News about Oracle's Solaris and Sun Hardware
System News
May 16th, 2016 — May 22nd, 2016 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 219, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Machine Learning For Dummies
O'Reilly, May 20th, 2016
"Your no-nonsense guide to making sense of machine learning

Machine learning can be a mind-boggling concept for the masses, but those who are in the trenches of computer programming know just how invaluable it is. Without machine learning, fraud detection, web search results, real-time ads on web pages, credit scoring, automation, and email spam filtering wouldn't be possible, and this is only showcasing just a few of its capabilities. Written by two data science experts, Machine Learning For Dummies offers a much-needed entry point for anyone looking to use machine learning to accomplish practical tasks..."

Google has a new chip that makes machine learning way faster
ITWorld, May 18th, 2016
"The new Tensor Processing Unit is a major leap forward for intelligent applications...

Google has taken a big leap forward with the speed of its machine learning systems by creating its own custom chip that it's been using for over a year.

The company was rumored to have been designing its own chip, based partly on job ads it posted in recent years. But until today it had kept the effort largely under wraps..."

12 Ways AI Will Disrupt Your C-Suite (Slideshow)
InformationWeek, May 18th, 2016
"McKinsey & Company estimates that as much as 45% of the tasks currently performed by people can be automated using existing technologies. If you haven't made an effort to understand how artificial intelligence will affect your company, now is the time to start..."
    Artificial Intelligence is no Longer Science Fiction, It's a Reality
    TechZone360, May 18th, 2016
    "Artificial intelligence (AI) is one of the most evocative and confusing terms in technology. It seems there are new announcements almost every day about the advancements of machines and their ability to 'think'.

    We have seen a machine master the complex game of Go, previously thought to be the most difficult challenge of artificial processing..."

      IT - Storage
      Flash Reliability in Production
      Storage Newsletter, May 18th, 2016
      "To read this article included in the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST '16). February 22-25, 2016, Santa Clara, CA, click on:

      Flash Reliability in Production: The Expected and the Unexpected

      By Bianca Schroeder, University of Toronto; Raghav Lagisetty and Arif Merchant, Google Inc. Between 20-63% of drives experience at least one uncorrectable error during their first four years in the field, making uncorrectable errors the most common non-transparent error in these drives. Between 2-6 out of 1,000 drive days are affected by them..."

      Enterprise Storage Shake-Up Coming via Cloud-Native
      Information Management, May 19th, 2016
      "Enterprise IT is on the verge of a revolution, adopting hyper-scale and cloud methodologies including micro-services, DevOps and those developed specifically for cloud platforms (cloud-native).

      Many organizations simply try applying the same infrastructure, practices and vendor solutions to the new world, but it may lead to failure. That's because many solutions and practices - SAN/VSAN and NAS among others - are becoming irrelevant.

      In the new revolution, many of the methods employed by cloud vendors are being used for software development in IT organizations:..."

      Backblaze releases billion-hour hard drive reliability report
      BackBlaze, May 17th, 2016
      "Backblaze has released its reliability report for Q1 2016 covering cumulative failure rates both by specific model numbers and by manufacturer. The company noted that as of this quarter, its 61,590 drives have cumulatively spun for over one billion hours (that's 42 million days or 114,155 years, for those of you playing along at home).

      Backblaze's reports on drive lifespan and failure rates are a rare peek into hard drive longevity and lifespan. One of the most common questions from readers is which hard drives are the most reliable..."

        IT - Technology
        Researchers Design Six-State Magnetic Memory, May 18th, 2016
        "Computers are often described with "ones and zeros," referring to their binary nature: each memory element stores data in two states. But there is no fundamental reason why there should be just two. In a new study, researchers have designed a magnetic element that has six stable magnetic states, which paves the way toward realizing a six-state magnetic memory element..."
          A cord-cutter's guide to digital TV antennas
          CIO, May 20th, 2016
          "Consumers who want to say sayonara to their pay TV providers need a quality digital antenna. Tons of different antenna options exists, and finding the right one can be a challenge. Here's how to get started..."
            3 Technology Services for Which You're Definitely Overpaying
            Business 2 Community, May 18th, 2016
            "To the small business, budgets are important. They need to be set and stuck to in order to confidently predict cash flow and succeed in the long term. But once you sign contracts with vendors, prices seem to escalate. Machines break. Your server is getting older. It seems as though there is a never-ending need to invest in new technology and fix and refresh it in order to stay up to speed and innovate. Taking the time to sit down and be proactive about your technology is extremely important..."
              IT - Bitcoin
              The Quick Death Of The Zero-Fee Bitcoin Transaction
              CryptoCoinsNews, May 21st, 2016
              "The increasing amounts of Bitcoin transactions have slowly led to an increase in Bitcoin fees as miners favor the transactions with fees as priority transactions. This means that it can take a longer time for a Bitcoin transaction to clear. Some transactions, small ones without fees generally, can be lost to the Bitcoin ether, only to be returned to sender a few day later..."
              IT - FOSS
              The shift in open source: A new kind of platform war
              Network World, May 18th, 2016
              "Open source has shifted to become a critical piece of any software company's business strategy. But why?...

              For many years, open source software seemingly lay at the fringe of the tech industry. A subculture that many didn't understand and that seemingly threatened the broader industry. It is amazing how much has changed..."

              Linux Journal, May 20th, 2016
              "Free of charge for any use and free of any kind of advertising bundle, PeaZip is an open-source (LGPL) file archiver, a free alternative to software like WinRar and WinZip, for Linux and Windows. Version 6.0.0 is a major release of PeaZip that adds new features to the existing functionality. Innovations include ability to open/extract in the new RAR5 format, full support for Unicode filenames, quick search and new themes to customize PeaZip's look and feel..."
              Oracle Solaris 11.3 Cheatsheet
              By Joerg Moellenkamp
              Joerg blogs, "Four year ago i wrote the Solaris 11 General Administration Cheat Sheet. Last year there was an vastly extended update for Solaris 11.2 and i gave it to Glynn Fosters and Harry Foxwells for their really great Solaris 11.2 Administration book. Now the 11.3 update is public as an pdf for everyone. You find it at here."
              The Oracle Solaris Essentials of Support
              By Glynn Foster
              Glynn blogs, "Oracle Solaris is all about making your life easier in the data center. All its technologies have been designed to solve the problems administrators experience in running a highly reliable, secure and efficient data center. They've been integrated and carefully thought through to improve the user experience, and we're continuously re-working subsystems to modernize them and adapt to new trends of application deployment in the cloud.

              One of the areas of improvement that we've had much focus on over the past few years has been related to lifecycle management - making sure you can deploy Oracle Solaris securely and reliably, and that you can update it quickly to protect against the latest security vulnerabilities. We've seen technologies like the Image Packaging System (IPS), Automated Installer (AI) and Unified Archives having a massive impact in terms of agility and consistently..."

              IT - DevOps
              As DevOps matures, IT ops evolve into an IT service provider
              Search ITOperations, May 18th, 2016
              "As companies increasingly seek full-stack developers, IT operations specialists must find new ways to add value and remain relevant.

              Embracing DevOps doesn't mean handing over operations completely to developers -- IT ops specialists still have key roles to play.

              Industry veterans agree IT operations must identify and embrace new ways to add value by becoming internal IT service providers, working in a consultative role with developers, or risk becoming irrelevant...'

