News about Oracle's Solaris and Sun Hardware
System News
Aug 8th, 2016 — Aug 14th, 2016 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 222, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle News
Oracle Launches Largest B2B Audience Data Marketplace
Oracle Data Cloud's B2B Audience Solution Includes 400+ Million Business Users and 1 Million Addressable US Companies to Support Account-Based Marketing at Scale
Oracle Data Cloud today launched the largest business-to-business (B2B) audience data marketplace to help make programmatic and data-driven B2B marketing easier. To help B2B marketers improve their targeting throughout the marketing funnel, Oracle Data Cloud's B2B audience solution provides access to more than 400 million business profiles through thousands of B2B audience segments, thus creating a highly scalable and customizable targeting solution. In addition, more than one million addressable US companies add powerful account-based marketing (ABM) capabilities to a marketer's targeting toolkit.
Asahi Refining Selects Oracle Cloud to Improve Financial Visibility and Accelerate Business Growth
Modern Finance Platform Enables Asahi Refining to Embrace Industry Change
Asahi Refining, the world's leading provider of precious metal assaying, refining, and bullion products, selected Oracle Cloud Applications and Oracle Cloud Platform to streamline its procurement and financial processes to get a more comprehensive and accurate picture of its financials to provide better visibility into the business. By moving to the cloud, Asahi Refining has been able to shift its full attention to its core business of refining gold and silver and accelerate business growth.

The ongoing digitization of the refining industry means that organizations need an integrated financial platform to leverage data insights that can help evolve their business models and retain their competitive advantage. To address this market shift, Asahi Refining needed to overhaul its legacy enterprise resource planning (ERP) system, which was difficult to maintain, had limited reporting capabilities and contained fragmented data spread across various silos. The company needed a modern, integrated system to gain the insights needed for swift approvals and decision making.

With Cloud, Irving Materials Inc.'s Financial Reporting No Longer Set In Concrete
By Chris Murphy
Chris writes in Forbes, "To succeed in the concrete business, Indianapolis-based IMI Concrete, which is part of the Irving Materials Inc. Group of Companies, must be as good at scheduling as it is at the science of mixing cement, aggregates, and water.

For example, when an IMI Concrete team was pouring concrete to repair a dam over the White River in Indianapolis, it had to bucket-lift truckloads of concrete by crane from a mixer truck on a temporary bridge, to a dry section of the dam where the water was diverted. Timing those loads to the construction schedule, as well as to the rising and falling water levels around the bridge, required precise communication between the company's dispatchers and IMI teams at the job site..."

Internet of Things (IoT) Cloud Service available
By Juergen Kress
Juergen blogs, "Oracle Internet of Things Cloud Service is now available! Oracle IoT Cloud Service is a secure and scalable platform to help organizations quickly build and deploy IoT applications. This new offering allows customers to gain new data-driven insights and drive actions from IoT by connecting, analyzing and integrating device data into business processes and applications like remote equipment monitoring and asset tracking..."
ORACLE OPENWORLD - Keynotes and General Sessions
By Zeynep Koch
Zeynep blogs, "As we start our countdown to Oracle OpenWorld which will take place in San Francisco on September 18-22, 2016 we want to highlight keynotes and our general sessions in this second blog.

  • General Session: Oracle Linux, Virtualization, and Networking Power the Cloud
  • Oracle Private Cloud Appliance: Directions in Converged Infrastructure

... Visit the and bookmark the Session catalog link for access to list of general sessions, conferences and demos."

Is Artificial Intelligence The Next Frontier For Identity Management?
Business 2 Community, August 12th, 2016
Identity management professionals have seen significant changes in the industry in recent years, and the pace of change is only accelerating. In the past, workforce Identity and Access Management (IAM) evolved to keep up with a growing need for access to workforce systems. Now Customer Identity and Access Management (CIAM) is critically important as businesses undergo digital transformation and engage with customers across multiple apps and channels.
Apache Mahout - People Familiar With R Will Have A Leg Up
jaxenter, August 11th, 2016
"Machine learning may sound futuristic, but its not. Speech recognition systems such as Cortana or Search in e-commerce systems have already showed us the benefits and challenges that go hand in hand with these systems. In our machine learning series we will introduce you to several tools that make all this possible. Fourth stop: Apache Mahout..."
    IT - Storage
    32TB SAS SSD by Samsung, Record Capacity in 2.5-Inch Form Factor, August 11th, 2016
    "Samsung Electronics Co., Ltd., introduced next-generation flash memory solutions that will meet the increasing demands of big data networks, cloud computing and real-time analysis.

    At Flash Memory Summit 2016, the company showcased its 4th generation Vertical NAND (V-NAND) and a line-up of high-performance, high-capacity SSDs available for its enterprise customers as well as Z-SSD, a new solution providing performance for flash-based storage..."

    Choosing An All-flash Array
    NetworkComputing, August 9th, 2016
    "Today's storage market is crowded with AFAs. Here are some shopping guidelines.

    With vendors constantly touting new features in a hotly contested market segment, choosing an all-flash array (AFA) can be a daunting challenge. While the segment is growing rapidly and AFAs are well accepted in the enterprise, there are those who keep resetting their buying decision as these new features appear. Since all-flash arrays will continue to evolve, it's better not to wait on the sidelines since the benefits AFAs provide an IT operation today are phenomenal..."

    DCIG 2016-17 Midmarket Enterprise Storage Array Buyer's Guide, August 12th, 2016
    "DCIG, LLC announced the availability of the DCIG 2016-17 Midmarket Enterprise Storage Array Buyer's Guide as the first guide edition developed from this body of research.

    Other guides based on this body of research will be published in the coming weeks and months, including the 2016-17 Midrange Unified Storage Array Buyer's Guide and the 2016-17 High End Storage Array Buyer's Guide..."

    'World's largest' SSD Revealed as Seagate Unveils 60TB monster
    ZDNet, August 10th, 2016
    "Seagate has taken the wraps off its whopping 60TB solid-state drive for the enterprise.

    Seagate has been showing off its monster 60TB solid-state drive (SSD) this week, which breezes past the 15TB SSD that Samsung launched in March.

