News about Oracle's Solaris and Sun Hardware
System News
Jul 25th, 2016 — Jul 31st, 2016 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 221, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Oracle News
x
Glens Falls Hospital, University of Pittsburgh Medical Center (UPMC) and a New York Medical Center Move to Oracle Cloud
Oracle's modern, integrated cloud solutions help medical centers cost-effectively drive flexible, scalable innovation
Oracle announced that Glens Falls Hospital, University of Pittsburgh Medical Center (UPMC) and NYU Langone Medical Center have turned to Oracle Cloud to modernize their healthcare insight and administrative resources for staff and patients. These organizations join many other hospitals, healthcare providers and research centers that have moved the management of their people and business processes to the Oracle Cloud.
Oracle Buys NetSuite
Transaction is expected to close in 2016
Oracle announced that it has entered into a definitive agreement to acquire NetSuite (NYSE: N), the very first cloud company. The transaction is valued at $109.00 per share in cash, or approximately $9.3 billion.

'Oracle and NetSuite cloud applications are complementary, and will coexist in the marketplace forever,' said Mark Hurd, Chief Executive Officer, Oracle. 'We intend to invest heavily in both products-engineering and distribution.'

Oracle
x
Navigating Market Disruption with Scalable Database Technology
By Karen Sigman
Karen blogs, "As so many companies have discovered over the past decade, disruptive innovation can pull the rug out from just about any business, even market leaders. Unless companies are quick to identify effective responses to disruption, and are flexible enough to implement those responses, they can quickly join the list of companies that the next generation will never have heard of..."
    Features
    x
    Mix a Little Pleasure with Business at Oracle OpenWorld
    By Dr. Patricia Dues
    Patricia writes, "With such a jam-packed agenda full of quality sessions at Oracle OpenWorld, it's hard to imagine having any down time to escape the confines of the convention center and the overload of information assailing your brain. But remember, you are in beautiful San Francisco, and it's important to take a moment to rejuvenate. Here are three, quick time-outs to consider for Oracle OpenWorld this year...."
    IT - AI
    x
    Big Data Fed to Artificial Intelligence Means Great Marketing
    insideBIGDATA, July 28th, 2016
    "Once upon a time, a famous author imagined a great machine called the Multivac. While the name is cheesy, the concept is not: the technological behemoth was an artificial intelligence powered by machine learning that enabled it to process all the data of the universe and answer the last question at the end of time - marketing has more modest goals in mind for their own artificial intelligence platforms. Marketing needs artificial intelligence capabilities to process the data necessary for marketers to reach the potential customers in their audiences, identify their traits as individuals, talk with them at the moment they're most receptive to the message and in the way they'll find most engaging..."
      First look: Google Cloud Machine Learning soars
      ComputerWorld, July 28th, 2016
      "In the 2016 Google Founder's Letter, CEO Sundar Pichai cited Google's long-term investment in machine learning and AI.

      'It's what allows you to use your voice to search for information,' he explained, 'to translate the web from one language to another, to filter the spam from your inbox, to search for 'hugs' in your photos and actually pull up pictures of people hugging ... to solve many of the problems we encounter in daily life. It's what has allowed us to build products that get better over time, making them increasingly useful and helpful.'..."

      Machine Learning and AI in the Workplace: The Future of Business Tools
      Information Management, July 26th, 2016
      "Modern technology is leading us into a new industrial age, and big data and artificial intelligence (AI) stand to become the driving force behind innovation in the workplace. By automating previously manual processes, we have more capabilities to identify patterns in real-time and make predictions that can streamline how we run our businesses.

      We are already seeing this at highly data-driven companies - the ones that promote a culture of using analytics for all business decisions. Eventually, it becomes so natural that it feels weird when decisions are made without the edge of analytics..."

      Why Are Fintech Startups Focused on Bringing A.I to Finance?
      NEWSBTC, July 27th, 2016
      "Since 2015, an increasing number of multi-billion-dollar financial institutions such as Goldman Sachs have exhibited their interest in emerging innovative financial technologies and startups.

      Several major banks and financial organizations have established various investment funds for fintech and blockchain startups, to research the application of fintech and blockchain technologies in the financial market.

      Blockchain technology focused startups have been the main attraction of these banks. According to the Outlier Ventures research team, there are over 1,000 blockchain startups in existence with most of the companies being backed by venture capital firms and financial establishments..."

        Virtualization
        x
        Oracle VM 3.4 - Upgrade Utilities
        By John Priest
        John blogs, "This is another blog in the series to give the Oracle VM community some additional information on the 3.4 release that we delivered earlier this year. The topics that we covered in previous Oracle VM 3.4 blogs include:

        • Oracle VM 3.4 Ease of Use Enhancements
        • Oracle VM 3.4 Performance Gains
        • Oracle VM 3.4 Dom0 Enhancements
        • Solutions with Command Line Interface
        • Integrating Oracle VM with Oracle OpenStack for Oracle Linux
        • Oracle VM Hierarchical Viewer

        This week, we are going to share a little more information on a couple of useful tools to help upgrade your 3.2 or 3.3 environment to Oracle VM 3.4..."

        IT - Storage
        x
        Almost time for SSD flash storage to be used with object storage
        SearchSolidStateStorage, July 28th, 2016
        "As the price of flash SSD storage continues to fall, it becomes more attractive for object storage, which otherwise counts on big, slow and cheap HDDs.

        Object storage has become a popular choice for nearline storage, cloud storage, Hadoop storage and even NoSQL storage. The primary media type used for object storage, however, isn't SSD flash storage, but has been and continues to be 3.5-inch, 7,200 rpm fat HDDs. The logic behind this is that object storage is mainly secondary storage. Performance is not the driving factor. Scalability, reliability and durability at a very low cost are the principal factors in object storage sales..."

        Control the costs of cloud storage with these five steps
        SearchCloudComputing, July 30th, 2016
        "Your cloud storage could be costing you more than it should. Follow these five steps to identify and eliminate any unnecessary cloud storage fees.

        Storage was one of the first public cloud services to garner corporate acceptance. In a market led initially by vendors like Dropbox and Carbonite, businesses began housing information in the cloud -- and usage continues to grow. The global cloud storage market will grow from $18.87 billion in 2015 to $65.41 billion by 2020, according to research firm MarketsandMarkets..."

        Creating an Enterprise Data Migration Plan
        Data Center Knowledge, July 28th, 2016
        "Today's business has a lot of storage and data options. And, requirements around data control are going to continue to grow and evolve. With that in mind - let's touch on one aspect of the IT and data center administrative process that some organizations hate to discuss: data migrations.

        What if you need to move a massive amount of data? What if it's not as simple as just re-mapping a storage repository? In some cases, you might be migrating entire storage vendors to align with specific business strategies. Either way - when dealing with critical corporate data - you need to have a plan. So, here are 8 steps to creating an enterprise data migration plan:..."

          Why Fibre Channel Fabrics to Support Flash Storage?
          StorageNewsletter.com, July 25th, 2016
          "Data access speeds for enterprise applications are becoming more critical; as is the need to support real-time business requirements, which in turn is driving the deployment of flash for tier-I storage. In order for enterprise data centers to keep pace with data-intensive workloads, the right network architecture must be implemented to prevent IO from becoming a bottleneck. FC helps to alleviate IO discrepancies and unleash the full potential of flash- optimized storage..."
          Java Technology
          x
          Java Clients at JavaOne 2016
          By Jonathan Giles
          "It's great to be a JavaOne content track reviewer (and for me this year, a track lead), because we get to see all the exciting submissions weeks in advance of their 'unveiling'. Now that anyone can see the excellent sessions that we have coming to the JavaOne Clients and User Interfaces track, it is about time to talk about some of my personal highlights..."
          Thomas Kurian Outlines Java EE Next Steps
          By Stephen Chin
          Stephen blogs, "Reconfirming for the Java community that Oracle 'has a very clear plan' for the next Java Enterprise Edition, Thomas Kurian, Oracle's president of product development, has outlined a number of forthcoming improvements to the foundational application development platform..."
          IT - Technology
          x
          Here's how Drones are Being Used in 2016
          TechWorld, July 26th, 2016
          "With drones sales set to soar this year, Techworld looks at how businesses in the UK (and some abroad) are using the technology to improve customer service, maintenance and even capture the news.

          Read on to find out which companies are using drones..."

            Should CIOs be Chief Robot Wranglers?
            IT World, July 26th, 2016
            "Business Robotic Process Automation (RPA) initiatives can yield huge returns. But bypassing IT can create even bigger risks. Why CIOs need to take a greater role in RPA...

            Robotic Process Automation (RPA) is gaining increasing acceptance not just to handle certain IT tasks but also in business areas like finance and accounting, data entry and claims, and invoice and loan processing. Many organizations are looking to these emerging software tools' ability to perform well-defined, repetitive tasks traditionally performed by human workers as the next big source of corporate cost cutting and productivity improvements..."

              What's Holding back EMV?
              ComputerWorld, July 25th, 2016
              "New stats from Visa paint a sobering picture of the acceptance of EMV, a.k.a. chip cards. June stats from what Visa says are the 'top states for chip-ready merchants' show that 66% of merchants are not yet able to handle EMV.

              Nationally, that 'do not accept' number jumps to 72%. This is nine months after October's EMV liability shift, which was supposed to have been when most merchants were supposed to be accepting EMV transactions..."

