, but how fast and how much.

                        We need to look no further than the numbers to truly grasp the reach of cloud technology within today's enterprise, as 82% of organisations now consider cloud technology a key part of their IT strategies..."

                        IT - CxO
                        Meet Tech's New Odd Couple: The CIO And CMO
                        CIO, March 3rd, 2016
                        "When Akamai was laying the foundation for its digital business back in 2010, CMO Brad Rinklin had a relationship with IT, but it wasn't exclusive. Because the content delivery network provider had no CIO, Rinklin might call on IT for help tweaking a website or deploying a sales-enablement tool, but the marketing group often turned to cloud tools or outside service providers for the heavy lifting.

                        As Akamai's marketing initiatives surged, so did Rinklin's frustration..."

                        How CIOs Can Use 3D Printing Technology to Their Advantage
                        Search CIO, March 3rd, 2016
                        "CIOs may want to label 3D printing -- a type of additive manufacturing that constructs layers of plastic, resin or metal into three-dimensional objects -- a design or a product development tool and, therefore, technology that falls outside the senior IT manager's purview.

                        But, according to experts, the perspective is short-sighted..."

                        4 Principles That Will Shape The Future Of IT
                        CIO, March 4th, 2016
                        "Over the past year, I've had the opportunity to attend a number of conferences, ranging from the most establishment events you can think of all the way to highly technical yet informal meetups. The dress at the events ranged from suits and ties to t-shirts and shorts..."
                          7 Ways For CMOs To Keep Up With The Rapid Pace Of Change
                          Business 2 Community, March 3rd, 2016
                          "Ask any CMO what their biggest fear is, and most will tell you it's keeping up with today's relentless pace of change. But keeping up can be tricky as the two major drivers pushing change are the growing number of channels available, and the amount of data flooding in.

                          Neither driver shows any sign of slowing down. Because new channels will develop, you'll have more formats to communicate with your customers, and you'll gain more ways to gather data..."

                            How Can Organizations Safely Fire A Cybersecurity Manager?
                            SearchSecurity, March 4th, 2016
                            "A cybersecurity manager has access to many privileged systems in an organization, so letting one go can be tricky. Expert Mike O. Villegas explains how to handle the process...

                            As a CISO, how do you know when it's time to fire a cybersecurity manager?..."

                            South Florida Technology Alliance: Cracking the Code on Tech Talent
                            @Citrix, W. Cypress Creek Rd - Thursday March 24th, 2016
                            Hear from Leading CEOs and Student Interns who have worked at Google, VMware, Modernizing Medicine and 3Cinteractive! Learn about implementing company internship programs; the hottest skill sets; companies and talent in South Florida; the real deal behind internships - and how to crack the code on tech talent.


                            VBeers @ Broward - Funky Buddha Brewery
                            Wednesday, Match 9th: 6:00 PM to 9:00 PM
                            Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida.

                            Register today so you can be a part of this great monthly event! Feel free to invite all of your friends and co workers who work in the IT industry!

                            Funky Buddha

                            RSVP at

                            Sponsorships for the vBeers events are through the South Florida Technology Alliance (SFTA).

                            John Mclaughlin, SFTA

                            IT - DR
                            Two Key Disaster Recovery Colocation Questions To Ask
                            Search Data Center, March 3rd, 2016
                            "Choosing a disaster recovery colocation provider may seem daunting. However, knowing what to look for beforehand can help you make the right choice.

                            Any discussion of data center disaster recovery will almost certainly involve a discussion of off-site facilities. Businesses can select a wide scope of disaster recovery facilities, ranging from traditional, non hosted colocation to managed colocation services to full cloud-based services..."

                            IT - PM
                            How To Hire A Rock Star Project Manager
                            CIO, March 1st, 2016
                            "When hiring a PM, the knee-jerk tendency seems to be to hire the person with the most technical knowledge, when other, broader skills are more likely to get the results you're really after.

                            A great project manager (PM) can mean more than just the difference between project success and failure (which is important enough). With a rock star PM on your team, you can enjoy some peace of mind knowing that projects and processes are being shepherded in a professional, efficient, timely and ultimately profitable manner. Conversely, a lousy PM can have deleterious effects, including a drain on your own time and, eventually, your company's money.

                            Here are the things to do, consider and look for to ensure you get the former, and avoid the latter..."

                            Gartner's Insights on Database as a Service
                            What's next for databases? Like many organizations, yours is probably considering migrating some, if not all, your data to the cloud.
                            Join Gartner Research Director on Data Management Systems, Adam Ronthal for an impactful webcast as he shares his insights on industry trends on Database as a Service. Adam will share his deep knowledge of data management as he answers key questions your organization may be asking about moving databases to the cloud. He will share insights, best practices as well as what impact moving to a cloud environment will have on your IT organization over the next three years.
                            IT - Networks
                            IO Is Running Out Of Gas. It's Time For The New IP
                            Network World, February 29th, 2016
                            "The classic IP networks that support everything today were simply not designed to meet the needs of the connected world that is emerging...

                            The technology industry operates on micro and mega cycles of innovation. Micro cycles happen every hour, day, week and year. Mega cycles are far more rare, occurring every 20 years or so, like the leap from mainframes to client-server computing..."

                              SDN & NFV: You Need Both
                              Network Computing, March 4th, 2016
                              "IT organizations strive to deliver applications to their users more efficiently and productively in order to increase revenues, reduce costs, and improve quality of experience. At the same time, IT departments are mandated to provide more agile, automated and resilient services. Network services cannot take days, weeks or months to provision, which is often the case in current data centers. In many cases, new application services need to be enabled in near real-time..."
                                IT - IoT
                                IoT Is About To Go Mainstream This Year
                                ITProPortal, March 3rd, 2016
                                "The Internet of Things is about to go mainstream this year, if a new report by analysts Gartner is to be believed. According to the analysts, the IoT adoption among businesses will rise 50 per cent in 2016, reaching a total of 43 per cent of organisations, overall.

                                Here's how Gartner breaks it down: late last year it surveyed 465 IT and business professionals from North America, EMEA, Asia/Pacific and Latin America. The results say that 29 per cent are currently using IoT, 14 per cent plan on doing so in the coming 12 months, and 21 per cent plan on implementing after 2016..."