    But don't expect to see Seagate's SSD in a consumer device any time soon, with the new drive set to join the high-performance end of its datacenter portfolio..."

    Nine Reasons Object-level Storage Adoption Has Increased
    SearchStorage, August 12th, 2016
    "Scalability, performance and low cost are some of the motivations behind implementing object storage, but there are many more that have organizations looking at the technology.

    Object-level storage is seeing higher levels of adoption than ever before. From compliance requirements to scalability issues and budget constraints, object storage has proven to be an effective alternative to traditional file storage. Here are nine reasons why more organizations are turning to object storage technology..."

    Liqid and Kingston Claim Fastest 2.5-Inch SSD, August 12th, 2016
    "Liqid Inc., in partnership with Kingston Technology Company, Inc., announced the world's fastest SSD available for demonstration at Flash Memory Summit.

    They have partnered to deliver the fastest 2.5-inch PCIe NVMe SSD ever benchmarked.

    The Liqid Powered U.2, which is a standard form factor 8639 SSD, saturates the PCIe Gen 3.0 x4 interface by delivering capabilities and performance in an enterprise storage solution..."

    Java Technology
    Inside Java Magazine - July/August 2016 Edition
    Guest Blogger Andrew Binstock, Editor Chief of Oracle Java Magazine
    Andrew writes, "Welcome to the July/August issue of Java Magazine, in which we look at enterprise Java - not so much at Java EE as a platform, but at individual services that can be useful as part of a larger solution, For example, we examine JSON-P, the two core Java libraries for parsing JSON data; JavaMail, the standalone library for sending and receiving email messages; and JASPIC, which is a custom way to handle security, often used with containers. For Java EE fans, one of the leaders of the JSF team discusses in considerable detail the changes being delivered in the upcoming JSF 2.3 release..."a
    JVM Language Summit Highlights
    By Yolande Poirier
    Yolande blogs, "the 9th annual JVM Language Summit took place in Santa Clara, California. The three day summit was a gathering of language designers, compiler writers, tool builders, runtime engineers, and VM architects. It was an open collaboration about current and future development of the JVM, Java language, JVM languages, different runtime and VM. The topics this year were about JDK 9, a lot about features for releases beyond Java 9 and 10, and JVM languages and tools. All the presentations were recorded and are now available online..."
    IT - Technology
    Drop The Jackhammer And Fix Your Bridge With This Giant Waterpik
    Wired, August 10th, 2016
    "Ah, water. Healer, destroyer, carver of rivers and shorelines, future of electricity. And now, bridge repairman.

    This summer, Utah is running its first hydro demolition project. The name's misleading, because the state's department of transportation is using H2O to give two bridges a much-needed facelift. It's an easier, faster, cheaper, and maybe more sustainable way to expand the span's useful life by 15 years..."

      Understanding The Differences Between Virtual Reality, Augmented Reality And Mixed Reality
      Network World, August 10th, 2016
      "There are many exciting use cases emerging, but network infrastructure will need to evolve

      Virtual reality is hot, and enterprise- and consumer-facing organizations are eager to figure out how they can take advantage of the new medium, whether it be for entertainment, productivity, sales, or a myriad of other potential uses..."

      Advanced System Administrators: Learn How to Configure Infrastructure as a Service (IaaS) with Hands-On Training
      By Diana.H. Gray
      Diana writes, "Enterprises increasingly need to manage cost, reduce time to market, and improve business agility.

      They need to ensure security, scalability, and reliability for deployment and simplify the management and support of their full solution stack, which most often includes Oracle Databases, Oracle applications, and Oracle Middleware.

      Oracle Solaris 11 is uniquely positioned to address these needs across the Oracle stack. Oracle Solaris 11 includes a full distribution of OpenStack, the leading open source software for managing diverse cloud infrastructures."

      IT - Bitcoin
      IRS At A Standstill with Bitcoin; Users and Tax Professionals Remain in the Dark
      CryptoCoinsNews, August 10th, 2016
      "The Internal Revenue Service (IRS) has halted its proceedings of how individuals should report the earnings they make from bitcoin after failing to provide additional guidance to a notice released in 2014, according to the Tax Revolution Institute.

      In March 2014, the IRS was reported to have released Notice 2014-21 to the masses. Their aim was to inform people how they should apply current tax regulations to the digital currency, bitcoin. However, it did the exact opposite when it stated that bitcoin was a property and not a currency for tax purposes..."

      Bitcoin Volume In Venezuela Surging Amid Hyperinflation
      NEWSBTC, August 8th, 2016
      "The month of July has been a particularly good one for Venezuela. The number of transactions per week continues to increase every week, even though the primary local exchange ran into some problems. Now that everything has been resolved, the interest in cryptocurrency is surging in Venezuela once again..."
        A $99 Trezor Could Have Prevented The $70m Bitfinex Theft, August 10th, 2016
        "The Bitfinex hack was an unfortunate time for Bitcoin users as the exchange had lost roughly $70 million USD in customer funds. Thus, the topic of security is on everyone's lips as two hardware wallet manufacturers - Trezor and Ledger - are claiming that the hack could have been prevented with one affordable device..."
        Russia Reverses Plan To Penalize Bitcoin Use
        CryptoCoinsNews, August 13th, 2016
        "Russian authorities have gone back on their idea to penalize whoever is caught in bitcoin operations in the country, says a report by Russian news agency Interfax.

        Though Interfax referenced unnamed sources close to the Russian government's financial departments, it suggested that representatives from the country's Ministry of Finance, central bank, and other government bureaus are increasingly supportive of this action.."

        IT - FOSS
        4 Alternatives To Ghost For Disk Cloning, August 12th, 2016
        "System administration professionals and home users alike share a need for the ability to be able to quickly and reliably make one-to-one copies of entire disks, both for the purposes of backup and recovery, as well as the process of easing deployments and complete refresh repairs and upgrades of existing systems.

        To do so, a disk cloning utility is a must, to make sure that you've got an exact, and uncorrupted, copy of your original disk. For many years, Norton Ghost (now a Symantec product) was a favorite tool among administrators and technicians seeking to clone a disk. But the market these days has widened, and many open source tools offer comparable and even superior performance.

