News about Oracle's Solaris and Sun Hardware
System News
May 9th, 2016 — May 15th, 2016 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 219, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Oracle News
x
Oracle and Benefit Management LLC to Help Ease the Complexity of Bundled Payments Amidst Healthcare Reform
Oracle and Benefit Management LLC Enable Healthcare Payors and Providers to Shift from Retrospective Payments to Prospective Bundled Payments
Oracle announced that Benefit Management LLC, a progressive health Third Party Administrator (TPA) and joint venture of NueHealth, has selected Oracle Health Insurance Value Based Payment Cloud Service to deliver a cloud-based prospective bundled payments system for healthcare payors and providers.
Healthcare Organizations Turn to Oracle ERP Cloud for Industry's Most Complete, Modern, and Proven Solution
Oracle expands portfolio of healthcare customers with Adventist Health, Family Health, Presbyterian Medical Services, and Southern New Hampshire Health
Oracle announced that an increasing number of hospitals and healthcare systems worldwide are choosing Oracle Enterprise Resource Planning (ERP) Cloud to help increase productivity, lower costs, and improve controls. Adventist Health, Family Health, Presbyterian Medical Services, and Southern New Hampshire Health are just a few of the more than 1,800 organizations that have recently turned to Oracle ERP Cloud for a collaborative, efficient, and intuitive back-office hub with rich financial and operational capabilities to help reduce costs and modernize business practices to gain insight and productivity.
China-Based Contract Research Organization Selects Oracle Cloud to Optimize Clinical Trial Data Management
Increased productivity to the company's drug development process, reduce overall costs, improve communications with its sponsors
Fountain Medical Development (FMD), a full-service Contract Research Organization (CRO) headquartered in Beijing, China, and its US affiliate, FMD K&L, have adopted Oracle's cloud-based clinical data management solutions, to increase operational efficiencies and speed time to market. The solutions deliver increased productivity to the company's drug development process, reduce overall costs, improve communications with its sponsors, and advance clinical study quality and speed, worldwide.
Features
x
How Big Data Is Revolutionizing Marketing And Sales
By Steve Olenski
Convergence and the power of data in modern marketing this installment of the Friday Five - a collection of five curated articles from around the Internet, is all about Data.

  • Ten Ways Big Data Is Revolutionizing Marketing And Sales
  • Convergence and the power of data in modern marketing
  • 10 Elements of a Successful Data-Driven Marketing Strategy
  • MISCONCEPTIONS ABOUT MARKETING DATA
  • From Da Vinci to Data: The Heroes of Modern B2B Marketing

Read on for details.

Powering the Next Generation of Connected Cars
By Linda Tsan
Linda Tsan blogs, "Soon, Oracle technologies might be powering your next vehicle! In the latest Internet of Things news, Oracle is joining Automotive Grade Linux (AGL) project, alongside Qualcomm and Texas Instruments, to help build an open platform for the computing infrastructure of the connected car of the future..."
IT - AI
x
Cybersecurity And The Promise Of Machine Learning (Video)
CIO, May 12th, 2016
"Will Machine Learning come to rescue for cybersecurity? Or is it just more empty promises. This is the third part of a short series on cybersecurity. Watch the video below and let's discuss. (9 mins)..."
    Google AI 'Parsey Mcparseface' Comes Close To Human-Like English Skills
    CIO Today, May 13th, 2016
    "Humans in general are pretty good at parsing sentences -- that is, quickly and naturally identifying the individual parts and functions of a sentence to grasp the overall meaning. But because there's so much inherent ambiguity in written and spoken speech, parsing sentences accurately has been a challenge for artificially intelligent computers. So when Google announces -- as it did yesterday -- that its latest innovation for natural language understanding (NLU) can parse sentences with an accuracy of more than 94 percent (trained human linguists typically reach 96 percent to 97 percent accuracy), that's a big deal in the ongoing quest for human-like computer intelligence..."
    Amazon Open-Sources Its Deep Learning Software DSSTNE
    ITProPortal, May 12th, 2016
    "Amazon has decided to follow in the footsteps of Google and other technology companies by open-sourcing its deep learning software.

    The company has released its deep learning software DSSTNE (pronounced destiny) on Github under an open-source Apache license. Deep learning has gained a lot of traction in recent months and many tech companies are currently developing their own software to help teach computers..."

    Google Is Applying Machine Learning To More Than 100 Projects
    Information Age, May 11th, 2016
    "Google is betting on machine intelligence more than any other technology over the next ten years. Not only does it have more than 100 projects on the go internally, but it is open-sourcing APIs for the wider developer community...

    At the end of last month, Sundar Pichai wrote his first annual shareholder letter as CEO of Google. Eight months prior, Larry Page and Sergey Brin led a restructure of the company they founded, separating its core internet business from subsidiaries focusing on new areas of innovation, such as self-driving cars, drones, augmented reality, biotech and life sciences..."

    Starwood Taps Machine Learning To Dynamically Price Hotel Rooms
    CIO, May 13th, 2016
    "Starwood Hotels & Resorts Worldwide uses an analytics engine to alter hotel pricing rates on the fly, improving demand forecasting by 20 percent...

    Should Marriott International acquire Starwood Hotels & Resorts Worldwide as is widely expected, it will gain a company whose smartphone check-in, key-less entry and robot bellhops are progressive in the increasingly technology-focused hospitality sector. But Starwood's digital crown jewel is invisible to guests: Its analytics software platform enables the hotelier to automatically recalibrate pricing of its properties using hundreds of variables that influence supply and demand..."

    Review: 6 Machine Learning Clouds
    InfoWorld, May 11th, 2016
    "Amazon, Microsoft, Databricks, Google, HPE, and IBM machine learning toolkits run the gamut in breadth, depth, and ease...

    What we call machine learning can take many forms. The purest form offers the analyst a set of data exploration tools, a choice of ML models, robust solution algorithms, and a way to use the solutions for predictions. The Amazon, Microsoft, Databricks, Google, and IBM clouds all offer prediction APIs that give the analyst various amounts of control. HPE Haven OnDemand offers a limited prediction API for binary classification problems..."

    Virtualization
    x
    Oracle VM 3.4 script: schedule and move VMs to a different repository
    By Simon Coter
    Simon blogs, "Moving VMs from one repository to an other can be something noise, mostly if your VM has many vdisks or if you have to move many vms.

    On Oracle VM to completely move a VM you need to create a clone-customizer and specify target destination for each virtual-disk.

    So, on activities like:

    • storage replacement (new repositories)
    • huge list of vms to move to a new repository
    • vms to move to a new repository with tens of virtual-disks
    • scheduled VM moving

    a batch approach can help to address them with an automated script able to create the clone-customizer and move the entire vm (vm.cfg file and all virtual-disks) to the destination repository..."

    Oracle VM 3.4 Solutions with Command Line Interface
    By Simon Coter
    Simon blogs, "In today's spotlight, I want to share some useful tools that are built on top of Oracle VM Manager Command Line Interface (CLI). You can take advantage of the tools to automate some common tasks, thus bring more flexibility to help you deploy and manage an Oracle VM environment.

    As you already know, main components building the Oracle VM Server for x86 architecture are:

    • Oracle VM Server incorporates an open source Xen hypervisor component, which has been customized and optimized to integrate into the larger, Oracle-developed virtualization server.
    • Oracle VM Manager, the Browser user interface (BUI) to manage Oracle VM environment.

    But there are further options to manage an Oracle VM deployment!..."

    IT - Storage
    x
    One (Storage) Protocol To Rule Them All?
    architectingIT, May 13th, 2016
    "One of the questions posed to the 'ask me anything' storage panel at this week's TECHunplugged event was whether we will ever see a single storage protocol develop. This is an interesting idea and with the move to object storage, seems to have some merit. However as always with technology, the answer 'it depends' seems the most obvious, but let's dig down into what 'depends' could actually mean in this case..."
      What Large Storage Vendors Aren't Telling You About Openstack And Software-Defined Storage
      Information Week, May 11th, 2016
      "Simple, low-cost commodity storage devices can be used just as effectively, if not more so, than traditional proprietary, high-cost options.

      Large hardware manufacturers have been building high quality, dedicated storage appliances and storage arrays for many, many years. Many enterprises have been using them successfully for a long time.

      And why not? With so much structured data requiring simple, straightforward file-system storage, the intelligence integrated into these products made storage one less thing to worry about..."

        SSDs and Data: A Ticking Security Time Bomb?
        Information Management, May 12th, 2016
        "Data is more than just information these days; it's an asset. And enterprise businesses are managing a lot more data, particularly on solid state drives (SSDs).

        According to IDC, half of data centers had deployed SSDs by 2014 and the remaining half planned to consider them by 2015. In fact, data from MarketsandMarkets found that global spending on enterprise SSDs was valued at $13.29 billion in 2015 and is expected to grow at a compound annual growth rate of 9.5 percent between 2016 and 2022. So if you're like the majority of organizations, you use SSDs in many of your newer desktops, laptops, servers and data centers..."

        How Storage Admins Can Stay Relevant In Age Of Software Defined Storage
        Data Center Knowledge, May 10th, 2016
        "Good news: The reality of today's business means managing and storing data is more critical than ever before.