                                8 IoT Operating Systems Powering The Future (Slideshow)
                                InformationWeek, March 1st, 2016
                                "Unlike PCs and mobile devices, there's a wide variety of commercial and open source operating systems powering the IoT. Here are eight leading contenders and the best use-cases for them...."
                                Enterprise IoT: A Cost-Cutter Today, A Money-Maker Tomorrow
                                ComputerWorld, March 3rd, 2016
                                "The Internet of Things has made many enterprises more efficient. This year it will start making them more competitive.

                                IoT covers a collection of technologies almost as wide as the Internet, and the range of uses is even more broad. Some just help you run your business better, while others can get you into a new business..."

                                Gartner Finds Companies Still Figuring Out Their IoT Strategies
                                eWeek, March 3rd, 2016
                                "In a survey of 465 IT business professionals, support for using the Internet of things is growing, but 38 percent say they won't use it.

                                Enterprises are still trying to decide how the Internet of things will fit into their operations, though support for the idea continues to grow. That's the conclusion of the latest IoT research from Gartner, which reports that roughly 64 percent of 465 IT professionals surveyed said they eventually plan to implement IoT in some way..."

                                Industrial IoT And IT/OT Convergence: How To Reap Benefits And Avoid Pitfalls
                                ITProPortal, March 4th, 2016
                                "The Internet of Things or IoT is more than the newest fitness monitor or cool device. It is the process of transparently deploying countless sensors and devices, which produce data that is transformed into valued information.

                                This happens each time a consumer buys a smart device such as a fitness monitor. The consumer knowingly enables the device to monitor an event, such as a run..."

                                IoT Adoption Will Reach 43% In 2016, Gartner Finds
                                InformationWeek, March 3rd, 2016
                                "IoT is greatly used by heavy industries like utilities, oil, and gas and less by service-oriented industries, according to a new survey by Gartner. All told, about 43% of businesses are planning to adopt IoT technology by the end of the year...."
                                Ten Technologies To Unlock The Full Potential Of The Internet Of Things
                                Help Net Security, March 2nd, 2016
                                "Gartner has highlighted the top 10 Internet of Things (IoT) technologies that should be on every organization's radar through the next two years.

                                'The IoT demands an extensive range of new technologies and skills that many organizations have yet to master,' said Nick Jones, vice president and distinguished analyst at Gartner. 'A recurring theme in the IoT space is the immaturity of technologies and services and of the vendors providing them. Architecting for this immaturity and managing the risk it creates will be a key challenge for organizations exploiting the IoT. In many technology areas, lack of skills will also pose significant challenges.'

                                The 3 Fixes Needed To Get The Network Ready For The IoT Revolution
                                Network World, March 1st, 2016
                                "Cisco estimates 50 billion devices and objects will be connected to the Internet by 2020. And that estimate may be low. If consumers count every device that draws power in their home - lamps, light bulbs, kitchen gadgets - and then factor in objects at work, there may be many more billions of connected devices by then.

                                But the problem is, many traditional networks are still manual, static and complex, which isn't ideal for IoT. To realize the promise of a hyper-connected future, three shifts must take place...."

                                The IoT Liability Jumble
                                Network World, March 2nd, 2016
                                "The Internet of Things, while already vast and varied, is poised to become vastly bigger. A panel at the RSA conference said that makes the legal liability issues around vulnerabilities and failures very complicated..."
                                  There's A Huge Void At The Heart Of The Internet Of Things
                                  ZDNet, March 4th, 2016
                                  "It's a couple of months or so since the end of the 2016 CES, and the big themes from the show are finally starting to become clearer to me. Unusually, though, the biggest theme of the year is actually an absence, a technology that's clearly desperately needed, but which hasn't made its way out of the lab into the wider world - a technology that the later it arrives, the harder it will be to implement..."
                                    IT - Linux
                                    Linux Kernel 4.4.4 Officially Released
                                    Softpedia, March 4th, 2016
                                    "The latest version of the stable Linux kernel, 4.4.4, has been revealed today by Greg Kroah-Hartman, which makes it the most advanced stable version available.

                                    Even if the official website of the Linux kernel hasn't been updated with this information, the Linux kernel 4.4 branch is an LTS one. It's nice to see from time to time an LTS version of the kernel that also happens to be the most advanced out there..."

                                    Poor Man's Guide To Remote Linux Desktop Support
                                    Freedom Penguin, March 3rd, 2016
                                    "One of the most common things we face as Linux enthusiasts is the 'vacuum of despair' that comes about from switching family to Linux without fully thinking through backups and restoration. It usually starts with the dreaded phone call that they tried to 'do some Linux.'

                                    Sometimes it's as simple as fixing a broken X server install..."

                                    IT - Security
                                    6 Security Breaches That Made You Wish You Planned Ahead
                                    Business 2 Community, February 29th, 2016
                                    "More often than not, security is a matter of knowing what to expect rather than preparing for the unexpected. Too few of those tasked with the responsibility to respond to threats take into consideration the habits of those likeliest to launch an attack. Vandals and intruders are rarely interested in a prolonged fight to break into some random network. They are more likely to move on to a simpler target, provided your systems are up to the task. Here are some of the more common problems a security expert might face, and ways to prepare so they don't damage your network...."
                                    Battling The Enemy Within
                                    ITProPortal, March 4th, 2016
                                    "Traditionally, cyber attacks on corporate networks have come from outside the organisation. With the growing usage of personal mobile devices and the rise of the Internet of Things (IoT), however, the danger now also comes from the walls within.

                                    The world moves swiftly; the IT security world even more so. Just a couple of years ago, securing the enterprise would basically consist of protecting an organisation from external intruders. Today, the battle has changed ground..."

                                    Good Security Begins With The Endpoint In Mind
                                    ComputerWorld, March 3rd, 2016
                                    "Let's begin today with a quick quiz: What percentage of the PCs in your business or organization have all of the required patches for the operating system and application software? I'll bet you are tempted to say 100%, since you probably assume that your workstations are set to get updates automatically.

                                    Here is an easier question: Does YOUR workstation have all of the available patches? If you are like most, the answer to either question is no..."

                                      OpenSSL Update Fixes Drown Vulnerability
                                      Cabling Installation & Maintenance, March 1st, 2016
                                      "An international team of researchers has uncovered an attack that can compromise encrypted network traffic in a matter of hours.