                Training
                x
                Why Choose Oracle University for IT Training & Certification?
                By Breanne Cooley
                Breanne blogs:

                Career Growth: our training courses are designed to teach you skills that directly align with real-life IT jobs; empower yourself with in demand skills in a competitive job market.

                Salary Advancement: Certification magazine found that Oracle Certified Professionals earn higher salaries when compared to other DBA or Developer professionals. Earning this well-respected IT credential could make a positive impact on your wallet.

                Expert Instruction: learn Oracle from the same team involved in Oracle product development. You have questions and they have answers.

                Flexible Learning Options: train from anywhere, at any time, from any device. Pick the format that matches your learning style and schedule.

                100% Student Satisfaction Guarantee: if you're not completely satisfied with your training experience, you can re-take the same class for free. We're committed to providing the best IT training you can find.

                IT - Bitcoin
                x
                The Bitcoin Economy 'Has Grown and Matured,' Study Reveals
                devops.com, July 29th, 2016
                "Researchers have recently published a paper called 'The Evolution of the Bitcoin Economy: Extracting and Analyzing the Network of Payment Relationships,' which explains how the Bitcoin protocol is maturing...

                In partnership with Deutsche Bundesbank, the University of Wisconsin, and the UCL Centre for Blockchain Technologies, researchers declare that Bitcoin is maturing towards critical mass and enterprise usage.

                Data reveals that transactions across the network have risen 'exponentially,' and seem to be increasing at a rapid rate. This makes Bitcoin an appropriate study, researchers say, that explores how this cryptocurrency will evolve over time..."

                Why Florida's 'Bitcoin Isn't Money' Ruling Could Have Limited Impact
                CoinDesk, July 28th, 2016
                "In this opinion piece, Palley argues that a recent court case in which bitcoin was deemed not be "money" has questionable precedential value despite claims to the contrary..."

                "A Miami, Florida, trial court recently dismissed a criminal case against a defendant who had sold bitcoin to a police detective as part of an undercover investigation.

                The case, Florida v Espinosa, has been already been cited by some potentially important precedent for future cases, particularly those where bitcoin's status as 'money' or 'currency' is at issue. Bitcoin industry advocates will also cite the case when arguing for legislative reform and greater regulatory clarity..."

                Bitcoin: The Most Immutable Ledger of Them All
                bitcoin.com, July 30th, 2016
                "Since the creation of Bitcoin no cryptocurrency or private blockchain has compared to the exponential power of the longest running, immutable, peer-to-peer, distributed ledger...

                The Bitcoin blockchain has been the most popular distributed ledger since its inception in 2009. Over the course of its existence, many altcoins and privatized blockchains have entered the crypto space offering niche applications and bank-2-bank databases that have tried or are trying to take Bitcoin's place. So far nothing has been offered that compares to the irreversible, trust-free transactions and security provided by proof-of-work mining in the Bitcoin network..."

                IT - DevOps
                x
                The DevOps Force Multiplier: Competitive Advantage Security
                devops.com, July 28th, 2016
                "Several years ago, DevOps started hitting the eyes of enterprise business leaders when news outlets such as The Wall Street Journal and Forbes began reporting that the IT culture and methodology was helping adopters to gain a competitive advantage. Since then, we've seen story after story about how DevOps-focused employees are becoming the driving force behind the software and applications the world relies on for everything from mobile banking transactions to ride-hailing to gaming. Even the Pokemon company can't get enough DevOps engineers..."
                Why Every Tech Pro Should Learn to Code
                Network World, July 26th, 2016
                "You might think the need for coding skills applies only to programmers, but that is far from the case. This popular STEM skill has found its way into nearly every industry and is quickly becoming a skill.

                Coding is one of the hottest skills on the tech market. According to a recent survey from Burning Glass, programming jobs are growing 12 percent faster than the average. According to the survey in 2015 there were seven million job openings that required coding skills..."

                  5 things to consider with a DevOps release management solution
                  ITProPortal, July 30th, 2016
                  "DevOps is a modern software delivery movement that encompasses agile principles and encourages automation in application delivery. Why adopt it? It allows teams to reduce errors due to manual steps and break down silos between teams to improve communication and collaboration between all stakeholders within the business.

                  Whether you're knee deep in a DevOps transformation or just getting started, implementing a DevOps release management solution is an important step along the journey. Why? Because in today's on-demand economy, organisations must capitalise on any opportunity to improve application delivery throughout the organisation, irrespective of the development processes in place..."

                  Engaging Adoption of DevOps
                  devops.com, July 29th, 2016
                  "Executive mandate does not immediately translate into a change in behavior. Organizations inherently grasp the value of embracing DevOps, but the timing of exactly when it begins and is completed is another matter. The devil truly is in the details - or rather, in the ability and willingness of the organization to adopt a change in thinking and a change in the actions that follow..."
                  One DevOps tool for all clouds: Cloudify
                  ZDNet, July 29th, 2016
                  "Does your enterprise run multiple clouds? Yes? Then you should look into Cloudify...

                  Who doesn't want one program to run multiple clouds? I know I do. Cloudify, an open-source orchestration software company, now claims it can support all the top five public clouds and Azure, OpenStack, and VMware, with its latest release, Cloudify 3.4..."

                  MySQL
                  x
                  MySQL 5.7.14
                  MySQL Entomologist, July 30th, 2016
                  Valeriy Kravchuk blogs, "MySQL 5.7.14 was officially released yesterday. So, it's time to check what bugs reported by MySQL Community in public were fixed in this release. Some of these bugs are presented below.

                  As usual, let me start with InnoDB. The following bugs were fixed there:..."

                  MySQL on Docker: Single Host Networking for MySQL Containers
                  By Severalnines
                  Severalnines blogs, "Networking is critical in MySQL, it is a fundamental resource to manage access to the server from client applications and other replication peers. The behaviour of a containerized MySQL service is determined by how the MySQL image is spawned with 'docker run' command. With Docker single-host networking, a MySQL container can be run in an isolated environment (only reachable by containers in the same network), or an open environment (where the MySQL service is totally exposed to the outside world) or the instance simply runs with no network at all..."
                  On Uber's Choice of Databases
                  By Markus Winand
                  Markus writes, "A few days ago Uber published the article 'Why Uber Engineering Switched from Postgres to MySQL'. I didn't read the article right away because my inner nerd told me to do some home improvements instead. While doing so my mailbox was filling up with questions like 'Is PostgreSQL really that lousy?'.

                  Knowing that PostgreSQL is not generally lousy, these messages made me wonder what the heck is written in this article. This post is an attempt to make sense out of Uber's article..."

                  Cloud Computing
                  x
                  Get Started With Oracle Cloud - New Preconference Training Sessions!
                  Oracle OpenWorld Blog
                  The Oracle University Pre-Conference Training event being held on Sunday, September 18 from 8:30-3:30 just got better with the addition of the following Oracle Cloud training sessions which provide in-depth overview of features and functions designed for those evaluating or just getting started with Oracle Cloud Products:

                  • Oracle Database Cloud for Oracle DBAs
                  • Introduction to Oracle Human Capital Management Cloud
                  • Introduction to Oracle Financials Cloud
                  • Introduction to Oracle Service Cloud
                  • Introduction to Oracle Sales Cloud
                  • Introduction to Oracle SCM Cloud: Manufacturing
                  • Cloud Admin Essentials

                  Read on for details.

                  Oracle Service Cloud Release Recordings Now Available! - August 2016
                  By Ramona Costea
                  Ramona blogs, "The Oracle Service Cloud 2016 August release is here!

                  Check out our two recorded sessions to review the Service Cloud platform changes and get a feeling of the features and enhancement packages. The sessions are intended for a technical audience, more specific for consultants, application engineers, solution consultants, CSMs, BDMs, customer care, upgrades but also to anyone else wanting a look at the solution changes..."

                  Linux
                  x
                  Oracle OpenStack for Oracle Linux is now certified as 'OpenStack Powered'
                  By Zeynep Koch
                  Zeynep blogs, "One of the top 3 reasons users are adopting OpenStack for their Cloud is 'Open platform and ecosystem, including flexibility of underlying technology choices.'

                  Oracle OpenStack for Oracle Release 2.1 is now certified as 'OpenStack Powered' achieving high level of interoperability among various products and services enabling a large OpenStack ecosystem for end users. User's can accelerate their ability to innovate and compete by deploying applications faster on Oracle 'OpenStack Powered' platform since software applications using standard API are assured interoperability..."

                  IT - Cloud
                  x
                  AWS vs Google vs Microsoft: How the enterprise cloud war is hotting up
                  ComputerWeekly, July 29th, 2016
                  "With Amazon, Google and Microsoft all reporting strong growth on the back of cloud, we take a closer look at how they have achieved it...

                  The grip that Amazon Web Services (AWS) has on the infrastructure-as-a-service (IaaS) market can make it hard for even relatively big players to get a look-in when enterprise CIOs shop around for cloud services.

                  Microsoft has managed to hold its own, with the help of its Azure platform, by focusing on convincing its existing base of on-premise enterprise customers to ditch their own servers and use its cloud infrastructure..."

                  Customer Service: The Next Challenge for Cloud Providers
                  InfoWorld, July 26th, 2016
                  "Customer service is still a new concept for many cloud providers, but you can make sure you get what you need by communicating clearly...

                  Public cloud providers are not new, but their interactions with enterprises are still in the early stages. Not long ago, few public cloud providers picked up the phone. Today, public cloud providers must respond to users. Moreover, as an enterprise that works with a public cloud, you must learn how to effectively communicate with cloud providers, on both sales and operational issues..."