              Site reliability engineering kicks rote tasks out of IT ops
              Search ITOperations, May 20th, 2016
              "DevOps dominates the ideology around operations and development. But what does it mean that one of the biggest technology companies doesn't do ops?

              Internet search giant Google released Site Reliability Engineering: How Google Runs Production Systems, a book focusing on its software engineering approach to IT operations. This book covers the gambit of practices and management tips to help any enterprise, big or small, implement site reliability engineering (SRE), which, the authors say, is not taught in schools..."

              Enterprises offer own twist on DevOps adoption
              Search ITOperations, May 18th, 2016
              "DevOps adoption by the average enterprise is still rare but interest is growing, which indicates that IT executives understand how team collaboration and rapid application delivery are crucial to a company's long-term success.

              At Gartner's IT Operations Strategies & Solutions Summit here recently, IT architects from a variety of established companies agreed that slow application development cycles don't cut it in a world where immediacy is valued, and they are taking steps to address their own transformation..."

              Beyond Jenkins: 7 devops tools
              InfoWorld, May 19th, 2016
              "These alternatives to Jenkins offer unique capabilities for automating software integration and delivery...

              The need for speed in the software development cycle has given rise to a number of valuable automation tools for developers. Chief among these tools are those aimed at facilitating the continuous integration and continuous delivery of software projects. Through these CI/CD tools, development teams can keep software up-to-date and quickly put it into production..."

              DevOps Chat: Gene Kim, DevOps Enterprise Summit London 2016
    , May 18th, 2016
              "I recently had a chance to sit down with author and researcher Gene Kim about the upcoming DevOps Enterprise Summit in London (DOES). This is the first DOES out of the US and Gene and team are planning to make it a great success. Below is the audio of our conversation and below that is a the transcript of the conversation..."
              DevOps is a Risky Business
    , May 19th, 2016
              "I spend a considerable amount of time with clients discussing DevOps and the potential value it can bring to them, but there is one theme that always resonates: the ability of a DevOps approach to eliminate risk. While many of us understand the benefits in terms of being faster (improved productivity), cheaper (reduced cost) and better (improved quality), I find that a conversation based around risk, especially when talking to the business or department heads, usually gets straight to their concerns in a language they understand..."
              MySQL 5.7 read-write benchmarks
              Percona Database Performance Blog
              Vadim blogs, "In this post, we'll look at the results from some MySQL 5.7 read-write benchmarks.

              In my past blogs I've posted benchmarks on MySQL 5.5 / 5.6 / 5.7 in OLTP read-only workloads. For example:

              • MySQL 5.7 sysbench OLTP read-only results: is MySQL 5.7 really faster?
              • MySQL 5.7 primary key lookup results: is it really faster?
              • ProxySQL versus MaxScale for OLTP RO workloads

              Now, it is time to test some read-write transactional workloads. I will again use sysbench, and my scripts and configs are available..."

              Cloud Computing
              Integrating Oracle VM with Oracle OpenStack for Oracle Linux
              By Honglin Su
              Honglin blogs, "Oracle's contribution and participation in Docker and OpenStack bring more flexibility and openness to Oracle VM deployment. Customers can take advantage of Oracle VM 3.4 and Oracle OpenStack for Oracle Linux 2.1 when building an open cloud infrastructure.

              Oracle VM Server for x86 incorporates an open source Xen hypervisor component, which has been customized and optimized as a virtualization and management solution for x86 servers..."

              The rise of the mobile citizen developer & Oracle Mobile Application Accelerator
              By Chris Muir
              Chris Muir blogs, "With the introduction of new mobile products & features we thought we'd take the opportunity to revive last year's mobile Q&A LinkedIn article series to interview the key staff behind the new offerings. These articles are designed to give you a unique insight into the product by talking to the experts who actually built the product, as different from the documentation and marketing.

              In the latest interview on LinkedIn we invited Denis Tyrell and Liza Broadbent, the product manager and user experience leads respectively, to talk about their new baby Oracle Mobile Application Accelerator (MAX)..."

              One Man's Cloud Journey: Lessons from 160 Focus Groups in 11 Countries
              By Jeffrey Erickson
              Jeffrey writes, "If your boss urged you to 'go out and listen to customers,' what would you do? Rex Wang hopped on a plane, holding over 160 focus group conversations in 11 countries on four continents over the past six months.

              Wang got his marching orders from Oracle CEO Mark Hurd, who wanted an even deeper understanding of what customers are doing and seeking in the cloud..."

              Oracle Linux 6.8 is now available
              By Michele Casey
              Michele Casey blogs, "On Monday evening, we released Oracle Linux 6.8 to the Unbreakable Linux Network. This release is the first ISO to incorporate Unbreakable Enterprise Kernel Release 4 (Quarterly Update 1) and includes several improvements and features. You can download this update from or from the Oracle Software Delivery Cloud..."
              IT - Cloud
              Cloud Vendor Relationship Management for Channel Partners
              Search Channel, May 18th, 2016
              "Account management, marketing support and cloud performance -- these are just a few of the concerns that channel partners may have when working with cloud vendors...

              As channel partners transition to offering cloud computing products, many discover that this shift comes with a set of uniquely different vendor-partner dynamics. These dynamics change the way partners manage business relationships with their vendors, as well as with their customers..."

              Is Capacity Planning Dead In the Cloud Era?
              NetworkComputing, May 18th, 2016
              "Yes, the cloud is theoretically infinite. But consider whether you can afford it.

              Most of us think of the cloud as the end of capacity planning. Why do we need the cloud if capacity is practically infinite, provided that our applications are built correctly? As more users come in and/or more capacity is required, we can spin up more capacity -- both bandwidth and compute. We have the same attitude towards hybrid cloud environments. At peak times, we can spill into the cloud..."

                10 Security Reasons Why the Enterprise Still Fears the Cloud (Slideshow)
                eWeek, May 19th, 2016
                "Despite advantages in cost, scalability and flexibility, enterprise companies still are dubious about using cloud services. Here are 10 reasons why...

                Cloud applications and services today are integral parts of IT systems, as more enterprises accept them as a simply another part of their infrastructure. Whether it's a simple Salesforce usage model or a more complicated big data analytics deployment, the cloud has taught IT managers and administrators to trust it over the course of several years..."

                IT - CxO
                CIO's guide to marketing automation software
                CIO, May 19th, 2016
                "Digital marketing is a fast-moving target even for those marketing pros who have embraced it. This CIO Wrapsheet will help you choose the right tools for your business..."

                "We are moving more and more towards a place where one-to-one relationships are going to be more the norm, even at mass scale," said Andy Markowitz, general manager of GE's performance marketing lab during a panel discussion at CES 2016.

                Enterprises Stumble on Data Management
                Datamation, May 18th, 2016
                "When it comes to information governance, the good news is that most enterprise organizations can at least grasp its significance in running a tight (and profitable) ship, according to the latest research from Veritas. The bad news is that relatively few businesses have mastered the practice.

                Information governance essentially describes an end-to-end approach to managing, protecting and extracting the maximum value of enterprise data, typically stored as business records or documents. To accomplish this, CIOs, IT managers and business leaders use a wide range of technologies, management tools and policies to ensure that information is not only routed, stored and used appropriately, but that it doesn't wind up in the wrong hands causing regulatory compliance and privacy headaches..."

