News about Oracle's Solaris and Sun Hardware
System News
Jun 6th, 2016 — Jun 12th, 2016 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 220, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Features
x
Migrating from Desktop to Cloud-Native Web Applications
By Yolande Poirier
Yolande blogs, "How can you provide a smooth migration path from a desktop application to a web application that has a similar user experience as the desktop application? In his new article 'Migrating from Desktop to Cloud-Native Web Applications', Thomas Kruse discusses how to use JavaFX as the foundation for hybrid desktop applications that are built by uniting the latest web and desktop frameworks..."
AI Is The Wave, And CIOs Must Learn To Surf
By John Soat
John blogs, "CIOs take note: When even the White House wants to take a serious look at the potential repercussions of artificial intelligence, you should, too.

After years percolating in the backwaters of IT, AI is catching a dynamic wave of interest and investment. Self-driving cars and Go-playing computers have grabbed the public's attention. But AI's potential to dramatically improve cost/benefit equations is why 'CIOs should start looking at how this is going to change the business they're in and potentially disrupt the types of applications they're using,' says IDC Research Director David Schubmehl..."

IT - AI
x
Synechron Survey: Blockchain and AI Will Have Huge Impact on Financial Services Over Next 10 Years
Bitcoin Magazine, June 10th, 2016
"Synechron, a global consulting and technology innovator in the financial services industry, has released the results of a survey conducted by the TABB Group for Synechron on the potential of blockchain and artificial intelligence (AI) in financial services, with respondents believing that they will have a major impact over the next 10 years.

After conducting the survey with 92 banking and capital markets institutions, the findings found that there is still a perception among decision-makers that working with blockchain and artificial intelligence is in some way circumventing or changing key regulatory requirements..."

    Google Alphabet's Schmidt: Ignore Elon Musk's AI Fears - He's No Computer Scientist
    ZDNet, June 9th, 2016
    "Our artificial intelligence won't kill you. We just want everyone to have their own personal assistant, says Alphabet chairman Eric Schmidt...

    Alphabet chairman Eric Schmidt has hit back at suggestions by Tesla boss Elon Musk that Google's artificial intelligence initiatives should be feared.

    If you're terrified by artificial intelligence outsmarting and then wiping out humanity, you've watched too many movies, Schmidt told a panel at Symposium Stockholm..."

    Google, Oxford Researchers Study Way To Stop Ai Systems From Misbehaving
    eWeek, June 8th, 2016
    "Intelligent systems of the future may not always behave optimally, so a way to safely interrupt them is needed, the Google and Oxford University researchers say.

    Researchers from Google's DeepMind group and at the University of Oxford are collaborating on a project to develop what amounts to a kill switch for preventing artificial intelligence systems from going rogue, like the iconic HAL 9000 system in "2001: A Space Odyssey."

    A paper, titled "Safely Interruptible Agents," describing the effort will be presented at the upcoming Conference on Uncertainty in Artificial Intelligence in New York later this month.

    Leveraging The Power Of Scalable Machine Learning
    CIO, June 9th, 2016
    "Automated analysis of EHR data in hospitals helps verify diagnoses and schedule follow-up care in an effort to improve patient outcomes...

    In today's digitally driven world, enterprises need to find ways to extract valuable insights from huge amounts of data. That data is both generated within the organization and captured from external sources, from every application and social media to the networks of sensors that constitute the Internet of Things (IoT)..."

    Alec Ross On How Cognitive Robots Will Change The World
    Search CIO, June 9th, 2016
    "Technology policy expert Alec Ross describes how cognitive robotics will impact the labor market and discusses why the U.S. is in the best position to capture tomorrow's industries.

    In 10 years, we'll see big changes in how people live their lives and how companies operate, thanks to the innovation that's now being kindled around the world. So says Alec Ross, former innovation adviser to Hillary Clinton during her term as U.S. Secretary of State, who lays out the thesis in his new book, The Industries of the Future. In Part 1 of our interview..."

      Virtualization
      x
      Oracle Virtualization Newsletter
      May 2016
      The latest edition of the Oracle Virtualization Newsletter is now available. News include:

      • Announcing Oracle VM 3.4 - Engineered for Open Cloud Infrastructure
      • Oracle VM Server for SPARC 3.3.0.1 Released
      • Oracle VM VirtualBox 5.0.20 now available for download!
      • Oracle Private Cloud Appliance 2.1.1 Released
      • Oracle Enterprise Manager Cloud Control 13c support for the Private Cloud Appliance
      • Patch Set Updates (PSUs) for Oracle Secure Global Desktop

      Full Edition

      Oracle VM VirtualBox 5.1 Beta 2
      By Simon Coter
      Simon blogs, "Oracle is proud to announce the availability of Oracle VM VirtualBox 5.1 Beta 2.

      This minor release includes following fixes from Oracle VM VirtualBox 5.1 Beta 1:

      • GUI: don't crash when showing the Beta popup message window
      • GUI: multi-screen full-screen layout fixed for Windows host (Qt5 regression)
      • GUI: don't allow to start subsequent separate VM instances
      • SDK: reduced memory usage in the webservice Java bindings
      • Settings: fixed regression with disabling audio
      • Settings: fixed regression with saving snapshots (only .vbox file is corrupted needing manual repair, disk images are intact; 5.1 Beta 1 regression)
      • Linux installer: Several path fixes for deb/rpm packages for older Linux distributions where we ship our own Qt5 libraries, see here.
      • Solaris Additions: added support for X.org 1.18

      See all the details related to Oracle VM VirtualBox 5.1 Beta 2 here with a complete list of enhancements, bug fixes and links to download the software.

      IT - Storage
      x
      Open Source Will Revolutionise The Enterprise Storage Market
      ITProPortal, June 10th, 2016
      "Mobility, social media, the Internet of Things, Big Data and the cloud have caused data volumes to reach new heights. Businesses already have too much data to cope with, and it's unlikely that the growth of 'Big Data' will slow down any time soon. Analyst firm IDC has said that the amount of data in the world doubles every two years, and that by 2020 there will be 44 trillion gigabytes of data stored. This data presents massive opportunities for businesses and IDC has also predicted that those organisations that analyse all relevant data and deliver actionable intelligence will see an additional $430bn in productivity gains by 2020 than those that don't..."
      Challenges Of Using The Cloud For Primary Data And How To Fix Them
      Storage-Switzerland, June 9th, 2016
      "Storing primary data in the cloud flies in the face of logic. Data is typically stored where the user would create it and there is one reason for that: physics. There was a time, of course, when storage and compute were always in one physical box - then came networked storage. Shared storage introduced a few milliseconds or so, but that was deemed an acceptable tradeoff for the advantages that shared storage brought to the table.

      Shared storage also introduced another problem: the noisy neighbor. If multiple servers are sharing the same storage resource, the other servers in a sharing network can significantly impact the performance of one server's storage. This is why some storage products introduced Quality of Service (QoS) features..."

      Cloud Storage: 7 Key Considerations
      NetworkComputing, June 6th, 2016
      "Keeping data stored in a hybrid cloud requires careful planning. Here's what to keep in mind.

      For most IT professionals, the cloud is today's greatest challenge and also the greatest opportunity. Moving mission-critical tasks into the cloud is still viewed as risky, both from a loss of control point of view and -- let's be honest -- from a job security perspective. This is leading companies to hybrid cloud solutions, where the public cloud complements a private cloud, which might either be in-house or hosted..."

      Java Technology
      x
      Experience JavaOne 2016
      By David Lopez
      David writes, "JavaOne 2016 is on its way! Are you ready? Check out the registration options for this year's conference, and make the most of your JavaOne experience.

      The JavaOne Full Conference Pass gives you over 450 sessions to choose from. These include the hands-on labs, tutorials, and Birds-of-a-Feather sessions as well. These expert-led sessions are the perfect way to stay up-to-date with everything Java. The content catalog isn't live yet, but to get an idea of what will be offered check out this year's seven tracks. Sessions will explore topics across tracks like the Core Java Platform, Emerging Languages, Java Clients and User Interfaces, and more..."

      IT - Technology
      x
      Five Technology Trends Peaking In 2016
      TechZone360, June 9th, 2016
      "To say that the tech industry is growing at a rapid pace these days would be a bit of an understatement. In fact, it might be an outright misunderstanding of just how pervasive the tech industry, much less technology as a whole, has become. Reports indicate that tech-related jobs are increasing 31 percent faster than other high-growth sectors. More importantly, however, technology has become inextricably intertwined with just about every growing industry out there, even in more traditionally analog sectors. Kitchen appliances, for example, now have smart technology to allow communication across appliances and the ability to perform such advanced tasks as tracking the status of food being prepared or sitting in the refrigerator..."
        Google Just Made A Leap For Quantum Computing
        ITWorld, June 9th, 2016
        "Many approaches are being tried in the race to develop a working quantum computer, but Google this week reported using a combination of techniques with particularly promising results.

        In a paper published Wednesday in the journal Nature, a team of researchers from Google and several academic institutions describe a method that they call 'quantum annealing with a digital twist.' Essentially, they combined the quantum annealing approach with the 'gate' model of quantum computing and found that they could get the best of both worlds..."

        4 Challenges To Consider When Choosing A Content Management System
        Business 2 Community, June 9th, 2016
        "Before selecting a Content Management System (CMS) solution, companies must have a content management strategy in place that dictates what they plan to do with their existing content and the processes for future content creation and publishing. This strategy should include designating internal staff members to manage content after the launch of the solution. Without a written plan there's the risk of an underwhelming initial impact from the CMS, instead of the 'wow factor' that should come from centralized and efficient website content management..."
        Iron Man Meets Aquaman As Navy Turns To Augmented Reality
        PCWorld, June 6th, 2016
        "Scientists with the U.S. Navy are working to develop an augmented reality display for divers' helmets that would enable them to see photos, sonar readings and texts while working under water.