                    Gartner Sees $1 Trillion Shift In IT Spending To Cloud
                    InformationWeek, July 25th, 2016
                    "The shift in IT spending from traditional hardware and software to cloud computing will continue over the next five years. The transfer will total $1 trillion, according to Gartner.

                    IT spending is undergoing a shift from traditional sources, such as direct server and software license purchases, into public cloud computing. The amount of money IT will spend on cloud services this year is $114 billion, and will grow to $216 billion in the year 2020, according to a report released by Gartner..."

                    Is Cloud Bursting Right for You?
                    Business 2 Community, July 29th, 2016
                    "The great promise of the hybrid cloud is the efficiency it can bring to data centers. Most data centers were originally built to serve a particular purpose, but now they're handling more and more tasks as IT has become even more business critical, whether performing heavy duty analytics, provisioning storage, protecting sensitive data, or more. As a result, modern data centers have become as cluttered as a garage filled with boxes and tools.

                    Moving storage and compute resources to the public cloud can free up space in the data center for other tasks that might be more important for specific business goals..."

                    Is Corporate Sustainability Shaping your Cloud Adoption Strategy?
                    Network World, July 26th, 2016
                    "Corporate sustainability departments looking to reduce waste are influencing IT decision making, and it could lead to increased cloud adoption...

                    As corporate sustainability increasingly exercises influence on IT decision making, the question becomes how will it affect technology adoption trends. Will cloud adoption accelerate as result?

                    The public cloud provides a good story for corporate sustainability in its 'reveal' of resources consumed..."

                      Successful cloud migration isn't about strategy or technology
                      CIO, July 29th, 2016
                      "At this point in time, every CIO knows that the cloud is a more agile, faster and cheaper place to be. But they have a tremendous amount of technical debt in legacy ecosystems, which, so far, has proved to be largely resistant to moving into cloud. There are a lot of companies, like AWS, that will help you - for free - evaluate your applications portfolio and help you calibrate which applications can move to the cloud. So it's not that we lack the knowledge or the technology to migrate to the cloud. The problem is that the people that manage legacy ecosystems resist their moving to the cloud..."
                      IT - CxO
                      x
                      10 Hiring Challenges Confronting CIOs (slideshow)
                      InformationWeek, July 28th, 2016
                      "CIOs are seeing the highest level of skills shortage since the Great Recession of 2008-09 and other hiring issues, according to the 2016 Harvey Nash/KPMG CIO Survey. Find out where these challenges exist and to what extent...

                      Around the globe, CIOs report facing the highest level of skills shortage since the Great Recession that began in 2008. Large enterprises are struggling to hire data analytics savants, project managers, and enterprise architecture experts. Small companies are in dire need of workers in big data analytics and development.

                      But that is only part of the hiring issues that CIOs are facing, according to the recently released 2016 Harvey Nash/KPMG CIO Survey. The survey of 3,352 CIOs and technology leaders across 82 countries was conducted from Dec. 12, 2015 to April 10, 2016..."

                      2016 Internet Trends Report
                      CIO, July 30th, 2016
                      "Every year, Mary Meeker, a partner with Kleiner Perkins, puts out a compilation report looking at the latest trends in online technology and marketing. The reports talk about everything from advertising budgets to mobile devices, and they offer critical insights into how customers are engaging with technology.

                      2016 Internet Trends Report from Kleiner Perkins Caufield & Byers

                      This year's report has just come out, and it shares a lot of revealing data. Here are some important highlights from the 2016 Internet trends report:..."

                        7 strategies to avoid CSO burnout (Slideshow)
                        ComputerWorld, July 27th, 2016
                        "Strategy 1: After major incidents, take time for self-rejuvenation

                        After a significant incident or breach, take the appropriate amount of time to recharge. When things go wrong in this job, and they do, the days are long, stressful and thankless. But similar to first responders, it's important to take time for self and center and recharge after the dust has settled. It's the only way to live to fight for another day..."

                          Becoming a Global Chief Security Executive Officer
                          SearchSecuity, July 29th, 2016
                          "In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, author Roland Cloutier discusses the primary role of the chief security officer...

                          There is no doubt that the CSO role has significantly developed and expanded in the past decade. From technology, to convergence, to legal considerations, the security executive requires broad, career-focused technical acumen across a large set of service areas while still serving as a business executive supporting the organization's goals and strategies and managing his or her business of security..."

                          How to attract a board-level cybersecurity expert
                          CSO Online, July 28th, 2016
                          "Suzanne Vautrinot's impressive cybersecurity experience has been in high demand since she retired from the U.S. Air Force in October 2013. As a major general and commander, she helped create the Department of Defense's U.S. Cyber Command and led the Air Force's IT and online battle group.

                          In the past year alone, she has fielded 'more than a handful' of phone calls from company executives and recruiters who hope to attract her to their board of directors, but she doesn't jump at every opportunity. She has turned down board positions 'more than once' because she perceived that the company wasn't committed to cybersecurity initiatives or that she wouldn't be active in any board matters beyond security..."

                          How to Be a More Effective IT Buyer
                          FCW, July 25th, 2016
                          "The federal government spent approximately $50 billion on IT in each of the past three fiscal years, according to Federal Procurement Data System totals for the Federal Acquisition Regulation Part 2 definition of IT. That makes IT one of the largest of the 10 categories of common goods and services spending governmentwide.

                          In fiscal 2015, that $50 billion in obligations broke out this way in six IT subcategories: Outsourcing $29.4 billion, hardware $11.5 billion, software $6 billion, telecommunications $1.8 billion, consulting $1.2 billion and IT security $1.2 billion..."

                          How to Stop Making Costly IT Contract Mistakes
                          CIO, July 25th, 2016
                          "Poor IT contract management can cost your business time, money and legal fees. Here's how to minimize risk by focusing on restructuring contract management and training employees around compliance...

                          Managing IT contracts is sensitive business. Typically, corporate relationships and large sums of money are on the line. One Western Australian public servant recently learned the pitfalls of poor contract management the hard way. The employee overspent $40 million dollars on an IT contract in the healthcare industry. .."

                          Six essential processes for keeping data secure
                          ComputerWeekly, July 29th, 2016
                          "Data security is increasingly vital for organisations as the countdown begins for compliance with new rules imposed by the EU's general data protection regulation...

                          Data is one of the most valuable assets a business has at its disposal, covering anything from financial transactions to important customer and prospect details. Using data effectively can positively impact everything from decision-making to marketing and sales effectiveness. That makes it vital for businesses to take data security seriously and ensure the necessary precautions are in place to protect this important asset..."

                          The 5 Things Keeping IT Leaders up at Night
                          Information Management, July 29th, 2016
                          "It should come as a surprise to no one that IT professionals at the top of their field are facing increased anxiety within the workplace. While it used to be an ancillary part of the business, IT is now taking on a central strategic role that touches every facet of the business, including HR, marketing, and customer relations.

                          With data breaches making daily news headlines and the near-constant pressure to remain abreast of the latest best practices, IT has evolved well beyond a typical 9-5 job as businesses are expected to make themselves available to customers 24/7..."

                            This Former LinkedIn Product Manager's Surprising Leadership Formula
                            Fast Company, July 27th, 2016
                            "Over a career spanning eBay, LinkedIn, and Instacart, Elliot Shmukler figured out how to turn A/B testing into a management tool...

                            Over his career, Instacart VP of product Elliot Shmukler has seen the interplay of people and products unfold across many industries. For instance, the former Wealthfront and Linkedin product leader knows that much of what takes people sideways with money and career involves emotions. He's also seen the same dynamic at play as product managers make decisions to pursue ideas, essentially their currency at a startup..."

                            U.S. and EU Tech Companies at Sea with End of Data Safe Harbor
                            ComputerWorld, July 26th, 2016
                            "New EU regimes are under consideration, but currently uncertainty reigns...

                            Nobody is more aware of our shrinking world than technology executives. They are also in a good position to see that contradictory requirements in the areas of data protection and privacy have created a confusing patchwork that, at times, runs counter to a global marketplace that places a premium on close collaboration and the smooth transfer of digital information..."

                              What a Chief Strategy Officer Does, and Why You Need One
                              HelpNet Security, July 26th, 2016
                              "Seasoned IT security expert and former Gartner analyst Richard Stiennon recently became the Chief Strategy Officer for the Blancco Technology Group...

                              It was the perfect opportunity to talk with him, and explore the challenges that come with filling this pivotal information security role - a role that requires the executive to be involved in not just long-term strategic planning, but also product positioning, public affairs, analyst relations, joint ventures and industry partnerships..."

                              vBeers-SF
                              x
                              vBeers @ Palm Beach Gardens - Twisted Trunk And August Schedule
                              Wednesday, August 3rd, 2016
                              Come out and connect with other professionals in your industry!

                              The South Florida Technology Alliance (SFTA) vBeers events happen four times each month, once each in these cities: Palm Beach Gardens, Oakland Park, Boca Raton and Miami.

                              These informal networking/social events provide a relaxed environment to meet with other IT professionals and promote the growth of IT in South Florida.