                Why CISO is the hardest tech role to fill
                CIO, May 20th, 2016
                "CISOs are hard to hire because there are far too few business executives with the right mix of business and technical chops. Also, companies aren't exactly sure how much they're willing to pay a CISO..."
                Customers' digital behavior drives CIOs to partner with CDOs, CMOs
                CIO, May 20th, 2016
                "CIOs from CVS Health and JetBlue insist it doesn't matter whether they work with CDOs, CMOs or other executives as long as their efforts meet customer demands...

                The emergence of the chief digital officer in some enterprises has revived theory that the CIO role is doomed. But CIOs say that partnerships with CDOs, CMOs and other senior executives who own different aspects of the business are essential to fostering healthy digital transformations..."

                South Florida Technology Alliance Presents: The Evolution And State Of Coding
                Thursday, May 26th, 2016: 5:30 pm - 9:00
                Axis Space Coworking, Las Olas - Ft. Lauderdale

                Join the SFTA and our distinguished panel of guests as we uncover the fascinating history of computer coding that brought us to where we are today.

                • Meet the panel opportunity
                • Gain valuable insights into the history of computer code
                • Take away first-hand wisdom and knowledge
                • Fantastic networking opportunities

                SFTA, John McLaughlin

                vBeers @ Miami - Concrete Beach
                Wednesday, May 25th: 6:00 PM to 9:00 PM
                Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida.

                Register today so you can be a part of this great monthly event! Feel free to invite all of your friends and co workers who work in the IT industry!

                Location: Concrete Beach

                RSVP at

                Sponsorships for the vBeers events are through the South Florida Technology Alliance (SFTA).

                John Mclaughlin, SFTA

                IT - PM
                6 tips to ensure you meet project deliverables dates
                CIO, May 18th, 2016
                "Whether you're talking about internal or external project management goals, successfully meeting client deliverables is a primary objective. Those deliverables may be different for each project depending on industry, nature of the project, project size, company strategy and a host of other variables. However, there are multiple shared factors that can compromise these deliverables and ultimately client satisfaction. Here are just a few..."
                IT - Networks
                Upgrading the Network In Healthcare: Two Approaches
                NetworkComputing, May 18th, 2016
                "A look at how two healthcare companies are tackling today's networking challenges.

                Like other enterprise networks, healthcare networks are under more pressures than ever. IP traffic is surging, users expect anywhere, anytime access from a variety of mobile devices, and the Internet of Things looms. In healthcare organizations, these pressures are compounded by strict data security requirements, legacy network equipment, and tight IT budgets..."

                GUI vs. CLI in Networking
                NetworkComputing, May 18th, 2016
                "Network devices should give engineers the ability to move beyond a graphical user interface to command line.

                The use of graphical user interfaces (or GUI) to configure network devices can divide the network engineering community. Network engineers can be either GUI lovers or haters. I'll confess right now that I'm a CLI fan and reluctant to use the GUI. As far as I am concerned, the GUI is a 'limited-view' of the network device, a necessary evil for first-time users...

                  Wave 2 Wi-Fi Delivers Dramatic Performance Boost for Home Networks
                  Network World, May 16th, 2016
                  "Mention 'home Wi-Fi router' and you'll probably think of a cheap device with cruddy performance. But dramatic changes are coming, with big boosts in bandwidth, thanks to two new Wi-Fi technologies.

                  Both beamforming and MU-MIMO (an acronym for the mouthful that is 'multi-user, multiple input, multiple output') are transformational technologies. We tested them in the new Linksys EA-7500, the company's first small office/home office router to support the so-called Wave 2 technologies..."

                  5 Secret Habits of Highly Successful Network Security Programs
                  Dark Reading, May 16th, 2016
                  "The key ingredients to network cybersecurity success and how they improve security results.

                  A new report out today shows that when IT organizations are segmented by security success factors, the top performers share a number of network security best practices. Conducted by ReRez Research and commissioned by Infoblox, the study highlighted in these findings took a close look at 200 large organizations to see how habits differed among top-tier organizations and everyone else..."

                  IT - IoT
                  IoT Growth Will Increase Risk of Distributed Denial-of-Service Attacks
                  v3 co uk, May 18th, 2016
                  "Recent attacks on companies through IoT devices proves risk is real, says F5 Networks CEO...

                  The rise of the Internet of Things (IoT) will lead to new forms of distributed denial-of-service (DDoS) attack, according to the CEO of security firm F5 Networks.

                  John McAdam told V3 at the F5 Agility 2016 event in Vienna that there will be about 37 billion endpoints making up the IoT by 2020, which will create a huge security surface that needs to be defended..."

                  IoT evolution begs for new thinking, new value systems
                  Search CIO, May 21st, 2016
                  "Who owns IoT data? The more pertinent question raised by the evolution of IoT is what does humanity look like in an IoT age, says Harvey Koeppel...

                  The problem with thinking about how we protect the data generated by the Internet of Things (IoT) and how we determine ownership of IoT data is that we are trying to apply the same old rules and methodologies to a completely different context for which the old rules and methodologies were never conceived or intended..."

                  Analyzing Data in the Internet of Things
                  O'Reilly, May 20th, 2016
                  A Collection of Talks from Strata + Hadoop World 2015 By Alice LaPlante

                  "The Internet of Things (IoT) is growing fast. According to the International Data Corporation (IDC), more than 28 billion things will be connected to the Internet by 2020 - from smartwatches and other wearables to smart cities, smart homes, and smart cars. This O'Reilly report dives into the IoT industry through a series of illuminating talks and case studies presented at 2015 Strata + Hadoop World Conferences in San Jose, New York, and Singapore..."

                  IoT Security In The Enterprise: 8 Steps
                  Network Computing, May 19th, 2016
                  "Follow these best practices to avoid security pitfalls with your Internet of Things deployment...

                  One of the top issues regarding the viability of the Internet of Things in the enterprise is how IoT data and devices will be secured. Indeed, IoT introduces several new architecture dynamics that traditional IT security administrators may not be accustomed to on such a large scale. And if security is not properly addressed in the early development stages of an IoT project, you run the risk of data loss and the possibility of introducing weak points on your network that can be used by hackers to infiltrate your entire infrastructure..."

                  Two key open source IoT frameworks get cozy
        , May 18th, 2016
                  "Two major open source IoT frameworks - the OCF's 'IoTivity' and the AllSeen Alliance's 'AllJoyn' - are moving toward interoperability, and possibly, a merger.

                  In his keynote address at the Embedded Linux Conference's OpenIoT Summit, Open Connectivity Foundation (OCF) Executive Director Mike Richmond discussed the potential for interoperability - and a possible merger - between the two major open source IoT frameworks: the OCF's IoTivity and the AllSeen Alliance's AllJoyn spec. 'We've committed to interoperability between the two,' said Richmond, who went on to explain how much the two Linux Foundation hosted specs had in common..."

                  New IoT security certification aims to make the world safer
                  CSO Online, May 20th, 2016
                  "Underwriters Laboratories new Cybersecurity Assurance Program (CAP) looks to certify Internet of Things products. Columnist Rob Enderle writes that these CAP certification will improve IoT security and help CIOs sleep better at night..."
                  No IoT without IPv6
                  Network World, May 18th, 2016
                  "Does your company foresee making big bucks from the Internet of Things? It won't be happening without widespread adoption of IPv6 first...

                  Do you think the Internet of Things (IoT) will be the Next Big Thing? It can't be. Not until we get past the real Next Big Thing: IPv6.

                  Without the extensive global adoption and successful deployment of IPv6 as the primary version of the Internet Protocol, the IoT won't be possible. In fact, the future of the Internet itself is at stake. Here are the five reasons why:..."