                                      The Drown (Decrypting RSA with Obsolete and Weakened Encryption) attack successfully decrypts TLS (transport layer security) sessions by exploiting a vulnerability in the older SSL v2 protocol that exposes private RSA keys. Once again, old cryptography is breaking the security of all online communications..."

                                      Review: 5 Application Security Testing Tools Compared
                                      CSO Online, March 1st, 2016
                                      "Application security is arguably the biggest cyber threat, responsible for 90 percent of security incidents, according to the Department of Homeland Security. Yet it suffers from not-my-job syndrome, or, as SANS put it in its 2015 State of Application Security report, 'Many information security engineers don't understand software development - and most software developers don't understand security.'"
                                      Security Think Tank: Top Five Access Control Mistakes
                                      ComputerWeekly, March 3rd, 2016
                                      "In the modern business environment, what are the most common access control mistakes and what is the best way to correct them?

                                      It is becoming more difficult to manage access to corporate IT resources as businesses become more mobile and reliant on cloud-based services. Here are the top five access control mistakes and guidelines on how to avoid them:.."

                                        To Protect Corporate Cybersecurity, Don't Ignore The Data
                                        Search Compliance, March 3rd, 2016
                                        "Business leaders aren't taking advantage of analytics data that could help maintain corporate cybersecurity, said GreyCastle Security CEO Reg Harnish.

                                        Threats to corporate information have become commonplace, and in recent years companies have turned to analytics data to help prevent information breaches. Analytics can help determine what corporate information is most vulnerable, where there are holes in security processes and how employee data protection training is lacking..."

                                        Why Your Security Tools Are Exposing You To Added Risks
                                        Dark Reading, March 2nd, 2016
                                        "The big lesson from 12 months of security product vulnerabilities: there's no foundation of trust in any piece of software. They all represent a potential new attack vector.

                                        There is a deep and amusing irony when products that are supposed to make you more secure are themselves subject to serious vulnerabilities. This isn't particularly surprising considering that writing complex and secure software continues to be something humanity struggles with..."

                                        IT - Careers
                                        8 Signs You're About To Be Laid Off
                                        CIO, March 2nd, 2016
                                        "The economy's certainly on the rebound, especially in the IT industry. Salaries have seen the largest year-over-year increase ever, and demand for IT professionals is far outpacing supply. But that doesn't mean you shouldn't be prepared in the event of a downsizing, layoffs or corporate restructuring (as HP and Yahoo have recently announced).

                                        So, how can you tell whether to keep riding out the storm, or jump ship in favor of a better opportunity? Career expert, resume writer and executive career consultant Andrew Ysasi, president of Admovio, suggests watching for these eight signs that could signal trouble ahead..."

                                        A Guide To Job Transition Prep
                                        Business 2 Community, March 3rd, 2016
                                        "There's something about the first quarter. It's always a strange time; the weather, the expectation of what a new year will bring, reflection on the prior year; it causes many people to get restless in January and February. As a recruiter, I have become very familiar with this cycle, because it often coincides with an influx in requests for resume reviews, assistance with LinkedIn profile development and inquiries about available positions..."
                                          Are You Using This Highly Effective Interview Technique?
                                , March 4th, 2016
                                          "A post by Amanda McPherson, former CMO of the Linux Foundation, about her best interviewing tip got me thinking about an interview technique I was taught while on the GNOME board of directors many years ago: focus on behavior..."
                                          How To Answer 'Have You Ever Been Fired?'
                                          Business 2 Community, March 4th, 2016
                                          "Being fired or 'let go' from a job is not necessarily something you bring up in discussion with people or want to talk about, especially if your next employer is the one asking the question. However, you're going to have to face the facts that during the interview process you'll be asked about the gap or break in your employment history on your resume.

                                          Keep in mind, then, that your best bet isn't to avoid the question or be surprised when it comes up. Go in being prepared. National workplace expert Lynn Taylor, who wrote Tame Your Terrible Office Tyrant, says employers ask this question to sift through the mounds of applicants quickly and more efficiently..."

                                            IT - Virtualization
                                            Application Containers: What Enterprises Need To Know
                                            Search Security, March 2nd, 2016
                                            "Application containers can be a major asset for deploying mobile and Web applications. Expert Michael Cobb explains what enterprises need to know about containerization.

                                            Application containers have emerged as a popular option for enterprises looking to accelerate the development and deployment of mobile and Web applications. Docker is currently the most popular option from a field that includes Microsoft's Drawbridge, Canonical's LXD and CoreOS Rocket..."

                                            You're Doing it Wrong: 5 Common Docker Mistakes
                                            InfoWorld, February 29th, 2016
                                            "The newer the tool, the tougher it is to use correctly. Sometimes nobody -- not even the toolmaker itself -- knows how to use it right.

                                            As Docker moves from a hyped newcomer to a battle-tested technology, early adopters have developed best practices and ideal setups to get the most out of it. Along the way, they've identified what works -- and what doesn't..."

                                            Oracle VM VirtualBox 5.0.16
                                            By Simon Coter
                                            Oracle has released VirtualBox 5.0 Maintenance Release 16.

                                            This release is a major improvement which include a large number of improvements and bug fixes; between the others we can find these important and very hot items:

                                            • Windows hosts/guests: properly sign binaries using a sha-256 certificate
                                            • PC Speaker passthrough: new experimental feature, available on Linux host only
                                            • Linux hosts: fixed the /sbin/rcvboxdrv script as well as the missing shebang in two scripts

                                            See all the details here with a complete list of bug fixes...

                                            IT - Email
                                            8 Reasons Why Email Is Still The Killer App - For Now
                                            Business 2 Community, March 3rd, 2016
                                            "Email is the oldest technology of the Internet. It's even older than the Internet itself, if you define 'the Internet' as when the government computer network known as ARPANET first started passing information via TCP/IP. That wonkitude happened all the way back in 1983. By then, email was already five years old..."
                                              IT - Backup
                                              We Suck At Backups. So Let's Not Have A Single Point Of Failure Any More
                                              The Register, March 2nd, 2016
                                              "The more that I move away from front line systems administration and towards data centre architect the more I absolutely convinced that systems administration can cause PTSD.

                                              With the exception of a handful of clients, I am no longer the individual responsible for making the computers go. Despite this, I still wake up at least twice a month in a cold sweat, heart racing, from an all-too-real nightmare about data loss. Recently, these nightmares have gotten worse..."