                              vBeers start at 6PM

                              • Wednesday, August 3rd @ Twisted Trunk Brewing
                              • Wednesday, August 10th @ Funky Buddha Brewery
                              • Wednesday, August 17th @ Biergarten Boca
                              • Wednesday, August 24th @ M.I.A. Beer Company

                              Pleaase register @ meetup.com

                              John Mclaughlin, SFTA

                              IT - Networks
                              x
                              IT Pros Want Relief From Network Costs, Complexity, Talari Survey Says (Slideshow)
                              eWeek, July 29th, 2016
                              "At a time when businesses are increasingly adopting cloud computing, the number of connected mobile devices is growing, applications are coming from multiple sources and the amount of data is accumulating rapidly, the network is becoming even more important. That importance was illustrated in the results of a recent survey by Talari Networks, one of a growing number of vendors of software-defined WAN (SD-WAN) technology, in which most respondents said that a reliable network is crucial to the success of their businesses and that they rely on the WAN for many of their most important tasks...."
                              Low-speed Ethernet champions set plugfest ahead of new net standard
                              NetworkWorld, July 26th, 2016
                              "Hand-in-hand with the forthcoming adoption of a low-speed Ethernet standard by the IEEE, proponents of the technology will hold an interoperability plugfest in October to tout the readiness of 2.5GBASE-T and 5GBASE-T products.

                              The new specification -- IEEE P802.3bz - defines 2.5GBASE-T and 5GBASE-T, significantly boosting the speed of traditional Ethernet without requiring the tearing out of current cabling..."

                              IT - IoT
                              x
                              75 Top IoT Devices
                              Datamation, July 26th, 2016
                              "By most market estimates, the Internet of Things is poised for extremely rapid growth. Gartner predicts, '6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and will reach 20.8 billion by 2020.' It adds, 'In 2016, 5.5 million new things will get connected every day.'

                              Cisco takes an even more bullish view, forecasting that the Internet of Things will include 50 billion devices by 2020..."

                              Architecting for the Internet of Things By Ryan Betts
                              O'Reilly, July 27th, 2016
                              "As the IoT continues to evolve, large vertical capabilities are converging to form an unexpected - and strong - new reference architecture for this emerging network. Machine-to-machine communications, big data, cloud computing, distributed systems, networking, mobile and telco, apps, and smart devices all contribute to IoT capabilities. This O'Reilly report examines the critical role that operational databases play in that convergence..."
                              GE Digital announces industrial developer toolkit, Predix Kits
                              ZDNet, July 26th, 2016
                              "GE Digital expects to have more than 20,000 developers building on the Predix industrial IoT platform by the end of the year.

                              GE Digital on Tuesday announced it will soon release Predix Developer Kits, the latest step designed to foster a developer community around Predix, its industrial Internet of Things (IoT) platform.

                              The cloud-based software platform launched in 2015, and there are now nearly 12,000 developers building on it, according to GE. The company expects that number to grow to more than 20,000 by the end of the year..."

                              How IoT Helps Transplant Surgeons Track Organ Shipments
                              Network World, July 25th, 2016
                              "Medical teams track donated organs in real time with OrganTracker and KORE to manage the logistics of transplant surgeries...

                              Transplanting organs is a matter of life and death. That's why a donated organ has to be transported quickly and safely.

                              There are more than 120,000 people on the United Network For Organ Sharing (UNOS) National Waiting List. Some patients have to wait up to five years for an organ donation. With so much at stake, how do you make sure a donated organ is transported safely to the recipient?..."

                                IoT: A hacker's dream come true?
                                Help Net Security, July 29th, 2016
                                "There's a lot more to the web than the cat-video-laden sites we normally see. In fact, according to most sources, the web that we can typically get to via our browser of choice represents only a small fraction of what's out there.

                                This deep web is an ocean of content that is not visible to search engines and cannot be easily stumbled over - existing as it does behind locked forms, encrypted connections, and hidden systems. Yet, even within the deep web there are darker corners, where the information isn't just difficult to find, but actively hidden, and often for good reason..."

                                  Thread Group, OCF to Partner on IoT Standardization Efforts
                                  eWeek, July 30th, 2016
                                  "The two industry groups will work together to improve the interoperability of devices and applications in the connected home.

                                  The Thread Group and the Open Connectivity Foundation are the latest industry groups in the internet of things space to partner in hopes of bringing some unity to a fragmented market.

                                  The two industry consortiums this week announced they plan to work together in their efforts to drive interoperability between the tens of millions of devices, systems and sensors that make up the internet of things (IoT) for the connected home..."

                                  IT - Linux
                                  x
                                  5 Best Calendar Apps for Linux Desktop
                                  Tecmint, July 29th, 2016
                                  "Time is money, as goes an old saying, therefore you need to manage it very well. This then calls for proper planning of your daily schedule, future events, appointments and several other daily activities...

                                  But you can't keep all your plans in mind, I guess no, at least a few but not all. So you need to have certain things around you to always keep reminding you of what you want to do, the people you are hoping to meet, events you plan to attend and many more..."

                                    Top 50 Linux System Administrator Interview Questions
                                    ComputerWorld, July 29th, 2016
                                    "Short Bytes: Today, the job opportunities for Linux experts are more than ever. The Linux SysAdmin interview questions range from basic Linux questions to networking, DevOps, and MySQL questions. So, one needs to prepare adequately to ensure success in the Linux system administrator interview process...

                                    According to a report, the open source and Linux job market is full of new opportunities. Due to the increasing adoption of open source technologies by the technology giants (Microsoft says HELLO!), there are ample job opportunities for system administrators and DevOps professionals..."

                                    IT - Operations
                                    x
                                    9 Steps for a Successful Incident Response Plan (Slideshow)
                                    CSO Online, July 26th, 2016
                                    "Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored.

                                    This quick guide from Cybereason takes a closer look at nine of the often forgotten, but important steps that you should incorporate into your IR plan..."

                                      Data Center Security Requires Paranoia
                                      Network Computing, July 25th, 2016
                                      "Imagine you are walking home very late at night. In the distance, you can hear rough laughter and the sound of breaking glass. You walk a little faster, your heart rate elevated, until you can put your key into the lock at your front door, let yourself in, and then lock the door behind you. You breathe a sigh of relief and head off to bed feeling safe and trusted inside your own home.

                                      For decades, companies and government institutions have stored the 'crown jewels' of their computing assets in a trusted environment, the data center. Now data centers -- and by extension, cloud computing facilities like Amazon Web Services and Microsoft Azure -- are no longer perceived as trusted environments. Insider threats, malware, and melting perimeters mean the network perimeter between the data center and the Internet is no longer the DMZ..."

                                      IT - Security
                                      x
                                      In Security, Know that You Know Nothing
                                      Dark Reading, July 26th, 2016
                                      "Only when security professionals become aware of what they don't know, can they start asking the right questions and implementing the right security controls...

                                      As I head into one of the most popular security conferences of the year, Black Hat, there are a few things that I expect to be top of mind for security professionals both at the show and in the various enterprises where they work:..."

                                      3 Ways Websites Get Pwned -- and Threaten You
                                      InfoWorld, July 26th, 2016
                                      "Hackers are maliciously manipulating both sides of the web experience, but a little due diligence goes a long way to thwart them...

                                      Some days when I'm wasting time on the internet, it seems like I can't visit three websites in a row without hitting a fake 'you're infected' scam or bogus browser extension ad. Most of the time these malicious offerings launch on otherwise legitimate websites -- or secretly direct your browser to illegitimate websites.

                                      For almost a decade now, a greater number of legitimate websites than malicious ones have been launching malware. The question is how a legitimate website gets compromised in the first place..."

                                        Black Hat: 9 free security tools for defense & attacking
                                        NetworkWorld, July 29th, 2016
                                        "Some of the researchers who at Black Hat will show how they hack and release the tools they used to do it...

                                        When Black Hat convenes next week in Las Vegas, it will be a rich environment for gathering tools that can be used to tighten security but also - in the wrong hands - to carry out exploits.

                                        Researchers presenting generally point out the value these releases hold for researchers like themselves who operate in experimental environments as well as for enterprise security pros who want to build better defenses against such attack tools..."

                                        Businesses Failing to Secure Privileged Accounts
                                        CIO, July 25th, 2016
                                        "A new benchmark survey finds that more than half of organizations have a failing grade when it comes to securing privileged accounts that can give attackers access to their entire networks...

                                        Most companies fail to secure the 'keys to the kingdom,' according to a new benchmark survey .

                                        Last week, privileged account management (PAM) specialist Thycotic and research firm Cybersecurity Ventures released their 2016 State of Privileged Account Management security report, based on the responses of more than 500 IT security professionals who have participated in the Privileged Password Vulnerability Benchmark survey to date..."

                                        Choosing a Next-Generation Firewall: 7 Factors
                                        NetworkComputing, July 27th, 2016
                                        "NGFWs are key to an enterprise network security strategy. Here's what to consider when shopping for one...

                                        If there is one network security device that has changed significantly in the past decade, it would have to be the firewall. What once was a simple access control gate between trusted and untrusted networks has now morphed into a multi-faceted and multi-layered threat management system..."

                                        Dispelling the myth of 'perfect' security
                                        FCW, July 27th, 2016
                                        "Because governments are the most-attacked organizations in the world, there has been broad recognition that the old approaches to security, based on the impossible premise that security must be perfect, aren't working, and a new approach, based on the premise that security doesn't have to be perfect to still be successful, is needed.

                                        The Defense Department in particular has depended on physical segmentation to protect itself..."