                  IT - Linux
                  Linux 4.6 is a major release: Here's what's new and improved
                  ZDNet, May 16th, 2016
                  "With better security, improved ARM support, and, oh yes, better gaming hardware support, Linux 4.6 is a major update...

                  You won't find the biggest news about the latest Linux kernel release, 4.6, in its release notes. There's been a major improvement in Linux's security..."

                  Linux V.s Unix Hot Patching - Have We Reached The Tipping Point?
                  Forrester, May 18th, 2016
                  "The Background - Linux as a Fast Follower and the Need for Hot Patching

                  No doubt about it, Linux has made impressive strides in the last 15 years, gaining many features previously associated with high-end proprietary Unix as it made the transition from small system plaything to core enterprise processing resource and the engine of the extended web as we know it. Along the way it gained reliable and highly scalable schedulers, a multiplicity of efficient and scalable file systems, advanced RAS features, its own embedded virtualization and efficient thread support..."

                  Choosing a Linux Desktop: 7 Tips
                  Datamation, May 20th, 2016
                  "Choose a Linux desktop should be about finding the Linux environment that works best for your individual workflow...

                  Newcomers to Linux desktop struggle with the concept of choosing a Linux desktop environment. Just the idea of having a choice is difficult if you are used to Windows or OS X, but how do you choose between a dozen major Linux desktop options, and several dozen minor ones?..."

                  How To Prepare Linux System For PCI DSS Compliance
                  LinuxPitStop, May 19th, 2016
                  "PCI DSS is the Payment Card Industry Data Security Standard, and this is a worldwide standard that was set up to help businesses process card payments securely and reduce card fraud. The way it does this is through tight controls surrounding the storage, transmission and processing of cardholder data that businesses handle. PCI DSS is intended to protect sensitive cardholder data. It is mandatory for all businesses who accept card payments to comply by getting a PCI certificate. This applies to all types of card payments through online, by mail, over the phone or using card machines..."
                  IT - Operations
                  What's Driving (and Inhibiting) DCIM Software Adoption?
                  Data Center Knowledge, May 20th, 2016
                  "Enterprises are building fewer and fewer data centers of their own, increasingly choosing to outsource operation of the infrastructure for their application workloads to cloud, colocation, and other types of service providers, who in turn are accelerating data center construction. More data center construction is taking place in edge markets, while corporate IT infrastructure is becoming increasingly distributed and orchestrated via software..."
                  IT - Security
                  Brute force attacks and how to defend against them
                  InfoWorld, May 19th, 2016
                  "Brute force attacks are one of the most common techniques used to gain access to a network. Essentially a game of trial and error, they try each possibility systematically in a predetermined sequence, such as alphanumerical, until an access route is found. They are brutal, forceful, and unstinting - so how can security teams stop attacks in their tracks and defend against them in the future?..."
                  Defend Yourself! Build a Cyber Security Database
                  InfoWorld, May 17th, 2016
                  "Attackers have all kinds of data about the threat landscape -- and about your organization, if it happens to be a target. Now's the time to arm yourself with data, too...

                  Data is king -- for attackers as well as defenders.

                  Malicious hackers have long collected and used data in a systematic manner. For example, they investigate all the public-facing servers of a particular target company, as well as document their IP addresses, services, software versions, and back-end relationships. They collect as much publicly accessible information as possible, including harvested credentials, then test potential weak spots..."

                    Justice official: Info sharing is the best revenge
                    FCW, May 18th, 2016
                    "Cybersecurity officials from the departments of Homeland Security and Justice are stressing the importance of continued collaboration to keep cyberattacks at bay.

                    'If you get hit, call somebody and start talking' to commercial or federal cybersecurity experts, said Brian Varine, chief of the Justice Security Operations Center. 'Sharing information drives up the costs for attackers.' He made the remarks at an ISMG Fraud and Breach Prevention Summit on May 18..."

                    Top 10 ways to retain IT security talent
                    CSO Online, May 19th, 2016
                    "With the pressure that a data breach can place on a company, the IT pro often doesn't stick around long...

                    With the growing number of threats, it's vital for companies to hire - and retain - the best and brightest IT security employees. But, with IT hiring above the national average of 44 percent and the average employee tenure in the IT industry only being three years, employers need to explore new ways to not only attract talent, but avoid burnout and keep that coveted talent around..."

                    Detecting low and slow insider threats
                    CSO Online, May 19th, 2016
                    "In my last post I discussed how machine learning could be used to detect phishing-based account compromise attacks using a real-world use case from the recent Verizon Data Breach Digest. This time I'll examine how to detect insider threats using similar techniques.

                    The example I've chosen involves an organization in the middle of a buyout that was using retention contracts to prevent employee attrition. To find out what other employees were being offered, a middle manager acquired IT administrator credentials from a colleague and friend. He used these credentials to access the company's onsite spam filter and spy on the CEO's incoming email. The abuse didn't stop there. The same credentials were also used to browse sensitive file shares and conduct other unauthorized actions..."

                    As the Phish, We All Need to Recognize the Baited Hook
                    ComputerWorld, May 18th, 2016
                    "Phishing scams aren't going away, and the scammers are in fact getting more sophisticated. That means users have to be more cautious than ever...

                    For the first time in a long time - in fact, for the first time ever, as far as I know - my company has gone a full three months without one of our employees falling for a phishing scam. I hope I don't jinx this winning streak by telling you about it..."

                      4 Huge Misconceptions About Business IT Security
                      Business 2 Community, May 20th, 2016
                      "When it comes to IT security, many business owners think that hackers are only targeting large businesses. We see things like the Target and Home Depot breach in the media and we think they're the only ones having trouble with hackers. But the fact of the matter is that more and more, hackers are turning to small businesses to try to cash in. From ransomware and phishing for your credentials, the risk is real for business owners that are trying to protect their data. Rather than making assumptions and using old knowledge to guide your IT security strategy, it's time to challenge what you thought you knew. Here are a few huge misconceptions about business IT security:..."
                      IT Pros Rely on These 5 Data Protection and Privacy Tools (and so should you)
                      CIO, May 17th, 2016
                      "Most people understand the importance of securing their devices and data. But experienced computer and networking professionals - like those who work in IT - must understand both the value of data to their company and the multiple dangers that can result from data loss and privacy breaches...

                      Below are five top tools recommended by Acronis True Image customers who have vast experience in IT, with a few quotes in their own words. We were very pleased to hear Acronis True Image named as the highest priority tool..."

                        IT - Careers
                        It's Unfair to NOT Fire People
                        TLNT, May 16th, 2016
                        "Firing people has a bad rap in business. But sometimes, firing someone is the greatest gift you could give the individual impacted, as well as the remaining team members and yourself.

                        Leading well requires having the right people in the right roles at the right times, which means not just hiring smart, but firing smart as well.

                        So how do you fire smart when most decent leaders dread this essential task?..."

                          7 Deadly Career Mistakes Developers make
                          InfoWorld, May 16th, 2016
                          "Failure may lead to success, but unthinking complacency is a certain dev career killer...

                          You'll find no shortage of career motivational phrases surrounding failure: Fail fast, failure builds character, the key to success is failure, mistakes make you grow, never be afraid to fail. But the idea of mistaking your way to the top of the software industry is probably unsound. Every developer will have their share of missteps in a career but why not learn from others' experience -- and avoid the costliest errors?..."