                                                IT - Big Data
                                                Data Privacy Is Coming Of Age
                                                ITProPortal, March 4th, 2016
                                                "The invalidation of the Safe Harbour agreement - which had allowed US companies storing EU customer data to self-certify - brought an issue to wider attention that those of us within the industry have known for some time. The difference between Europe and the US in terms of prevailing attitudes about data protection and legislation is as different as night and day. However, 2016 has kicked off with some encouraging signs that both sides of the Atlantic are prepared to take the necessary steps to properly manage data throughout its lifecycle..."
                                                  Drowning In Data, Starving For Insight
                                                  IT Web, March 1st, 2016
                                                  "What organisations need to win in the digital economy, are the capabilities, competencies and culture that close the gap between all the data available, and the ability to run that data into insight.

                                                  This is according to Martha Bennett, principle analyst serving CIOs at Forrester Research, giving a high-level overview of how to make the most out of the data we have to win in the digital economy, at the ITWeb Business Intelligence Summit 2016 at The Forum in Bryanston this morning..."

                                                  Evaluating The Key Features Of Data Warehouse Platforms
                                                  Search Data Management, March 3rd, 2016
                                                  "In Gartner's hype cycle, the term 'big data' was once a staple of the yearly report. It moved swiftly into the peak of inflated expectations, weathered its way through the trough of disillusionment, and is now prevalent - somewhere between the slope of enlightenment and the plateau of productivity.

                                                  Expectations of the technology are high, a Gartner survey in September 2015 showed more that 75% of companies are investing or planning to invest in big data in the next two years, and 37% of those projects are being driven from board level..."

                                                  What Are The Numbers, Facts And Figures Behind Big Data?
                                                  Information Age, March 4th, 2016
                                                  "Business leaders know they want to invest in big data, and they have high expectations on ROI, but do they really know what big data is?

                                                  In Gartner's hype cycle, the term 'big data' was once a staple of the yearly report. It moved swiftly into the peak of inflated expectations, weathered its way through the trough of disillusionment, and is now prevalent - somewhere between the slope of enlightenment and the plateau of productivity..."

                                                  IT - Mobile
                                                  What CIOs Need To Know About Hybrid Tablets
                                                  CIO, March 1st, 2016
                                                  "As hybrid devices become more popular with consumers, they're starting to find their place in the enterprise. However, there is a lot to consider before you decide to deploy them company-wide..."
                                                    Why Wearables Are Here To Stay
                                                    CIO Insight, March 4th, 2016
                                                    "Wearables are advancing into everyday use, and one factor for their staying power, aside from their popularity for fitness buffs, is FOMA (fear of missing out).

                                                    Wearables are rapidly advancing from the realm of science fiction into everyday use. We're seeing a proliferation of smart watches, fitness trackers, smart glasses, smart clothing, body sensors, wearable cameras, and other wearable devices for consumer, enterprise, healthcare, industrial, public safety, sports, and other markets..."

                                                    IT - BYOD
                                                    BYOD Continues To Add Challenges For IT Leaders
                                                    CIO, March 2nd, 2016
                                                    "A recent study shows that more workers are turning to personal mobile devices to get work done, but businesses need to consider not only the security threats, but also the effect on company culture.

                                                    You'd be hard-pressed to find someone in the working world who doesn't have a mobile device. A study from Wrike, a software company that specializes in task and project management, conducted a survey of 851 workers in the U.S. across several roles and industries, including marketing, IT, R&D, finance and human resources, to determine how mobile devices are affecting productivity..."

                                                    Top Ten Articles for last few Issues
                                                    Vol 216 Issues 1, 2, 3 and 4; Vol 215 Issues 1, 2, 3 and 4
                                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                    • Oracle Mounts Challenge to AWS in Massive IT Industry Shakeup
                                                    • Get Ready for Java 9
                                                    • TechCast Video about Xen and Oracle VM
                                                    • The Journey to the Cloud Starts at the Top
                                                    • Telcos Must Seize The 'Now Economy' Moment - Now
                                                    • Big Thoughts on Big Data
                                                    • At-a-Glance Guide to the OTN Virtual Technology Summit
                                                    • MySQL Enterprise Monitor 3.0.26 has been released
                                                    • Online Java Hands-On
                                                    • Next up in the Innovation Labs: BIG data

                                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                                      IT - Encryption
                                                      As Encryption Debate Rages, Inventors Of Public Key Encryption Win Prestigious Turing Award
                                                      CIO, March 1st, 2016
                                                      "The inventors of public key cryptography have won the 2015 Turing Award, just as a contentious debate kicks off in Washington over how much protection encryption should really provide.

                                                      The Association for Computing Machinery announced Tuesday that Whitfield Diffie and Martin Hellman received the ACM Turing Award for their contributions to cryptography..."

                                                      Most Infosec Pros Consider Government-Mandated Encryption Backdoors A Bad Idea
                                                      Help Net Security, March 4th, 2016
                                                      "Apple and the FBI have been engaged in a legal battle over the federal government's right to require built-in smartphone encryption software that could aid law enforcement investigations.

                                                      This debate has moved to Capitol Hill as pressure grows for Congress to pass updated laws clarifying technology companies' responsibility to provide access to customers' encrypted data.

                                                      Tripwire announced the results of a survey of 198 security professionals attending the RSA Conference 2016..."

                                                      World's Top Cryptographers On Encryption Backdoors: No Way
                                                      Network World, March 2nd, 2016
                                                      "Backdoors to break into encrypted communications are a bad idea from a confidentiality point of view, but Congress needs to act to decide how to balance that with the needs of law enforcement to catch terrorists and major criminals, some of the world's top cryptographers told the RSA Conference 2016..."

                                                      'The question is, where do you put the line?' says Adi Shamir, the 'S' in RSA and a professor at Weizmann Institute of Technology.

                                                        IT - HPC
                                                        A Look At HPC And Hyperscale Trends For 2016
                                                        insideHPC, March 1st, 2016
                                                        "In this video from the 2016 Stanford HPC Conference, Addison Snell from Intersect360 Research presents: HPC and Hyperscale Trends for 2016.

                                                        In this talk, Intersect360 Research returns with an annual deep dive into the trends, technologies and usage models that will be propelling the HPC community through 2016 and beyond. Emerging areas of focus and opportunities to expand will be explored along with insightful observations needed to support measurably positive decision making within your operations..."