        Let's take a look at four such open source tools, each with a slightly different focus, that make disk cloning an easy task...."

        IT - DevOps
        Why Your Organization Needs DevOps, August 11th, 2016
        "The recently released fifth annual 'State of DevOps Report' by Puppet has once again brought with it fresh insights into what drives high-performance teams. The report, which comes at a time when DevOps has ceased to be a buzzword, provides proof of why more and more businesses across the world are adopting DevOps to improve their organization's performance, revenues and profitability..."
        Are You Getting The Full Benefit Of DevOps?
        CIO, August 11th, 2016
        "DevOps enables IT departments to meet the business stakeholders' demands for faster cycle time. But it's causing enterprises to rethink where their talent should be located. As DevOps adoption grows, we hear two important questions: (1) how can we do DevOps in a distributed model, and (2) should we do DevOps in a distributed model?..."
        Automotive Industry Is Driving Innovation With DevOps
        ITProPortal, August 10th, 2016
        "Detroit, Michigan has been the centre of the American auto industry since the turn of the 20th century, when Henry Ford churned out a few cars each day at his Mack Avenue factory. Nowadays, in addition to Ford, Buick, Cadillac and the rest of the GM family call Motor City home. Behind all the horsepower and sheet metal of the production line, car manufacturers also employ numerous software applications and tools from various vendors as part of their business..."
          MySQL Group Replication Beta 0.8
          By Lefred
          Lefred blogs, "As announced by Luis Soares on MySQL High Availability's blog, a new labs version of Group Replication (GR) has been released for MySQL 5.7.14!

          Group Replication is the main component of the future MySQL HA solution. Even if with GR, it's possible to write simultaneously on all the member of the group, GR doesn't provide any write scaling. Indeed, if one member reached 100% of its write capabilities, adding writes to another member, won't help as both will have to write their load AND the load from the other member: remember this is (virtual) synchronous replication, all writes happening on member A will happen on member B and on all other members of the group..."

          MySQL Failover, Enhanced MySQL Utilities
          By Andrew Grimo
          Andrew blogs, "This blog is a 2nd part of a multi-part series on areas of failover for MySQL. The first installment looked at design considerations, giving us a 'thinking' perspective on what we might want to adopt. Later I will take a look at more of a business and operational way of thinking through these details. In this installment, I'd like to 'build' something. Let's do something with that initial thinking and put it to work.

          MySQL Utilities 1.6.4+ Latest GA tools

          The MySQL Utilities are a collection of tools aimed at making various tasks simpler. They were originally introduced as a component of MySQL Workbench, but later were also offered separately as well. This allows us to install the utilities on servers in proximity to the systems we need them to work on. My intention here is to focus on the HA utilities within the collection, but we may show some others for demonstrating their general use..."

          Cloud Computing
          HCL Predictive Maintenance Solution based on IoT Cloud Service
          By Jurgen Kress
          Jurgen writes, "Luis Weir and the HCL team build an excellent PaaS showcase for predictive maintenance.

          Predictive Maintenance HCL PaaS Showcase

          • Industry value proposition solving a business problem
          • PaaS services: IoT, MCS, PCS, ICS

          Industries such as aeronautics, automotive, manufacturing, high-tech and even healthcare always deal with the management of thousands of assets. This activity is complex in very costly. Even more so due to manual business processes and disconnected systems (many of them legacy)..."

          Oracle Internet of Things Cloud Service 16.3.3 Release Announcement
          By Jai Suri
          Jai blogs, "We are pleased to announce new enhancements that have recently been added to the Oracle Internet of Things Cloud Service. Customers will shortly see their instances upgraded to the Oracle Internet of Things Cloud Service 16.3.3 release. This release includes a number of new functionalities, enhancements and performance improvements.

          Oracle IoT Cloud Service Applications ('Mini-apps')

          The Oracle Internet of Things Cloud Service platform now offers SaaS-style applications or 'Mini-Apps' that are included with the platform and immediately runnable. Oracle Internet of Things Cloud 16.3.3 introduces the Asset Monitoring Application, which is the first in the series of built-in Mini-Apps that will be offered with the Oracle Internet of Things Cloud Service. This Mini-App enables users working with both fixed and movable assets to perform tasks such as rapidly locating available assets for a job, assessing the health of their assets, and reviewing asset specifications while in the field or office..."

          IT - Cloud
          Public Vs. Private Vs. Hybrid Cloud - Exploring The Use Cases
          Business 2 Community, August 12th, 2016
          "In a previous post we explored various challenges with cloud implementation and how to mitigate these. But how do you choose the right cloud implementation model for your business - public, private, hybrid?

          Before I get into the nitty gritty, let's first take a look at what the private cloud is. The essential difference between the public and private models is 'sharing.' With a public cloud infrastructure there is shared physical hardware which is owned and operated by a vendor, so there's no maintenance component for the client business..."

          Why Cloud Migration Is Still A Work In Progress (Slideshow)
          CIO Insight, August 10th, 2016
          "Despite the seemingly ubiquitous presence of the cloud, many organizations are still in a transitional stage when it comes to cloud adoption, according to a recent survey from Unisys. The accompanying report, titled "Trends in Hybrid Cloud Computing," indicates that most companies are planning for a private or public cloud migration (with most favoring the private cloud). As a result, they want to replace end-of-life technology while reducing costs and increasing capacity on demand. However, most organizations are still keeping mission-critical apps and storage tools on-premise, with many citing security in the cloud as a leading concern..."
          IDC: Global Public Cloud Services Will Reach $195 Billion By 2020
          InformationWeek, August 12th, 2016
          "While SaaS is by far the leading slice of the public cloud services pie, IT professionals should keep an eye PaaS and IaaS as well, because these are the fast-rising segments of the cloud market, according to IDC.

          Between now and 2020, worldwide spending on public cloud services is expected to soar to more than $195 billion, essentially doubling the revenue the industry is expected to generate by the end of this year, according to a new report from IDC..."