        The futuristic-looking helmet offers a bit of Iron Man-meets-Aquaman in what the Naval Surface Warfare Center calls 'next-generation' technology.

        Dubbed the Divers Augmented Vision Display, the augmented reality technology is embedded directly inside the helmet..."

          Why No One Wins The Tech Holy Wars
          InfoWorld, June 6th, 2016
          "The longer you work in IT, the more it seems the 'right' way might not be the only way...

          If you haven't seen the HBO show 'Silicon Valley,' it's worth the time. Along with many jabs at well-known tech companies, it's surprisingly accurate with regard to how IT and developers think and behave. It's not perfect, but I can't recall ever hearing a vim-versus-emacs debate in a popular television show. (Can you?)..."

            IT - Bitcoin
            x
            Venture Capitalist: Banks Are Oblivious to Bitcoin's Best Feature
            CryptoCoinsNews, June 10th, 2016
            "Investor Fred Wilson, co-founder of Union Square Ventures, thinks banks are missing the most important opportunity bitcoin offers by building private blockchains.

            Speaking on a panel with Nathaniel Popper of The New York Times at the CB Insight 'Future of Fintech,' he said the transformative value of virtual currency will be on a public blockchain, as reported by the Observer.

            Private blockchains copy the distributed approach of public blockchains but hide it inside the servers that their creators have given permission to maintain a copy..."

            Governments & Central Banks Are Now Funding Blockchain Research
            June 9th, 2016, June 11th, 2016
            "Governments are showing increasing interest in cryptocurrencies and blockchain technology. A recent press release details that this week the US Department of Homeland Security (DHS) plans on funding $600,000 in grants to government-related distributed ledger startups..."
            Bitcoin Markets: Black And Gray, White And Red
            Cabling Installation & Maintenance, June 8th, 2016
            "The markets context of cryptocurrencies is changing in what may seem like a subtle manner but has real political consequences. One question is the pivot point. Should Bitcoin maintain the pseudonymity that offers privacy or should government identify users through such measures as imposing Know Your Customer (KYC) requirements on exchanges?..."
            [Bit]Coin Flipping: I See Bitcoin Like The Internet Was In The 90's
            jaxenter, June 8th, 2016
            "Bitcoin continues to hit the headlines as the price nears $600 and the halving is almost upon us. We talked to Henry Brade, the CEO of Prasos Oy, a Finnish Bitcoin startup founded in 2012, about the hike and the reasons why people should invest in bitcoins now.

            Let's call it a deja-vu. Bitcoin price passed the $500 threshold in late May, something which hasn't happened in almost two years. Despite reports that it will drop once again, the price is still going strong - at press time, the price continued to increase and almost broke the $600 threshold..."

            Is Bitcoin The Best Instrument To Trade?
            NEWSBTC, June 7th, 2016
            "Bitcoin (BTC) is a virtual currency, using encryption algorithms and priding itself with anonymity of transactions and low fees. Since its development, back in 2009, it managed to rise from 20-30 USD, to over 580 USD for one BTC, nowadays. This huge increase also attracted traders interested to gain from the fluctuations. But how profitable really is the BTC trading?

            Let's start with one characteristic that impacts significantly the trading process: liquidity..."

            IT - FOSS
            x
            What CIOs Don't Know About Open Source Software
            CIO, June 7th, 2016
            "Even companies contributing to open source projects have little understanding of open source usage...

            More companies are contributing to open source projects, but the management of open source software is still chaotic.

            Those are two of the findings of the 2016 Future of Open Source survey from Black Duck Software, a maker of products to help secure and manage open source code..."

            IT - DevOps
            x
            Top 9 Tips For Effective Patch Management
            Information Age, June 8th, 2016
            "Patch management may seem like an endless burden, but by following these steps it can be an easily executed task

            As intrusion points continue to expand in scope, making malicious attacks ubiquitous and harder to prevent than ever, an effective patch management strategy might appear the first line of defense in building endpoint security. However, the complexity and scope of the task has often undermined its success.

            Patch management can easily consume huge amounts of time and money, yet informal, ad hoc patching without a central strategy often fails to deliver what patching is supposed to deliver: a safe, secure and available IT infrastructure.

            Here are nine simple tips that can make patch management simpler, more effective and less expensive..."

            How DevOps is Killing QA
            devops.com, June 7th, 2016
            "If you work in software quality assurance (QA), it's time to find a new job.

            The overall software development process has always consisted of the following core activities:

            • Creating a requirements analysis;
            • Producing a specification of the software artifact;
            • Constructing the software;
            • Investigating the quality of the product or service;
            • Finding and fixing defects; then
            • Deploying to production.

            In most organizations, this process generally has occurred within one or more methodologies such as waterfall or agile. In waterfall, the testing process occurs relatively late..."

              Partners
              x
              Oracle Excellence Awards 2016 - Nominations are NOW Open!
              By Ramona Costea
              Regional and global award winners receive a FREE Oracle OpenWorld 2016 pass.

              Nomination period closes Friday, June 17, no exceptions. Nominate your partners today!

              Oracle Cloud ISV Partner of the Year Award recognizes partners listed in Oracle Cloud Marketplace for delivering innovative solutions that run with Oracle Cloud Services.

              Nomination criteria:

              • Oracle PartnerNetwork member at Gold level or higher and be a partner in good standing
              • Partner must have an application listing on Oracle Cloud Marketplace in the Platform or Infrastructure category

              Nominate your Cloud ISV partners here: Cloud ISV Partner of the Year 2016

              MySQL
              x
              Using MySQL 5.7 Document Store with Internet of Things (IoT)
              By Alexander Rubin
              Alexander blogs, "In this blog post, I'll discuss how to use MySQL 5.7 Document Store to track data from Internet of Things (IoT) devices.

              In my previous blog post, I've looked into MySQL 5.7.12 Document Store. This is a brand new feature in MySQL 5.7, and many people are asking when do I need or want to use the JSON or Document Store interface?..."

              Cloud Computing
              x
              Where Personalization Crosses The Line Into Creepy: Five Examples
              Torrey Martin
              How do you know when personalized marketing crosses the line from effective into creepy? It can be a fine line - a bit like former US Supreme Court Justice Potter Stewart's take on pornography: "I know it when I see it."

              Personalization is the practice of tailoring marketing messages to an individual's tastes, preferences, lifestyle, and status based on a variety of data. Personalization is a critical element in turning prospects into buyers and improving brand loyalty...

                The Cloud's Underappreciated Advantages
                By Reggie Bradford
                Reggie blogs, "My colleague Daryl Szebesta joined Oracle earlier this year as vice president of cloud transformation. He came from BT, where he was CIO for four years. The two of us are working on a presentation that addresses the cloud imperative from the perspective of our previous professional experiences - mine as a former CMO, Daryl's as a former CIO. Here's a preview..."
                Linux
                x
                OCFS2 Certified with EBS 12.2 Shared File System Configurations
                By Steven Chan
                Steven blogs, "Oracle Cluster File System 2 (OCFS2) is now certified for use with E-Business Suite 12.2 when sharing a single file system between multiple application tier server nodes.

                You can improve your E-Business Suite 12.2 environment's fault tolerance, availability, and performance by distributing traffic across multiple application tier server nodes. For information about using multinode configurations,.."

                IT - Cloud
                x
                Can The Cloud Solve It's Budget Conundrum?
                Network Computing, June 9th, 2016
                "A recent report published by the US Government Accountability Office documented that the government spends 75% of its total annual IT budget on maintaining legacy systems, some of which date back to 1970s-era IBM mainframe technology.

                While there are plans to decommission some of these older platforms and replace them with more modern systems in the coming years, the fact remains that the government clearly is not running anywhere near peak efficiency when it comes to IT spending..."

                How Organisations Can Get Started In Openstack
                Information Age, June 10th, 2016
                "As OpenStack's popularity and adoption continues to grow, so does the need for dedicated cloud engineers...

                Cloud engineers are still in short supply as the technology is still relatively new - but as adoption increases, the ability to specialise in the open-source software platform for cloud computing also grows.

                There are a growing number of use cases in OpenStack. Telcos especially are getting very excited about OpenStack as NFV (network functions virtualisation) gives the ability to rapidly deploy virtualised appliances like routers and firewalls over software-defined networks, reducing the need for expensive proprietary hardware..."

                IT Priorities 2016: Cloud Initiatives Drive IT Spending
                ComputerWeekly, June 10th, 2016
                "Cloud computing is expected to experience the biggest growth in spending among businesses planning IT investments in 2016...

                There appears to be strong correlation between moving to the cloud and cutting costs, according to the Computer Weekly IT priorities 2016 survey of 142 IT professionals and managers..."

                Why Legal Departments Begrudge The Cloud
                Network World, June 6th, 2016
                "Legal professionals are by their nature a skeptical and cautious lot, but the sharp rise in cloud-based applications being used by enterprises and law firms, as well as recent high-profile law firm security breaches, has many legal professionals reticent about entering cloud engagements...

                'The buck stops with the lawyer,' says Michael R. Overly, a partner and intellectual property lawyer focusing on technology at Foley & Lardner LLP in Los Angeles.