                                                        HPC Finally Climbing To The Cloud
                                                        insideHPC, March 3rd, 2016
                                                        "In this special guest feature, Tom Wilkie from Scientific Computing World writes that, after a shaky start, interest in migrating HPC to the cloud is growing rapidly.

                                                        Although commerce and consumers have been computing in the cloud for years, the high-performance computing sector has been more hesitant. But all that may now be changing.

                                                        The cost of cloud computing for HPC is falling, while new programming models that will allow HPC workloads to run more efficiently in the cloud are becoming available. 'Public cloud' providers are installing hardware configurations that are more suited to HPC, while private clouds are giving users experience of how to run their jobs in a cloud environment..."

                                                        Open Sourced: Oracle JET, An Enterprise-Ready JavaScript Toolkit
                                                        Jaxenter, February 29th, 2016
                                                        "Announced at JavaOne and OpenWorld last year, and open sourced today, Oracle JavaScript Extension Toolkit (Oracle JET) is an enterprise-ready JavaScript solution for developers working on client-side applications.

                                                        Built into it are components and techniques relevant to data visualization, modularity, responsive design, accessibility, and internationalization. Within Oracle, it has been developed and used over the past three years as the basis of a variety of Cloud-oriented applications..."

                                                        SP vs. IdP Initiated SSO
                                                        By Damien Carru
                                                        Damien blogs, "In today's article, I will discuss about the concepts of SP and IdP Initiated SSO between two Federation deployments, and what the differences between those two flows are. I will also explain the concept of a user state or a return URL shared between the IdP and the SP during the Federation SSO, which is called:

                                                        • RelayState for SAML 2.0
                                                        • TARGET for SAML 1.1
                                                        • wctx for WS-Fed 1.1
                                                        • openid.return_to for OpenID 2.0 (the return SSO URL can contain a query parameter representing the user state at the SP)

                                                        In this article, I will showcase examples using the SAML 2.0 protocol, though the same would apply for the other protocols..."

                                                        Nexenta News
                                                        Webinar: All-Flash, All-Software Defined, for All Workloads
                                                        Nexenta and SanDisk - Wed. March 16th - 11 AM PST
                                                        The data center is going through more changes now than it has in the past two decades. Companies are seeking better performance, more flexibility, scalability, and cost-effectiveness from their storage systems to better manage the volume and variety of their workloads. This is where the benefits of Software-Defined Storage comes into play.

                                                        Join Steve Wilkins of SanDisk, and Michael Letschin of Nexenta as they discuss the storage characteristics needed to meet the workload demands of enterprises, data centers and cloud environments. Learn how by combining the performance of flash with the intelligence of Software-Defined Storage you can achieve petabyte scale, high-performance storage without compromise. Make sure you stay until the end to hear about the Nexenta and SanDisk special promotion.


                                                        Nexenta to Highlight Trends in Open Source-driven Software-Defined Storage to AGC's 2016 Information Security and Broader Technology Growth Conference
                                                        Nexenta, February 29th, 2016
                                                        Nexenta, the global leader in Open Source-driven Software-Defined Storage (OpenSDS), announced that CEO and Chairman, Tarkan Maner, will be moderating the Storage & Data Protection Panel at AGC's 2016 Information Security and Broader Technology Growth Conference.

                                                        Tarkan will host the storage closing panel on Tuesday, March 1st at 3:30pm in San Francisco. The panel will consist of executives from Geminare, Google, NetApp, Swiftstack, and Zadara. Tarkan plans to discuss elements that are driving the need for scale-out, distributed 'new IT' infrastructures, software-defined storage and software-driven data center architectures running on low cost hardware...

                                                        Veritas News
                                                        Veritas Technologies Announces CFO and Key Positions on Its Leadership Team
                                                        Veritas, March 1st, 2016
                                                        Veritas Technologies, the leader in information management, announced that Mick Lopez is joining the leadership team as Chief Financial Officer. Lopez brings 30 years of global commercial experience with both public and private companies most recently serving as CFO at Harris Corporation. He has lead corporate strategy, operations, and mergers and acquisitions for leading technology organizations including Aricent, Cisco and IBM.

                                                        Veritas also announced that George Haddad is joining the leadership team as Chief Human Resources Officer. Haddad comes from Concentrix Corporation and brings a wealth of experience and passion for building talent and leadership to Veritas.

                                                        Cisco News
                                                        Cisco Unveils Digital Network Architecture to Accelerate Customer Digital Transformation
                                                        Delivers an Open, Extensible and Software-driven Architecture Enabling Businesses to Innovate Faster, Reduce Cost and Complexity and Lower Risk
                                                        Digitization is transforming businesses in every industry, opening up a $2.1 trillion global market opportunity by 2019, according to IDC. The path to digitization requires a digital network that evolves beyond just connectivity. This new network will enable business innovation, generate insights and create customer experiences. It will reduce cost and complexity with new orchestration and automation capabilities, while helping protect the business with an architecture designed for security.
                                                        Intelligent Mobile Access Selection Simplifies Smartphone Use for Vodafone
                                                        smartphone users can more easily access the Internet via a Wi-Fi or mobile data connection
                                                        Vodafone Germany, in cooperation with Cisco and Chemring Technology Solutions, has completed a trial demonstrating how smartphone users can more easily access the Internet via a Wi-Fi or mobile data connection, thanks to a new intelligent mobile access solution solution.

                                                        This innovative solution aims to ensure that customers always use the best available access technology. To achieve this, the solution can switch between the mobile and Wi-Fi networks, depending on which provides the best user experience, based on time or location, as well as the load on the mobile or Wi-Fi networks. This also avoids common issues when logging into portals, as well as slow or inactive Wi-Fi connections. This approach will make poor Wi-Fi connection a thing of the past.