          Microsoft To Drop Azure Remoteapp In Favor Of Citrix Virtualization Technologies
          ZDNet, August 12th, 2016
          "Microsoft is dropping its Azure RemoteApp technology over the course of the next year and guiding customers to go, instead, with virtualization software and service from Citrix...

          Microsoft is starting to "wind down" its Azure RemoteApp technology in favor of application virtualization software and services from its partner Citrix.

          Microsoft made the announcement on August 12, calling the move 'the next step in our broad partnership with Citrix in the remote desktop and applications space'..."

          How Does Compliance Differ In The Cloud Versus On-premise?
          Business 2 Community, August 9th, 2016
          "With 253 healthcare breaches in 2015 for a total of 112 million lost records, HIPAA compliance has never been more relevant. Meanwhile, 80 percent of businesses fail their PCI compliance assessments.

          As a business, whether you're storing patient records or processing customer credit card data, chances are the government or your customers (or, many times, both) require you to meet some sort of compliance standards. And it ain't easy..."

          The Cloud Computing Effect: Better Security For All
          InfoWorld, August 9th, 2016
          "IT's paranoia about the cloud forced better security approaches to become the norm and helped on-premises deployments... Cloud computing offers lots of benefits, but improved security is not one that makes many IT lists. In fact, many -- perhaps even most -- IT pros still believe that cloud computing means a huge step backward in terms of security risk.

          That doesn't seem to be the case. About 10 percent of our workloads now run on public clouds, and so far, so good..."

          IT - CxO
          The Rise Of The Creative CIO (Slideshow)
          CIO Insight, August 11th, 2016
          "A clear majority of global CIOs said their influence within their organization is rising, according to a recent survey from Harvey Nash and KPMG. The resulting report, titled 'The Creative CIO,' indicates that most CIOs now serve as members of the executive committee, for example. Many CIOs are also working with company leaders to develop a formalized digital strategy enterprisewide. The report reflects a broad range of findings impacting today's tech leaders, especially with regard to their support of strategic objectives..."
          4 Traits Of Top Leaders In Tech
          CIO, August 11th, 2016
          "While there's a broad spectrum of unique qualities in technology leaders today, these four traits are consistently visible in the most innovative leaders that organizations covet...

          The role of technology leaders has evolved as organizations continue to embrace the competitive advantages tech initiatives can bring to their organizations.

          While innovation and problem solving are vitally important skills, there are other traits that consistently appear in top tech leaders that are worth adopting. Here are four attributes I think every successful tech leader should possess:..."

            Is Your It Team Reactive Or Strategic? (Slideshow)
            CIO Insight, August 12th, 2016
            "What's the difference between strategic companies and the rest of the pack? For starters, the former grows revenue at a much faster rate than the latter, according to a recent survey from Kaseya. The resulting "IT Operations Benchmark Survey 2016" report distinguishes organizations into a number of categories, including those considered strategic and those considered reactive. Aligned/strategic companies are defined as those which achieve IT operational excellence and strategically drive business innovation, while also tracking and managing against service level agreements (SLAs) or availability and performance expectations..."
            Global IT Security Spending Will Top $81 Billion In 2016
            InformationWeek, August 9th, 2016
            "Gartner predicts worldwide spending on information security products and services will reach $81.6 billion in 2016 -- an increase of 7.9% from last year.

            Global spending on information security products and services will reach $81.6 billion in 2016, according to a new report from Gartner. This prediction marks an increase of 7.9% from last year.

            The largest areas of information security spending are consulting and IT outsourcing, Gartner stated. Security testing, IT outsourcing, and data loss prevention (DLP) will be the biggest opportunities for growth through the end of 2020..."

            Anatomy Of A Service Outage: How Did We Get Here?
            NetworkWorld, August 11th, 2016
            "As euphemisms go, it's hard to beat the term 'service outage' as used by IT departments. While it sounds benign -- something stopped working but tech teams will soon restore order -- anyone familiar with the reality knows the term really means 'Huge hit to bottom line.'

            A quick perusal of the tech news will confirm this. Delta Airline's global fleet was just grounded by a data center problem. A recent one day service outage at cost the company $20 million..."

              Why Measuring It Productivity Is So Challenging
              The Enterprisers Project, August 8th, 2016
              "In some professions, there are metrics that one can use to determine an individual's productivity. If you're a widget maker, for instance, you might be measured on how many widgets you can make in a month. If you work in a call center - how many calls did you answer, and what's your average handle time? These are over-simplified examples, but even if you're a doctor, you may be measured on how many operations you perform, or how many patients you can see in a month. Whether or not these are the right metrics, they offer a general picture of how an individual performed within a set timeframe..."
                Four IT Trends CIOs Need to Know About
                HelpNet Security, August 8th, 2016
                "CIOs looking for a benchmark to gauge IT success can depend on user experience metrics to provide the answer. In each of today's 'third platform' technologies - cloud, analytics, security and mobile - emerging millennial users expect their compute experience to be seamless, secure, and portable, but delivering on those expectations is not as easy as it sounds.

                According to Logicalis US, there is no single, simple legacy-only or cloud-only approach to providing the experience that today's digital natives expect. They want to connect with their mobile devices, access pre-provisioned cloud resources, interact with big data securely and do so in as little time and in as familiar a fashion as texting..."

                The 7 Deadly Sins Of Bad Managers
                TLNT, August 10th, 2016
                "We have all witnessed it. Some really well-liked, productive employee suddenly tenders his or her resignation, or maybe just doesn't show up for work one day. The workplace quickly becomes abuzz with rumors of why the person quit. If the rumors are accurate then the reason most often lies with the manager. After all, there is a whole heck of a lot of truth to the old adage, 'Employees don't leave companies, they leave managers.'

                These are the seven deadly sins that managers commit to cause these resignations. Sadly, all of these can be easily avoided..."

                  vBeers @ Boca - Biergarten Boca
                  Wednesday, August 17th, 2016: 6:00 PM to 9:00 PM
                  Come out and connect with other professionals in your industry!

                  The South Florida Technology Alliance (SFTA) vBeers events happen four times each month, once each in these cities: Palm Beach Gardens, Oakland Park, Boca Raton and Miami.