                                        How Trust and Security in the Enterprise Have Evolved in 40 Years (Slideshow)
                                        eWeek, July 26th, 2016
                                        "Mainframe computers, personal computers, client/server systems, the Internet, mobile computing, cloud, multicloud, Internet of things (IoT): Information technology never stops evolving. Also evolving are our beliefs about trust and security and how we implement them to keep our connected world safe and secure. When PCs began selling worldwide in the early 1980s, security was not considered a fundamental component in any system that wasn't for military, government or scientific use. With the coming of the Internet in the early '90s, however, all of that changed very quickly..."
                                        NIST blog clarifies SMS deprecation in wake of media tailspin
                                        ZDNet, July 29th, 2016
                                        "Agency goal is two-factor authentication for all levels of security assurance, but SMS is not on preferred factor list

                                        Whoa! Hold on there two-factor authentication killers!

                                        The National Institute of Standards and Technology Friday published a blog explaining its guidance on the deprecation of SMS as a viable second factor for strong authentication..."

                                        SMS-Based Two-Factor Authentication May Be Headed Out the Door
                                        Dark Reading, July 26th, 2016
                                        "SMS messaging for two-factor authentication might become a thing of the past. A federal agency is discouraging its use.

                                        The National Institute of Standards and Technology is pushing for the change. The latest draft of its Digital Authentication Guideline, updated on Monday, warns that SMS messages can be intercepted or redirected, making them vulnerable to hacking.

                                        Many companies, including Twitter, Facebook and Google, as well as banks, already use the phone-based text messaging to add an extra layer of security to user accounts..."

                                        So You want to be a Security Researcher?
                                        IT World, July 26th, 2016
                                        "Security researchers need a broad set of skills to investigate a constantly-changing threat landscape. But specializing in areas such as reverse engineering or network forensics will boost opportunities...

                                        According to Verizon's 2015 Data Breach Investigations Report, more than 317 million new pieces of malware -- computer viruses or other malicious software -- were created in 2014. That means nearly one million new threats were released each day..."

                                        White House unveils federal cybersecurity plan and attack rating system
                                        NEWSBTC, July 29th, 2016
                                        "The White House's new federal cybersecurity plan outlines the responsibilities of each agency in a cyberattack and creates a rating system to determine the severity of an attack.

                                        A new White House directive aims to make clear the responsibilities of each federal agency in the event of a cyberattack and create a rating system to determine the severity of an attack.

                                        The Presidential Policy Directive (PPD) on United States Cyber Incident Coordination aims to clarify the federal cybersecurity incident response plan, ensuring understanding of which agency takes the lead in certain situations and making cooperation between agencies more efficient ..."

                                          7 Ways to Charm Users Out of their Passwords
                                          Dark Reading, July 27th, 2016
                                          "While the incentives have changed over time, it still takes remarkably little to get users to give up their passwords.

                                          What won't users give up in exchange for their passwords?

                                          Not much, as it turns out.

                                          It is indeed curious what induces users to divulge passwords to perfect strangers..."

                                            IT - Careers
                                            x
                                            Five Pro Tips to Nail an Interview and Land Your Dream Job
                                            Fast Company, July 25th, 2016
                                            "From those first critical five minutes to the right way to say 'thank you,' we've gathered the best tips on how to ace any job interview...

                                            It's a great time to be looking for a job. There were 5.5 million jobs open last month across sectors from technology to health care, retail, and manufacturing. Couple that with the capability to search and apply for jobs online and via mobile and candidates now have more control over the job-seeking process than ever..."

                                            How infosec professionals can improve their careers through writing
                                            SearchSecuity, July 28th, 2016
                                            "Writing can be one of the best ways to establish your reputation as an infosec professional. Expert Joshua Wright of the SANS Institute explains the best ways to do it...

                                            The technology industry has no shortage of intelligent and skilled infosec professionals. Yet too often their brilliance often goes unrecognized outside of their immediate circles.

                                            Many infosec professionals have amazing security stories and technical solutions to share. Yet their knowledge reaches a limited audience when shared via word of mouth..."

                                            How to Win in Today's Job Market
                                            Business 2 Community, July 28th, 2016
                                            "It is well-known that in today's economy, job seekers face unprecedented challenges. One of them is the large numbers of applicants chasing just a few openings, but another is their lack of understanding of the rules of the competition. Many discount the fact that employers use different methods of selecting final candidates by applying certain technology, and those job applicants simply keep doing what they did years ago, when they almost always had success finding a job..."
                                              Why IT Managers Are Desperate for Employees with Soft Skills
                                              Information Management, July 26th, 2016
                                              "One of Ephraim McLean's favorite things to tell his students is that he started working in the IT industry back in 1962.

                                              'My students gasp,' he said in a recent interview. 'They say, 'that's 54 years ago, I wasn't even born.' The guy next to him says, 'hell, my father wasn't even born then.''

                                              McLean got his start working for Procter & Gamble, first as a factory manager and later doing systems work installing a plant payroll. He left the company in 1965 to earn his masters and Ph.D. degrees at MIT.

                                              After graduating he joined the faculty at UCLA and later took a faculty position at Georgia State University in Atlanta, where he's been ever since. Over the last several decades he's witnessed tectonic shifts within the IT industry as it's evolved from an ancillary part of the business into a vital, customer-facing role..."

                                                IT - Virtualization
                                                x
                                                System Containers vs. Application Containers: Does the Difference Matter?
                                                Container Journal, July 25th, 2016
                                                "Is it time to differentiate between application containers and system containers? Some companies think so. Here's a look at why the difference matters - or not, depending on your preferences.

                                                When people talk about containers in the era of Docker, they usually mean what would most properly be called an application container. That term refers to a container whose job is to run a single application inside an isolated environment.

                                                Application containers are the primary use case for Docker, which is arguably the only container company that has made a big splash in the IT world writ large..."

                                                IT - Backup
                                                x
                                                BT outage highlights need for Backup and Disaster Recovery (BDR)
                                                ITProPortal, July 29th, 2016
                                                "The Telecity data centre 'outage' that knocked 10 per cent of BT Internet subscribers offline in the UK recently (20/07/16) stands as a stark reminder of how vulnerable our systems are, and how important it is to have a solid Backup and Disaster Recovery (BDR) solution in place.

                                                As data continues to grow in volume and value, businesses are increasingly turning to the cloud to meet their data storage and management needs..."

                                                Data Backup Strategy: 7 Considerations
                                                NetworkComputing, July 25th, 2016
                                                "Data backup is an essential part of data center operations, but it's important to really understand what makes a backup strategy successful. Most people say that it's necessary to have a second copy of data in case the original copy fails. That's true, but it is only part of the story.

                                                A good backup strategy is obviously going to create that second copy, but it is more crucial that, when file recovery is needed, the data can actually be found quickly. This was a problem with straight tape backup, which could have recovery times in the tens of minutes for a single file..."

                                                IT - Mobile
                                                x
                                                Broken Android phone made me strangely happy
                                                ComputerWorld, July 28th, 2016
                                                "A funny thing happened this week: My wife's Android phone stopped working -- and after troubleshooting it and concluding there was no easy fix, I chuckled to myself and felt a strange sense of wonder.

                                                Let me step back a bit and explain. The missus has a Nexus 5X (yup), and it's generally served her well since she moved into it last fall. She's much more of a 'typical phone user' than I am (though an exceptional all-around person -- hi, honey!), and the 5X proved to be the right mix of power and comfort for her needs..."

                                                  IT - Big Data
                                                  x
                                                  10 Steps to Becoming a Data Scientist (slideshow)
                                                  Information Management, July 28th, 2016
                                                  "The desire today for a career in data science is exceeded only by the difficulty of breaking into the field. It's often grueling and quite challenging, though the rewards can be enormous. Here are the top things to know if you want to become a data scientist...."
                                                    2 Simple Strategies for Using Big Data to Effectively Raise Capital and Increase Employee Engagement
                                                    Smart, July 30th, 2016
                                                    "From funding campaigns to customer service, every facet of your business impacts how customers perceive your brand and feel about your products. Perception is reality, especially in business. To create a loyal customer base, your company needs to perceive their needs before they do. And, in order to actually act on those perceptions, your organization needs funding and an engaged workforce.

                                                    Let's look at 2 ways your business can leverage big data to create value for shareholders and customers by engaging your workforce..."

                                                    Big Data: Big Opportunities
                                                    CIO, July 26th, 2016
                                                    "You've got data. Now it's time to harness the power of analytics and drive business value...

                                                    f you haven't created and launched your big data and analytics strategy, you may already be behind your competitors. We asked CIOs, CEOs, and other IT professionals whether they're using big data and analytics, and why or why not. The overwhelming majority of respondents are not only using big data and analytics, but consider it essential to their business operations..."

                                                    IT - BYOD
                                                    x
                                                    Beyond BYOD: Does it still matter?
                                                    ITProPortal, July 25th, 2016
                                                    "Ever since Intel first introduced the 'Bring-Your-Own-Device' concept in 2009, BYOD has seen broad and popular adoption around the world. A recent Tech Pro Research report on BYOD found that 72 per cent of organisations polled were permitting BYOD or planning to do so...

                                                    Companies promote BYOD because it supports remote working, and that is linked to significant gains in productivity, the report points out. Increasing worker communication leads directly to that much-desired goal. Information gets to where it is needed faster; projects are completed more rapidly and decisions get made more quickly at enterprises that adopt mobility..."