        Bad news: This doesn't necessarily benefit storage admins.

        More good news: If you're a storage admin, then there's a lot you can do to increase your relevancy..."

          IT - Technology
          x
          ATSC 3.0: What You Need To Know About The Future Of Broadcast Television
          CNET, May 11th, 2016
          "The next generation of broadcast TV is coming, whether you're ready or not. Actually, no one's ready, and that's sort of the point.

          ATSC, or Advanced Television Systems Committee, is the group that decides what over-the-air (and more) TV signals look like. Last year about 76 percent of US households subscribed to cable, satellite or fiber for TV, while 21 percent relied on antenna reception for at least one TV in the home. But that antenna number went up four points compared to 2014, according to the Consumer Technology Association..."

            8 Awesome (And Sometimes Free) Conference Call Services
            CIO, May 12th, 2016
            "Conference calls are a big part of work life today - sometimes too big. Because we spend so much time in meetings, we want conference-calling systems that that launch quickly and work flawlessly so we can get the information we need and move on to other pressing matters. The capability to browse a post-meeting transcript or zoom through an audio recording would be big bonuses, especially for fastidious note-takers who don't always catch everything in real time..."
              World Drone Market Seen Nearing $127 Billion In 2020, PwC Says
              Information Management, May 10th, 2016
              "Drones will soon be boosting crop yields, verifying insurance claims, and assisting in future Hollywood blockbusters in a business that's due to boom by more than 6,000 percent by the end of the decade.

              The global market for commercial applications of drone technology, currently estimated at about $2 billion, will balloon to as much as $127 billion by 2020, consulting group PricewaterhouseCoopers LLP said in a report published on Monday..."

                IT - Bitcoin
                x
                Caterina Rindi Keynote: 'Bitcoin Is A Digital Currency Made For The Internet'
                Jaxenter, May 12th, 2016
                "In her keynote at JAX 2016, Caterina Rindi, a Certified Bitcoin Professional, talked about how Bitcoin began and how to tame the blockchain. She also revealed that the Bitcoin blockchain has reached some limitations and that other blockchains are being built - such as Ethereum, which is a blockchain plus a programming language..."
                Jeff Garzik: Bitcoin Is Moving To New Growth Stage With Cross-Chain Smart Contracts
                Bitcoin Magazine, May 13th, 2016
                "Jeff Garzik is one of the most respected developers in the Bitcoin industry. He has been a Bitcoin core developer and has worked for various other companies, such as BitPay. Recently, he started his own blockchain-as-a-service firm, Bloq, which will serve enterprise clients who wish to develop stems on a private, public or confederated blockchain.

                In a recent discussion with Bitcoin Magazine, Garzik expressed his belief that, currently, blockchain technology is moving from Step Three to Step Four in a model he crafted..."

                Be Prepared For Blockchain, Says Consultant
                ComputerWeekly, May 12th, 2016
                "The blockchain endgame is unclear, but organisations should ensure they are aware of what is happening at the very least, says consultant Sebastien Meunier...

                Whether or not organisations believe blockchain has a future, they should ensure they are prepared in case it takes off, according to Sebastien Meunier, management consultant at Chappius Halder & Co.

                The distributed ledger technology underlying the bitcoin crypto-currency has come under increasing scrutiny since 2014, but continues to divide opinion..."

                State Of Blockchain Q1 2016: Blockchain Funding Overtakes Bitcoin
                CoinDesk, May 11th, 2016
                "CoinDesk's Q1 2016 State of Blockchain report summarizes key trends, data and events from the first quarter of 2016.

                This article highlights a few of the 100 new slides from the report, which is freely available to view in full here. For more of our quarterly and annual reports, visit CoinDesk Research..."

                Bitcoin Core Is Seeking To Overhaul How It Upgrades Its Code
                CoinDesk, May 13th, 2016
                "The Bitcoin Core team is looking to refresh the process by which code changes are proposed, considered and implemented in a bid to engage more people in the development of the protocol.

                But this remains a significant challenge in a diverse and distributed community..."

                IT - FOSS
                x
                Goldman Sachs Talks Open Source
                FOSS Force, May 10th, 2016
                "Goldman Sachs doesn't get a lot of positive press these days (for good reason), but check out what Don Duet, co-head of the Technology Division there, had to say about open source in this video that was posted last June...

                If open source levels the playing field, then in what other ways can the playing field be leveled? Bring this conversation to people you know. Listen and gauge their ideas. Explain what open means to you..."

                Milestones In Free And Open Source Software History, 1969-2015 (Slideshow)
                The VAR Guy, May 10th, 2016
                "As the twenty-fifth birthday of the Linux kernel approaches, it's high time to take a look back at this and other major developments in the history of open source software. Here's The VAR Guy's overview of milestones in open source history, from the introduction of Unix to today's Microsoft-Linux lovefest..."
                IT - DevOps
                x
                Avoiding Common Hang-Ups In DevOps Pipelines
                GCN, May 13th, 2016
                "While many federal agencies have begun adopting a DevOps approach to software development, some are still struggling to develop proper DevOps pipelines.

                This is not surprising; getting a basic continuous integration (CI) and continuous delivery (CD) process to work correctly is difficult and takes time. Ideally, there is always some type of source control management (SCM) solution, build server and application platform for app deployment. Hooking these components together can be nontrivial..."

                Enterprises Offer Own Twist On DevOps Adoption
                SearchDataCenter, May 13th, 2016
                "For many companies, DevOps remains a long-term goal, and they are putting their own spin on how to best adopt it...

                DevOps adoption by the average enterprise is still rare but interest is growing, which indicates that IT executives understand how team collaboration and rapid application delivery are crucial to a company's long-term success.

                At Gartner's IT Operations Strategies & Solutions Summit here recently, IT architects from a variety of established companies agreed that slow application development cycles don't cut it in a world where immediacy is valued, and they are taking steps to address their own transformation..."

                As DevOps Matures, IT Ops Evolve Into An IT Service Provider
                SearchDataCenter, May 10th, 2016
                "As companies increasingly seek full-stack developers, IT operations specialists must find new ways to add value and remain relevant...

                Embracing DevOps doesn't mean handing over operations completely to developers -- IT ops specialists still have key roles to play.

                Industry veterans agree IT operations must identify and embrace new ways to add value by becoming internal IT service providers, working in a consultative role with developers, or risk becoming irrelevant..."

                The Beauty Of Inheritance Architectures
                devops.com, May 11th, 2016
                "Spoiler alert: This article is not about inheriting your great-grandparent's estate. It is rather about how embedding the principles of inheritance into the architecture of your chosen DevOps toolset can yield exponential results. And yes, I realize that you, the customer, have little to do with what a vendor builds its tooling architecture upon. However, you, the customer, can vote with your feet, to search out products that offer features such as inheritance, rewarding vendors that have it and punishing those that do not. The simple question to address here is, Why should the customer care?..."
                Velocity Mandates DevOps And Continuous Deployment
                Forrester, May 13th, 2016
                "Today's customers, products, business operations, and competitors are fundamentally digital. Succeeding in this new era mandates everyone constantly reinvent their businesses as fundamentally digital. You have two choices,

                • become a digital predator; or
                • become digital prey.

                To compete in this new digital market norm, software applications and products must contain new sources of customer value while at the same time adopting new operational agility..."

                  Why IT Pros Should Learn Puppet
                  Network Computing, May 10th, 2016
                  "The DevOps tool isn't easy to learn, but the payoff is increased efficiency in your server room. Shawn Powers explains.

                  Learning Puppet ... Once you understand how it works, and how simple it is to implement into your environment, it seems silly that you haven't done it before. But those first few steps aren't just inconvenient -- they're hard. The entire DevOps way of doing things is foreign to those of us who have been working in IT for decades as opposed to years. Even if you're relatively new to IT, once you learn a specific way to accomplish a task, it's hard to justify learning a new way..."

                  5 Prerequisites For A Successful DevOps Initiative
                  devops.com, May 10th, 2016
                  "There are certain tools and attitudes that are essential to any successful DevOps transformation.

                  The manner in which a DevOps transformation is performed will have huge implications on the level of agility the company is able to achieve. However, before that point is even reached, some vital foundations must be laid. It is from that foundation that any innovation occurs. With that in mind, each of these elements are equally important, and should be regarded as such..."

                  MySQL
                  x
                  MySQL Connector/J 5.1.39 has been released
                  By Filipe Silva
                  Filipe blogs, "I'm pleased to announce that MySQL Connector/J 5.1.39 Maintenance Release is now generally available.

                  MySQL Connector/J can be downloaded from the official distribution channels MySQL Downloads and The Central Repository. The commercially licensed version is available for download at My Oracle Support.

                  As always, we recommend that you check the CHANGES file in the download archive and/or the release notes page to know what is new and if there are any changes that might affect your applications..."