                  These informal networking/social events provide a relaxed environment to meet with other IT professionals and promote the growth of IT in South Florida.

                  vBeers start at 6PM

                  Wednesday, August 17th @ Biergarten Boca

                  Pleaase register @

                  John Mclaughlin, SFTA

                  vBeers @ Miami - M.I.A Beers
                  Wednesday, August 24th, 2016: 6:00 PM to 9:00 PM
                  Come out and connect with other professionals in your industry!

                  The South Florida Technology Alliance (SFTA) vBeers events happen four times each month, once each in these cities: Palm Beach Gardens, Oakland Park, Boca Raton and Miami.

                  These informal networking/social events provide a relaxed environment to meet with other IT professionals and promote the growth of IT in South Florida.

                  vBeers start at 6PM

                  Wednesday, August 24th @ M.I.A. Beer Company

                  Pleaase register @

                  John Mclaughlin, SFTA

                  IT - DR
                  Delta Outage Is A Wake-up Call For IT Execs, CEOs
                  Search CIO, August 12th, 2016
                  "The Delta outage isn't the first DR-related debacle to strike a well-known organization and it won't be the last. Also: Data theft on the rise; Intel the latest to buy AI startup.

                  Delta's problems started with a small fire and a power outage. The fire was extinguished quickly, but by then it had sparked a chain reaction that led to more than 2,000 cancelled flights, millions of dollars lost, a tarnished reputation and a lot of questions for IT professionals..."

                  Disaster Recovery More Important To IT Than It Is To Business Execs
                  eWeek, August 10th, 2016
                  "A Bluelock survey found IT professionals tend to place a higher value on protecting their business against technology-related disruptions than executives do.

                  One-third of companies have experienced a technology-related disruption in the past two years, and the most common reason for not investing in disaster recovery (DR) is because of more pressing priorities, according to a Bluelock survey highlighting the disparity between IT professionals and C-level execs on IT security and recovery issues..."

                  IT - PM
                  7 Traits Of An Exceptional Software Project Manager
                  Business 2 Community, August 12th, 2016
                  "The tech business is an awesome place to be these days. You can build incredible apps that are fun and easy to use, or complex software systems that fill gaps and solve big problems. Being a technologist gives me and my team the opportunity to educate those that aren't as comfortable in tech. The majority of our product buyers are in the accreditation industry and when making major software purchases, most of the individuals we meet are methodical in their questioning because this is the nature of those working in that field..."
                    9 Things Great Project Leaders Do Every Day (Slideshow)
                    CIO, August 11th, 2016
                    "Every project leader is different, from their thought processes to their daily interactions, but there are a few things that great ones do every day that just might set them apart from the rest.

                    Making waves shouldn't be confused with making trouble or making problems, as it is often seen. Great change can only come about when project leaders remain in a constant and conscious state of continuous improvement. They make waves by performing the following tasks and services..."

                      5 Styles Of Project Collaboration And When To Use Them
                      TechRepublic, August 9th, 2016
                      "There are a ton of project collaboration tools out there. The trick is finding the ones that compliment your workflow.

                      A plethora of project collaboration tools are available today, but to fully optimize them, managers must first determine the types collaboration tools that are best suited to further the success of their projects.

                      There are five common types of collaboration that are used in projects that managers and project members can choose from:..."

                        Community Reception Oracle OpenWorld 2016 September 20th San Francisco
                        By Jurgen Kress
                        Jurgen blogs,"You are invited to join our traditional Fusion Middleware & PaaS Partner Community Reception at OpenWorld. The Reception will be held on Tuesday September 20th 2016 in San Francisco! Don't miss this unique opportunity to:

                        • Network and exchange information with fellow Oracle Middleware & PaaS Partners & ACEs
                        • Meet with members of the Global Oracle Middleware & PaaS Product Management team and Oracle EMEA Alliances and - Solutions Partner Programs team
                        • Learn more about Oracle OpenWorld activities


                        IT - Networks
                        Managing Network Sprawl
                        Network Computing, August 10th, 2016
                        "Organizations rely on a growing number of networks on-premises and in the cloud, creating a daunting responsibility for network engineers.

                        Virtual machine sprawl is a well-known challenge with established best practices to prevent and resolve. But there's a new kind of sprawl to worry about: network sprawl.

                        Network sprawl is a phenomenon resulting from the growing adoption of the cloud, and subsequently, hybrid IT, where some applications and infrastructure remain on-premises, but some are transitioned to the cloud..."

                        Putting IPv6 Vulnerabilities Under The Microscope
                        SearchSecurity, August 11th, 2016
                        "Examining IPv6 vulnerabilities prior to deployment is crucial for enterprises. Expert Judith Myerson explains the risks of older gear, unpatched IPv6 ND flaws and other issues...

                        The IPv6 protocol is more than 20 years old, and it is celebrating an adoption rate of nearly 30% of United States traffic and almost 11% of global traffic. As available address space in IPv4 is depleted, enterprises and small-midsize businesses and individuals are migrating to IPv6, with its much larger address space, to meet the demands of the ever increasingly connected world and to enable the continued growth of the internet...."

                        Uncovering Network Performance Killers
                        Network Computing, August 11th, 2016
                        "Learn how monitoring syslog data, using Cisco debug, and other methods can reveal network issues.

                        We've been discussing the many things that could be killing your network's performance - often quietly and without your knowledge. Last time, we covered the value of using the right tools to get network management data that you need. Let's continue with a discussion of syslog, debug, managing voice and video traffic, and more..."

                        Four Things To Consider Before Upgrading Your Data Center Net To 25G
                        Network World, August 10th, 2016
                        "25G is backward compatible, jacks up performance and improves the efficiency of every workload...

                        Hyperscale public cloud providers and social media giants have already made the jump to 40Gbps Ethernet for their server and storage connectivity for lower total cost of ownership (TCO) and operational efficiency, and now they are migrating to 50 and 100Gbps Ethernet...."

                        Managing The IPv6 Transition In The Enterprise
                        Network Computing, August 12th, 2016
                        "IPv6 offers many enterprise benefits, but successful implementation requires careful planning.