                                                    Top10
                                                    x
                                                    Top Ten Articles for last few Issues
                                                    Vol 221 Issues 1 and 2 ; Vol 220 Issue 1, 2, 3, 4 and 5; Vol 219 Issue 4
                                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                    • Public PaaS for Dummies - free eBook
                                                    • IBM GSKit using SPARC S7 Hardware Encryption 5X faster than Xeon E5
                                                    • Enhanced Oracle VM Utilities
                                                    • Oracle VM VirtualBox 5.1.2
                                                    • OAuth and Oracle JET
                                                    • Friday Spotlight: Easily Create 3rd Party Hardware Driver for Oracle VM Server
                                                    • Oracle Critical Patch Update for July 2016
                                                    • 3 Keys to Modernizing University Operations
                                                    • The Value of Database Support
                                                    • Social Media In A Regulated Industry: How Yorkshire Building Society Does It

                                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                                      IT - Encryption
                                                      x
                                                      Only a Third of Sensitive Data Stored In Cloud-Based Applications Is Encrypted
                                                      HelpNet Security, July 26th, 2016
                                                      "Despite the continued importance of cloud computing resources to organisations, companies are not adopting appropriate governance and security measures to protect sensitive data in the cloud, according to a new Ponemon Institute study that surveyed more than 3,400 IT and IT security practitioners worldwide..."
                                                      The Importance of SSL Certificates
                                                      Business 2 Community, July 28th, 2016
                                                      "SSL (secure socket layer) certificates are very important in today's world of online business, so any website that wants to accept online payments must implement this concept. Continue reading to see why SSL really matters.

                                                      SSL certificates will not only benefit your e-commerce website, but your customers as well. If you want to be successful in the online world you must take the necessary steps for gaining confidence of your website visitors and potential customers..."

                                                        IT - Server
                                                        x
                                                        White Boxes Are Now Ready for Prime Time
                                                        Network World, July 27th, 2016
                                                        "White box switches have come a long way. Their cost, reliability and features mean they're ready for a broader range of companies to use - not just large enterprises.

                                                        White box switches have been around for years, but adoption has been limited to niche companies that have large engineering departments. The rise of software-defined networking (SDN) has brought them into the public eye, though, as a lower-cost alternative to traditional network hardware. In fact, some of the early messaging around SDN revolved around using white boxes as a complete replacement for all network hardware..."

                                                        IT - Tape
                                                        x
                                                        In a tape archive system, how can LTFS and LTO products help?
                                                        SearchDataBackup, July 29th, 2016
                                                        "Linear Tape File System and Linear Tape-Open technology can improve user access and durability in your tape archive system. Explore specific products that do the job...

                                                        Active archiving products have been pressed forward by library makers, including Spectra Logic. That company has blazed a trail to integrate active archiving directly into the workflow of specific vertical markets, like media and entertainment companies, converting video clips from editing systems into objects and transferring the object buckets directly to tape via an appliance called BlackPearl..."

                                                        Security
                                                        x
                                                        SQL Injection Detection and Alerting are Vital For Secure Data
                                                        By Alex Slotnick
                                                        Alex blogs, "The recent Mossack Fonesca 'Panama Papers' hack is the latest security breach to drive home how much an impact an SQL injection can have on modern-day organizations. Though that hack ultimately revealed massive professional fraud by companies and governments around the world, it involved the exposure of 11.5 million confidential documents. The 2.6 terabytes of data stolen were a powerful reminder that the history of web-based business has been riddled with instances of SQL injections. They remain common and potentially devastating to organizations..."
                                                        Nexenta News
                                                        x
                                                        Three Dimensions of Storage Sizing & Design - Part 3: Speed
                                                        Nexenta, July 27th, 2016
                                                        Edwin Weijdema blogs, "In this third post of the multi-post Three Dimensions of Storage Sizing & Design we will dive deeper in the dimension: Use and specifically the application Workloads part characteristic Speed. Depending on the application workload requirements, you will need to size the storage system for The Need for Speed. So let us dive deeper into IOPS.

                                                        Speed with computer storage devices like hard disk drives (HDD), Solid State Drives (SSD) and Storage Area Networks (SAN) is expressed in Input/Output Per Second (IOPS). Applications will interact with storage for retrieving and storing data..."

                                                        Cisco News
                                                        x
                                                        Cisco 2016 Midyear Cybersecurity Report Predicts Next Generation of Ransomware; New Tactics Emerging to Maximize Profit
                                                        Closing Attackers' 'Window of Opportunity' Is Top Priority for Organizations
                                                        The Cisco (NASDAQ: CSCO) 2016 Midyear Cybersecurity Report (MCR) finds that organizations are unprepared for future strains of more sophisticated ransomware. Fragile infrastructure, poor network hygiene, and slow detection rates are providing ample time and air cover for adversaries to operate. According to the report's findings, the struggle to constrain the operational space of attackers is the biggest challenge facing businesses and threatens the underlying foundation required for digital transformation. Other key findings in the MCR include adversaries expanding their focus to server-side attacks, evolving attack methods and increasing use of encryption to mask activity.
                                                        Dell News
                                                        x
                                                        Customers Validate the Advanced Protection Provided by SonicWALL Capture, Now Available With the Release of SonicOS 6.2.6
                                                        SonicWALL Capture Advanced Threat Protection Service, the first-to-market multi-engine sandbox enabled to block suspicious files until verdict, transitions from technical preview to general availability
                                                        SonicWALL customers observed dramatic increases in their network security during the technical preview of SonicWALL Capture Advanced Threat Protection Service. With the general availability of SonicOS 6.2.6 firmware announced today, SonicWALL Capture is the industry's first multi-engine sandbox that enables customers to block suspicious files until a verdict is reached. Additionally, SonicOS 6.2.6 features an enhanced Content Filtering Service that gives organizations the power to easily enforce protection and productivity policies to control access to inappropriate or unproductive web content.

                                                        Available for use with SonicWALL TZ, NSA and SuperMassive 9000 series firewalls, SonicOS 6.2.6 with SonicWALL Capture protects customers from today's most advanced threats, including zero-day attacks.

                                                        New Dell Global Study Shows Business and IT Decision Makers are Aligned on Key IT Trends
                                                        Increasing business productivity, followed closely by growing the business, are the main considerations for IT decisions
                                                        Dell announced the results of a new Dell State of IT Trends 2016 global study , which finds business decision makers' (BDMs) and IT decision makers' (ITDMs) understanding of current IT trends are much closer than they are generally perceived to be.

                                                        In the past, business and IT leaders had different levels of understanding of IT trends and technologies. However over time, business and IT leaders' perceptions of technology have evolved and more closely aligned as new technologies have entered the market and become increasingly critical drivers of an organization's success.

                                                        The Dell State of IT Trends 2016 global study reveals a greater sophistication and alignment in understanding of IT trends between the two groups. The results indicate that IT and business leadership are better collaborating and having in-depth conversations about not only how technology works but how it can propel the business forward...

                                                        Saensuk pilots smart city living with first healthcare Internet of Things project in collaboration with Dell and Intel
                                                        Proof-of-concept developed for the pilot project lays the foundation for other smart applications and large-scale smart city deployments
                                                        Saensuk Smart City, a project by the Saensuk Municipality in Thailand, has become the first smart city in the country to announce a live pilot based on multiple proofs-of-concept (PoCs) that can be extended to other innovative, reliable smart applications. The first phase of the project is the implementation of an intelligent healthcare monitoring system, aimed at improving the quality of care towards the locale's ageing population. Piloted in collaboration with technology partners Dell, Intel and the IoT City Innovation Center (ICIC), this smart healthcare project is the first of its kind to be implemented in Thailand.
                                                        Stay Ahead of the Class with Dell's A Tech Devices for Back to School
                                                        Large selection of 2-in-1s, laptops, desktops, and gaming systems to fit every student's budget, backpack or desk
                                                        Students today know that having access to up-to-date technology is essential for them to engage in learning that will prepare them for success inside and outside of the classroom. Dell's back-to-school products are the perfect companion for the techies, gamers, budding entrepreneurs, musicians, fashionistas and more looking for a system for school, work and entertainment. With ultimate visual experience, mobility, design and industry-leading battery life, students can start the year with their best foot forward.
                                                        Microsoft News
                                                        x
                                                        How Microsoft Is Making Big Impact With Machine Learning
                                                        Forbes, July 30th, 2016
                                                        Janakiram writes in Forbes, "During the last two years, Microsoft has upped the ante on Machine Learning and Analytics. From hiring top notch data scientists to acquiring niche startups, Redmond has made all the right moves to transform Azure into one of the best analytics platforms. These investments have started to pay off for the company. It has been successful in articulating and demonstrating the value of data-driven insights to governments, medical institutions, and public sector organizations..."
                                                        Microsoft's Bing Bet Is Starting to Pay Off
                                                        The Motley Fool, July 27th, 2016
                                                        "Bing became profitable last year. Can it keep it up?"

                                                        Adam Levy blogs, "Bing has long been the butt of jokes, as the Microsoft search engine is often seen as a second-rate competitor to Google, an Alphabet subsidiary.

                                                        But in Microsoft's latest fiscal year, which ended on June 30, its search advertising business brought in roughly an estimated $5.5 billion in revenue. That's more than major digital advertising platforms such as Twitter or Tencent, although it still pales in comparison with the $52 billion Google brought in from its owned and operated websites last year..."