                                                        Cisco Announces Intent to Acquire CliQr
                                                        Expands Data Center Portfolio with Technology to Simplify, Automate and Manage Applications Across Hybrid Cloud
                                                        Cisco announced the intent to acquire CliQr Technologies Inc., a privately held company based in San Jose. CliQr provides an application-defined cloud orchestration platform to model, deploy and manage applications across bare metal, virtualized and container environments. This acquisition will help Cisco customers simplify and accelerate their private, public and hybrid cloud deployments. CliQr is already integrated with a number of Cisco's data center switching and cloud solutions, including Cisco's Application Centric Infrastructure (ACI) and Unified Computing System (UCS).
                                                        Cisco Unveils New Data Center Innovations to Accelerate Hybrid Cloud Deployments
                                                        Next generation data center switches deliver cloud services at cloud scale with cloud economics
                                                        Cisco announced data center technology innovations in three key areas: networking, hyperconverged infrastructure, and hybrid cloud orchestration which will enable application-centric hybrid cloud deployments. Cisco continues to lead data center innovation with SDN-ready Nexus switches that deliver cloud scale 10/25/40/50/100Gpbs, with up to 10 times performance improvement at industry leading price points. The new switching platforms provide the scale, telemetry, security, and performance needed for distributed containers and microservices, as well as the lossless traffic needed for IP storage and hyperconverged infrastructure. The new switches give Cisco customers a two-year innovation advantage over competitive technology.
                                                        Dell News
                                                        Dell SecureWorks New AETD Red Cloak Solution Slashes Time to Detect, Respond to Endpoint Security Threats from Months or Weeks to Hours or Minutes
                                                        New SaaS solution focuses on identifying malicious behavior and detecting attacks that use little or no malware
                                                        Armed with strong threat detection and endpoint monitoring capabilities as well as lightweight sensors that can be provisioned in minutes, AETD Red Cloak can scale via a cloud delivery model to any size environment and meet the challenge of identifying attacks that use little or no malware.

                                                        Too often, attackers go undiscovered within a victim's IT infrastructure for months or even years. In one instance, the Dell SecureWorks Incident Response team deployed AETD Red Cloak in a client's environment and within 48 hours was able to discover threat actors had compromised the environment 14 months earlier. With AETD Red Cloak's emphasis on sweeping for forensic evidence of malicious behavior, organizations can identify attacks whether malware is involved or not and quickly pinpoint the affected devices to reduce the cost and time it takes to respond.&#12288;&#12288;

                                                        Dell Reveals New Research Spotlighting Technology Adoption in Healthcare as well as Innovation in Monitors at HIMSS 2016
                                                        Dell Global Technology Adoption Index reveals healthcare organizations expect improved efficiency, better security and greater employee productivity from their technology investments
                                                        Dell at HIMSS 2016 unveiled new research and technology solutions to advance the healthcare industry toward patient-centered, information-driven healthcare. New insights from the Dell Global Technology Adoption Index (GTAI) reveal how healthcare organizations are using cloud, mobility, security and big data as well as the benefits and barriers to these technologies.

                                                        "Dell works to deliver end-to-end capabilities that healthcare organizations need to operate as efficiently and effectively as possible, solve critical problems, enhance patient care and unleash innovation," said John Mullen, vice president and general manager of Central Region Sales, North America Commercial at Dell. "At HIMSS, we will put a spotlight on important trends affecting the industry and how we are building open, capable and affordable future-ready infrastructures that allow customers to address demands of tomorrow."

                                                        Dell Security Multi-Engine Approach Advances Sandboxing Beyond Threat Detection to Complete Prevention with New SonicWALL Capture Advanced Threat Protection (ATP) Service
                                                        Industry-first, multi-engine approach to advanced threat analysis
                                                        Dell at RSA announced the launch of the Dell SonicWALL Capture Advanced Threat Protection Service, which enhances organizations' ability to safeguard against today's shape-shifting cyber threats. Taking a first-to-market, adaptive, multi-engine sandboxing approach, Dell Security is incorporating the VMRay third-generation Analyzer threat detection analysis engine with the Lastline Breach Detection platform and the Dell SonicWALL Sonic Sandbox threat analysis engine, to deliver a three-layer level of defense that organizations need to safeguard against today's unknown threats. This new cloud offering reinforces the commitment Dell Security has made to delivering comprehensive protection against the meteoric growth of zero-day attacks targeting businesses today, as identified in the Dell Security 2015 Threat Report. The Dell SonicWall Capture Service will be showcased this week at RSA.
                                                        Dell Cloud Clinical Archive Services Integrate Genomics Into Core Offering
                                                        Dell Cloud Clinical Archive advances clinical research and treatment with genomics tools applied to growing Dell Unified Cloud Archive community
                                                        Dell at HIMSS 2016 unveiled new technology solutions and intelligence to advance the industry toward patient-focused, information-driven healthcare. Dell has extended its Cloud Clinical Archive Services to include genomics data. This will empower healthcare organizations to unlock the potential of clinical health innovations and manage storage growth from next-generation sequencing and advanced diagnostic technologies. Additionally, the Dell Cloud Clinical Archive integrated with Zebra Medical Vision's Analytics and Research platforms is now available, enabling clinical sites to provide future-ready healthcare.
                                                        Microsoft News
                                                        Microsoft and NCAA team up for NCAA March Madness
                                                        Microsoft, March 3rd, 2016
                                                        "On Thursday, Microsoft Corp. and the NCAA announced a comprehensive partnership to provide college basketball fans with the ultimate March Madness bracket experience along with a new Windows 10 NCAA app.

                                                        In partnership with the NCAA, Bing, which returns as an Official Corporate Partner of the NCAA, will be the Official Bracketologist of the NCAA for the 2016 NCAA Division I Men's Basketball Championship and will leverage over a decade of extensive NCAA statistical data to help inform an immersive bracket experience complete with Bing Predicts data and matchup analysis. The bracket will be made available online after Selection Sunday, on and"

                                                        IBM News
                                                        IBM Study: Leading Companies Using Hybrid Cloud to Commercialize Data Insights
                                                        IBM, March 3rd, 2016
                                                        "Two-thirds of organizations implementing hybrid cloud report they're already gaining competitive advantage from their hybrid environments and are nearly three times as likely to use it to assemble data assets or monetize data, according to findings released today by IBM.

                                                        With a hybrid cloud approach, organizations can be selective about when to use cloud and when to use traditional IT infrastructure - delivering the best functionality while meeting speed and flexibility needs, as well as resiliency, security and regulatory requirements...