                  Cloud Computing
                  x
                  Announcing Oracle OpenStack for Oracle Linux 2.1
                  By Zeynep Koch
                  Zeynep Koch blogs, "Oracle OpenStack for Oracle Linux Release 2 (Kilo) uses Docker Containers for simplified, fast and reliable deployment. Today Oracle announced the first update release (2.1). This release delivers several new features and enhancements engineered for a modern cloud infrastructure, including: ..."
                  Larry Ellison's Marching Orders For Oracle Cloud: Make It Fast And Simple To Buy
                  Margaret Harrist, Oracle - Forbes, May 9th, 2016
                  Margaret blogs, "All companies need to move faster than ever to keep up with changing customer demands, but outdated processes are forcing many into a holding pattern. That's why enterprises are opting for Oracle's cloud services-and why Oracle now enables its customers to purchase cloud services with the click of a button, CEO Safra Catz told attendees at the Modern Finance Experience conference in Chicago..."
                  IT - Cloud
                  x
                  Cloud Cost Management Tips For Working With Multiple Vendors
                  SearchCloudComputing, May 13th, 2016
                  "Using more than one cloud has its benefits, but can also get expensive. To manage costs, examine your providers' data access charges, as well as your application design.

                  Nearly every enterprise and most midsize businesses will deploy public cloud computing for some of their applications. Larger companies -- particularly those with extensive operating geographies -- are likely to use multiple public cloud services, and, in some cases, this results in eye-popping charges. It's critical for any prospective multicloud user to understand how costs can get out of control, and what to do to save the budget..."

                  How Cloudbursting Could Accelerate Discovery
                  ComputerWorld, May 9th, 2016
                  "Implemented properly, technology innovations like cloudbursting can fundamentally accelerate the rate of important research.

                  At the recent Bio-IT World Conference in Boston, I had the privilege of speaking to an audience made up primarily of life sciences and medical researchers. My main message concerned the cloud, specifically the trend of cloudbursting. This audience is extremely important to me personally, as my daughter was diagnosed with autism at the age of two..."

                    Solving The Ransomware Problem - Backup Or Cloud Storage?
                    Storage-Switzerland, May 11th, 2016
                    "Given the 'success' of its initial wave, the ransomware problem is getting worse. Backups seem to be the 'go to' solution but really they should represent the last line of defense. The problem with backups are that they are not frequent enough to protect all the data that ransomware can impact. In a busy organization, a lot of data can be created and modified between backup jobs. And it is this most active data that organizations are willing to pay for to get unlocked. Ransomware developers know this and are exploiting it with strains of the code that can infect more file types, faster than ever..."
                      Your Data, Their Cloud? Bring Your Own Encryption Keys
                      InfoWorld, May 11th, 2016
                      "As governments and others increasingly seek the keys from your vendors to unlock your encrypted data, you should consider using self-provisioned keys...

                      The goal of encryption is clear: To prevent unauthorized people from reading what they should not. Even if someone intercepts your messages or a cloud provider's engineer opens your data stores, that encrypted data should be worthless without the key. Encrypted data must have a key (aka a cypher) to be unlocked..."

                      IT - CxO
                      x
                      6 Traits Engineers Need To Succeed As IT Leaders
                      CIO, May 10th, 2016
                      "Finding managers who motivate, lead and inspire is easier said than done. Here are six tips for hiring IT leaders with successful outcomes...

                      Engineers and developers often make the best IT leaders. Not only are they forward-thinking and tech-savvy, but they've already have the trust and the loyalty of your IT team and they know the ins-and-outs of a great culture. If you're looking for good IT leadership, you should start from within your own ranks..."

                        CEOs Should Be Held Accountable For Cyber Attacks
                        ITProPortal, May 13th, 2016
                        "VMware has announced new findings from specialist market research agency Vanson Bourne, revealing that 29 per cent of IT decision makers and office workers in the UK believe CEOs should be held accountable for any significant data breaches that occur at their companies.

                        The survey of 500 UK office workers and 250 IT decision makers shed light on the growing belief that cyber security needs to become a focus for businesses. Serious cyber attacks are now the norm for large organisations with 24 per cent expecting to fall victim to an attack within the next 90 days..."

                        Week-In-Review: Avoid These Common CIO Pitfalls
                        The Enterprisers Project, May 13th, 2016
                        "Earlier this week we shared 14 bad habits that IT leaders told us were the biggest barriers standing in the way of CIOs' success. We found three more in the news this week. Take a look, and see if there are any bad habits you need to break in your own IT organization..."
                          The Bimodal It Backlash: Should It Departments Subscribe To The Notion Of A Two-Tier Workforce?
                          ComputerWeekly, May 13th, 2016
                          "Gartner's Bimodal IT vision has captured the imaginations of some CIOs, but industry watchers have queried how well cultivating a two-tier IT department works in reality...

                          For enterprise CIOs trying to balance the day-to-day maintenance of their IT equipment with the need to become more startup-like and agile in their approach to technology, Gartner's Bimodal IT concept ticks all the right boxes..."

                          GDPR: Do You Know What Data Protection Breaches Could Cost You?
                          Business 2 Community, May 13th, 2016
                          "With the upcoming EU General Data Protection Regulation (GDPR) laws coming into force Europe-wide in 2018, it seems that many enterprises in the EU still do not understand these new laws and the far-reaching changes to data processing needed to comply with them.

                          While 2018 may seem like light-years away and GDPR looks like some distant inconvenience, there are two very distinct issues to bear in mind.

                          Firstly, there are current data privacy laws in place such as the UK Data Protection Act 1998 (DPA 1998) which is beginning to be enforced more rigorously now, as the authorities start to turn their attention to the introduction of GDPR..."

                            Forrester Calls For CIOs And CMOs To Improve Their Relationship
                            CIO, May 10th, 2016
                            "A new report looks at the relationship between CIOs and CMOs, citing that a big shift needs to take place if businesses ever hope to live up to increasing customer expectations.

                            Not long ago, CIOs and CMOs didn't have much to talk about. The former was traditionally more focused on the technological infrastructure of the corporation, while the latter focused on the customer experience and brand image. Marketing technology has changed all of that..."

                            Hyper-Convergence: Benefits, Challenges And Use Cases
                            Search CIO, May 13th, 2016
                            "SearchCIO's Hyper-converged infrastructure infographic provides an at-a-glance look at the technology's benefits, drawbacks and key enterprise applications.

                            Hyper-converged technology offers computing, storage, networking and virtualization in a unified package.

                            This approach aims to challenge traditional three-tier data center architecture in which servers, storage arrays and networking equipment are purchased independently and managed via platform-specific administrators. Hyper-convergence benefits include easier acquisition, smaller footprint and simplified management..."

                            IT Talent Gap An 'Existential Threat' In Need Of New Tactics
                            CIO, May 11th, 2016
                            "According to the Wall Street Journal, the war for high-tech talent, particularly in disruptive technologies such as robotics, is growing fiercer than ever...

                            According to the Wall Street Journal, the war for high-tech talent, particularly in disruptive technologies such as robotics, is growing fiercer than ever: Last June, Uber reportedly poached 40 researchers and scientists from the robotics department at Carnegie Mellon University, as the company works to create driverless cars. The story claimed techies were offered bonuses of hundreds of thousands of dollars and a doubling of salaries to staff Uber's new Pittsburgh-based tech center..."

                              IT - Wireless
                              x
                              One Gigabit 4G: The Coming Of LTE Advanced
                              Zdnet, May 9th, 2016
                              "Today, you're doing well if you get 12 Mbps from your 4G LTE connection. For tomorrow, companies such as Ericsson and Qualcomm are working on delivering Gigabit LTE speeds to your smartphones. One carrier, Swisscom, even boasts that it's hit data transfer speeds of 1Gbps on its mobile network. Here's how it works..."
                              vBeers-SF
                              x
                              vBeers @ Boca - Biergarten Boca
                              Wednesday, May 18th: 6:00 PM to 9:00 PM
                              Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida.

                              Register today so you can be a part of this great monthly event! Feel free to invite all of your friends and co workers who work in the IT industry!

                              Location: Biergarten Boca - $5 burger/fries!

                              RSVP at meetup.com.

                              Sponsorships for the vBeers events are through the South Florida Technology Alliance (SFTA).

                              John Mclaughlin, SFTA

                              IT - DR
                              x
                              How To Create A Reliable DR Strategy: Best Practices
                              Data Center Knowledge, May 12th, 2016
                              "Modern IT platforms are designed to handle more users than ever, but what happens when these systems become the primary access point for most, if not all, users? What happens when a critical system experiences a fault or goes down entirely?

                              A survey by the Disaster Recovery Preparedness Council found two years ago that only 27 percent of companies received a passing grade for disaster readiness. The more we rely on data centers, the more costly data center outages become. A recent study by the Ponemon Institute and Emerson Network Power found that:.."

                              Understanding Your Disaster Recovery Readiness
                              ITProPortal, May 10th, 2016
                              "I recently read a statistic from Gartner's 2015 Business Continuity survey stating that 72 per cent of firms surveyed had to use their IT disaster recovery plans. I found that stat quite staggering, considering a report from Forrester that suggested that the vast majority of disasters are either operational failures such as power failure, IT hardware failure or they are human caused events. Human caused events can include human error, malicious security outsiders or insiders, and terrorism..."
                              IT - PM
                              x
                              4 Ways Project Managers Can Make Their CEOs Happy
                              CIO, May 12th, 2016
                              "Project managers...it's not just about making your project clients happy. Here are four tips that will have your CEO smiling week in and week out...probably.