                            Here's How to Trick Your Brain into Making Smarter Mistakes
                            Fast Company, May 18th, 2016
                            "Let's play a game. It's called 'Who's Your Ancestor?'

                            Imagine it's about 200,000 years ago: Two people are sitting around a watering hole, both freshly branched onto the new evolutionary path of modern humans. Suddenly, they hear a twig snap behind them. One of them jumps up, eyes wide, ears tuned, muscles tensed. The other one stretches their legs and says, 'It's probably nothing.'

                            So, who's your ancestor?..."

                              10 fastest-growing tech skills (Slideshow)
                              ComputerWorld, May 21st, 2016
                              "Technology is constantly evolving, and IT pros need to keep up with changing skills demands to remain relevant. A recent report from tracked a year's worth of job postings on the site, from April 1, 2015 to April 1, 2016, to determine growth in demand for certain skills year-over-year. Skills must appear in at least 1,000 job postings in order to be considered statistically relevant.

                              Based on that data, here are the top 10 fastest-growing technology skills IT pros should consider adding to their repetoire, and examples of the types of roles available for professionals with those skills..."

                                5 Things on You Should NEVER Say or Do on a Resume
                                Business 2 Community, May 19th, 2016
                                "Sometimes when I am reading resumes I feel like I should be a third grade English teacher rather than a recruiter. Why do I say this? I am simply amazed by the mistakes made on resumes. The misspellings, the run on sentences, the formatting, and the blatant lack of attention to detail are simply astounding. I need a red pen to mark up the resume. As I have said more than once, even in the age of social media and LinkedIn, resumes are essential in your job search..."
                                  IT - Virtualization
                                  Ensure virtualization containers' security in an app world
                                  Search ITOperations, May 20th, 2016
                                  "Both containers and VMs offer different ways of meeting an organization's application deployment requirements. And virtualization containers present different security challenges than VMs...

                                  The rapid rise of virtualization containers in the application world cements their growing relevance to production IT managers. Although similar in approach to virtual machines, containers have a few core differences that prompt IT departments to review their security approaches..."

                                  The 'New' IT Landscape: The rise of virtualisation
                                  ITProPortal, May 19th, 2016
                                  "The IT landscape is dramatically and rapidly changing. Business needs are driving and shaping it, while IT is navigating the trade-offs between Performance, Agility, and Cost.

                                  Application design, development, and deployment have evolved, but IT is struggling to keep up. The building blocks of the software-defined data centre (SDDC) are there, but Operations teams are constrained by brittle management tools..."

                                  Worldwide Server Virtualization Market Reaches Its Peak, Gartner Says
                                  Information Management, May 17th, 2016
                                  "The worldwide server virtualization market is reaching its peak, according to a new report from Gartner Inc.

                                  The global x86 server virtualization market is expected to reach $5.6 billion in 2016, an increase of 6% from 2015, the firm says. Despite the overall market increase, new software licenses have declined for the first time since the market became mainstream more than a decade ago.

                                  Growth in the market is now being driven by maintenance revenue, which indicates a rapidly maturing software market segment, the report says..."

                                  IT - Email
                                  How Missing Emails Can Cost Companies Millions (Slideshow)
                                  CIO Insight, May 21st, 2016
                                  "Enterprises that fail to properly manage email for information governance purposes can face catastrophic consequences, according to a new survey. Two recent examples: Scottrade was fined $2.6 million in 2015 because it could not produce important emails for an audit. Barclays faced a $3.75 million lawsuit in 2013 over its alleged decade-long failure to properly keep electronic records, emails and instant messages..."
                                  IT - Big Data
                                  5 Things You Need to Know About Data Exhaust
                                  PC World, May 16th, 2016
                                  "Pay close attention or your data lake may turn into a data swamp...

                                  Big data is now a familiar term in most of the business world, and companies large and small are scrambling to take advantage of it. Data exhaust, on the other hand, is less widely known, and in some ways it's an evil twin brother. Here are five things you should understand about data exhaust's pros and cons..."

                                  How to Turn Big Data into Valuable Business Outcomes
                                  insideBIGDATA, May 20th, 2016
                                  "In this special guest feature, Terry Kline, CIO of International Truck, Navistar's commercial truck brand, discusses the overarching best practices that have enabled his company to drive strong business value from data and analytics. Terry Kline, International Truck's CIO, is a 30-year veteran of the automotive and transportation industry, and has held a wide range of IT roles. Before assuming his current position, he was the Global Chief Information Officer for General Motors. Prior to his 12 years at GM, he spent 11 years with International Truck in multiple roles, including serving as director, Information Systems for Truck Engineering and Manufacturing at the company's truck assembly plant in Springfield, Ohio..."
                                  The Difference between Data, Analytics, and Insights
                                  Business 2 Community, May 17th, 2016
                                  "Data, analytics, and insights. Those words are thrown around a lot, but what do they really mean, and how do they relate to one another?

                                  We're sharing some insights of our own to show you exactly how this triad works..."

                                  IT - BYOD
                                  Chromebooks surge past Macs in the U.S. for the first time
                                  PCWorld, May 19th, 2016
                                  "It may have taken nearly five years, but it's finally official: Chromebooks are no joke.

                                  More Google-powered laptops shipped than Macs in the U.S. during the first three months of 2016, IDC market analyst Linn Huang recently told The Verge. (Disclosure: IDC and PCWorld are both owned by International Data Group, but have no editorial ties.) This is the first time Chromebooks have out-shipped a competing PC platform.

                                  Chromebooks beating Macs may be a surprising statistic, but in reality, it's just that - a statistic. It's unlikely that Chromebooks are about to become the second most important PC platform in the United States, because this first Chromebook victory comes with two big caveats..."

                                  The uncertain future of the tablet: a dying breed of device?
                                  Information Age, May 20th, 2016
                                  "Six years after the release of the iPad, a once booming market is on the verge of a massive shift, one that not many predicted. For those who visited Mobile World Congress, the world's largest mobile conference earlier this year, you had a better chance of spotting the odd person wearing Google Glasses than any new tablet devices.

                                  According to the recent industry analysis conducted by IDC, the tablet market was down by as much as 10.1%, last year, with an estimated 206.8 million tablets shipped..."

                                  Top Ten Articles for last few Issues
                                  Vol 219 Issues 1 and 2 ; Vol 218 Issues 1, 2 and 3; Vol 217 Issues 3, 4 and 5
                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                  • Announcing Oracle OpenStack for Oracle Linux 2.1
                                  • The #1 Database is About to Get Even Better
                                  • Oracle VM 3.4 Solutions with Command Line Interface
                                  • Larry Ellison's Marching Orders For Oracle Cloud: Make It Fast And Simple To Buy
                                  • Oracle OpenWorld & JavaOne: Take Advantage of Early Bird Rates
                                  • Using the YoOracleJET NetBeans Plugin for iOS
                                  • Larry Ellison Gives $200 Million to 'Next-Level' USC Cancer Center
                                  • How Big Data Is Revolutionizing Marketing And Sales
                                  • MySQL Connector/J 5.1.39 has been released
                                  • Powering the Next Generation of Connected Cars

                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                    IT - Encryption
                                    Let's Encrypt: The Good and the Bad
                                    Datamation, May 16th, 2016
                                    "By now, most of you have heard about the 'Let's Encrypt' initiative. The idea being that it's high time more websites had a simple, easy to manage method to offer https encryption. As luck would have it, the initiative is just out of its beta phase and has been adding sponsors like Facebook, Cisco, and Mozilla to their list of organizations that view this initiative as important.