                                                        Symantec News
                                                        x
                                                        Symantec Partners With The SSL Store To Quickly Enable Encryption For Millions Of Websites
                                                        One of the Largest Distributors of SSL Certificates Now Offers the Encryption Everywhere Program from Symantec, the Leader in Cybersecurity
                                                        Symantec Corp, the global leader in cybersecurity, today announced that The SSL Store has become the first reseller of Symantec's Encryption Everywhere program in the Americas. With over 7,000 resellers in over 120 countries, The SSL Store accelerates access to encryption and other advanced security options for millions of websites. Since announcing the Encryption Everywhere program in March of 2016, Symantec has partnered with some of the world's largest distributors and hosting providers, including The SSL Store and 1&1 in Europe, to reach its goal of securing every legitimate website by 2018.
                                                        IBM News
                                                        x
                                                        IBM Intensifies Fight Against Zika
                                                        Shares cloud and analytics technology and expertise with science and public health community
                                                        IBM announced that it is committing powerful resources, technology and pro bono expertise to help scientists, the public health community, and humanitarian agencies in the fight against the Zika virus. As part of its IBM Impact Grant programs, IBM is providing technology and talent to Brazil's Oswaldo Cruz Foundation (Fiocruz), a research institution affiliated with the Brazilian Ministry of Health and one the most prominent science and technology health institution in Latin America. Fiocruz plans to help track the spread of Zika by using technology developed by IBM to analyze clues ranging from anecdotal observations recorded by the general public on social media, to official data about human travel patterns.
                                                        IBM Cloud Ranked as Leading Platform as a Service (PaaS) According to Analyst Firm
                                                        Enterprise Strategy Group survey indicates adoption of IBM Bluemix cloud platform is growing at a rate of 5X faster than other vendors
                                                        IBM announced that developers and IT managers across the U.S. cited IBM Bluemix as one of the fastest growing and one of the most widely adopted platforms as a service (PaaS) according to a new survey from the analyst firm Enterprise Strategy Group (ESG).

                                                        According to ESG's analysis of the survey results, Bluemix adoption is growing at a rate 5 times faster on average than the other leading vendors in the PaaS market. The survey results encompass hundreds of North American developers and IT managers who ranked IBM Bluemix ahead of the competition in areas including internal application development, PaaS satisfaction, PaaS benefits and future IT needs. IBM also won high praise for Bluemix being the world's largest Cloud Foundry deployment, with more than 150 APIs and services in 179 countries.

                                                        Amica Insurance Digitally Transforms Claims Handling with IBM MobileFirst for iOS
                                                        Amica's field adjusters adopting innovative mobile tools to enhance customer experience
                                                        Amica Insurance, the oldest mutual insurer of automobiles in the United States, announced it is teaming with IBM to digitally transform the way Amica's field adjusters investigate, manage and settle claims using IBM MobileFirst for iOS Claims Adjust. Amica is equipping over 170 adjusters with iPad Pro and iPhone 6 loaded with Claims Adjust, providing secure, immediate access to individual claims data anywhere in the field. It will allow them to gain instant insight on claims and process their work directly from the field, decreasing cycle time and improving the overall customer experience.

                                                        Amica collaborated with IBM to develop Claims Adjust and will be the first U.S. insurer to deploy the application, specifically tailoring it to meet the everyday needs of its field adjusters. Previously, when adjusters received a new assignment and were preparing to go out in the field, they would often write down details from their files or email themselves information so they could have it on the go. With Claims Adjust, Amica's field adjusters are free of these manual, paper-based processes and have all the information they need in the palm of their hands. They can also add information to their files while out in the field.

                                                        ENGIE joins forces with IBM to deploy smarter cities solutions and improve the quality of life for citizens
                                                        IBM, July 26th, 2016
                                                        ENGIE, a global leader in energy transition, announced a new initiative with IBM. This nonexclusive, technological and commercial alliance is designed to improve the management of cities by looking at patterns, event correlation, anomaly detection and real-time data across all parts of cities.

                                                        Whether it's a traffic jam, a building fire, or a large sporting event, city officials need a reliable solution to adapt to constant changes and challenges. IBM and ENGIE will be combining some IBM solutions (Watson IoT, IBM Bluemix) together with ENGIE's expertise on cities' needs to help them to collect, analyze and manage data from IoT, social media, and other systems to prevent risks, alert authorities, and organize rescues.

                                                        IBM Security Tackles Insider Threats with User Behavior Analytics
                                                        Extends QRadar platform's advanced analytics to protect against compromised credentials and malicious insiders
                                                        IBM Security announced a new app for IBM QRadar which analyzes the usage patterns of insiders, including employees, contractors and partners, to determine if their credentials or systems have been compromised by cybercriminals. IBM QRadar User Behavior Analytics, available for free via the IBM Security App Exchange, extends IBM QRadar's security intelligence platform to provide early visibility into potential insider threats before they can do further damage to a business.
                                                        VU University Medical Center Amsterdam Collaborates with IBM to Enhance Communication between Healthcare Professionals with Analytics
                                                        Leading Dutch healthcare organization adopts IBM MobileFirst for iOS apps to enable teams of employees to better collaborate
                                                        VU University Medical Center Amsterdam in the Netherlands announced it is teaming with IBM (NYSE: IBM) to deploy analytics-driven IBM MobileFirst for iOS apps, designed to better coordinate and communicate data across healthcare teams. The Message for Healthcare app will be the first of a suite of IBM MobileFirst for iOS apps that VU University Medical Center Amsterdam will implement to help improve collaboration between members of their healthcare teams.
                                                        Fujitsu News
                                                        x
                                                        Fujitsu Interstage XWand Selected as XBRL Engine for SAP BusinessObjects Disclosure Management
                                                        Fujitsu, July 25th, 2016
                                                        Fujitsu announced that its comprehensive, market-leading XBRL software offering, FUJITSU Software Interstage XWand, is included in the SAP BusinessObjects Disclosure Management application, which is available worldwide. Interstage XWand supports the efficient development and delivery of state-of-the-art, end-user-driven specific XBRL capabilities in areas such as extension, mapping, tagging, validation, generation, visualization and creation of financial statements and regulatory filings, in electronic format and in accordance with XBRL standards.
                                                        Fujitsu Acquires US-Based Network Service Provider TrueNet Communications
                                                        Newly Combined Inside-and-Outside Plant Capabilities will Provide One-Stop Shop for Organizations Building or Upgrading Broadband Networks
                                                        Fujitsu Limited announced that Fujitsu Network Communications Inc. has acquired TrueNet Communications, Inc., a leading national communications infrastructure engineering contractor, for undisclosed terms. TrueNet, headquartered in Jacksonville, Florida, will retain its distinct brand identity through the transition into a wholly owned subsidiary of Fujitsu Network Communications. The acquisition greatly expands Fujitsu Network Communications' potential range of offerings as a prime contractor, and enhances the company's ability to deliver complete, end-to-end solutions for designing, building, operating, and maintaining fiber and wireless communications infrastructure.
                                                        Fujitsu Reports Fiscal 2016 First-Quarter Financial Results
                                                        Operating profit improved owing to solid performance in Technology Solutions, although consolidated revenues declined
                                                        Fujitsu reported a loss for the first quarter attributable to owners of the parent of 14.0 billion yen, representing an improvement of 4.8 billion yen compared to the first quarter of fiscal 2015.

                                                        Consolidated revenue for the first quarter of fiscal 2016 was 986.5 billion yen, down 78.5 billion yen over the last year. Although revenue in Japan from services increased, especially in systems integration and outsourcing services, revenue from mobile phones and LSI devices declined. In addition to a decline in revenue from infrastructure services in the US and Europe, and a decline in revenue from network products in North America, results were also impacted by foreign exchange movements.

                                                        Fujitsu recorded an operating loss of 11.2 billion yen, an improvement of 16.0 billion yen over the last year. Despite the impact of lower revenue from LSI devices and other areas, operating profit improved because of higher revenue from services in Japan and cost reductions and efficiencies in PCs and mobile phones, as well as the reduced impact from one-time expenses related to employee relocations in the network business in Japan.

                                                        VMware News
                                                        x
                                                        Veritas Vision 2016 - September 12-14, Las Vegas
                                                        Veritas Technologies, July 25th, 2016
                                                        Veritas Vision is the only industry conference dedicated to helping you protect, organize, manage, and control all of your critical data, so information can power your business like never before. Don't miss this opportunity to see what's next in information management -and learn from the organizations and experts that are leading the way.

                                                        • Aria Resort, Las Vegas
                                                        • September 12-14, 2016

                                                        $895.00 - Now to August 12

                                                        Save $100 off standard registration PLUS receive a limited edition Vision jacket and a free certification exam.

                                                        Red Hat News
                                                        x
                                                        Red Hat Satellite 6.2 Introduces New Features to Help Users Increase Efficiency Across On-Premise, Cloud, and Container-based Environments
                                                        New features add systems lifecycle management for disconnected networks and streamline workflows through remote execution and flexible provisioning
                                                        Red Hat announced the general availability of Red Hat Satellite 6.2, its systems lifecycle management tool across physical, virtual, and private and public cloud environments. Red Hat Satellite 6.2 introduces remote execution and extends capabilities for container management and security.

                                                        'With ever-changing business needs and the speed at which technology is shifting, organizations need to efficiently manage and more securely operate both their traditional and cloud-based infrastructures. Red Hat Satellite 6.2 helps meet these needs with increased scalability, support for offline environments as well as enabling system administrators to more easily manage physical, virtual, hybrid cloud and container environments.' - Joe Fitzgerald Vice President, Management, Red Hat

                                                        Red Hat Unveils JBoss Data Grid 7 as Platform for Real-Time Data Analytics
                                                        Leading in-memory datastore serves up data faster for continuous business optimization
                                                        Red Hat announced the general availability of Red Hat JBoss Data Grid 7. The latest version of Red Hat's leading in-memory data management technology, which can be used as a distributed cache, NoSQL database, or event broker, introduces enhancements to help organizations generate insights for continuous business optimization through real-time data analytics, contributing to greater agility and competitiveness.