                IT - CxO
                x
                The One Word That Can Transform Your Negotiating Skills
                Fast Company, June 7th, 2016
                "The most powerful word in negotiations is 'fair.' It's so powerful that I call it the 'F-word.' Here's why it's so powerful, when to use it, and how...

                As human beings, we're powerfully swayed by how much we feel we're being respected. People comply with agreements if they feel they've been treated fairly and lash out if they don't..."

                  Why Security Execs Lack Confidence In Security (Slideshow)
                  CIO Insight, June 10th, 2016
                  "A majority of IT security executives are only somewhat confident in their enterprise's security, according to a new survey. One-third of respondents are confident in their security posture and one-quarter said they communicate effectively about security metrics and posture to senior management. These executives continue to rely mainly on quantitative metrics aimed at preventing breaches..."
                  Is Anyone Listening?
                  IT World, June 9th, 2016
                  "In IT, we've all had the sensation that business people haven't really heard what we've told them. Here's how you can be sure to grab their attention...

                  Ever have the feeling that your business sponsors don't really listen to you?

                  Just about all of us in IT have been there. You might be talking to someone when you realize that this business person has no idea what you're talking about..."

                    The 4 Habits Every Great Leader Needs To Practice
                    Fast Company, June 9th, 2016
                    "You don't need to be told that leadership takes presence. But in my experience, leaders today have arguably fewer opportunities to show it.

                    Particularly if you head up a digital business or lead teams spread out across multiple locations, you're faced with generating 'remote' influence at the same time that the people right there in your own office need to be kept motivated, too.

                    While I've always been pretty outgoing, it took me some time to create the kind of leadership presence that could inspire the people who work at my company - and it's always a work in progress, especially as the daily features of modern business crowd in. I used to get frustrated, for instance, when employees texted me about something I thought they could easily figure out. I felt I deserved an office..."

                      IT - Wireless
                      x
                      Wi-Fi 911: Running With Scissors?
                      Network World, June 6th, 2016
                      "When calling 911 for help, depending on the service you are using, your actual mileage may vary, and what you didn't know may prove harmful to your health...

                      Emergency 911 services first materialized in the United States when the Alabama Telephone Company established the service in the sleepy little town of Haleyville on Feb. 16, 1968. At that time, phone companies knew the installation address and phone number of each and every telephone device, and calls were routed based on this information. While seemingly unsophisticated by today's standards, at the time, it was considered quite a feat of engineering..."

                      7 Reasons You Need 802.11Ac
                      NetworkComputing, June 8th, 2016
                      "Do we really need 802.11ac? That's a question that my clients frequently ask me as they look into WLAN upgrades or plan new deployments. There are several benefits of the 802.11ac WiFi specification when compared to previous 802.11 protocols. But really what my clients want to know is whether they'll see a noticeable difference in 802.11ac WLAN compared to what they're using today..."
                        To Wave 2 Or Not To Wave 2?
                        Network World, June 7th, 2016
                        "The second wave of the gigabit WiFi 802.11ac standard - known as 'wave 2' - is the cutting edge, but should you just wait for 11ax?

                        Boasting multi-user MIMO (meaning that it can service multiple client devices using its multiple antennae), wider channels, and a number of other bells and whistles, wave 2 hardware offers more throughput and better handling of multiple connections..."

                          vBeers-SF
                          x
                          vBeers @ Boca - Biergarten Boca
                          Wednesday, June 8th: 6:00 PM to 9:00 PM
                          Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida. vBeers events happen four times a month, once per county:

                          • vBeers @ Palm Beach Gardens 1st Wednesday of Month
                          • vBeers @ Broward 2nd Wednesday of Month
                          • vBeers @ Boca 3rd Wednesday of Month
                          • vBeers @ Miami 4th Wednesday of Month

                          Biergarten Boca, located in on US 1, just South of Palmetto Park and East of I-95, features $5 burger/fries and $3 featured drafts during Wednesday's happy hour!

                          RSVP at meetup.com.

                          Sponsorships for the vBeers events are through the South Florida Technology Alliance (SFTA).

                          John Mclaughlin, Nicole Ciccone/SFTA

                          IT - DR
                          x
                          4 Must-Haves In Your IT Disaster Recovery Plan
                          SmartDataCollective, June 10th, 2016
                          "Disaster recovery is a pretty important aspect of your technology. While it's rare that flooding, hurricanes, power surges, fires or tornados strike; other types of disasters like viruses, ransomware, hardware failing and human error are even more likely to be the source of a data loss or failure. The fact of the matter is that while a natural disaster is an unlikely scenario, the odds are very good that at some point something is going to happen to your systems and data. No matter what that something is - you need a plan in place. Here are four must-haves in your IT disaster recovery plan:.."
                          A Disaster Recovery Report Uncovers The Errors That Led To Chaos
                          SearchDataCenter, June 7th, 2016
                          "In this disaster recovery report, discover the failure points that led to catastrophe and learn how to make decisions that will lead to data center success...

                          Editor's note: In part one of this two-part article on data center disaster recovery -- which is based on real-world experiences -- an administrator woke up at 3 a.m. to manage an electrical fire, a blaring alarm and two exploded buses in his data center. Through this disaster recovery report, find out what went wrong and how the disaster could've been avoided..."

                          IT - PM
                          x
                          12 Project Management Tools Worth A Look (Slideshow)
                          CIO, June 8th, 2016
                          "With so many project management tools to choose from, how can you decide which are best-suited for your needs? To help you start to sort through the options we highlight 12 PM tools that are worth your consideration.

                          I've been a project manager for a long time. I started out using ABT's Project Workbench, which is apparently is still around - it still exists as a free tool called Open Workbench. I never professionally used the Windows version of it, only an old DOS version. I eventually moved on to a DOS version of Microsoft Project and then on to the windows version of that which I have used off and on for many years..."

                          6 Ways To Destroy Your Project Management Career
                          TechRepublic, June 7th, 2016
                          "When asked about things to avoid doing as a project manager (PM), you may be inclined to think about the technical and mechanical aspects of project management. Staying within scope, cost, and timelines and adhering to quality criteria tend to be on the list.

                          But there are other equally or even more important things you may intentionally or unintentionally do that can have a distressing impact on a project, team members, or stakeholders, and in turn, jeopardize your career. Here are a few things a PM should avoid doing..."

                          6 Proven Project Management Team Communication Strategies
                          CIO, June 8th, 2016
                          "Project teams are in a constant state of communication via email, videoconferences, telephone calls, texts, face-to-face discussions and even nonverbal interactions. Whatever media they use, project teams will increase their chances of achieving their goals if they develop successful strategies for keeping everyone informed about what's going on.

                          Here are some tips for communicating effectively during the course of a project..."

                            Events
                            x
                            Don't Miss the FY17 OPN Global Partner Kickoff Webcast on June 21
                            By Ramona Costea
                            Ramona invites Oracle Partners to "Oracle PartnerNetwork's Global Partner Kickoff webcast on June 21 for a chance to hear directly from top executives, including Thomas Kurian, Shawn Price, Dave Donatelli, and regional Alliances & Channels leaders. This is a great opportunity to align your business with Oracle's direction for a prosperous year ahead..."

                            Read more & Register Now

                            IT - Networks
                            x
                            Over 8 Billion Devices Connected To The Internet
                            ZDNet, June 10th, 2016
                            "And it's smartphones, not PCs that make up the bulk of that 8 billion devices...

                            By the end of 2015, there were 8.1 billion internet-connected, claims a report by IHS Technology. These devices consist of smartphones, tablets, PCs, TVs and TV-attached devices such as Apple TV and Chromecast, and audio devices. Averaged out across the globe, this works out at four devices per household. The breakdown of those devices is also quite an eye-opener. Smartphones are without a doubt the dominant device, outnumbering PCs by about 1.8 to one, and outnumber tablets by around 4.6 to one..."

                              Cisco: IP Traffic Will Surpass The Zettabyte Level In 2016
                              Network World, June 7th, 2016
                              "IP traffic will grow in a massive way as 10 billion new devices come online over the next five years.

                              Those are just a couple of the amazing facts found in Cisco's 11th annual Visual Networking Index look at all things in the communications world..."

                              IP Traffic Will Surpass 2 Zettabytes By 2020
                              NetworkComputing, June 7th, 2016
                              "Cisco Visual Networking Index forecast shows new users, IoT, and video services driving growth.

                              More than one billion new Internet users and even more new devices will push annual global Internet traffic to 2.3 zettabytes by 2020, up from 870 exabytes in 2015, according to Cisco's latest Visual Networking Index.

                              Released today, the annual forecast report shows that the number of number of Internet users will grow to 4.1 billion in four years, up from three billion last year. With the number of personal computing devices on the rise, combined with growing machine-to-machine communications, networks will support 26.3 billion devices and connections in 2020, up from 16.3 billion in 2015, according to Cisco. In fact, the number of devices connected to IP networks will be more than three times the global population, with 3.4 device per capita..."

                              IT - IoT
                              x
                              Show Me The Money - Monetising Iot
                              ITProPortal, June 10th, 2016
                              "The Internet of Things (IoT) is exciting but simply adding sensors to every piece of equipment or every location, from shop floors to petrol pumps, is not going to change the world.

                              While a predicted 20 billion connected devices will be in place by 2020, how many businesses yet truly understand how this connected world will drive new value and create new revenue streams?..."

                              The Right IoT Stuff: V5 Systems Wins Dell's IoT Contest
                              IT-Director.com, June 9th, 2016
                              "The Internet of Things (IoT) has come a long way since 1982, when researchers at Carnegie Mellon University modified a Coke machine to create the first internet-connected appliance, which could report on inventory and whether drinks were cold.