                                    In this article, I want to examine this initiative carefully, taking a look at the good and the bad of Let's Encrypt..."

                                    Getting Started with Java Jigsaw Services in NetBeans IDE
                                    By Geerjtan
                                    Geertjan bligs, "In the Project Jigsaw: Module System Quick-Start Guide, a section is included on Services. Idioms such as 'service consumer' and 'service provider' are part of the set of solutions provided by Project Jigsaw.

                                    A full code sample is discussed in the section above, which I have successfully implemented in NetBeans IDE. Three Jigsaw modules make up the scenario - a service defined in 'com.socket', a service provider defined in 'org.fastsocket', and a service consumer defined in 'com.greetings'..."

                                    Nexenta News
                                    Nexenta and Intel to Host Webinar Discussing Open Software-Defined Storage on Intel-based Hardware
                                    Thursday, May 26 at 9am PT.
                                    Nexenta and Intel will be hosting a complimentary webinar, 'Storage on Your Terms: Nexenta Software-Defined Storage with Intel (link is external).' Join Michael Letschin, Field CTO at Nexenta and Shawna Meyer-Ravelli, Product Marketing Engineer at Intel, as they discuss the storage characteristics needed to meet the workload demands of enterprises, data centers and cloud environments. They will share insights on how to deliver software-defined infrastructure for legacy and next-generation enterprise applications, virtual workloads, file service applications, and more - all while maintaining the freedom to choose which platform to run on.

                                    The webinar will be on Thursday, May 26 at 9am PT.

                                    Today's technology leaders need to tackle the big trends - cloud, big data, the Internet of Things, mobility, social media - while lowering IT spend year over year. That's a tall order. Storage cost projections are becoming unsustainable, and organizations need new, more cost-effective ways of delivering storage. Nexenta provides a software-only storage solution that includes a rich feature set across all block, file, and object storage needs.

                                    In this session you will learn more about the main kinds of software-defined storage technology landscape organizations will likely deploy including, scale-up, scale-out, containerized, file, block and object storage platforms. Each solution is easy to support with Nexenta software and commercial off-the-shelf Intel-based hardware.


                                    Veritas News
                                    New Veritas Research Finds Only 40% of Organizations Are High Performers When It Comes to Successful Information Governance
                                    High Performers Continuously Evaluate the Worth and Risk of Their Information, Automate and Integrate Workflows to Manage Data End-to-End, and Monitor Their Data to Spot Outlier Activity
                                    Veritas Technologies, the leader in information management, released new research findings that illuminate the most effective information governance practices that empower organizations to extract as much value as possible out of their information while reducing related risks and costs. The study found that 94% of organizations have a formal information governance program currently in place or are in the planning stages. However, only 40% of organizations are high performers when it comes to information governance.
                                    Cisco News
                                    Cisco Reports Third Quarter Earnings
                                    Cisco, May 16th, 2016
                                    Cisco cBR-8 Converged Broadband Access Platform Passes One Year and 32 Countries

                                    As the Internet & Television Expo kicks off today, cable and Internet leaders are gathering to discuss topics on the future of cable and broadband services, how to succeed with OTT, the evolution of bundling and more.

                                    Improving the user experience is atop every service provider's list. Most are looking at how to build Gigabit networks to support exploding growth in online and mobile video, 4G connected smart devices, and IoT advancements.

                                    Cisco and Roku Collaborate to Expand Streaming Video Security
                                    Cisco, May 16th, 2016
                                    Cisco and Roku Inc. announced a collaboration to enable the Cisco VideoGuard Everywhere video service protection solution on Roku streaming players and Roku TVs.

                                    Cisco VideoGuard Everywhere enables pay-TV operators to secure their content distribution to a wide variety of devices, which now includes Roku streaming players and Roku TVs. This collaboration will enable VideoGuard Everywhere to support the Charter Spectrum TV app available on Roku devices.

                                    VideoGuard Everywhere is a software-based video service protection solution encompassing Conditional Access (CA) and Digital Rights Management (DRM)...

                                    Cisco Reports Third Quarter Earnings
                                    Cisco, May 18th, 2016
                                    Cisco reported third quarter results for the period ended April 30, 2016. Cisco reported third quarter revenue of $12.0 billion, net income on a generally accepted accounting principles (GAAP) basis of $2.3 billion or $0.46 per share, and non-GAAP net income of $2.9 billion or $0.57 per share.

                                    "We delivered a strong Q3, executing well despite the challenging environment," said Chuck Robbins, Cisco chief executive officer. "I'm pleased with our performance today as well as the progress we're making in transitioning our business to a more software and subscription focus, which we'll continue to apply across our entire portfolio."

                                    Dell News
                                    Dell Delivers New Solutions in Collaboration with SAP to Offer Improved Agility, Scale and Speed of Gaining Data Insights
                                    Expands portfolio with cost-effective, purpose-built solutions, innovations and services
                                    Today at SAPPHIRE NOW, Dell announced new solutions, innovations and services developed in collaboration with SAP that deliver greater performance, insight and agility for organizations processing large volumes of data. This new set of offerings can help customers optimize SAP solution environments running on clouds; deploy IoT enabled solutions; build on specialized healthcare applications; and streamline data migration and analytics with Dell's world-class services...
                                    Dell Makes Ground-Breaking Leap Forward with Uniquely Adaptable, Future-Ready Storage Solutions
                                    Dell Storage Center Operating System 7 offers a revolutionary approach and economics for all-flash and hybrid flash arrays with deeper intelligence and industry-leading data efficiency
                                    Dell announced Storage Center Operating System 7, the culmination of a three-year effort to redefine the economics of enterprise storage with an innovative platform which embraces and helps accelerate the industry shift to modern, flash-based architectures.

                                    Dell Storage Center Operating System 7 (SCOS 7) aggressively promotes the adoption of flash, elevates and abstracts data control through increased virtualization, and unifies Dell's storage ecosystem across multiple portfolios. The release provides new intelligence and flexibility to help businesses 'flash-forward,' advancing their infrastructures to meet today's needs and prepare for future challenges. SCOS 7 delivers industry-leading capabilities resulting in significant business benefits for customers including:...