                                                        IBM Security To Expand Incident Response Capabilities With Plans To Acquire Resilient Systems
                                                        IBM, March 2nd, 2016
                                                        "IBM announced a significant expansion of its security operations and incident response capabilities with its plans to acquire Resilient Systems, Inc. The incident response platform, pioneered by Resilient Systems, automates and orchestrates the many processes needed when dealing with cyber incidents - from breaches to lost devices. This enables clients to respond and mitigate cyber incidents more quickly while helping minimize their exposure..."
                                                        IBM Expands Data Science Education around the World
                                                        IBM, February 29th, 2016
                                                        IBM is expanding its academic initiative with a new program that infuses its natural-language-based Watson Analytics technology into the classroom to help professors teach students how to turn data into insights without needing in-depth knowledge of data science. IBM is also introducing a new student version of Watson Analytics that will put the power of cognitive computing into the hands of the next generation of business leaders as they prepare to enter the workforce.

                                                        The skills gap in analytics is well known - not just in IT, but also across a wide range of job roles and functions. Recent research cited in Datanami indicates that the current demand for data scientists exceed the current supply by factor of three1. To help meet the need, line of business managers are learning to launch complex analytics programs on their own; as Gartner predicts that the number of citizen data scientists will grow five times faster than the number of highly skilled data scientists through 20172.

                                                        VMware News
                                                        VMware Simplifies and Improves the Digital Health Experience for Doctors and Patients
                                                        VMware, March 1st, 2016
                                                        "VMware has evolved well beyond simply a server virtualization company, and can deliver the complete Digital Clinical Workspace and unified hybrid cloud to help drive healthcare's digital transformation," said Frank Nydam, Healthcare CTO at VMware. "We believe in improving the quality of patient care through better application access, availability and security. The Digital Clinical Workspace enables caregivers to focus on patients through secure and simple access to patient information from the right device for the right task at the right time. Through the unified hybrid cloud, health IT organizations gain access to a more secure and agile infrastructure to quickly add new applications and services, seamlessly manage IT systems through mergers and acquisitions, and reduce risk from unpredictable outages or scheduled downtime."
                                                        VMware CEO to Outline Need for a Comprehensive IT Security Architecture at RSA Conference
                                                        VMware, March 3rd, 2016
                                                        In his keynote at the RSA Conference today, VMware CEO Pat Gelsinger will address the most significant impediment facing IT security today: IT architectural issues that create complexity and inhibit security teams from successfully doing their ultimate job -- protecting applications and data. By adopting a common framework, enterprises can align policies with innovative security solutions that can be extended across the data center and the cloud. Gelsinger will also unveil new research from The Economist Intelligence Unit (EIU), sponsored by VMware, that shows significant misalignment between corporate and IT leadership on cyber security investment, cyber protection priorities, and the timing of a major attack against their company...
                                                        Imprivata and VMware Collaborate to Deliver a New Secure Mobile Clinical Experience for Healthcare
                                                        VMware, March 1st, 2016
                                                        Imprivata, the healthcare IT security company, and VMware announced a collaboration to create a new mobile clinical capability for healthcare by combining Imprivata OneSign, Imprivata Confirm ID, and Imprivata Cortext with VMware Workspace ONE. This new solution is designed to simplify mobile access to electronic health record systems (EHRs), enable DEA-compliant electronic prescribing of controlled substances (EPCS), and provide secure communication between clinicians and patients, from Workspace ONE managed devices...
                                                        VMware Makes 2016 Fortune Best Companies to Work For List
                                                        VMware, March 3rd, 2016
                                                        For the second year in a row, VMware, Inc. (NYSE: VMW) has ranked on Fortune magazine's list of '100 Best Companies to Work for in the U.S.,' competing among hundreds of companies for the honor. VMware was also highlighted as the following in Fortune's Best Companies Coverage:

                                                        • No. 8 of companies located in the San Francisco Bay Area
                                                        • No. 7 of information technology companies The field of potential competitors for the list is large. Any company that is at least five years old with more than 1,000 U.S. employees is eligible.
                                                        Red Hat News
                                                        Friday Five - March 4, 2016
                                                        Red Hat, March 4th, 2016
                                                        The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.

                                                        • ComputerWorld - How Microsoft learned to stop worrying and love open source
                                                        • PC World - IoT can be hard, but Red Hat and Eurotech are teaming up to make it easier
                                                        • EnterpriseTech - The Do's, Don'ts of Docker Containers
                                                        • CMS Wire - Jump Start Mobile in Your Enterprise
                                                        • Fierce IT Security - Senior corporate leadership attention doesn't translate into more money for security

                                                        Read on for details.

                                                        Eurotech and Red Hat Collaborate to Power More Secure and Scalable Internet-of-Things Implementations
                                                        Red Hat, March 1st, 2016
                                                        Red Hat, the world's leading provider of open source solutions, and Eurotech, a leading provider of Machine-to-Machine (M2M) platforms and Internet of Things (IoT) solutions, announced a collaboration to simplify IoT integration and accelerate implementations of IoT projects. Red Hat and Eurotech have combined their complementary technologies with the intention of building an end-to-end architecture for IoT that will seek to bridge the gap between operational and information technology...
                                                        Level3 News
                                                        Top Three Security Themes At RSA Conference 2016 (Video)
                                                        Level(3), March 4th, 2016
                                                        RSA is where the world gathers in San Francisco to talk security. Chris Richter, senior vice president of global security services at Level 3 Communications (LVLT) reveals the industry's most pertinent themes at the 2016 conference. In the video, Richter touches on these topics:

                                                        • Malware proliferation and the new deception detection technology he likens to "sandboxing on steroids."
                                                        • Security Costs are escalating. Organizations once spent about three percent of its IT budget on security; now that number is about eight times more. But money doesn't create a silver bullet fix.
                                                        • Cyber Education and the lack thereof. Humans remain the weakest link for every organization.

                                                        See the video.

                                                        EMC News
                                                        EMC Makes A Quantum Leap In Enterprise Storage, Delivers Re-Engineered VMAX All Flash For The Modern Data Center
                                                        VMAX All Flash Scales Up To Four Petabytes; Offers Radically Simplified Software Packaging as well as Guaranteed Investment Protection Through Xpect More Program
                                                        EMC Corporation made a quantum leap forward in its flagship enterprise storage platform, announcing the new VMAX All Flash, the first-to-market all-flash storage array to natively support block, file, open systems and mainframe with the ability to scale up to four petabytes (PB) of data. More than just improving on raw performance, VMAX All Flash arrays deliver the legendary reliability and flexibility of the VMAX platform, while offering total cost of ownership (TCO) less than traditional enterprise disk-based arrays. Recognized by customers as the most-trusted storage array in the industry, EMC is extending the world-class VMAX data services to VMAX All Flash. In addition to a dramatically simplified management experience, its appliance-like packaging now includes both hardware and software.