                                                        "Paired with an in-memory data processing engine, JBoss Data Grid can be used as a platform for real-time data analytics, leading to faster and more effective customer engagements." -- Mike Piech Vice President And General Manager, Middleware, Red Hat

                                                        Friday Five
                                                        Red Hat, July 29th, 2016
                                                        The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.

                                                        • TechTarget - Ansible automation heralds move beyond DevOps niche
                                                        • WinBeta - Microsoft and Red Hat now working together to bring Azure Linux support to government
                                                        • Red Hat Unveils JBoss Data Grid 7 as Platform for Real-Time Data Analytics
                                                        • Linux.com - Fix Bugs, Go Fast, and Update: 3 Approaches to Container Security
                                                        • Gartner - Develop an Open Innovation Framework

                                                        Read on for details.

                                                        Level3 News
                                                        x
                                                        Level 3 Reports Second Quarter 2016 Results
                                                        Strong growth in Net Income of $149 million up from a Net Loss of $13 million in the second quarter 2015
                                                        Second Quarter 2016 Highlights:

                                                        • Reaffirming Adjusted EBITDA and Free Cash Flow outlook for the full year 2016
                                                        • Strong growth in Net Income of $149 million up from a Net Loss of $13 million in the second quarter 2015
                                                        • Strong growth in Adjusted EBITDA of 10 percent, on a modified basis, to $715 million
                                                        • Generated solid Cash Flows from Operating Activities of $631 million and Free Cash Flow of $264 million
                                                        • On a constant currency and modified basis, Enterprise CNS revenue grew 5.3 percent and 2.9 percent as reported

                                                        Level 3 Communications, Inc. reported results for the second quarter 2016 on July 27th.

                                                        "With our focus on profitable growth combined with the strong operating leverage in the business, we continued to deliver expanded margins and improved profitability," said Jeff Storey, president and CEO of Level 3. "We continue to invest in the business, remain confident in our ability to meet the networking needs of our enterprise customers and believe we can deliver stronger revenue growth in the future."

                                                        EMC News
                                                        x
                                                        C-D-M and Y-O-U: Excess Copy Data is a Problem, but How Do You Solve It?
                                                        EMC, July 27th, 2016
                                                        Tyler Stone blogs, "If you've been following EMC's latest announcements, one of the numbers you've seen repeated over and over - and over is $50 billion, the amount that the 'copy data problem' is expected to cost customers globally over the next three years. Given such an outrageous number, it's hard not to take a closer look at what's causing this major cost overrun. I'll save you the Google search and tell you right now: your numerous data copies are taking up valuable space on your storage, and the decentralized self-service methods of monitoring, managing, and protecting these copies are costing you a lot of time and money due to lack of oversight...."
                                                        Are you a IT Service fast food junkie?
                                                        By Roger Burnett
                                                        Roger blogs, "Ask any doctor and they will tell you that one of the biggest challenges we face as a society is our love of fast food. We want what we want and want it now. Funny thing is, if you asked that same doctor how long it took to get setup with a computer and access to systems when they joined the health system you will likely get an earful. When it comes to consuming IT services, we're all fast food junkies and waiting doesn't improve our satisfaction.

                                                        In this blog I'd like to talk about ways IT services can be delivered in a way that satisfies the hunger..."

                                                        Storage Media Transformation
                                                        EMC, July 28th, 2016
                                                        2016 is the Year of Flash storage for transactional processing. The transition to flash has been journey for the industry. EMC introduced flash storage media and Fully Automated Storage Tiering (FAST) into our products starting in 2008. Our customers often realized 5x better performance for their transactional workloads with a small amount of flash capacity supplementing high performance hard disk drive technology. Over the past several years it has become more affordable for our customers to move more transaction processing data to flash media. The price for the flash media decreased. In conjunction we introduced new space efficiency software functionality such de-duplication, and compression while enabling more efficient garbage collection processing...
                                                        HP News
                                                        x
                                                        HPE Brings to Life London Shell Eco-marathon Event with Technology
                                                        IoT, Big Data and Apps used to run Live Data Project at Queen Elizabeth Olympic Park
                                                        Hewlett Packard Enterprise (NYSE: HPE) announced that it has teamed up with Shell, the multinational oil and gas company, to support the company's Shell Eco-marathon event through the use of technology and promote the importance of creating a sustainable future.

                                                        Held each year in Asia, the Americas and Europe, Shell Eco-marathon is one of the world's most challenging student innovation competitions. Teams are challenged to design, build and test ultra-energy-efficient vehicles with the aim of creating a vehicle that can drive the furthest on the equivalent of 1 kWh or 1 litre of fuel and the team that goes the furthest wins.

                                                          Brocade News
                                                          x
                                                          Brocade And DMI Survey Lifts The Lid On Companies' Industry 4.0 Concerns
                                                          Robust, secure networks are key to accelerating adoption of Industry 4.0 initiatives in manufacturing
                                                          Brocade and Deutsche Messe Interactive (DMI), a subsidiary of the organizer of HANNOVER MESSE, the world's premier industrial trade show, published the results of a joint survey of over 100 German-based executives who visited the show in April 2016. The decision-makers were asked how their companies view INDUSTRY 4.0* and to what extent they have already planned or implemented relevant initiatives.

                                                          While 79 percent of the respondents see Industry 4.0 as important to their business and 56 percent are planning short-term investments in it, many companies see security as a challenge. One of the more surprising findings was that only 12 percent of respondents see Industry 4.0 as a management responsibility, with production and/or IT departments being tasked with any relevant initiatives.

                                                          Ruckus Wireless Simplifies Wireless Networking With Cloud Wi-fi
                                                          New WLAN Management-as-a-Service Offer Combines Cloud Simplicity with Better Wi-Fi
                                                          Ruckus Wireless, Inc. is now part of Brocade, announced the general availability of Ruckus Cloud Wi-Fi, a wireless local area network (WLAN) management-as-a-service offer powered by the new Ruckus public cloud platform. Ruckus Cloud Wi-Fi enables distributed organizations with limited IT resources to set up, monitor and manage a high-performance multi-site WLAN of any size. Featuring an intuitive, intent-driven user interface for managing some of the industry's highest performing access points (APs), network managers benefit from cloud simplicity without having to compromise on Wi-Fi performance.
                                                          Comcast News
                                                          x
                                                          EdgeConneX, Comcast Business, Datapipe and Megaport Partner to Bring the Cloud Local to Boston Enterprises
                                                          Collaboration Provides Direct, Local Access to AWS Direct Connect, Microsoft Azure and Google Cloud Platform, Simplifying Enterprise Migration to the Cloud
                                                          EdgeConneX, specializing in global data center solutions at the Edge of the network, today announces that it has entered into an agreement to facilitate the availability of direct cloud connectivity to Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform within its BostonEdge Data Center via the deployment of Megaport's SDN-based elastic interconnection fabric. With this new offering, Datapipe and Comcast Business will offer localized cloud migration services to ease enterprise adoption and simplify network connectivity to the cloud.

                                                          Datapipe, a leading global managed hosting and cloud services provider, will offer Boston-based cloud integration services, facilitating and managing local enterprises through the appropriate migration to public and hybrid solutions..."

                                                          Windstream News
                                                          x
                                                          Windstream Uses G.fast Solutions from Calix in Lincoln MDUs
                                                          Calix AXOS platform speeds delivery of an unmatched subscriber experience to apartment dwellers in Nebraska's capital
                                                          Calix, Inc., the world leader in enabling next generation service delivery with an unmatched subscriber experience, announced that Windstream, a leading provider of advanced network communications and technology solutions, will equip multiple multi-dwelling units (MDUs) with Calix AXOS G.fast nodes and GigaFamily solutions in Lincoln, Nebraska. Using the combined solution of Calix E3-16F G.fast sealed DPU nodes and GigaFamily products, Windstream will dramatically increase broadband speeds available to residents in a select number of buildings. The company has plans to extend the deployment of G.fast technologies to deliver speeds of up to 1 gigabit per second (Gbps) over traditional copper telephone wires to other buildings in Lincoln and to other markets around the country.
                                                            Netapp News
                                                            x
                                                            NetApp Insight 2016: Register by August 12 to Save
                                                            NetApp, July 27th, 2016
                                                            NetApp Insight is NetApp's annual technical conference for storage and data management professionals. It gives customers, engineers, consultants and partners a forum for learning from industry experts and each other.

                                                            Choose from nearly 300 technical sessions, participate in the self-paced Hands-On Lab, earn NetApp Certifications at no cost, and see exciting new technology in action at the solutions expo: Insight Central. In addition, you can meet the SolidFire team and get a close look at their innovative technology.

                                                            Why Are High-Capacity SSDs Such a Big Deal?
                                                            NetApp, July 27th, 2016
                                                            Mark Bregman blogs, "Sometimes it's tough to discern the value of new technologies when they first enter the market. But thankfully with new high-capacity solid-state drives (SSDs), it's pretty clear they can deliver immediate customer value. That makes it even more confusing that some vendors within the storage industry are expressing alarm and uncertainty about the new 15TB SSDs. The case for SSDs has been compelling from the start, even for some of the more expensive ones. This is particularly true for space constrained data centers, mixed SAN and NAS environments, and applications that require both low latency and high capacity..."
                                                            Trending in
                                                            Vol 234, Issue 3
                                                            Trending IT Articles