                                    Dell Provides Industry-First Zero-day Malware Prevention for Thin Clients and Virtual Desktops to Provide Businesses with the Most Secure VDI Solutions from the Data Center to the Edge
                                    Threat Defense provides advanced threat protection for Windows-based thin clients
                                    Dell Cloud Client-Computing, the No. 1 provider of secure thin-client solutions and the expert in VDI, today announced the addition of two new security solutions to provide organizations with advanced threat prevention that spans from the endpoints to the data center for Windows-based thin clients and virtual desktops. Leveraging IP from its award-winning Dell Data Protection portfolio of security solutions, Dell is applying its endpoint security expertise beyond the PC to the thin client and virtual machines, to give customers an industry-leading approach to comprehensively securing their data.
                                    Dell Announces Its First Multi-Client Monitor, Designed for Financial Traders and Software Developers
                                    Four independent clients in a single screen without bezels hindering view
                                    Dell announced the release of its Dell 43 Multi-Client Monitor (P4317Q), the company's first multi-client display designed specifically for financial institutions, trading floors and software developers. The Multi-Client Monitor is the latest example of Dell's commitment to innovation, intentional design and meeting the needs of customers by offering users the opportunity to view up to four independent clients in a single view or easily switch between four independent systems in full-screen view.
                                    Microsoft News
                                    Microsoft selling feature phone business to FIH Mobile Ltd. and HMD Global, Oy
                                    Microsoft will continue to develop Windows 10 Mobile and support Lumia phones
                                    Microsoft Corp. on Wednesday announced it reached an agreement to sell the company's entry-level feature phone assets to FIH Mobile Ltd., a subsidiary of Hon Hai/Foxconn Technology Group, and HMD Global, Oy for $350 million. As part of the deal, FIH Mobile Ltd. will also acquire Microsoft Mobile Vietnam - the company's Hanoi, Vietnam, manufacturing facility. Upon close of this deal, approximately 4,500 employees will transfer to, or have the opportunity to join, FIH Mobile Ltd. or HMD Global, Oy, subject to compliance with local law.
                                    SAP and Microsoft usher in new era of partnership to accelerate digital transformation in the cloud
                                    Focused on empowering organizations to advance their digital transformations
                                    SAP SE and Microsoft Corp. announced joint plans to deliver broad support for the SAP HANA platform deployed on Microsoft Azure, simplify work through new integrations between Microsoft Office 365 and cloud solutions from SAP, and provide enhanced management and security for custom SAP Fiori apps. This announcement was made at the 28th annual SAPPHIRE NOW conference.

                                    Microsoft CEO Satya Nadella and SAP CEO Bill McDermott will take the stage together at SAPPHIRE NOW today to discuss the expanded partnership that will help organizations use the cloud to drive innovation, agility and enable new ways to work.

                                    IBM News
                                    IBM Cloud First to Offer Latest NVIDIA GRID with Tesla M60 GPU, Speeding Up Virtual Desktop Applications
                                    NVIDIA GPU accelerators on IBM Cloud deliver breakthrough performance for graphics-accelerated applications, big data analytics, HPC, AI and cognitive workloads.
                                    IBM has become the first company to offer the NVIDIA Tesla M60 GPU accelerator in the cloud, giving companies of all sizes easier and more affordable access to the latest virtual desktop applications with no compromise to performance.

                                    IBM continues to be in lock step with NVIDIA in bringing its latest GPU technology to the cloud. The Tesla M60 joins other NVIDIA GPU offerings on IBM Cloud, including the Tesla K80 and Tesla K10 GPUs, which accelerate deep learning, data analytics and high performance computing (HPC) workloads...

                                    Zika Treatment Search Launched, Fueled By IBM's World Community Grid
                                    Crowdsourced research project aimed at helping scientists cure debilitating disease
                                    IBM's World Community Grid and scientists are launching an international study to identify drug candidates to cure Zika, a fast spreading virus that the World Health Organization has declared a global public health emergency.

                                    IBM and a global team of scientists are inviting anyone with a computer or Android device to join the #OpenZika project. Volunteers don't need to provide time, expertise or money to help; they simply run an app on their Windows, Mac, Linux or Android devices that automatically performs virtual experiments for scientists whenever the machines are otherwise idle.

                                    Jabil Speeds Global Collaboration with IBM Cloud
                                    Leading Supply Chain and Manufacturing Company Deploys Aspera High-speed Transfer on the IBM Cloud to Streamline Collaboration Between Geographically Dispersed Teams and Partners
                                    IBM announced that Jabil Circuit, a leading supply chain management and electronics manufacturing company, has deployed high-speed file transfer solutions from Aspera, an IBM company, running on the IBM Cloud to enable global users to send and exchange high-value design and engineering files quickly and reliably.

                                    Jabil manages customers' supply chains from product development through design engineering to final manufacturing. As Jabil's business has grown, so too has its need for faster exchanges of increasingly larger design files - such as CAD models and circuit diagrams - with global customers, peers and partners in order to bring innovative products to market quickly, reliably and securely.

                                    ING Direct Australia Turns to IBM to Engage Younger Online and Mobile Banking Consumers
                                    ING Attracts New Customers by Managing Their Daily Expenses and Helping Plan Their Financial Future While on the Go
                                    IBM announced its collaboration with ING Direct Australia to attract, engage and build brand loyalty with today's younger digital savvy consumers.

                                    ING Direct is now accelerating growth by delivering personalized banking services to online and mobile customers precisely when they need them most using IBM.

                                    Australian consumers are leading the world in their use of mobile banking, which has created greater needs for businesses to deliver a feature rich and personalized set of services and campaigns that can meet their needs. ING DIRECT looked to IBM to better engage with these digital savvy consumers, including millennials who have shifted away from brick and mortar branches to both online and on their mobile devices.

                                    Standard Life Delivers Financial Services Catered to the Unique Needs of 3.8 million UK Customers with IBM
                                    IBM, May 18th, 2016
                                    IBM announced that Standard Life, an investment company with over 190 years' experience, is personalizing financial services capabilities to each of its 3.8 million UK customers. Working with IBM, Standard Life is addressing the real-time financial needs of its diverse customer base as they plan and invest in their future...
                                    IBM Enables Brands to Deliver the Next Wave of Consumer Experiences
                                    Continued Portfolio Expansion Features New Cloud and Cognitive Technologies that Personalize Customer Interactions
                                    IBM announced an expanded set of solutions and features including cognitive technologies that allow brands to help deliver relevant customer experiences. With these offerings marketers, merchandisers and e-commerce professionals can learn, predict and guide customer engagement at each step in their brand journey.

                                    According to a new report from Nucleus Research, IBM delivers $15.82 return on investment (ROI) for every dollar spent on its marketing, sales, merchandising and analytics offerings which today are being used by leading brands such as ING Direct, The Home Shopping Network (HSN) and Standard Life to meet the personalized, real-time needs of their customers.

                                    Security First Insurance Boosts Mobile Customers - and Transforms Customer Experience - with IBM MobileFirst
                                    Streamlined mobile app generates 195 percent growth in new users due to ease-of-use, greater functionality and weather and location-based insights
                                    IBM announced that Security First Insurance, a leading Florida-based homeowners insurance company, has deployed the IBM MobileFirst platform to enhance their mobile experience. Since deploying the app, Security First Insurance has seen a 195 percent increase in average monthly new users and a 140 percent increase in online payments.
                                    IBM Scientists Achieve Storage Memory Breakthrough
                                    Technology can speed up machine learning and access to the Internet of Things, mobile phone apps and cloud storage
                                    For the first time, scientists at IBM Research have demonstrated reliably storing 3 bits of data per cell using a relatively new memory technology known as phase-change memory (PCM).

                                    The current memory landscape spans from venerable DRAM to hard disk drives to ubiquitous flash. But in the last several years PCM has attracted the industry's attention as a potential universal memory technology based on its combination of read/write speed, endurance, non-volatility and density. For example, PCM doesn't lose data when powered off, unlike DRAM, and the technology can endure at least 10 million write cycles, compared to an average flash USB stick, which tops out at 3,000 write cycles.

                                    IBM Enables to Bring Personalized Experiences to Millennial Shoppers
                                    Continued Portfolio Expansion Features New Cloud and Cognitive Technologies that Personalize Customer Interactions
                                    IBM announced an expanded set of solutions and features including cognitive technologies that allow brands to help deliver relevant customer experiences. With these offerings marketers, merchandisers and e-commerce professionals can learn, predict and guide customer engagement at each step in their brand journey.