                              So, if you want your CEO to be happy, there are four ways - according to me - to get there that we, as project leaders, can make that happen. No guarantees, of course, but these four tips should help your cause..."

                              More Than Half Of IT Projects Still Failing
                              CIO, May 11th, 2016
                              "An annual survey from project management company Innotas shows that more than half of IT projects fail, three years after a similar survey showed nearly identical findings...

                              In 2013, a survey from cloud portfolio management provider Innotas revealed that 50 percent of businesses surveyed had experienced an IT project failure within the previous 12 months. Now, three years later, not much has changed. According to the most recent Innotas annual Project and Portfolio Management Survey, in fact, the numbers have increased: 55 percent of the 126 IT professionals surveyed between January and March 2015 reported they had a project fail, up from 32 percent in 2014..."

                              Events
                              x
                              The #1 Database is About to Get Even Better
                              By J. Gelhaus
                              Watch live on June 1 as Larry Ellison, Executive Chairman and Chief Technology Officer, Oracle announces database innovations in the cloud that will redefine data management.

                              Register for the Live Webcast

                              Oracle OpenWorld & JavaOne: Take Advantage of Early Bird Rates
                              By Ramona Costea
                              Ramona Costea bogd, "There's still time to save on OpenWorld and JavaOne registration pricing! Take advantage of the Early Bird discount to save up to $500 USD on your 2016 conference pass. We look forward to seeing you in San Francisco on September 18-22, 2016 at the world's largest gathering of Oracle customers, developers and partners..."

                              Register for OpenWorld

                              Register for JavaOne

                              IT - Networks
                              x
                              Networking For Dummies, 11th Edition
                              O'Reilly, May 13th, 2016
                              "Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction.

                              The topics range from the theory of past, current, and future attacks, to the mitigation of a variety of online attacks, all the way to empowering you to perform numerous malicious attacks yourself (in the hope that you will learn how to defend against them). By increasing your understanding of a hacker's tools and mindset you're less likely to be confronted by the all-too-common reality faced by many admins these days: someone else has control of your systems..."

                              IT - IoT
                              x
                              Rise Of IoT Networks Could Create Huge Asset Management Headaches
                              v3.co.uk, May 13th, 2016
                              "But organisations shouldn't rush into spending millions on new infrastructure, says Coreix's Paul Davies..

                              The rise of the Internet of Things (IoT) will lead to a 'horrific nightmare' in terms of asset management, according to Paul Davies, technical director at Coreix.

                              Davies said at V3 sister title Computing's Internet of Things Business Summit 2016 that his company is already seeing clients struggling to keep track of everything connected to their data centre as the IoT grows..."

                              Intel's New No. 2 Executive Outlines Chip Maker's IoT Future
                              eWeek, May 14th, 2016
                              "Intel is the only company will all the hardware and software assets needed for the new cloud- and IoT-centric world, the ex-Qualcomm official says.

                              Intel is going through a time of turmoil as company officials look to create a future for the giant chip company that has less to do with traditional PCs and mobile devices and more with the Internet of things, the cloud and 5G connectivity..."

                              To Work Right, IoT Has To Move To The Cloud's Edge
                              InfoWorld, May 13th, 2016
                              "Traditional cloud architecture has too much latency for many IoT applications. Welcome to the edge of the cloud...

                              I attended Internet of Things World in Santa Clara, Calif., this week and served as the track chairman for, you guessed it, cloud and IoT. The vibe I got throughout the event was one of confusion: IoT seems to be so systemic, yet is difficult to define. As one presenter put it, 'It's like plastic. It's going to be a part of everything'..."

                              Sloppy Security In IoT Putting 'Life And Limb' At Risk, Guru Warns
                              The Register, May 13th, 2016
                              "IoT developers need to get their act together on security or the chaos caused by the likes of Anonymous in traditional computing will seem like a picnic, security vet Josh Corman warned the Building IoT conference in Cologne yesterday.

                              Corman, the founder of iamthecavalry.org and director of the Cyber Statecraft Initiative for the Atlantic Council, drew a bleak picture of the state of security in the Internet of Things, as software and connectivity is applied to new markets and bolted onto existing infrastructure, often with little thought to how that opens up new vistas for hackers..."

                              IT - Linux
                              x
                              Linux Is The Largest Software Development Project On The Planet
                              CIO, May 12th, 2016
                              "Greg Kroah-Hartman discusses the inner workings of the massive development project that is Linux...

                              Greg Kroah-Hartman is second in command in the Linux kernel community. In addition to doing great work on device drivers, he also maintains the stable tree of the Linux kernel.

                              In his keynote presentation at CoreOS Fest in Berlin this week, Kroah-Hartman offered some inside perspective on just how massive the Linux kernel project is. And I also had a chance to sit down with him to talk about the kernel and security..."

                              Linux Will Be The Major Operating System Of 21St Century Cars
                              Zdnet, May 10th, 2016
                              "Cars are more than engines and good looking bodies. They're also complex computing devices so, of course, Linux runs inside them...

                              Linux doesn't just run your servers and, via Android, your phones. It also runs your cars. Of course, no one has ever bought a car for its operating system. But Linux is already powering the infotainment, heads-up display and connected car 4G and Wi-Fi systems for such major car manufacturers as Toyota, Nissan, and Jaguar Land Rover and Linux is on its way to Ford, Mazda, Mitsubishi, and Subaru cars..."

                              Red Hat Enterprise Linux 6.8 Has Landed
                              Zdnet, May 13th, 2016
                              "The latest version of the most popular server Linux, RHEL, is now ready to be deployed in your business...

                              If you're serious about server Linux, odds are good you're running Red Hat Enterprise Linux (RHEL). There are other good ones; SuSE Linux Enteprise Server (SLES) and Ubuntu 16.04 Long Term Support (LTS) Server both spring to mind. But the Fortune 500 loves RHEL..."

                              Linux Server Security
                              O'Reilly, May 13th, 2016
                              "Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction.

                              The topics range from the theory of past, current, and future attacks, to the mitigation of a variety of online attacks, all the way to empowering you to perform numerous malicious attacks yourself (in the hope that you will learn how to defend against them). By increasing your understanding of a hacker's tools and mindset you're less likely to be confronted by the all-too-common reality faced by many admins these days: someone else has control of your systems..."

                              Here's A List Of All The Ethical Hacking Tools Included In Blackarch Linux
                              Softpedia, May 10th, 2016
                              "BlackArch Linux 2016.04.28 was, as its version number suggests, baked and cooked at the end of April, and it introduced 80 new security-oriented utilities to the ever growing collection of tools that are available in the software repositories of this GNU/Linux operating system.

                              Therefore, the BlackArch Linux devs were proud to announce that their collection of penetration testing and security auditing tools has been increased to a little over 1,400 items, which you can now view them as a list with version numbers, description, and official homepage, on the project's website..."

                              Linux Can't Keep You Safe If You Don't Update It
                              CIO, May 13th, 2016
                              Your machine is insecure unless you're running my kernel," says Greg Kroah-Hartman...

                              At CoreOS Fest in Berlin, Greg Kroah-Hartman, Linux kernel developer and maintainer of the stable branch, talked about an inconvenient truth about Linux and security: vendors are notoriously bad about implementing patches.

                              For the last 15 years the kernel community has been following a rule to fix things as soon as possible. The Linux community fixes the bugs and pushed them so that vendors can push them to their users.

                              But there is a problem..."

                              IT - Operations
                              x
                              Study: Number of Costly DoS-Related Data Center Outages Rising
                              Data Center Knowledge, May 13th, 2016
                              "While UPS system failure is the number-one reason for data center outages, cybercrime comes in a close second, and Denial of Service, or DoS, is the most common form of cyberattacks on data centers.

                              That's according to recent survey findings by the Ponemon Institute, a Michigan-based research center that studies issues of privacy, data protection, and information security. Earlier this year, Ponemon looked at the costs and reasons of data center outages, but a more recent study focused on costs associated with outages caused specifically by DoS attacks, since they are on the rise..."

                              Data Center Convergence Enabled by SDN, SD storage
                              SearchSDN, May 13th, 2016
                              "As applications drive the need for massive storage capacity, data center convergence will be aided by software-defined storage and networking to enable private cloud architecture...

                              Large data centers are experiencing massive growth in storage traffic and storage capacity requirements. To enable data center convergence, having software-defined networking and software-defined storage work together is critical to enable automated storage provisioning and the effective management of storage traffic..."

                              Label Your Cables: A Cautionary Tale From The Server Room
                              The Register, May 11th, 2016
                              "Friends of friends can be a pain in the nuts when you're in IT: you find yourself invited to someone's house 'for a beer' and then somehow end up kneeling in a dark, dusty under-stair cupboard trying to coax a six-year-old router back into life..."
                                Macgyver IT: 19 More Tools For IT Heroes (Slideshow)
                                IT World, May 12th, 2016
                                "Here you will find a collection of tools to help you and your IT team do your jobs better, faster, and hopefully with less frustration, wherever you roam. Many of these essentials are inexpensive; even those that cost a bit are great alternatives to expensive systems. Consider this a means for stretching tight IT budgets as well.