                              Today, cloud, analytics, wireless and other technologies have advanced to the point where IoT can provide a simple, effective way to communicate with and through machines to get things done more easily, and to make better decisions..."

                              Closing Security Gaps In The Internet Of Things
                              Homeland Security News Wire, June 10th, 2016
                              "Cars, fridges, household appliances - in the future, many everyday items will be online. This opens up numerous new targets for attacks. IT experts are developing protection mechanisms. The experts are developing a new method for detecting and fixing vulnerabilities in the applications run on different devices - regardless of the processor integrated in the respective device..."
                                The Internet Of Things Has Arrived, Let The Games Begin (Slideshow)
                                eWeek, June 10th, 2016
                                "The Internet of things (IoT) has exploded onto the scene, bringing us smartphones that track health data, drones that monitor wildfires and onesies that alert parents when their baby starts to move. IoT is here, and the sooner organizations adapt to the new normal, the more likely they are to benefit from the enormous opportunities that have opened up. A digital system where people, objects and networks communicate and interact in entirely new ways, IoT is viewed as a major paradigm shift that will transform how we live and work. But is IoT really all it's cracked up to be?"
                                The IoT: Where We Are, And Where We're Heading
                                ComputerWorld, June 10th, 2016
                                "I'm often asked, 'When will the Internet of Things materially impact me or my organization?' Given the enormous amount of hype associated with the IoT, the question is reasonable. Fortunately, history offers us a guide to how this is likely to play out. Let's quickly look at the factors that have typically brought new technologies into common use:..."
                                Why Machine Intelligence Is The Key To Solving The Data Integration Problem For The Industrial Internet of Things (IIoT)
                                insideBIGDATA, June 8th, 2016
                                "In this special technology white paper, Why Machine Intelligence is the Key to Solving the Data Integration Problem for the IIoT, you'll uncover the reasons why machine intelligence is the key to solving the data integration challenge for the IIoT. The heaviest lift for an industrial enterprise is data integration, the Achilles' heel of the Industrial Internet of Things (IIoT). This is blocking progress on the transformations and ROI that companies originally envisioned..."
                                  Just One In 10 IoT Devices Offer Adequate Security, Warns Research
                                  v3 co uk, June 6th, 2016
                                  "Just one in 10 Internet of Things (IoT) devices has adequate security, underlining the risks posed by the rise in connected devices, according to security experts.

                                  The IOActive IoT Security Survey warned that many IoT devices, especially those with a consumer focus, lack the security needed to ensure they are not at risk of being hacked using simple tactics.

                                  The figure comes from a panel of senior security professionals interviewed by IOActive about the rise of the IoT.

                                  They raised concerns that security is lacking in everything from wearables to household appliances, echoing concerns V3 has covered before..."

                                  IT - Linux
                                  x
                                  Linux: What's Our Next Fight?
                                  Linux Journal, June 7th, 2016
                                  "We won the battle for Linux, but we're losing the battle for freedom.

                                  Linux turns 25 in August 2016. Linux Journal turned 21 in April 2016. (Issue #1 was April 1994, the month Linux hit version 1.0.) We're a generation into the history of our cause, but the fight isn't there anymore, because we won. Our cause has achieved its effects.

                                  It helps to remember that Linux was a fight, and so were free software and open source. If they weren't fights, they wouldn't have won what they did..."

                                  IT - Operations
                                  x
                                  Build Or Lease: Eight Key Considerations For Data Centers
                                  Data Center Knowledge, June 7th, 2016
                                  "Outsourcing data requirements to a third party for the first time can be nerve-racking. Endless requirements paired with an increased expectation for data performance puts IT in the hot seat. Below is a list of key considerations when deciding whether to build vs. buy, along with some guidance on how to address each..."
                                  Why You Don't Have To Fix Every Vulnerability (Slideshow)
                                  IT World, June 9th, 2016
                                  "The word 'vulnerability typically comes with a 'must fix now' response. However, not all vulnerabilities should be treated equally because not all of them pose a risk. It all depends on what the data represents. In fact, some vulnerabilities are OK to deprioritize, depending on associated threats and the value of the asset at risk. For example, a lock on a 20th floor window of a building is not as important as one on the ground level, unless the contents of the room are so valuable that a thief would take the effort to access such an unreachable place..."
                                    IT - Security
                                    x
                                    Security Event Management: 14 Questions To Ask Before You Buy
                                    CSO Online, June 7th, 2016
                                    "Today's security event management technology boasts more brain power than ever, but many organizations fail to realize its full promise. Here are the key questions you need to ask to ensure the solution you choose will deliver..."
                                    Traits Every Digital Security Pro Should Have (Slideshow)
                                    CIO Insight, June 9th, 2016
                                    "The tech world has been in constant motion while CISOs have been building defenses to ward off attackers, and the changing landscape has created entirely new responsibilities for security professionals, according to Greg Mancusi-Ungaro, CMO, BrandProtect, a threat detection services firm.

                                    'It's not that digital enterprises undervalue certain attributes and skill sets in their CISOs,' he said, 'It's that digital enterprise CISOs have a whole new set of responsibilities that require them to make considerable changes in how they go about their day-to-day.' CISOs are up against cyber-criminals who are just like every other working professional; they're sophisticated, resilient and opportunistic. Here are some qualities every CISO needs to combat their counterparts, according to Mancusi-Ungaro..."

                                    11 Theatrical Security Measures That Don't Make Your Systems Safer (Slideshow)
                                    CSO Online, June 7th, 2016
                                    "The term 'security theater' was coined to describe the array of security measures at U.S. airports -- taking off shoes, patting down children and the elderly -- that project an image of toughness without making commercial aviation any safer. But the man who came up with the phrase is famous cybersecurity expert Bruce Schneier, and it could just as easily apply to a number of common tech security measures. We talked to an array of tech experts to discover what security technologies are often just for show..."
                                    9-Vendor Authentication Roundup: The Good, The Bad And The Ugly
                                    Network World, June 6th, 2016
                                    "New 'smart' tokens and risk-based factors deliver tighter security, but setups remain complex and user interfaces need a facelift...

                                    Due to numerous exploits that have defeated two-factor authentication, either by social engineering, remote access Trojans or various HTML injection techniques, many IT departments now want more than a second factor to protect their most sensitive logins and assets..."

                                    Incident Response Planning
                                    CloudTweaks, June 7th, 2016
                                    "The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly - these days, it's almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to being a mission-critical component, BODs are also becoming more interested in what their organizations are doing to plan their incident response..."
                                    It Takes 248 Days For It Businesses To Fix Their Software Vulnerabilities
                                    HelpNet Security, June 8th, 2016
                                    "Compiled using data collected from tens of thousands of websites, a new WhiteHat Security report reveals that the majority of web applications exhibit, on average, two or more serious vulnerabilities per application for every industry at any given point in time.

                                    The report's findings are based on the aggregated vulnerability scanning and remediation data from web applications that use the WhiteHat Sentinel service for application security testing. The research shows that no industry has mastered application security, and of the 12 industries analyzed in this report, the IT, education, and retail industries suffer the highest number of critical or high-risk vulnerabilities per web application, at 17, 15 and 13 respectively..."

                                    Securing Your Car From Cyberattacks Is Becoming A Big Business
                                    ComputerWorld, June 9th, 2016
                                    "Last year, the auto industry got a warning shot when a Jeep Cherokee was remotely hacked and controlled

                                    A modern car has dozens of computers with as much as 100 million lines of code -- and for every 1,000 lines there are as many as 15 bugs that are potential doors for would-be hackers.

                                    With vehicles becoming more automated and connected to the internet, to other cars and even roadway infrastructure, the number of potential intrusion points is growing exponentially, according to Navigant Research..."

                                    Security Blindspots: Websites, Network Architects, And Third-Party Code
                                    IT World, June 7th, 2016
                                    "Components of a website, what renders on the browser and security vulnerabilities to the enterprise

                                    It is no easy task to secure today's digital enterprise. With all of the irons in the fire of the digital ecosystem, there is a lot that can compromise the corporate website. Both website visitors and Internet users are vulnerable to web-based malware, and it is increasingly more difficult for security practitioners to thwart web-based attacks..."

                                    What To Do When You Can't Fix A Security Vulnerability
                                    Business 2 Community, June 8th, 2016
                                    "When you discover a security vulnerability affecting your environment, you want to fix it. Quick.

                                    But, as you're probably painfully aware, it's not always that simple. Many of us have already come across vulnerabilities that can't be completely removed - leaving even the most experienced security pros feeling severely challenged. This year's Verizon Data Breach Investigation Report addressed this type of problem, and we felt it was worth opening up a broader conversation around this unfortunate reality..."

                                    IT - Careers
                                    x
                                    Get Noticed In A Job Interview With These 5 Questions
                                    Business 2 Community, June 9th, 2016
                                    "Most job candidates come to an interview with a list of questions prepared, but asking the right ones can make the difference between getting an offer and being shown the door. Asking the right questions during a job interview not only helps you to stand out to a hiring manager, it also provides insight into an organization's culture and reveals what it takes to succeed in a particular role.

                                    So channel your inner Barbara Walters or Anderson Cooper during your next job interview and ask the tough questions others candidates were too afraid to ask. This is your opportunity to get to know a potential employer and decide if the position you're interviewing for is right for you.

                                    Here are five questions you should ask in your next job interview..."