                        As Internet access has become increasingly ubiquitous, the massive number of connected devices has depleted the supply of available IP addresses. IPv6 is the new protocol specifically designed to fix this issue by making 340 undecillion potential new IP addresses available. This is done using an addressing system of 128 bits, compared to the IPv4 format that uses an addressing system of 32 bits, which supplied approximately 4.3 billion addresses..."

                        IT - IoT
                        Time To Monetize The IoT
                        ComputerWorld, August 12th, 2016
                        "So far the conversation has been about what/whom/where/why the IoT. It's time for how the money will be generated...

                        We've all been looking at, thinking and talking about the Internet of Things (IoT) for some time now. Many of us have begun to implement IoT-based systems and solutions.

                        The majority of these, insofar as the commercial world is concerned, have been funded and implemented for specific applications, as with most IT-driven initiatives. The time has come for the next wave: revenue-producing IoT..."

                        The Rise Of Business-driven IoT
                        Data Center Knowledge, August 11th, 2016
                        "Here are some common assumptions about the Internet of Things. Everybody wants in on it and, in the negative column, security and privacy are a nightmare.

                        There are problems with those conclusions, according to Jerry Chase, CEO and Kevin Walsh, &#8206;Vice President Marketing at Bsquare. Sure, the IoT field is trendy, but that isn't enough to entice most industrial companies to invest in it. 'Our view is that nobody is buying IoT,' Chase says - or at least not the operations departments, P&L centers, and business unit managers at industrial firms that the company is targeting. He continues: 'Instead they're buying better business outcomes'..."

                        IoT Market Could Top $3 Trillion By 2025, Report Finds
                        InformationWorld, August 10th, 2016
                        "IT departments take note: The internet of things market is picking up speed, with new technologies like LPWA paving the way for broader adoption. Even though a new study shows that spending on IoT could reach $3 trillion by 2025, security remains a concern...

                        The total number of internet of things (IoT) connections is expected to grow from 6 billion in 2015 to 27 billion in 2025, a compound annual growth rate (CAGR) of 16%, according to Machina Research's annual report on the global growth of the market..."

                        What CISOs Need To Know About Securing The Internet Of Things
                        ITProPortal, August 12th, 2016
                        "The rapid adoption of the Internet of Things (IoT) is hard to ignore: Gartner estimates a compound annual growth rate of 31.7 per cent until the end of the decade. This means that, by 2020, 20.8 billion connected things - excluding PCs, tablets and smartphones, will join the internet. While it's easier for organisations to roll out their own IoT services thanks to new mobile-based IoT platforms, there are not only opportunities arising from growing IoT, but also new kinds of risks...."
                        AWS IoT Button: Introduction
                        SmartDataCollective, August 13th, 2016
                        "Sometimes, small things end up making big changes. Inventions which don't look like a big deal end up making a huge impact on the technology industry. We think that the AWS IoT button will be one of those devices which will end up being an important part of the technological revolution of our times. The product is still very confusing for people who don't know much about the world of the Internet of Things..."
                        Beyond The M2M Narrative: The Internet Of Things Grows Bigger
                        jaxenter, August 11th, 2016
                        "IDC predicted that the Internet of Things market will exceed $1.7 trillion by 2020 and the number of IoT connected devices will increase to over 30 billion. It's safe to say that IoT will be everywhere -but where does this leave us?...

                        Machine-to-machine is just the tip of the Internet of Things iceberg.

                        Machine-to-machine (M2M) communications is a term used for automated data transmission and measurement between mechanical or electronic devices..."

                        10 IoT Security Best Practices for IT Pros (Slideshow)
                        InformationWeek, August 9th, 2016
                        "IT professionals have to treat internet of things (IoT) vulnerabilities as they would vulnerabilities in databases or web applications. Any flaw can bring unwelcome attention, for those making affected products and those using them. Any flaw may prove useful to compromise other systems on the network. When everything is connected, security is only as strong as the weakest node on the network..."
                        IT - Linux
                        A Brief Introduction To Linux Containers And Image Signing
              , August 11th, 2016
                        "Fundamentally, all major software, even open source, was designed before image-based containers. This means that putting software inside of containers is fundamentally a platform migration. This also means that some programs are easy to migrate into containers, while others are more difficult.

                        I started working with image-based containers nearly 3.5 years ago. In this time I have containerized a ton of applications. I have learned what's real, and what is superstition. Today, I'd like to give a brief introduction to how Linux containers are designed and talk briefly about image signing..."

                        IT - Operations
                        Delta Outage Raises Backup Data Center, Power Questions
                        SearchDataCenter, August 12th, 2016
                        "Another outage at an airline data center offers yet another lesson about the need to fail over to a backup data center and bounce back quickly after a power problem.

                        Delta Air Lines' failure to keep its data center flying at a cruising altitude this week holds lessons for enterprise IT pros..."

                          IT - Security
                          Disable WPSD Now Or Have Your Accounts And Private Data Compromised
                          ComputerWorld, August 10th, 2016
                          "Researchers show the WPAD protocol can be used to steal user data despite HTTPS or VPN connections

                          The Web Proxy Auto-Discovery Protocol (WPAD), enabled by default on Windows and supported by other operating systems, can expose computer users' online accounts, web searches and other private data, security researchers warn..."

                          6 Shocking Gaps In Your Data Security Strategy (Slideshow)
                          CSO Online, August 11th, 2016
                          "Despite billions of dollars invested in cybersecurity, businesses lose critical data daily. We've secured our organizations like fortresses, building layers of walls around networks, applications, storage containers, identity, and devices. But when an unhappy employee moves high-value designs onto a USB drive or sends important email attachment outside the 'secure' network, those walls crumble the moment we need them the most..."
                          Sounds From Your Hard Disk Drive Can Be Used To Steal A PC's Data
                          ComputerWorld, August 12th, 2016
                          "An HDD's internal mechanical arm can be used to generate acoustic binary signals...

                          Researchers have found a way to steal a PC's data by using the mechanical noise coming from the hard disk drives inside.

                          It's not a very practical hack, but the scheme has been designed for 'air-gapped' systems, or computers that have been sectioned off from the Internet..."