                                I should say that these items are in my actual collection, and some are in their second or third iteration after their predecessors got worn out (or stolen)..."

                                  Siem Review: Splunk, ArcSight, LogRhythm And Qradar
                                  CSO Online, May 9th, 2016
                                  "Enterprise IT professionals who use these leading security information and event management (SIEM) products identify the most valuable features and the areas needing improvement...

                                  IT and security managers in the IT Central Station online community say that the most important characteristics of security information and event management (SIEM) products is the ability to combine information from several sources and the ability to do intelligent queries on that information.

                                  Four of the top SIEM solutions are Splunk, HPE ArcSight, LogRhythm, and IBM Security QRadar SIEM, according to online reviews by enterprise users in the IT Central Station community.

                                  But what do enterprise users really think about these tools? Here, users give a shout out for some of their favorite features, but also give the vendors a little tough love..."

                                  IT - Security
                                  x
                                  4 Steps To Secure Data Management
                                  GCN, May 13th, 2016
                                  "Data is the currency that drives the global economy and keeps organizations running, and it needs to be treated as the considerable resource it is. This entails ensuring data is secure, available on demand and able to provide value. In today's data-driven economy, deriving value from data currency is still a work in progress -- but it's one with great potential.

                                  Perhaps nowhere is this more the case than in the federal space, where data serves as the backbone of operations ranging from weather forecasting and intelligence gathering and analysis to energy research..."

                                    The Ransomware Epidemic: Don't Let Hackers Hold Your Systems To Ransom
                                    ITProPortal, May 13th, 2016
                                    "Ransomware has been around since the late 80s, but its growth in recent years, both in volume and value, has been considerable.

                                    McAfee reported a twofold increase in samples between 2012 and 2013, and Cryptowall - one of the most damaging recent pieces of malware - was estimated by the FBI to have earned its operators more than $18 million by June 2015. This growth can in part be attributed to anonymous digital currencies facilitating ease of use with a lower likelihood of the trail of money being followed successfully..."

                                      Security Think Tank: Internal Up-Skilling Key To Tackling Cyber Security Skills Shortage
                                      CIO, May 10th, 2016
                                      "What strategies can organisations use to ensure that they are able to hire the information security professionals they need and that good candidates are not being missed or overlooked?...

                                      As a specific business sub-set, human resources (HR) is seldom regarded as the most fleet of foot department and, more often than not, it is not the most technologically advanced either..."

                                      5 Security Experts Share Their Best Tips For 'Fringe' Devices
                                      CIO, May 10th, 2016
                                      "What is a 'fringe' device in IT?

                                      For some, it's a gadget everyone has forgotten about - a printer in a corner office, an Android tablet in a public area used to schedule conference rooms. A fringe device can also be one that's common enough to be used in the office yet not so common that everyone is carrying one around or has one hooked up to the Wi-Fi every day.

                                      As with any security concern, many of these devices are overlooked. There might be security policies and software used to track and monitor iPads and Dell laptops, but what about the old HP printer used at the receptionist's desk? In a hospital, it might be a patient monitoring device. In a more technical shop, it could be a new smartphone running an alternate operating system..."

                                      6 Eye-Opening Stats About Endpoint Device Health
                                      Dark Reading, May 10th, 2016
                                      "New report shows state of endpoint patching and updates among a sample of 2 million devices. A report out today on the state of endpoint device health shows that businesses today still face plenty of challenges in limiting the number of risky devices roaming in and out of their corporate networks.

                                      Conducted by Duo Security and based on the 2 million devices utilizing its two-factor authentication platform, the study took a look at the condition of the operating systems and some of the apps on the devices logging into business environments..."

                                      PCI DSS 3.2: Making the Move to MFA
                                      Dark Reading, May 9th, 2016
                                      "PCI DSS has always required that any untrusted, remote access into the cardholder data environment use multi-factor authentication. Now version 3.2 takes it one step further.

                                      After more than 10 years in existence, the PCI Data Security Standard (PCI DSS) is globally recognized and accepted as a mature industry standard. It's most recent iteration -- PCI DSS version 3.2 -- focuses on confirming that security controls are in place and operating effectively, and that processes are followed throughout the year and not just during the annual validation...

                                      Security Testing Basics: Fending Off Hackers And Crackers
                                      Search Software Quality, May 12th, 2016
                                      "Cybersecurity -- we hear about it every day, whether it's another major security breach in the news or a new security initiative within your our own organization such as a directive to change your password more frequently. We may have been impacted personally by fraudulent credit charges or identity theft, or know someone who has. Cybersecurity affects everyone, both personally and professionally..."
                                      IT - Careers
                                      x
                                      How To Save Yourself From Bad Hiring Decisions
                                      Business 2 Community, May 13th, 2016
                                      "All employers want to fill their open positions with the best candidates. It improves productivity, drives the bottom line, and reduces costs associated with absenteeism and turnover. So how can you ensure that you are hiring the best candidates?

                                      The simple answer is: don't use a hiring process; use a selection process..."

                                        Why IT Pros Need Better Soft Skills (Slideshow)
                                        CIO Insight, May 12th, 2016
                                        "A significant share of CIOs say today's tech pros need to improve upon their communications interactions and other soft skills, according to a recent survey from Robert Half Technology. After all, in the modern era of cross-departmental collaboration, IT employees have to expand beyond purely technical competencies to work with business teams on strategic goals - efforts which require the ability to communicate well, both in writing and conversation..."
                                          Engage More Candidates With Video-Based Social Recruiting
                                          Business 2 Community, May 13th, 2016
                                          "To say that social media has revolutionized talent acquisition is an understatement. Two years ago, according to a Jobvite survey, social recruiting had already established itself as the accepted standard among 93 percent of recruiters. A large part of that stems from the growing population of Millennials in the labor force. In fact, they represent the lion's share of workers in the market. Their personal, professional and digital lives intersect at every juncture, unlike their predecessors..."
                                            Why You Shouldn't Lie On Your CV
                                            Business 2 Community, May 13th, 2016
                                            "According to a recent survey, hiring managers are finding more lies on applicants' CVs than in the past. Five years ago, 70% of recruiters said that they had found out that a candidate was telling porky pies. Now, that figure is up to 88%.

                                            Whether that means more people are lying or that hiring managers have become more adept at rooting out the truth is irrelevant. It comes down to the same thing: Don't put anything on your CV (or other application materials) that you can't back up..."

                                              IT - Social Media
                                              x
                                              Ignoring Customers On Social Media Will Hurt Your Bottom Line
                                              Business 2 Community, May 12th, 2016
                                              "Social Media Marketing is more than just posting a link to an article or a funny meme. Social Media Marketing is not only a forum to post information that will generate interest and engagement, increasing online visibility, search rank and more. Social Media Marketing is an opportunity for communication between your business and your customer.

                                              Though many businesses still don't understand the importance of using Social Media as a customer service tool..."

                                                IT - Virtualization
                                                x
                                                Server Virtualization Market Is Peaking: Gartner
                                                ServerWatch, May 13th, 2016
                                                "Gartner has found signs that server virtualization, a once game-changing technology, is reaching its peak.

                                                In a new forecast, the analyst firm predicted that the worldwide x86 server virtualization software market will hit $5.6 billion this year, a 5.7 percent gain compared to 2015. This seemingly good news comes with a caveat, however..."

                                                How To Make Containers More Secure
                                                CIO, May 13th, 2016
                                                "Matthew Garrett, principal security engineer at CoreOS, is one of the most respected names in the Linux world when it comes to security and cloud computing. I sat down with Garrett at CoreOS Fest to discuss the risks around containers and Linux in general. Here is an edited version of that discussion.

                                                Lately we've been hearing a lot about container security. What are the risks involved with containers and what are open source projects like CoreOS doing to mitigate them?..."

                                                Containers Vs. Virtual Machines: How To Tell Which Is The Right Choice For Your Enterprise
                                                InfoWorld, May 10th, 2016
                                                "Name a tech company, any tech company, and they're investing in containers. Google, of course. IBM, yes. Microsoft, check. But, just because containers are extremely popular, doesn't mean virtual machines are out of date. They're not.

                                                Yes, containers can enable your company to pack a lot more applications into a single physical server than a virtual machine (VM) can. Container technologies, such as Docker, beat VMs at this part of the cloud or data-center game..."

                                                IT - Database
                                                x
                                                Comparing Graph With Other Database Technologies
                                                ITProPortal, May 13th, 2016
                                                "Today's cloud applications are intensely multi-faceted where data management is concerned. The data flowing through these applications is complex, ever-changing, large in volume, and highly connected.

                                                The number of data relationships coupled with the data distribution, scale, performance, volume, and uptime requirements of the application are not a fit for a relational database. However, these requirements are addressed natively by a graph database that possesses scale-out and active-everywhere capabilities..."

                                                Using NoSQL Databases to Handle Fast Data
                                                Enterprise Apps Today, May 10th, 2016
                                                "NoSQL databases can help enterprises handle so-called Fast Data. MongoDB, DataStax and Redis are three NoSQL databases worth checking out.

                                                NoSQL databases have grown markedly in popularity over the last few years, and for good reasons. Broadly speaking, NoSQL is proving especially useful in the following two areas of increasing interest to IT organizations:..."