                                      What's Going On With IT Hiring?
                                      ComputerWorld, June 8th, 2016
                                      "CompTIA, an industry group, said about 96,000 IT jobs were lost last month across all industries, not just the technology sector. That figure includes the impact of the approximately 37,000 telecommunications jobs sidelined by the Verizon strike, which was settled this month. But it was a rough month, by some estimates.

                                      Analysts have been generally cautious this year about IT hiring trends. Although the unemployment rate for IT professionals is about half the national average of 4.7%, said CompTIA, some analysts use terms ranging from 'modest' to 'pre-recession' to describe IT hiring.

                                      Reports on IT employment from four different groups -- two independent analysts and two industry groups -- present a mixed picture. Although they all use the same government data, analysts can pick and choose from many different categories to build their analysis, which can produce different assessments..."

                                        How To Ace Your Next Cover Letter
                                        Business 2 Community, June 9th, 2016
                                        "Cover letters: are they necessary?

                                        Applicants don't know. Recruiters don't care. And leaders? Well, leaders seem to be divided on the issue. But let's assume for a moment that you should, in any position for which you are applying, include a cover letter. If it IS read by your future boss, what should it say?

                                        Not these three scary examples from David Silverman over at Harvard Business Review:..."

                                          8 Small Things People Use To Judge Your Personality
                                          Entrepreneur, June 7th, 2016
                                          "From the moment two people meet, they're sizing each other up, looking for signs of qualities like honesty, intelligence, and altruism.

                                          Whether it's a date or a job interview, the small stuff matters - from the firmness of your handshake to how often you check your phone.

                                          We checked out the Quora thread, "What are the really small things that tell a lot about a person's psychology and personality?," and highlighted some of the most common behaviors people use to judge you..."

                                            IT Pros Stress Is Low, But So Is Job Satisfaction
                                            CIO, June 8th, 2016
                                            "Working in IT can be a stressful career, but a new survey shows the pressure's easing for many tech workers. But is career satisfaction dropping, too?...

                                            It's no secret that working IT is stressful, but a new survey from TEKsystems shows that the pressure may be easing for some IT professionals. The 2016 IT Stress and Pride survey from IT talent management and solutions company TEKsystems polled 241 IT workers at all experience levels in April of 2016, and found that just 14 percent of entry-to mid-level IT professionals and 18 percent of senior IT professionals consider the work they are currently doing to be the most stressful of their career..."

                                            The 3 Types Of 'No' You Need To Master In Your Career
                                            Fast Company, June 7th, 2016
                                            "There's a reason why 'no' is one of first words we learn to say. Life never fails to throw us offers and opportunities that are worth turning down.

                                            As we grow up, it's no longer the suggestion that we finish our broccoli that we're most hard-pressed to reject - it's the requests to do more work and the dubious job offers that we have to find ways of declining politely. Hence the raft of advice out there for professionals looking for graceful ways to bow out of everything from hiring processes and time-consuming assignments to helping coworkers and 'voluntary' extracurriculars...."

                                              Servers
                                              x
                                              Ease Cloud Deployment with Oracle Private Cloud Appliance
                                              By Honglin Su
                                              Honglin blogs, "Engineered for open cloud, Oracle Private Cloud Appliance simplifies the way customers install, deploy, and manage converged infrastructures for Linux, Windows, or Oracle Solaris applications.

                                              Oracle Enterprise Manager offers complete cloud solution including self-service provisioning balanced against centralized, policy-based resource management, integrated chargeback and capacity planning and complete visibility of the physical and virtual environments from applications to disk. Oracle Enterprise Manager 13c further improves enterprise grade management, stack management and cloud lifecycle management..."

                                              IT - Email
                                              x
                                              How Many Layers Does Your Email Security Need?
                                              Dark Reading, June 8th, 2016
                                              "At least one more layer than the attacker can defeat. Here's how to improve your odds by turning on little-used or newer capabilities to block email-targeted malware.

                                              Most IT people find email gateways justifiably boring. They've been around almost as long as email, after all. Everybody has one. You probably only notice them when they miss obvious spam or block legitimate mail. For everything else, you probably figure email gateways are all pretty much the same, and as long as you checked the box, you are free to think about something else. Out of sight, out of mind, right?..."

                                                IT - Database
                                                x
                                                Defining SQL Server Security Roles for Better Security Management
                                                SmartDataCollective, June 10th, 2016
                                                "SQL Server comes with a long list of database, application and server roles which outline data selection and modification, disk management and permissions among other aspects. These roles are important in maintaining server security.

                                                Many SQL Server databases have multiple users accessing and viewing data, giving the administrator extra concern regarding maintenance of security. A wise administrator should take complete advantage of security roles in SQL server, diving groups of users according to their database access needs and setting permissions in a way as to reduce security risks in the system..."

                                                7 DBaaS Vendors You Should Consider (Slideshow)
                                                enterpriseappstoday, June 6th, 2016
                                                "Database-as-a-service (DBaaS) puts storage and management of structured data in the cloud, offering companies functionality similar to well-known relational database management systems like MySQL, SQL Server and Oracle, with the added flexibility and lower upfront costs of the cloud.

                                                The DBaaS market is expected to be worth $1.8 billion this year. While database mainstays such as Oracle, IBM and Microsoft are expected to perform well, according to 451 Research, Google, Amazon and a slew of database-as-a-service startups are striving to compete by providing lower latency, real-time transactional processing and improved scalability.

                                                Here are seven DBaaS providers to keep in mind..."

                                                Blockchain's Hype Exceeds Its Grasp - For Now
                                                CIO, June 7th, 2016
                                                "Broad adoption of blockchain technology is likely years away as companies struggle to understand how to apply the digital ledger technology to practical scenarios amid regulatory, governance and standards obstacles.

                                                Blockchain has been touted by venture capitalists, technophiles and pundits as the Next Big Thing in computer science. The reality, however, is that the digital ledger software at the heart of Bitcoin and other cryptocurrencies has a long way to go before it gains mainstream adoption..."

                                                5 Ways To Avoid Compromised Database Credentials
                                                GCN, June 9th, 2016
                                                "The term 'insider threat' is widely misunderstood. More often than not, the 'insiders' are actually malicious outsiders who have penetrated an organization's perimeter defenses and are using stolen, yet legitimate, credentials to mine valuable data. An outside attacker with legitimate credentials is now an insider with all of the privileges assigned to that stolen login.

                                                These insider threats have become an enormous risk to enterprises, governments and the military; the 2016 IBM Cyber Security Intelligence Index found that 60 percent of all attacks originated from insiders..."

                                                IT - Mobile
                                                x
                                                3 Keys To Understanding A Mobile-First Business Strategy
                                                Business 2 Community, June 8th, 2016
                                                "'Mobile-first' isn't just some Millennial buzzword. From small business to enterprise-level, it's a reality of the market today. But for many, it's happening so fast that it might be hard to understand what a mobile-first business strategy actually is. It's pretty simple, actually. Here are the 3 keys to understanding what it means to be 'mobile-first'..."
                                                  7 Reasons Mobile Payments Still Aren't Mainstream
                                                  CIO, June 7th, 2016
                                                  "Though mobile payments and wallets are increasingly popular, they're still nowhere near mainstream. A set of experts and finance-industry watchers weigh in on what's holding mobile payments back, as well what will need to happen for the systems to hit the big time...

                                                  Despite the fact that they received plenty of media attention during the past few years, "proximity" mobile payments, or mobile payments made at retailers' points of sale (PoS), have yet to hit the mainstream. Multiple reasons why exist, but perhaps the most significant roadblock thus far: Today's mobile payment systems simply don't offer a strong enough value proposition to compel consumers to use them consistently..."

                                                    Forget Fingerprints; Iris Scans Could Validate Mobile Payments
                                                    ComputerWorld, June 8th, 2016
                                                    "While mobile payment systems like Apple Pay and Samsung Pay are growing, they haven't lived up to the hype that surrounded their arrival in 2014.

                                                    But newer biometrics security technologies beyond the use of fingerprint scans could boost adoption rates when purchases are made in-store with smartphones. Those technologies include palm vein sensors or even sensors that assess a person's typing patterns or movements..."

                                                    Implement Mobile Device Security
                                                    CIO, June 9th, 2016
                                                    "The mobile revolution has essentially handed responsibility for device management and security to your users. This may sound terrifying, but it doesn't have to be. As long as you have a solid mobile device security strategy that is based on best practices and implemented consistently across the enterprise, you can successfully combat the risk involved in enabling mobile productivity.

                                                    But a successful mobile device security strategy can be a major challenge to design and implement, particularly for organizations that do not have an enterprise-wide mobile device security program already in place..."

                                                    IT - Big Data
                                                    x
                                                    Making Big Data More Efficient And Accessible
                                                    GCN, June 8th, 2016
                                                    "The battle to manage big data while making information useful to agency personnel is one that federal network administrators fight every day. But there are a few strategies that can help them manage the challenge.

                                                    The problem is not that there is too much data; rather, it's difficult for administrators to deliver that data effectively. As the amount of data continues to grow, delivery is understandably hampered, especially with users expecting data to be available quickly, whenever and wherever it's needed..."

                                                    Crunching Big Data: Making Sense Of Massive Data Sets
                                                    ITProPortal, June 7th, 2016
                                                    "We've been hearing about big data presenting tons of opportunities for a long time. As the volume, velocity, and variety of data have exceeded the human ability to manage it, organisations in any industry have started implementing new storage architectures to gather as much data as possible, and have adopted solutions to crunch more data than people. The problem is that crunching does not mean making sense: too often businesses have found themselves wondering what to do with the vast amount of data they are amassing..."
                                                    4 Lessons Learned From 4 Years Of Non-Stop Data Analysis
                                                    Business 2 Community, June 9th, 2016
                                                    "Analytics is a field that moves fast.