                                    According to a new report from Nucleus Research, IBM delivers $15.82 return on investment (ROI) for every dollar spent on its marketing, sales, merchandising and analytics offerings which today are being used by leading brands such as ING Direct, The Home Shopping Network (HSN) and Standard Life to meet the personalized, real-time needs of their customers...

                                    VMware News
                                    AppConfig Community Announces Android Best Practices
                                    Standard Android for Work Configurations Based on AppConfig Community Best Practices Are Available Today for Developers
                                    The AppConfig Community announced standard configurations for developing enterprise-ready Android applications. The AppConfig Community's mission is to establish a common approach for enterprise app configuration and security based on OS native standards. Working with Google, the AppConfig Community provides developers with a common standard for Android apps, simplifying enterprise app development and configuration for any enterprise mobility management (EMM) provider. The Android AppConfig Community best practices are available to all developers at no cost.
                                    Red Hat News
                                    Friday Five - May 20, 2016
                                    Red Hat, May 20th, 2016
                                    The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.

                                    • Seeking Alpha - Red Hat - Finally Building A Multi-Legged Stool Beyond Linux To Enhance Growth
                                    • InfoWorld - Fedora 24 beta focuses on containers and the cloud
                                    • The New York Times - In a Crisis, Be Open and Honest
                                    • Caixa Seguradora gains agile, scalable virtualization platform
                                    • Red Hat's OpenShift Commons Crosses 200 Members in More Than 40 Countries

                                    Read on for details.

                                    Friday Five - May 27, 2016
                                    Red Hat, May 27th, 2016
                                    The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.

                                    • BBVA signs strategic collaboration with Red Hat to accelerate the Group's global transformation
                                    • eWeek - Red Hat Expands Ansible With Broader Container, Microsoft Support
                                    • IDG Connect - The difference between "open" and "open source"
                                    • NetworkWorld - The shift in open source: A new kind of platform war
                                    • Huffington Post - An Entrepreneurial Read: The Open Organization

                                    Read on for details.

                                    EMC News
                                    EMC Declares Quarterly Cash Dividend
                                    EMC, May 16th, 2016
                                    EMC Corporation (NYSE:EMC) announced that the Company's Board of Directors has declared a quarterly cash dividend of $0.115 per common share. The dividend will be payable on July 22, 2016 to shareholders of record as of July 1, 2016.

                                    EMC Corporation is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyze their most valuable asset - information - in a more agile, trusted and cost-efficient way.

                                    Brocade News
                                    Brocade Reports Fiscal Q2 2016 Results
                                    Brocade, May 19th, 2016
                                    Brocade reported financial results for its second fiscal quarter ended April 30, 2016. Brocade reported second quarter revenue of $523 million, down 4% year-over-year and down 9% quarter-over-quarter. The Company reported GAAP diluted earnings per share (EPS) of $0.11, down from $0.18 in Q2 2015 and down from $0.23 in Q1 2016. Non-GAAP diluted EPS was $0.22 for Q2 2016, flat year-over-year and down from $0.29 in Q1 2016.
                                    Telefonica And Brocade Establish vEPC Performance Benchmarks In Joint Nfv Reference Lab Tests
                                    Brocade, May 17th, 2016
                                    Brocade Virtual Core for Mobile Solution Provide Agile Network Deployment Options With Independently Scalable Control and User Planes

                                    Telefonica and Brocade have completed performance benchmark testing for a virtual EPC (vEPC) implementation within the Telefonica NFV Reference Lab framework. The test results demonstrate that Brocade vEPC built on top of its innovative Virtual Core for Mobile (VCM) solution platform enables service providers to build agile networks that quickly scale to match the performance demands of new services. The VCM software architecture is purpose-built to reduce production costs, support faster service rollout, and dynamically allocate virtual resources. As a result, it allows service providers to serve diverse use cases that include traditional customer-centric services, IoT/M2M, MVNO, private LTE, and mobile edge computing...

                                    Unlocking The Power Of Digital Transformation: Freeing IT From Legacy Constraints
                                    Brocade, May 16th, 2016
                                    Study Shows Legacy Decisions, Technology and Perceptions Are Impacting Innovation and Business Performance

                                    Brocade launched the results of its latest global study, "UNLOCKING THE POWER OF DIGITAL TRANSFORMATION: FREEING IT FROM LEGACY CONSTRAINTS," which identifies that businesses are missing opportunities to unlock innovation more quickly and more effectively due to legacy technology and historical misperceptions about the role of IT departments. According to the report, more than 70% of IT teams felt that if they had more opportunities to be flexible in their approach to technology, benefits would include increased competitiveness (36%), more time to focus on innovation (31%), the elimination of shadow IT (30%), a 12% increase in revenue and 10% decrease in costs over the next 12 months...

                                    Windstream News
                                    Windstream names Beth A. Lackey as senior vice president of carrier operations
                                    Will oversee service delivery, service assurance, and the customer experience team for the carrier business unit
                                    Windstream, a leading provider of advanced network communications, announced that Beth A. Lackey has been appointed senior vice president of carrier operations. In this new role - specifically created to support the company's ongoing commitment to providing an exceptional experience for its carrier and wholesale customers - Lackey will oversee service delivery, service assurance, and the customer experience team for the carrier business unit. As Windstream continues expanding and enhancing its network, Lackey will lead and guide initiatives to assess current internal business processes, analyzing the results in order to build and implement efficiencies that enhance the overall carrier customer experience - from order entry to the ongoing service of customers.
                                      F5 News
                                      F5 Unveils New Capabilities to Address Enterprise Security Needs in an App-Driven World
                                      New software offers strong policy based security as applications, and access to applications, become the new security perimeter
                                      F5 Networks announced at F5 Networks's ASEAN Anticipate 2016 new enhancements to F5's security capabilities that will give customers industry-leading features that support traditional data center, cloud and hybrid architectures. The enhancements will enable customers in Asia Pacific to more effectively ensure application security, resolve critical app protection gaps and strengthen anti-fraud defenses.

                                      The proliferation of Internet-facing applications has led to pervasive threats on business-critical web services, along with an increase in the sophistication of attacks. Today's announcement reflects a number of new security capabilities, with highlights including:...

                                      European and Middle Eastern consumers deeply conflicted over privacy and security priorities
                                      Study reveals differing attitudes across EMEA towards personal data use and protection from cyber terrorism
                                      An EMEA-wide study commissioned by F5 Networks has revealed that whilst European and Middle Eastern consumers have confidence in some organisations to keep their data safe, many are willing to share their personal information in return for using a service for free. The study, conducted by Opinium Research, surveyed over 7,000 consumers across the UK, Germany, France, Bene, United Arab Emirates, Saudi Arabia and Poland, exploring their attitudes towards data security and handling.
                                      New F5 Software Advances Application Security, Management, and Orchestration
                                      Industry-leading service programmability promotes flexible deployment capabilities, policy-based controls, and hybrid cloud support
                                      F5 Networks introduced software-based solutions that enable customers to seamlessly integrate availability and security services, simplify device management, and better orchestrate IT infrastructure. To lower costs and boost efficiency, organizations are evolving toward more dynamic infrastructure models that combine physical, virtual, and cloud components. Supporting this transition, F5's innovative, versatile solutions give customers the ability to take advantage of the benefits provided by traditional data center, cloud, and hybrid architectures.
                                      Trending in
                                      Vol 235, Issue 2
                                      Trending IT Articles