                                                SQL vs. NoSQL Databases: What's the Difference?
                                                Business 2 Community, May 9th, 2016
                                                "In the world of database technology, there are two main types of databases: SQL and NoSQL- or, relational databases and non-relational databases. The difference speaks to how they're built, the type of information they store, and how they store it. Relational databases are structured, like phone books that store phone numbers and addresses. Non-relational databases are document-oriented and distributed, like file folders that hold everything from a person's address and phone number to their Facebook likes and online shopping preferences..."
                                                IT - Mobile
                                                x
                                                7 Ways To Prevent Mobile Break-In (Slideshow)
                                                CSO Online, May 9th, 2016
                                                "As mobile devices continue to penetrate our society, mobile security is becoming increasingly difficult to manage. Every mobile device, whether it's a phone or a tablet, provides hackers with a new avenue to seize private information. We've seen many banks, hospitals, and other large organizations have enormous data breaches that caused a lot of damage and recovery time, and they don't appear to be slowing down anytime soon. For this reason, it is important to take these steps to keep mobile devices protected. Sinan Eren, vice president of Avast Software and general manager of Avast Mobile Enterprise, provides advice on how to do so..."
                                                IT - Big Data
                                                x
                                                Why We Love These 5 Data Visualization Tools (And You Should, Too!)
                                                SmartDataCollective, May 13th, 2016
                                                "If you are from the finance, sales, marketing or operations sector, then you must have noticed that massive data is crawling into your everyday life. No doubt it will keep growing with a good reason. The only problem is how you get results out of the data before making any kind of decisions.

                                                For example, if you are having terabytes of data, what is the first thing will you do to retrieve some information?..."

                                                  8 Reasons You'll Do Big Data This Year
                                                  InfoWorld, May 12th, 2016
                                                  "To know what people are really doing with big data technology, you need to get dirty in the trenches. Here's what we've found...

                                                  Over the past 12 months, I've been digging in the data trenches. OK, mostly I've been sitting next to the smarter people digging through the trenches and oversimplifying what they were doing in reports to management.

                                                  Very few IT projects are truly unique -- and the ones that sound unique often fall into relatively predictable buckets. Lucky for you, I've decided to come up for air and share the top eight types of projects I've seen over the past 12 months..."

                                                  8 Universities At The Forefront Of Big Data (Slideshow)
                                                  ComputerWorld, May 13th, 2016
                                                  "Undergraduate programs have been slow to catch on to big data education. Until now. Here are eight universities paving the way for the next generation of data scientists with undergraduate degrees in big data..."
                                                  Shedding Light On The Problem Of Dark Data (Slideshow)
                                                  CIO Insight, May 13th, 2016
                                                  "For enterprises to keep up with the impending surge of data - most of which will be unstructured - they must first understand what dark data is and how it will affect their operations. Gaining that knowledge is the first step toward developing a set of data management processes that will 'light up' and extract value from more data. There is a pressing need to do so. Today, 80% of all data is dark and unstructured ..."
                                                  7 Open Source Big Data Analytics And Storage Tools (Slideshow)
                                                  CIO, May 11th, 2016
                                                  "Open source developers have built a burgeoning ecosystem of data analytics and storage solutions to address the data deluge over the past several years. Here's a look at several of the most popular open source tools for big data storage and analytics..."
                                                  5 Key Requirements Of Successful Big Data Projects
                                                  CIO, May 10th, 2016
                                                  "In her keynote presentation at Apache: Big Data North America, Amy Gaskins, a data scientist with more than a decade of experience, shared five key requirements that can make or break big data projects...

                                                  Successful big data projects have five key requirements, says Amy Gaskins, a data scientist with more than a decade of experience designing and implementing data and intelligence projects for the private sector, government agencies and the U.S. military.

                                                  In her keynote presentation at the Apache: Big Data North America conference in Vancouver on Monday, Gaskins stressed that five factors can make or break big data projects:.."

                                                  Top10
                                                  x
                                                  Top Ten Articles for last few Issues
                                                  Vol 219 Issue 1; Vol 218 Issues 1, 2 and 3; Vol 217 Issues 2, 3, 4 and 5
                                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                  • New whitepaper 'Optimizing Oracle VM Server for x86 Performance
                                                  • What is on tap for Linux Container strategy in 2016?
                                                  • Upgrading Oracle VM Manager to version 3.4.1
                                                  • OTN Virtual Technology Summit Replay Libraries are Live!
                                                  • FIS Payment Card Products on Oracle Solaris and SPARC
                                                  • Oracle Linux 7 Pre-Install RPM available for EBS 12.1 and 12.2
                                                  • Mark Hurd: Better Customer Service Offers Fastest Path to Growth
                                                  • YouTube: Hybrid Mobile Development with Cordova and Oracle JET
                                                  • They Scale with MySQL
                                                  • How Max Burgers Is Becoming Sweden's Latest Breakout Star

                                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                                    IT - Java
                                                    x
                                                    Java Will Not Be Ignored! Why The World'S Biggest Companies Rely On It
                                                    Jaxenter, May 12th, 2016
                                                    "Java has undoubtedly become the foundation of the world's largest and most ambitious companies - tech giants turn to Java as they mature and their platforms can no longer come across with what they promised: quality and efficiency.

                                                    Five years ago, Bob Lee, the (then) CTO of Square, famously said that the web was 'on the cusp of a Java renaissance.' He opined that it is 'the only choice when it comes to the requirements for a company like ours 'Square' - extreme performance requirements and extreme scalability requirements. There is no visible alternative.'..."

                                                    NetBeans
                                                    x
                                                    Using the YoOracleJET NetBeans Plugin for iOS
                                                    By Geertjan
                                                    Geertjan blogs. "When you use the YoOracleJET NetBeans plugin, which is a set of tools for doing hybrid OracleJET development in NetBeans IDE, you'll find a few "gotchas" when working on Mac OSX, i.e., you're creating iOS apps in this scenario.

                                                    The error you'll get while using the iOS project templates in NetBeans IDE, i.e., provided by the YoOracleJET plugin, is as follows:..."

                                                    Nexenta News
                                                    x
                                                    SDS can Free You from your Storage Captors; Interview with Nexenta's CEO Tarkan Maner, Part 1
                                                    DCIG, May 16th, 2016
                                                    Jerome M. Wendt writes in DCIG, "Any organization that looks at the cost of networked storage for the first time may suffer from sticker shock as they look to deploy a solution. Conversely, those who already have a networked storage solution in place may feel bound to keep using the same provider going forward. Nexenta's Chairman and CEO, Tarkan Maner, unabashedly addresses these concerns in this first part of my interview series with him as he first defines Software-Defined Storage (SDS) and then calls out storage providers for holding their customers hostage with overpriced and inflexible storage solutions..."
                                                    Three Dimensions of Storage Sizing & Design - Part 1: Overview
                                                    By Edwin Weijdema, Sales Engineer Benelux & Nordics, Nexenta
                                                    Edwin blogs at Nexenta, "Why do we build ICT (Information and Communications Technology) infrastructures? What is the most important part in those infrastructures? It is Data! With the digital era we need to store bits of information, or so called data, so we can process, interpreter, organize or present that as information by providing context and adding value to the available data. By giving meaning and creating context around data we get useful information. We use data carriers to protect the precious data against loss and alteration. Exchanging floppies/tapes with each other was not that efficient and fast. So storage systems came into play, to make it easier to use, protect and manage data..."
                                                    Veritas News
                                                    x
                                                    Veritas Prepares Organizations for the Complex New European General Data Protection Regulation (GDPR)
                                                    Any organization that handles personal data relating to individuals located in the EU will be strictly obliged to review, and potentially overhaul nearly all of their information management processes.
                                                    Veritas Technologies, the global leader in information management, announced a set of solutions and services to help prepare organizations for the new European General Data Protection Regulation (GDPR) recently finalized by the European Union Parliament. Veritas Enterprise Vault 12, Data Insight 5.1, Information Map and supporting services including the dark data assessment provide businesses with critical visibility into their unstructured data that will help them to achieve better compliance with the new GDPR and existing regulations.

                                                    The EU General Data Protection Regulation aims to catapult data protection into the era of big data and cloud computing, ensuring that data protection is a fundamental basic right uniformly and consistently regulated throughout Europe. Any company that serves European customers and collects their data will have to abide by this law - even companies based and handling that personal data outside Europe.

                                                    Dell News
                                                    x
                                                    Dell Fuels Adoption of Modern and Analytic Database Platforms with New Release of SharePlex
                                                    Latest release of Dell SharePlex continues expansion beyond traditional Oracle-to-Oracle replication, adds support for SAP HANA, Teradata, and EnterpriseDB Postgres
                                                    Dell announced a major new release of its award-winning SharePlex database replication and near real-time data integration solution. Continuing its evolution beyond traditional Oracle-to-Oracle replication capabilities, the latest release of Dell SharePlex enables users to replicate Oracle data directly to SAP HANA, Teradata, or EnterpriseDB Postgres.