                                                    Most changes have happened as a result of the transition from PC computing to mobile. Mobile is still a new space for analytics. Things are happening quickly, and everyone's looking for the newer, better, and faster solution.

                                                    We've now been analyzing data non-stop for four years. We want to share four of the themes that we've seen emerge over our time helping companies with analytics. These are bigger-picture ideas and frameworks that sometimes get lost in the rush for the new, but they're crucial to keep in mind if you want to successfully use your data to its fullest potential..."

                                                    We Have The Big Data Tools - Let's Learn To Use Them
                                                    InfoWorld, June 9th, 2016
                                                    "Few enterprises enjoy even the first-order benefits of big data. The real payoff will come when we interact with systems much less than we do today...

                                                    Recently, at the Apache Spark Maker Community event in San Francisco, I was on a panel and feeling a bit salty. It seems many people have prematurely declared victory in the data game. A few people have achieved self-service, and even more have claimed to..."

                                                    Top10
                                                    x
                                                    Top Ten Articles for last few Issues
                                                    Vol 202 Issue 1; Vol 219 Issues 1, 2, 3 and 4 ; Vol 218 Issues 2, 3 and 4
                                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                    • Take Training On Oracle VM 3.4
                                                    • Oracle VM Windows Pv Drivers 3.4 Released
                                                    • Oracle VM Server for SPARC 3.4
                                                    • Oracle Advanced Analytics: SPARC T7-4 Beats 4-Chip x86 E7 v3
                                                    • SAP Two-Tier Standard Sales and Distribution SD Benchmark: SPARC M7-8 World Record 8 Processors
                                                    • SPARC M7 DAX - Stream Processing for Big Data
                                                    • Oracle Linux Newsletter (May 2016)
                                                    • DataLab in a Box: accelerate your Data Value to stay ahead
                                                    • Oracle Big Data Discovery Cloud Service For Visual Face Of Big Data
                                                    • From Big Data To Insights

                                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                                      IT - Encryption
                                                      x
                                                      Asymmetric Cryptography
                                                      Search Security, June 10th, 2016
                                                      "Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are simply large numbers that have been paired together but are not identical (asymmetric). One key in the pair can be shared with everyone; it is called the public key. The other key in the pair is kept secret; it is called the private key. Either of the keys can be used to encrypt a message; the opposite key from the one used to encrypt the message is used for decryption..."
                                                      IT - Server
                                                      x
                                                      Intel Launches Latest High-End Xeon E7 Chips, And Server Oems Sign On (Slideshow)
                                                      eWeek, June 9th, 2016
                                                      "Intel this week rolled out the latest generation of its Xeon E7 server processors, unveiling a family of 14nm chips with more cores per chip (up to 24, rather than 18), instruction threads (48 from 36) and more last-level cache (60MB from 45MB) than its predecessor. Officials said the new 'Broadwell-EX' 8800/4800 chips offer as much as 1.3 times the scaling of the previous Xeon E7 chips, twice the memory support - up to 24TB - and twice as many analytics queries as the previous version..."
                                                      Developer
                                                      x
                                                      NEW PaaS4SaaS TOOLS: Rapid Development Kit
                                                      By Juergen Kress
                                                      Juergen blogs, "The OAUX team has launched a Rapid Development Kit to help partners grow their Oracle Applications Cloud business and offer more value to customers. It's a work in progress, but the design patterns for Release 10 are already available for download via ebook. See why user-centricity, simplicity, and consistency remain front and center in Cloud user experience designs. Check out the Forbes Oracle Voice interview with Ultan O'Broin, who leads the partner enablement effort for the OAUX team. The Voice of User Experience (VoX) blog has also published a recent post on extensibility in Release 10..."
                                                      Nexenta News
                                                      x
                                                      Nexenta to Discuss Software-Defined Storage Implementation and Landscape at Data Storage Innovation Conference
                                                      June 13-15 in San Mateo, Calif.
                                                      Nexenta, the global leader in Open Source-driven Software-Defined Storage (OpenSDS), announced that Field Chief Technology Officer (CTO), Michael Letschin, will speak at the Data Storage Innovation Conference (link is external) on June 13-15 in San Mateo, Calif.

                                                      Michael will discuss how software-defined storage (SDS) means different things to different people. With solutions ranging from do-it-yourself to full-fledged, scale up and scale out architectures, the landscape can seem blurry and confusing. Michael will delve into what all these terms mean by mapping each style of SDS with a corresponding environment. These solutions include the use of virtual server based solutions, containers, bare metal installs and even hyper-converged. Regardless of vertical or company size, from branch offices through the largest enterprise, the right software-defined storage strategy can put you back in control and help you gain unmatched levels of flexibility, scalability, performance, and cost efficiency.

                                                      Cisco News
                                                      x
                                                      Cisco Declares Quarterly Cash Dividend
                                                      $0.26 per common share
                                                      Cisco (NASDAQ: CSCO) announced that its Board of Directors declared a quarterly dividend of $0.26 per common share to be paid on July 27, 2016 to all shareholders of record as of the close of business on July 7, 2016.

                                                      Cisco's previous quarterly dividend of $0.26 per common share was paid on April 27, 2016. Future dividends will be subject to Board approval.

                                                      The Millennials won't save you, but culture can
                                                      Ciso, June 7th, 2016
                                                      "Businesses hoping that their digital woes will be solved by a surge in Millennials joining the workforce are in for a shock. New research commissioned by Cisco, in partnership with the Institute of Cultural Capital (ICC), has found that creating a positive digital culture at work and encouraging worker confidence in digital tools are the most important factors in ensuring digital roll-outs are successful.

                                                      Based on a survey of more than 3,000 UK workers, the findings outline the most important factors to determine whether businesses will succeed with digital roll-outs. Research has found that different organisational cultures lead to contrasting rates of digital adoption. Company digital culture ranked far above an employees' IT experience, company size or the sector in which they operate, when determining attitudes to digital roll-outs..."

                                                      Cisco Visual Networking Index Predicts Near-Tripling of IP Traffic by 2020
                                                      Growth Driven by More Than One Billion New Internet Users and 10 Billion New Devices and Connections Over the Next Five Years
                                                      According to today's release of the Cisco Visual Networking Inde (VNI) Complete Forecast for 2015 to 2020, global IP traffic will nearly triple at a compound annual growth rate (CAGR) of 22 percent over the next five years. More than one billion new Internet users are expected to join the global Internet community, growing from three billion in 2015 to 4.1 billion by 2020. The global digitization transformation, based on the adoption of personal devices and deployment of machine-to-machine (M2M) connections will have an even greater impact on traffic growth. Over the next five years, global IP networks will support up to 10 billion new devices and connections, increasing from 16.3 billion in 2015 to 26.3 billion by 2020. There are projected to be 3.4 devices and connections per capita by 2020 - up from 2.2 per capita in 2015.
                                                      Altice Sets Speed Record with Cisco cBR-8 Enabling Best-in-Class Broadband and Video Experiences Across Its Global Markets
                                                      Altice Sets Speed Record with CiscoSPVideo cBR-8 Enabling Best-in-Class Broadband and Video Experiences Across Its Global Markets
                                                      "Following the successful launch of its Zive subscription video on-demand service, Altice has begun a field trial for its DOCSIS 3.1 Gigabit broadband service with SFR in France, using the Cisco cBR-8 converged broadband router.

                                                      In less than one year, Altice has deployed the cBR-8 across its markets in France and is rapidly progressing with deployment of the cBR-8 across its U.S. entities and all Altice International companies..."

                                                      Teracom A/S Launches Digital TV System with Cisco Encoding Solution
                                                      Cisco Digital Content Manager Provides Teracom A/S with End-to-End Solution for Premium Picture Quality and Optimized Bandwidth Efficiency
                                                      Teracom A/S, the leading provider of digital terrestrial transmitted radio and TV in Denmark, has launched a new digital headend, which enhances its digital terrestrial television (DTT) services.

                                                      Teracom A/S, in close collaboration with Cisco, performed a technology renewal and replacement project to help simplify terrestrial distribution for national and regional TV broadcasters in Denmark.

                                                      Using the D9902 Digital Content Manager (DCM), Teracom will be able to broadcast more high-definition content and services by using the same applicable bandwidth, over the DTT network. DCM functions include:...

                                                      VOO to Offer Its Subscribers More of Everything at Faster Speeds with Cisco DOCSIS 3.1 Broadband Technology
                                                      VOO Completes Successful Gigabit Speed Trials with the Cisco cBR-8 Converged Broadband Access Platform
                                                      VOO, a leading Belgian cable operator and one of the fastest-growing cable operators in Europe, is deploying the Cisco cBR-8 converged cable access platform (CCAP) to give its residential and business customers faster broadband services.

                                                      VOO provides digital television services to its customers, including HD and VoD, as well as Internet, fixed telephone, and mobile phone services.

                                                      The Cisco cBR-8 with DOCSIS 3.1 broadband will help VOO prepare to increase its cable network capacity to support the demand for more Internet video and the growth of connected devices. Dimension Data Belgium has been enlisted to stage, configure, install and maintain the Cisco cBR-8 for VOO.