                                                        Available immediately, EMC's flagship VMAX array has been re-engineered to offer two new all-flash models: the EMC VMAX 450 and EMC VMAX 850. Both models are specifically designed to take full advantage of the superior performance, density and economies of scale offered by cutting-edge flash storage media. In addition, EMC will add improvements later in the year to compress data in real time, which will result in significant capacity efficiencies.

                                                        EMC Declares 2016 The 'Year of All-Flash' For Primary Storage
                                                        EMC, February 29th, 2016
                                                        EMC Corporation announced a quantum leap forward in its enterprise storage strategy with major additions to the industry's leading all-flash storage solutions to address mixed, consolidated and the world's most performance-intensive enterprise workloads. Complementing the industry-leading XtremIO all-flash array, today's announcement of EMC's flagship VMAX All Flash enterprise data services platform and EMC DSSD Rack-Scale Flash solution (see related news releases linked above) underscores EMC's commitment to all-flash arrays for primary storage. EMC's flash portfolio is designed to address virtually any enterprise data center use case, enabling the Modern Data Center. By 2020, EMC estimates that all storage used for production applications will be flash-based; traditional disk will primarily be used for bulk and archive storage only.
                                                        HP News
                                                        Hewlett Packard Enterprise Leads Transformation of Cyber Defense With 'Build it In' and 'Stop it Now' Approach
                                                        New Reference Architecture, Offerings and Partnerships Enable Enterprises to Build Security Into the Fabric of Enterprise IT and Stop Attacks in Their Tracks
                                                        Hewlett Packard Enterprise announced new security offerings designed to help organizations build protection into the fabric of their enterprises and stop attacks through comprehensive detection and response capabilities. Announcing a new cyber reference architecture, mobile security offerings and an expanded ecosystem of partners, HPE Security is helping organizations design security and risk management processes into IT operations to address today's sophisticated threat landscape while providing a safer environment to meet tomorrow's business demands.
                                                        Hewlett Packard Enterprise Announces Comprehensive Cyber Reference Architecture and Enhancements to Threat Defense Services Portfolio
                                                        New Offerings Provide Framework for Cyber Resiliency to Proactively Identify and Manage Risk Allowing Organizations to Fearlessly Innovate
                                                        Hewlett Packard Enterprise announced the HPE Cyber Reference Architecture (CRA), a comprehensive information security framework designed to help build resilient organizations capable of addressing today's most complex security threats. Together with innovative enhancements to the HPE Threat Defense Services portfolio, which includes market-leading security monitoring and managed security services powered by HPE Security ArcSight, the new framework helps organizations comprehensively address today's digital risks, while layering in advanced capabilities for threat detection and response.
                                                        HPE Reports Fiscal 2016 First Quarter Results
                                                        First quarter net revenue of $12.7 billion was down 3% from the prior-year period and up 4% on a constant currency basis.
                                                        First quarter GAAP diluted net earnings per share (EPS) was $0.15, down from $0.30 in the prior-year period, and above its previously provided outlook of $0.09 to $0.13. First quarter non-GAAP diluted net EPS was $0.41, down from adjusted non-GAAP diluted net EPS of $0.44 in the prior-year period, and at the top end of its previously provided outlook of $0.37 to $0.41. First quarter non-GAAP net earnings and non-GAAP diluted net EPS exclude after-tax costs of $464 million and $0.26 per diluted share, respectively, related to restructuring charges, the amortization of intangible assets, separation costs, acquisition and other related charges and tax indemnification adjustments.
                                                          Brocade News
                                                          Excite Japan Selects Brocade Ethernet Fabric-Based New Ip Networking Solution For Its Service Infrastructure
                                                          The Combined OpenStack and Brocade Solution Gives Excite Japan Greater Business Agility and Flexible Scalability for Future Requirements
                                                          Brocade announced that its Ethernet fabric-based New IP network switching solution has been deployed by Excite Japan Co Ltd as a key part of the company's service infrastructure. The Internet portal operator has completely re-engineered its data centers with the OpenStack software platform for cloud computing, along with BROCADE VDX 6740 SWITCHES, to create a next-generation service infrastructure that improves business agility and scalability for future requirements.

                                                          Established in 1997 as an Internet portal operator, Excite Japan has evolved its business model to focus on services targeted at women, with an increasing emphasis on mobile apps. The move to a fully integrated, software-driven data center infrastructure enables the company to eliminate previous operational bottlenecks and respond more dynamically to fluctuating demand and new requirements, thereby streamlining the deployment of new services and improving operational economics.

                                                          Windstream News
                                                          Windstream adds McAllen Data Center to 100G network
                                                          Windstream, March 2nd, 2016
                                                          Windstream announced its network expansion into McAllen Data Center in McAllen, Tex. Windstream will deploy diverse 100G-capable Dense Wave Division Multiplexing (DWDM) routes, providing direct, low-latency transport from the McAllen Data Center to San Antonio, Dallas, Houston, and many other high-density data centers within our footprint. This deployment into McAllen Data Center is another in a series of recent Windstream investment announcements - including the construction of a metro fiber network in Charlotte, N.C. and 500G routes from Denver - supporting the carrier's on-going commitment to network expansion and enhancement efforts.
                                                          Windstream announces network enhancements in Georgia
                                                          Windstream, March 2nd, 2016
                                                          Windstream, a leading provider of advanced network communications, announced today network enhancements in Georgia to meet growing consumer data usage demand and enhance the customer experience.

                                                          Since 2014, Windstream has invested more than $80 million in broadband infrastructure throughout Georgia and expects to invest an additional $38 million in 2016 to make available faster speeds, improved reliability and 'future-proofing' of the core network. Key results to date include:

                                                          • 620,000 Georgia households serviceable by Windstream High Speed Internet;
                                                          • 93 percent of Georgia customers served by fiber-backed facilities; and
                                                          • 75 percent of households in Georgia serviceable by 10 Mbps or greater, a figure expected to reach 84 percent by year-end.

                                                          'Windstream's commitment to Georgia has never been stronger,' said Sarah Day, president of consumer and small business for Windstream.

                                                          Trending in
                                                          Vol 235, Issue 2
                                                          Trending IT Articles