                                                    • Latest release of Dell SharePlex continues expansion beyond traditional Oracle-to-Oracle replication, adds support for SAP HANA, Teradata, and EnterpriseDB Postgres
                                                    • Expanded platform support delivers organizational agility while ensuring cost-effective, ZeroIMPACT database migrations
                                                    • Support for modern database platforms empowers organizations to leverage improved performance from in-memory databases and drive analytics initiatives forward

                                                    In keeping with the focus of Dell's robust portfolio of systems and information management solutions, the new release of Dell SharePlex empowers organizations to spend less time worrying about how to migrate data onto these modern platforms, and more time fueling innovation by driving reporting and analytics initiatives forward.

                                                    Dell Boomi Announces Titanium Sponsorship of SuiteWorld 2016
                                                    Company to highlight customer and partner enterprise integration successes at SuiteWorld Booth #717
                                                    Dell Boomi, the leading provider of Integration Platform as a Service (iPaaS) solutions, today announced its Titanium sponsorship of SuiteWorld 2016, NetSuite's annual user conference, taking place May 16-19 in San Jose, Calif. SuiteWorld brings together NetSuite customers, solution providers, independent software vendor partners, and industry thought leaders to learn about and share insights and best practices related to implementing NetSuite solutions.
                                                    Microsoft News
                                                    x
                                                    Customer relationships key to service provider opportunity in the cloud
                                                    Microsoft, May 11th, 2016
                                                    Organizations now rely more on digital IT infrastructure than physical, a tipping point that suggests the cloud has become the go-to model for most customers. In addition, 95 percent of customers intend to renew their contract with their primary cloud and hosting provider, indicating a high degree of loyalty despite the inherent flexibility of the cloud model. These and other findings are according to The Digital Revolution, Powered by Cloud, a Microsoft Corp.-commissioned study conducted by 451 Research LLC, released Wednesday, that illustrates the opportunity for cloud service providers and highlights the important role that developing deep and lasting customer relationships will play in capturing it.
                                                    Microsoft and ELECOM's new partnership means more innovative business solutions for customers
                                                    Microsoft, May 11th, 2016
                                                    ELECOM CO. LTD. and Microsoft Technology Licensing LLC announced that they will be partnering on a range of business solutions for customers including network attached storage (NAS) and tablets.

                                                    "We're pleased to announce a new patent collaboration with ELECOM that will ultimately deliver more innovative technologies to customers," said Nick Psyhogeos, president of Microsoft Technology Licensing. "This partnership is an example of how the mutually respectful and beneficial exchange of technology can empower businesses and consumers to achieve more."

                                                    IBM News
                                                    x
                                                    evolve24 Adopts IBM Cloud to Advance Global Insights Platform
                                                    Company leverages IBM Cloud for analysis platform; turns to IBM Bluemix for new mobile apps that put marketing insights at clients' fingertips
                                                    IBM announced that data analytics and consumer insights provider, evolve24, is adopting IBM Cloud to host its neuroscience omni-channel data analytics platform for improved performance and scalability. By untethering the platform from the constraints and limitations of the company's existing brick-and-mortar data center, the new cloud solution will also support evolve24's growing global customer base.

                                                    'We serve more than 350 brands around the globe so being able to provide reliable, real-time insights to our clients is imperative,' said Anthony Sardella, CEO of evolve24. 'IBM Cloud has the global footprint, quality and scalability we need and that our customers demand.'

                                                    Global Weather Forecast Notifications From The Weather Company Help Make Life Easier for Users Around the World
                                                    IBM, May 12th, 2016
                                                    In some countries, it's become the norm to know when significant weather will affect your day to help you stay safe and plan daily activities. However, in other places around the globe, citizens have little to no warning before weather-related disaster strikes. To help in both cases, The Weather Company, an IBM Business, has launched new global weather forecast notifications. Now available on The Weather Channel and Weather Underground apps, the notifications also go beyond apps to include mobile web, offering new technology to many areas where it did not previously exist.
                                                    IBM Closes Acquisition of Bluewolf
                                                    Acquisition of global strategic Salesforce cloud consulting partner accelerates customer experiences for Salesforce users
                                                    IBM announced it has completed the acquisition of Bluewolf , one of Salesforce's top partners and a globally recognized leader in cloud consulting and implementation services, to join IBM Interactive Experience (IBM iX). Financial details were not disclosed.

                                                    Together, Bluewolf and IBM iX will form a deeper consulting capability for clients adopting Salesforce solutions to transform relationships with their customers. IBM iX's deep proficiency in analytics, experience design and industry consulting leadership will combine with one of the world's leading Salesforce consulting practices to deliver differentiated, consumer-grade experiences via the cloud.

                                                    Scientists Discover New Technology Breakthrough in Fighting Viral Diseases
                                                    IBM Research and Singapore's Institute of Bioengineering and Nanotechnology Announce New Macromolecule with Triple-Play Action to Help Fight Virus Infection and Drug Resistance
                                                    As one of medicine's largest challenges, viral infections often escape vaccines due to their natural ability to mutate rapidly and develop drug resistance easily. Many viruses, such as Zika, Ebola and dengue fever, have grown into major global health epidemics with great human and economic toll. IBM and Singapore's Institute of Bioengineering, Nanotechnology (IBN) announced they have identified a new breakthrough macromolecule that could help prevent deadly virus infections with a unique triple-play mechanism that can also help prevent viral drug resistance.
                                                    Alder Hey Children's Hospital Set to Become UK's First 'Cognitive' Hospital
                                                    Collaboration With the UK Science and Technology Facilities Council Hartree Centre Taps into IBM Watson to Improve Patient Experience
                                                    Alder Hey Children's NHS Foundation Trust announced a ground-breaking multi-year collaborative program with the Science and Technology Facilities Council's (STFC) Hartree Centre, supported by IBM, to create the United Kingdom's first 'cognitive' hospital by harnessing 'big data' and the power of IBM's Watson technology platform.

                                                    This is the first time that Watson technology will be applied to improve patient experience in the United Kingdom. Alder Hey and the Hartree Centre believe that by applying Watson - an innovation in computing technology - it will enhance patient care and potentially generate savings for both the hospital and the UK National Health Service (NHS) as a whole.

                                                    IBM Watson to Tackle Cybercrime
                                                    IBM, May 10th, 2016
                                                    IBM Security announced Watson for Cyber Security, a new cloud-based version of the company's cognitive technology trained on the language of security as part of a year-long research project. To further scale the system, IBM plans to collaborate with eight universities to greatly expand the collection of security data IBM has trained the cognitive system with.

                                                    Training Watson for Cyber Security is a critical step in the advancement of cognitive security. Watson is learning the nuances of security research findings and discovering patterns and evidence of hidden cyber attacks and threats that could otherwise be missed...

                                                    BM and UMBC Collaborate to Advance Cognitive Cybersecurity
                                                    New Lab to Tackle National Cybersecurity Needs through Cognitive and Accelerated Computing
                                                    IBM and the University of Maryland, Baltimore County (UMBC) announced plans for a multi-year collaboration to create the Accelerated Cognitive Cybersecurity Laboratory (ACCL), which will be housed within the College of Engineering and Information Technology at UMBC. Opening in the fall of 2016, the lab will work to advance scientific frontiers in the application of cognitive computing to cybersecurity via analytics and machine learning, while also exploring specialized computer power optimized for these new intensive computing workloads.
                                                    Fujitsu News
                                                    x
                                                    Fujitsu Develops High-Speed Forensic Technology to Grasp at a Glance the Entirety of a Cyber Attack
                                                    Damage analysis for rapid and comprehensive countermeasures, even for non-experts
                                                    Fujitsu Laboratories Ltd. announced the development of new technology that, in response to targeted cyber-attacks on specific organizations, rapidly analyzes damage status after an attack has been detected.

                                                    In the event of malware attacks, which infect organizations to cause a great deal of damage, including information leaks, it was previously necessary to analyze a range of logs on networks and devices to clarify attack status. However, in order to grasp the whole picture of the attack, analysis by an expert over the course of many hours was required.

                                                    Fujitsu Receives Order for New Supercomputer System
                                                    Large-scale PRIMERGY server-based x86 cluster system to serve as an HPC platform for JCAHPC, and jointly operated by the University of Tokyo and the University of Tsukuba
                                                    Fujitsu announced that it has received an order for a many-core large-scale supercomputer system from the University of Tokyo and the University of Tsukuba. The system will be deployed to the Joint Center for Advanced High-Performance Computing (JCAHPC), which the two universities jointly operate.

                                                    The new supercomputer will be an x86 cluster system consisting of 8,208 of the latest FUJITSU Server PRIMERGY x86 servers. These will run on the next-generation Intel Xeon Phi processors (Intel development code name: Knights Landing), and achieve a theoretical aggregate performance of 25 petaflops (PFLOPS)).

                                                    Fujitsu Enhances Global Managed Security Service to Minimize Cyber-Attack Damage to Businesses
                                                    Provides new service to strengthen responsiveness to cyber-attacks and improve business continuity for companies and organizations
                                                    Fujitsu announced that it has enhanced its Global Managed Security Service, which provides unified support in response to cyber-attacks across the lifecycle, including detection and prevention, analysis and countermeasures, and enhanced security resilience. Fujitsu will also provide the new FUJITSU Security Solution Security Resilience Enhancement Support Service from June in Japan, which will improve business continuity for companies.