                                                      Dell News
                                                      x
                                                      Denali Holding (parent company of Dell), Reports Fiscal Year 2017 First Quarter Financial Results
                                                      Revenue was $12.5 billion; Non-GAAP revenue was $12.6 billion
                                                      • Revenue was $12.5 billion; Non-GAAP revenue was $12.6 billion
                                                      • Operating loss improved to $161 million; Non-GAAP operating income was $565 million, a 37 percent increase year-over-year
                                                      • Cash flow from operations improved approximately $800 million year-over-year Denali Holding Inc. ('Denali'), parent company of Dell Inc., announced its fiscal 2017 first quarter results, with revenue of $12.5 billion from continuing operations, down 2 percent year-over-year, driven by declines in the company's Client Solutions and Enterprise Solutions Groups, while Dell Software Group revenue was flat. The company reduced its operating loss by 52 percent and grew its non-GAAP operating income by 37 percent year-over-year.
                                                      Dell Enables Customers to Maximize Performance of Enterprise Applications and Core Business Workloads with PowerEdge Four-Socket Servers
                                                      four-socket server portfolio includes four rack and blade options
                                                      • Dell's broadest four-socket server portfolio includes four rack and blade options to support customers' evolving workload requirements with flexibility and modularity
                                                      • Dell PowerEdge 13th generation four-socket servers deliver enhanced performance, versatility, security and productivity for enterprise-scale and mid-market compute environments
                                                      • Dell PowerEdge R930 with Intel Xeon E7-8890 V4 processors recently set three new SAP world- record benchmarks

                                                      Dell announced performance and capability updates to its PowerEdge 13th generation four-socket server portfolio, engineered for enterprise customers with large scale server deployments to solutions requirements for remote and branch offices. Designed to optimize performance for big data and real-time analytics and dense virtualization deployments the updated PowerEdge servers enable the flexibility, scalability and manageability of customers' demand for the future-ready enterprise.

                                                      Microsoft News
                                                      x
                                                      Microsoft recognizes outstanding contributions by suppliers
                                                      Microsoft, June 9th, 2016
                                                      Microsoft Corp. announced the recipients of the 2016 Microsoft Supplier Program (MSP) Excellence Awards. The MSP Excellence Awards recognize superior performance, exemplary service and innovation by suppliers that demonstrate what it means to be a preferred supplier at Microsoft. The purpose of the MSP is to build long-term relationships with a select group of strategic suppliers that create long-term value for Microsoft.

                                                      Winners of the 2016 MSP Excellence Awards were nominated by employees of Microsoft in various business units, MSP suppliers and Microsoft Procurement Professionals. An extensive panel of Microsoft employees and external judges selects all final awardees.

                                                      School leaders, new research say technology helps increase engagement and career readiness
                                                      Microsoft, June 9th, 2016
                                                      Schools around the world are choosing Windows 10 and Microsoft Office 365 platforms to enable greater classroom engagement and drive improved learning outcomes. According to Futuresource Consulting, Windows is leading in global device sales for K-12 education and is projected to gain market share in 2016.

                                                      "Microsoft continues to be the global market leader within the K-12 market, reaching 46 percent of the OS market in the first quarter of 2016 and gaining 6 percent global market share year over year," said Mike Fisher, associate director of education technology at Futuresource.

                                                      Symantec News
                                                      x
                                                      Symantec Launches New IoT Solution to Help Carmakers Protect Against Zero Day Attacks
                                                      New Anomaly Detection for Automotive Offering Expands Company's IoT Portfolio
                                                      Symantec Corp. introduced Symantec Anomaly Detection for Automotive to protect against zero-day attacks and never-before-seen issues facing modern connected vehicles. Bringing Symantec's extensive security and sophisticated analytics expertise across complex networks to the vehicle, Anomaly Detection for Automotive provides the crucial ability to identify issues for early remediation.

                                                      Connected cars offer drivers conveniences such as navigation, remote roadside assistance and mobile internet hot spots. There will be 220 million connected cars on the road in 2020, according to Gartner.1 While new technologies promise to enhance the driving experience, these advancements also create avenues of attack for hackers that can endanger drivers and passengers...

                                                      IBM News
                                                      x
                                                      IBM Unveils Two New IBM Studios to Create Innovative Digital Experiences in Asia
                                                      New Studios in Seoul and Singapore join network of over 30 IBM Studios globally
                                                      IBM announced the opening of IBM Studios in Singapore and Seoul, Korea to support digital reinvention for clients in Asia. With these Studios, IBM will help enterprises in two of Asia's economic powerhouses put innovative customer experiences at the core of their businesses through a combination of cognitive capabilities and experience design.

                                                      IBM Studios Seoul, located at the IBM Korea headquarters in Yoido, and IBM Studios Singapore, located in the Marina Bay Financial Centre, will host designers and digital experts from IBM Interactive Experience (iX), which provides next-generation services dedicated to creating personalized brand experiences.

                                                      IBM invests to accelerate development and commercialization of disruptive technologies in Asia
                                                      Close to 5000 IBM Cognitive Solution Professionals across the region co-creating with clients to drive transformation
                                                      In less than five years, disruptive technologies such as cognitive computing and blockchain are expected to drive dramatic shifts in every industry, from healthcare, to financial services, to tourism. To help clients of all sizes in the Asia Pacific region lead in shaping the future of their industries, IBM announced plans to assist in the rapid prototyping and commercialization of solutions based on cognitive computing and blockchain.

                                                      IBM opened The Watson Centre at Marina Bay, an incubator designed to bring together organizations of all sizes, business partners and IBM experts to co-create business solutions that leverage IBM's cognitive, blockchain and design capabilities. IBM's new Asia Pacific headquarters is based in the same location, in the heart of Singapore's financial district.

                                                      IBM Signs US$300 Million Services Agreement with Emirates Airline
                                                      IBM z Systems mainframe provides leading airline with the technology backbone for passenger systems
                                                      IBM announced that it has signed a ten-year technology services agreement with Emirates Airline worth approximately US$300 million. IBM will provide IT Infrastructure delivered as a service, allowing the airline to improve efficiency on its passenger support systems and functions.

                                                      The agreement provides fully managed services for the IBM mainframe and storage that will help Emirates encrypt data in near real-time. Additionally, the platform allows the airline to build new apps that will support the API Economy - a commercial exchange of business functions, capabilities, or competencies as services packaged in APIs.

                                                      IBM Launches Industry's First Development Environment for Apache Spark
                                                      Delivered in the Cloud for Rapid Adoption
                                                      IBM announced the first cloud-based development environment for near real-time, high performance analytics, giving data scientists the ability to access and ingest data and deliver insight-driven models to developers. Available on the IBM Cloud Bluemix platform, the Data Science Experience provides 250 curated data sets, open source tools and a collaborative workspace to help data scientists uncover and share meaningful insights with developers, making it easier to rapidly develop applications that are infused with intelligence.
                                                      Fujitsu News
                                                      x
                                                      Fujitsu Unveils ScanSnap Cloud
                                                      Fujitsu, June 7th, 2016
                                                      Fujitsu, the market leader in document imaging scanners, unveiled ScanSnap Cloud, a new service that enables ScanSnap customers to streamline workflows by delivering scanned data directly to their favorite cloud service without the need for a computer or mobile device. ScanSnap Cloud eliminates the old multi-step process to scan and save important information. With the push of a button, customers can now simply send data directly from their ScanSnap iX500 or iX100 scanners to popular cloud-based services such as Dropbox, Evernote, Expensify, Google, and OneDrive.
                                                      Fujitsu and Box Sign MoU for Strategic Content Management Partnership
                                                      Fujitsu and Box plan to develop integrated solutions targeting global markets
                                                      Fujitsu Limited and Box announced they have entered into a non-binding Memorandum of Understanding with regard to a strategic partnership in the content management space. Under the proposed partnership, Fujitsu would deploy Box to the approximately 160,000 employees across its internal communication platform. In addition to improved content management, Box will help control storage expansion costs that grow in line with increased volumes of data storage.

                                                      Fujitsu will use Box internally and, leveraging the knowledge gained through this experience, intends to integrate Box into global communication solutions. Under the proposed partnership, the two companies would jointly roll out solutions tailored to specific industries, and also plan to make Box available to Japanese customers as part of the FUJITSU Digital Business Platform MetaArc (MetaArc).

                                                      Fujitsu Develops AI-Utilization Platform for Design and Manufacturing, Launches Consulting Service
                                                      Supporting AI-based manufacturing innovation, with shorter design times and improved production quality
                                                      Fujitsu announced the addition of an expert consulting service for the use of AI technology at design and manufacturing sites to its MONOZUKURI Total Support Solutions, which support customer manufacturing. This service will be available in Japan starting October 2016. As its platform, the service will use the MONOZUKURI AI Framework(1) to systematize functions for incorporating AI into manufacturing locations.

                                                      MONOZUKURI AI Framework is an AI-usage platform that implements Fujitsu's AI technology, Human Centric AI Zinrai, and is made up of learning databases, AI processing engines, security authentication servers, and so forth. This platform is being offered based on the experience gained from using it as a smart manufacturing platform at Fujitsu's manufacturing locations.

                                                      Red Hat News
                                                      x
                                                      Friday Five - June 10, 2016
                                                      Red Hat, June 10th, 2016
                                                      the technology industry. Consider it your weekly digest of things that caught our eye.

                                                      • Red Hat Events Blog - Red Hat Summit: Product Focused Sessions
                                                      • Red Hat Blog - OpenShift Enterprise 3 by Red Hat Wins CODiE Award for Best Platform-as-a-Service Solution
                                                      • Amadeus innovates customer service with OpenShift Enterprise by Red Hat
                                                      • ComputerWeekly.com - Big data and open-source cloud technology help Gulf Air pin down customer sentiment
                                                      • opensource.com - Catalyst-In-Chief: Download the PDF

                                                      Read on for details.