                            Why Software-defined Security Can Strengthen Branch Office Weak Links (Slideshow)
                            eWeek, August 12th, 2016
                            "Branch-office networks are proving to be a weak security link in many enterprises. In the 2013 Gartner Research report, "Bring Branch Office Network Security Up to the Enterprise Standard," analyst Jeremy D'Hoinne wrote that '30 percent of advanced targeted threats - up from less than 5 percent today - will specifically target branch offices as an entry point.' While the attack landscape and threat vectors have evolved since that report was published, branch security architectures for the most part have not..."
                            Worldwide Information Security Spending Expected To Top $80 Billion In 2016
                            ITProPortal, August 12th, 2016
                            "Worldwide spending on information security products and services will reach $81.6 billion in 2016, an increase of 7.9 per cent over 2015, according to Gartner, Inc.

                            Consulting and IT outsourcing are currently the largest categories of spending on information security. Until the end of 2020, the highest growth is expected to come from security testing, IT outsourcing and data loss prevention (DLP)..."

                            The Advanced Security Techniques Of Criminal Hackers
                            JavaWorld, August 5th, 2016
                            "InfoWorld talks with Digital Shadows' Rick Holland about the security tools hackers use to protect themselves while ripping you off...

                            Staying secure online is an essential concern, for individual users, businesses, and cybercriminals alike. That's right: Basic IT security applies whether you're protecting sensitive data at an upstanding, ethical organization, or you're in the business of stealing data from those same organizations..."

                            How Well Does Social Engineering Work? One Test Returned 150%
                            Network World, August 11th, 2016
                            "White hat hackers see companies at their worst. It is, after all, their job to expose weaknesses. Network World Editor in Chief John Dix recently chatted with penetration testing expert Josh Berry, Senior Technology Manager at Accudata Systems, an IT consulting and integration firm based in Houston, to learn more about the attack techniques he encounters and what he advises clients do to fight back..."
                              Top 10 Websites To Refresh Your Hacking Skills
                              TechWorm, August 13th, 2016
                              "Hacking is one of the most misunderstood word in computer dictionary. Hacking was a term that originated in 1990s and is more commonly used in context of 'Computer Hacking', which is associated with the unauthorized use of computer and network resources. Such kind of hacking poses threat to the security of the computer and other resources.

                              By definition, hacking is the practice of altering the features of a system, to accomplish a goal which is not in scope of the purpose of its creation..."

                              Complexity Is The Enemy Of Security
                              ComputerWorld, August 8th, 2016
                              "A single security plane is the only way to reduce complexity and eliminate the seams...

                              I've been managing cybersecurity product development for about two decades, including running the firewall business at a large networking company for several years. During this time, I've met a number of very interesting technical professionals from the NSA and the CIA. Recently, I had drinks with someone who was responsible for managing the offensive cyber capability for the NSA..."

                              How Can You Detect A Fake Ransom Letter? (Slideshow)
                              CSO Online, August 8th, 2016
                              "In the 2016 Executive Application & Network Security Survey, among those who have not experienced a ransom situation, the majority say they would not pay a ransom. But among the few who have experienced a ransom attack, more than half in the U.S. did not pay. One respondent indicated that paying did not guarantee that the attacker would do their part.

                              So how do you know if a perpetrator actually has control of your network and is holding it hostage. Radware explains some tell-tale signs to watch out for..."

                              Periodic Password Changes -- Good Or Bad?
                              ComputerWorld, August 8th, 2016
                              "The debate about whether frequent password changing is a good or a bad practice is raging.

                              OK, maybe just humming along. FTC chief technologist Lorrie Cranor and some other security experts have started saying that the practice may be counterproductive -- especially if it encourages poor password selection. To push this debate a little further, let's examine the issues that are involved..."

                              Security Still The Biggest Challenge In Cloud Management
                              HelpNet Security, August 9th, 2016
                              "CIOs are the C-suite executives most intensively advocating and driving migration of their organizations' IT resources to the cloud. A new Unisys study indicates that reducing costs and gaining faster access to computing capacity are the CIOs' primary motivations. In addition, securing the cloud is the respondents' primary management concern..."
                              Spearphishing: It's Curiosity That Makes Them Click
                              Dark Reading, August 9th, 2016
                              "Researchers prove that people can be fooled just because they want to know what's on the other end of that email. Here are three steps you can take without spending too much money.

                              If it was curiosity that killed the cat, it can also be the reason organizations can experience a costly spear phishing attack.

                              In research conducted by Zinaida Benenson, who studies human factors in security at the University of Erlangen-Nuremberg in Germany, Benenson and her colleagues learned that 34 percent of those who clicked on a test survey they emailed out to select students did so out of curiosity..."

                              With Prevention Efforts Failing, It Security Focus Turns To Reaction
                              Information Management, August 10th, 2016
                              "Worldwide spending on information technology security will grow by 7.9 percent, to reach $81.6 billion in 2016, according to Gartner, Inc.

                              In its latest market growth forecast, released yesterday, the research firm says the highest growth during that time will come in the areas of security testing, IT outsourcing, and data loss prevention..."

                              Information Security Ignorance Is Not A Defense
                              ComputerWorld, August 11th, 2016
                              "Despite increasing awareness about the importance of information security, underscored by the fear of ransomware attacks, I continue to find that most of the small and medium business (SMB) world is unprepared for an attack. It may be a bit unfair to single them out, since so many enterprises have similar issues, but the SMB folks are subject to increasing attacks for which they are not ready...."
                              IT - Careers
                              Six Habits Of Champions
                              Fast Company, August 9th, 2016
                              "If you want to see the tangible results of hard work and determination, tune into the 2016 Olympics. There you'll find more than a few great examples of people at the top of their game.

                              "For most elite competitions like the Olympics and Athletics World Championships, the world governing body publishes standards in advance of the competitions," says motivational speaker Mike Lipkin, author of Star Power: How to Be Unstoppable Through the Nine Star Social Values. "If you're selected to compete at the event, you know you're literally among the best in the world," Lipkin explains, "You've qualified to perform at the highest level against the best of the best."