                                                    The Resilience Enhancement Support Service, based on the Fujitsu Group's track record and knowledge of business continuity gained by consulting for over 1,000 companies, helps customers set medium-term security countermeasure plans from the perspective of business continuity. This is achieved through simulated scenarios based on the customer's industry and business conditions, and by quantifying the expected financial cost of damage to business caused by a cyber-attack. It also uses comparisons with the security countermeasure levels of other companies of the same scale in the same industry.

                                                    VMware News
                                                    x
                                                    Leading Global Research Universities Virtualize Their Networks With VMware NSX
                                                    VMware NSX Empowers Universities to Become IT Service Brokers and Community Cloud Providers; Network Virtualization Increases Security and Efficiency to Support Research and Administration Requirements
                                                    VMware announced that University of New Mexico (UNM), University of New Hampshire and Université Laval have implemented production deployments of the VMware NSX network virtualization platform. Deployed as part of a software-defined data center architecture, VMware NSX provides these university IT teams with the agility and security necessary to keep pace with the speed of research and discovery.

                                                    A huge component of IT in supporting academic research has always been the laborious task of network provisioning to support current and future applications, and ongoing configuration and management of the physical network infrastructure. Additionally, IT teams have increasingly had to improve and evolve their approaches to IT security as the research and information they possess has increasingly become the target of hackers and criminals.

                                                    Red Hat News
                                                    x
                                                    Friday Five
                                                    Red Hat, May 13th, 2016
                                                    The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.

                                                    • Royal Bank of Scotland Powers Open Experience with Red Hat Mobile, Container and Cloud Technologies
                                                    • Announcing Red Hat Shares, the Red Hat corporate newsletter
                                                    • Your path to a secure enterprise
                                                    • Agenda and Keynote Speakers Announced for Red Hat Summit 2016
                                                    • ZDNet - Want a good tech job? Report says &#8203;open source skills are hotter than ever

                                                    Read on for details.

                                                    Agenda and Keynote Speakers Announced for Red Hat Summit 2016
                                                    Thousands of attendees expected at industry's premier open source technology conference to learn about the future of enterprise technology, including cloud computing, containers, DevOps, big data, mobile, security, and more
                                                    Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions, announced the agenda and keynote speakers for Red Hat Summit 2016, the industry's premier open source technology conference. The 12th annual Red Hat Summit is expected to welcome thousands of attendees from around the world to San Francisco's Moscone Center, June 27-30. Event 'url "http://www.redhat.com/summit" "details and registration are live"'.
                                                    Royal Bank of Scotland Powers Open Experience with Red Hat Mobile, Container and Cloud Technologies
                                                    Red Hat Mobile Application Platform and OpenShift Enterprise at core of new innovation and entrepreneurship technology solutions center
                                                    Red Hat announced that Royal Bank of Scotland is powering its new Open Experience center with Red Hat technologies, including the Red Hat Mobile Application Platform and OpenShift Enterprise, Red Hat's web-scale container application platform.

                                                    "Innovation and community have long been hallmarks of open source, and we have seen firsthand the power of creating technology the open source way." - Craig Muzillasenior Vice President, Application Platforms Business Group, Red Hat

                                                    Latest Version of Red Hat Enterprise Linux 6 Brings Enhanced Security, Management, and Monitoring to the World's Leading Enterprise Linux Platform
                                                    Red Hat Enterprise Linux 6.8 adds improved system archiving, new visibility into storage performance and an updated open standard for secure virtual private networks
                                                    Red Hat announced the general availability of Red Hat Enterprise Linux 6.8, the latest version of the Red Hat Enterprise Linux 6 platform. Red Hat Enterprise Linux 6.8 delivers new capabilities and provides a stable and trusted platform for critical IT infrastructure. With nearly six years of field-proven success, Red Hat Enterprise Linux 6 has set the stage for the innovations of today, as Red Hat Enterprise Linux continues to power not only existing workloads, but also the technologies of the future, from cloud-native applications to Linux containers.

                                                    "With enhancements to security features and management, Red Hat Enterprise Linux 6.8 remains a solid, proven base for modern enterprise IT operations," - Jim Totton, vice President And General Manager, Platforms Business Unit, Red Hat

                                                    Level3 News
                                                    x
                                                    Top Three Cloud Drivers are Cost Savings, Disaster Recovery and Need for Scalability
                                                    According to Level 3 2016 Cloud Survey Conducted by HIMSS Analytics
                                                    A new Level 3 Communications, Inc. study, conducted by HIMSS Analytics and designed to understand cloud use, trends and preferred vendors among healthcare organizations, was released today. The 2016 Cloud Survey is a blinded, web-based quantitative study that includes perspective from more than 100 IT decision makers at medium to large-sized hospital systems and hospital corporate offices across the United States.
                                                    EMC News
                                                    x
                                                    EMC 2015 Sustainability Report Illustrates Interconnections Between Sustainability and Business
                                                    Report highlights progress towards 2020 goals and key achievements
                                                    EMC Corporation published its 2015 Sustainability Report, Connections. As in past years, the annual sustainability report provides visibility into progress made toward the Company's 2020 science-based goals, and highlights the programs and initiatives advancing the primary sustainability priorities for EMC.

                                                    'IT is at the center of a monumental shift that is transforming the world. Technology is making it possible to better understand and shape a healthy and sustainable future,' said David Goulden, CEO at EMC Information Infrastructure. 'EMC is excited and committed to being part of this tremendous opportunity - for our business, our employees and the communities in which we operate.'

                                                    Goulden added, 'It is important to me that as a global business we are creating a culture of environmental sustainability and digital responsibility. Our 2015 Sustainability Report illustrates EMC's progress on its sustainability goals as well as how we are supporting local communities and society as a whole. I am excited to share our progress with you.'

                                                    EMC Fellow Radia Perlman Honored During National Inventors Hall of Fame 2016 Induction Ceremony
                                                    Perlman honored at 44th Annual National Inventors Hall of Fame Induction Ceremony
                                                    EMC Fellow Radia Perlman was recently honored at the 44th Annual National Inventors Hall of Fame Induction Ceremony in Washington D.C. as a member of the esteemed 2016 class of Inductees.

                                                    The National Inventors Hall of Fame honors individuals who have contributed great technological and scientific achievements that have helped stimulate growth for the U.S. and beyond. The criteria for induction requires candidates to hold a U.S. patent that has contributed significantly to the nation's welfare and the advancement of science and the useful arts.

                                                    HP News
                                                    x
                                                    HP Inc. Creates HP Tech Venture Group
                                                    HPE , May 10th, 2016
                                                    HP Inc. announced the launch of HP Tech Ventures, a new corporate venture arm, targeting early stage companies with cutting edge technologies. Find out more at the HP Tech Ventures website: http://techventures.hp.com.

                                                    Operating across teams in Palo Alto, Calif., and Tel Aviv, Israel, HP Tech Ventures will pursue strategic investments and partnerships in disruptive technology areas, including: 3D transformation, immersive computing, hyper-mobility, Internet of Things, artificial intelligence, and smart machines.

                                                    Comcast News
                                                    x
                                                    Comcast Business Named Exclusive Network Services Provider for Reston Business Incubator Refraction
                                                    Cisco, May 12th, 2016
                                                    Comcast Business announced that it has been named the exclusive network services provider for Refraction, a rapidly-growing coworking community in the heart of Reston, Virginia. In addition to innovative cloud-based voice and TV solutions, all startup and entrepreneur members at Refraction receive access to a 1 Gigabit-per-second (Gbps) Ethernet Dedicated Internet line from Comcast Business capable of scaling to 10 Gbps of capacity.
                                                    F5 News
                                                    x
                                                    F5 Networks and Hutchinson Networks partner with Edinburgh Napier University
                                                    Working to bridge cyber-security skills gap in Scotland
                                                    Leading cyber-security company F5 Networks (F5) and IT network services provider Hutchinson Networks (HN) have announced a partnership with Edinburgh Napier University, to share technology and insights that will augment the institution's cyber-security courses. In providing technology and training licences, F5 and HN will help the university build on the progress it is making towards tackling the growing skills gap in Scotland and across the UK.

                                                    With the shortage of qualified IT security personnel predicted to reach 1.5 million globally by 2020, collaboration between educational institutions and technology companies grows ever-more important. Through the partnership, students at Edinburgh Napier will benefit from the integration of devices provided by F5 and HN throughout their degree courses, exposing future employees to real-life IT environments and threats and enabling a better understanding of IT security technology.

                                                    Netapp News
                                                    x
                                                    Citrix Speeds Mobile Application Delivery with NetApp All Flash FAS
                                                    Faster, more reliable development test results accelerate time to market for new software versions and features
                                                    "Introducing NetApp all-flash arrays into our software development process has reduced storage latency up to tenfold, enabling us to significantly increase the number of tests we can run and the accuracy of our results," said Satish Sambandham, Senior Manager, Product Development for Citrix. "NetApp all-flash arrays give our engineering team the scale-out capacity, performance, and non-disruptive operations we need to deliver new features in our flagship XenApp and XenDesktop product lines with utmost speed and quality."
                                                    Trending in
                                                    Vol 233, Issue 3
                                                    Trending IT Articles