                                                      EMC News
                                                      x
                                                      EMC Special Shareholder Meeting To Be Held July 19, 2016
                                                      Shareholders will be asked to take actions to approve the merger agreement among Denali Holding Inc., Dell Inc., Universal Acquisition Co., and EMC.
                                                      EMC Corporation announced that a special meeting of its shareholders will be held at 10:00 a.m. Eastern Time on July 19, 2016 at EMC's facility at 176 South Street, Hopkinton, Massachusetts. At the special meeting, shareholders will be asked to take actions to approve the merger agreement among Denali Holding Inc., Dell Inc., Universal Acquisition Co., and EMC.

                                                      The EMC board of directors has fixed the close of business on May 13, 2016 as the record date for the special meeting. Only holders of record of EMC common stock as of the record date are entitled to attend and vote at the special meeting. Shareholders planning to attend must pre-register no later than July 12, 2016, by visiting www.emc.com/specialmeeting and completing the registration form.

                                                      HP News
                                                      x
                                                      Hewlett Packard Enterprise Announces OneView 3.0
                                                      Enhancements Provide Simplified IT Through Software-Defined Intelligence and Unified API to Deliver Composable Infrastructure
                                                      Hewlett Packard Enterprise announced OneView 3.0 to provide software-defined intelligence across HPE's family of infrastructure solutions, including HPE ProLiant, HPE BladeSystem, HPE 3PAR StoreServ, HPE Hyper Converged solutions, and HPE Synergy, the industry's first composable infrastructure.

                                                      Today, customers need to simplify day-to-day operations, deploy applications faster and enable IT to quickly take advantage of the latest tools, like Docker, SaltStack and Chef. HPE OneView delivers software-defined intelligence, workload template automation and open integration through a unified API so organizations can provision their infrastructure to improve efficiencies.

                                                      The latest enhancements to HPE OneView include:...

                                                      Hewlett Packard Enterprise Expands Helion Cloud Portfolio
                                                      New Solutions Address Enterprises' Multi-Cloud Operations and Continuous Delivery Requirements
                                                      Hewlett Packard Enterprise introduced updates to its HPE Helion cloud portfolio today at HPE Discover, including:

                                                      • HPE Helion Cloud Suite, a new software suite enabling customers to deliver and manage their full spectrum of applications -- from traditional, virtualized, cloud native and containers -- across a broad range of infrastructure environments
                                                      • HPE Helion CloudSystem 10, an engineered hardware and software solution to build and rapidly deploy an enterprise grade cloud environment for a full range of workloads and offering a deep integration with HPE OneView 3.0 for automatic provisioning of cloud resources from bare metal infrastructure
                                                      • HPE Helion Stackato 4.0, a complete and open application development platform-as-a-service (PaaS) solution, powered by Cloud Foundry, designed to speed the delivery of cloud native applications
                                                      • HPE Cloudline 3100 Server, offering industry leading economics for service providers
                                                      • New HPE Technology Services offerings for IT transformation and workload migration

                                                      "No enterprise has a one size fits all approach to cloud -- every customer wants solutions that help them drive their business faster and cut costs across their full spectrum of applications," said Bill Hilf, senior vice president and general manager, HPE Cloud.

                                                      Hewlett Packard Enterprise Delivers Industry First Converged System for IoT
                                                      New IoT solutions, services and ecosystem provide device security and enables decision making at the edge
                                                      Hewlett Packard Enterprise (HPE) unveiled the Edgeline EL1000 and Edgeline EL4000, the industry's first converged systems for the Internet of Things (IoT). These systems integrate data capture, control, compute and storage to deliver heavy-duty analytics and insights at the edge to enable real-time decision making. In addition, HPE announced enhanced IoT security capabilities, new services and an industry leading partner ecosystem to advance the adoption and impact of the Internet of Things.
                                                      GE and Hewlett Packard Enterprise Partner to Deliver New Industrial IoT Solutions
                                                      Strategic agreement brings together HPE and GE IoT technologies and expertise to deliver Predix capabilities at the edge
                                                      Hewlett Packard Enterprise and GE Digital announced a strategic agreement to unite cutting-edge Internet of Things (IoT) technologies from HPE with GE's industrial expertise and its Predix platform to bring digital know-how to the industry sector. Together, the two companies will enable industrial analytics from the edge to the cloud. This alliance offers a combination of HPE's market leading hardware with GE's for industry, by industry software to deliver a new suite of solutions for customers seeking to transform their businesses with real-time analytics and insights.
                                                      Hewlett Packard Enterprise and Docker Partner to Power Distributed Applications Across Hybrid Infrastructure
                                                      Ground Breaking Agreement Provides the Industry's First HPE Docker Ready Server and Infrastructure Portfolio, Extending the Reach of Distributed Applications to Modernize the Enterprise Datacenter
                                                      Hewlett Packard Enterprise announced a strategic alliance with Docker, Inc., the company behind the open platform that enables organizations to build, ship and run distributed applications on any infrastructure.

                                                      Through a joint worldwide enterprise alliance agreement covering sales, go-to-market, engineering, support, services and knowledge sharing, HPE and Docker are collaborating to help customers transform and modernize their datacenters to benefit from a more agile development environment. At the heart of this alliance is HPE's Docker ready server program, unique to the server industry, which ensures HPE servers are bundled with Docker Engine and support. This enables customers to create distributed applications that are portable across any infrastructure. By combining the strength of the number one cloud infrastructure provider with the leader in containerization, HPE and Docker will deliver hybrid infrastructure solutions and an application portfolio ranging from legacy to microservices applications, fully supported by HPE.

                                                      Hewlett Packard Enterprise Extends All-Flash Datacenter Capabilities With Leading Density and Data Services
                                                      Accelerating the Mainstream Adoption of Flash for More Workloads, at Greater Scale, With Less Risk
                                                      Hewlett Packard Enterprise announced new data storage solutions to help customers unlock the value of the all-flash datacenter. Updates to the HPE 3PAR StoreServ flash portfolio include the world's most capacity-dense all-flash system, persistent storage for containers, unified storage enhancements, and flash-integrated data protection.

                                                      Data is at the heart of digital disruption; the ability to accelerate how data is stored, analyzed and protected can be an advantage. This is why customers are moving to flash at record speeds and exploring software-defined storage options.

                                                      Comcast News
                                                      x
                                                      Comcast Begins Rollout Of Gigabit Internet Service In Nashville
                                                      Earlier this year, Comcast unveiled plans to offer Gigabit Internet service using DOCSIS 3.1 technology in Atlanta and Nashville in early 2016
                                                      Earlier this year, Comcast unveiled plans to offer Gigabit Internet service using DOCSIS 3.1 technology in Atlanta and Nashville in early 2016, with Chicago, Detroit, and Miami to follow in the second half of the year.

                                                      Following its announcement in February to bring 1 Gigabit-per-second Internet speeds to residential and business customers using DOCSIS 3.1 technology, Comcast today announced it is beginning an advanced consumer trial of Gigabit Internet service to Nashville.

                                                      Nashville becomes the second Comcast market to roll out DOCSIS 3.1, following Atlanta's launch in March. Initial customers in Nashville will have the choice of a promotional contract price of $70 per month for 36 months, or an everyday price with no contract at $139.95.

                                                        Windstream News
                                                        x
                                                        Windstream Moves into new QTS Chicago 'Mega Data Center'
                                                        Alliance delivers Windstream fiber network solutions to QTS customers
                                                        Windstream, a leading provider of advanced network communications, announced that it is one of the first carriers to establish a presence in QTS Realty Trust's new downtown Chicago mega data center set to open July 1. Windstream already has presence in two other QTS data centers - one at 1033 Jefferson St. in Atlanta, Ga., and another at 6000 Technology Blvd. in Sandston, Va. With this latest partnership, as an anchor service provider in the QTS Chicago facility, Windstream is continuing its aggressive network expansion strategy - providing secure, high-performance connectivity solutions to wholesale and enterprise customers.
                                                        Netapp News
                                                        x
                                                        NetApp Ranked #2 in Worldwide All Flash Array Market Share for Q1 2016
                                                        NetApp all flash array revenue grew 238.2% year over year, 2.7 times faster than the market growth of 87.4% year over year
                                                        • Per IDC, NetApp all flash array revenue grew 238.2% year over year, 2.7 times faster than the market growth of 87.4% year over year.

                                                        • Per IDC, NetApp moved to #2 from #4 in the tracker quarter over quarter, with 22.8% revenue market share, ahead of Pure, HPE, and IBM.

                                                        As of the end of its Q4FY2016, NetApp indicated:

                                                        • Its all flash array business has grown to an annual net revenue run rate of more than $700 million.

                                                        • Its All Flash FAS line has produced eight consecutive quarters of year over year triple digit unit growth.

                                                        "Flash solutions are changing the expectations and economics of enterprise IT," said Brian Bakstran, acting Chief Marketing Officer, NetApp.

                                                        Shanghai PPDAI Speeds Credit Lending Platform with NetApp
                                                        New IT infrastructure reduces cost while accelerating online loans and bidding transactions in China
                                                        "As the first pure-credit-based unsecured Internet financing platform in China, we needed a solution that would support our exponential growth and protect critical customer data while keeping cost down," said Zhenya Luo, IT manager, Shanghai PPDAI Financial Information Service Co., Ltd. "NetApp has enabled us to transform our infrastructure without disruption. We can now scale to meet customer demand and stay competitive without jeopardizing the quality of our service."
                                                        Trending in
                                                        Vol 234, Issue 2
                                                        Trending IT Articles