                                7 Cyber-Security Skills In High Demand
                                InformationWeek, August 8th, 2016
                                "Organizations across industries are challenged to address a cyber-security skills shortage leaving their networks open to attacks.

                                There will be 1 million to 2 million unfilled cyber-security jobs worldwide by 2019, according to a recent report released by Intel Security called "Hacking the Skills Shortage." The report includes the results of a survey of 775 IT decision-makers involved with security, 82% of whom reported a lack of cyber-security skills within their business..."

                                Rethinking HR Practices To Attract And Retain IT Talent
                                ITProPortal, August 13th, 2016
                                "The demand for tech talent is high and businesses looking to hire the best employees need to offer more than standard salary and benefits packages, as job seekers are looking for attractive employer brands.

                                Jochen Schoenmaeckers, Director IT & Consulting Industry, Randstad Global Client Solutions, points out: 'There are four areas within the IT sector that are in particular demand: cloud, security, big data and mobile technologies. Talent shortages in these areas have created a highly competitive market'..."

                                10 Tips To Master The Art Of The Career Humblebrag
                                CIO, August 9th, 2016
                                "Modesty is the best policy, right? Not when it comes to describing your professional accomplishments. Here's how to master the art of the self-promotion to advance your career...

                                In today's hyper-connected social media-centric culture, there aren't many topics that are off-limits. People seem comfortable sharing the most intimate details about meals, travel, kids, pets and personal drama, not to mention their feelings and opinions on politics, current events and religion. But there's one subject that seems to render even the most outspoken people mute: their professional success. And that's a big problem...."

                                  Solving Useful Problems: Innovation At Work
                                  Business 2 Community, August 10th, 2016
                                  "Identifying which problems to solve is open to your business' core competencies, industry, and values. The ability to identify problems worth solving can thus be used to differentiate essential business product or services versus those that are nice to have. The difference between these two can be substantial as the former category is arguably more sustainable and has the potential to have a larger impact in the customer's life..."
                                    These 4 Hobbies Can Actually Improve Job Performance
                                    Fast Company, August 9th, 2016
                                    "While downtime of any kind can help relieve stress, there are several science-backed ways that let you enjoy life outside of the office while improving your productivity within it.

                                    Research conducted by Kevin Eschleman, an assistant psychology professor at San Francisco State University, suggests hobbies that are less relevant to one's career are paradoxically more beneficial for it..."

                                    IT - Big Data
                                    Build A Strong Work Culture With Big Data
                                    insideBIGDATA, August 13th, 2016
                                    "Once regarded as mostly theoretical, the benefits of big data in the business world are real and tangible. This is especially true with the advent of big data tools and cloud Spark platforms that do the heavy lifting and allow companies to focus on the business at hand. As a result, more and more companies are leveraging customer data and insights to drive data-driven decisions and gain a competitive advantage..."
                                    Getting Serious About Big Data Security
                                    SmartDataCollective, August 10th, 2016
                                    "Big data is not just a passing trend or a boardroom buzzword anymore. It's here to stay, and the benefits can be significant and far-reaching.

                                    However, with the collection of all of this data comes the need to store and protect it. Such large repositories of data, especially when it contains sensitive information about customers and your business, are attractive targets for cyber-criminals, and the results of a major breach devastating on a number of levels..."

                                    Can Big Data Really Help You Understand Buying Intent?
                                    Business 2 Community, August 11th, 2016
                                    "We hear from most marketers these days that their challenge is not a lack of data but an overwhelming abundance of dat- and no way to harness it or distinguish which data really matter.

                                    Marketers would love having the ability to know when a consumer is in market - or, better yet, exactly which phase of the buying journey each consumer resides in at any given time.

                                    So, can big data really help you predict buying intent? Yes, it can. But, if you don't know which data matter most and how to leverage the data to make improvements to your business, it is not worth the time and effort of figuring out how to harness it in the first place..."

                                    Caution: Predictive Analytics May Miss One Important Thing
                                    Business 2 Community, August 9th, 2016
                                    "Predictive analytics is, without a doubt, the new big thing in marketing. It's how we marketers are putting so-called big data to work to help us find, target, and sell to the right customers at the right time. I've written about this before; any time we rely on technology or process to tell us about our customers' preferences, habits, or needs, we run the risk of missing out on one critical element of our customers' decision-making. Our customers are human and, therefore, somewhat unpredictable..."
                                    Data Protection From The Inside Out
                                    Dark Reading, August 8th, 2016
                                    "Organizations must make fundamental changes in the way they approach data protection. Despite many organizations' significant cybersecurity investments, sensitive data breaches continue to occur at an alarming rate and have a devastating impact. There are many reasons why these breaches and corresponding effects continue to occur, such as the quickly rising rate of data collection and increasing storage, business and technology innovation (e.g., the Internet of Things and cloud computing), the extended enterprise, inherently flawed technology, and the reliance on outdated security standards and corresponding controls that can't keep up with attack vectors..."
                                    Do You Know Big Data?
                                    CloudTweaks, August 9th, 2016
                                    Many definitions:

                                    • The Multiple V's: Data that brings challenges in Volume (size), Velocity (speed), Variety (formats), Veracity (accuracy), as well as Visualization, Value, Vendors, etc.

                                    • McKinsey: 'Datasets whose size is beyond the ability of typical database software tools to capture, store, manage, and analyze.'

                                    • Economist: 'Society has more information than ever before and we can do things when we have a large body of information that simply we could not do when we only have smaller amounts'

                                    • Wikipedia: 'Big data is the term for a collection of data sets so large and complex that it becomes difficult to process using on-hand database management tools or traditional data processing applications'

                                    • Adam Jacobs, 1010data: 'Data whose size forces us to look beyond the tried-and-true methods that are prevalent'

                                    • Dan Law, Altamira: 'Data of any type with potential value that exceeds the analytic capabilities of traditional stand-alone solutions'

                                    Click through to see the one-page PDF.

                                    Top Ten Articles for last few Issues
                                    Vol 222 Issue 1; Vol 221 Issues 1, 2, 3, and 4 ; Vol 220 Issue 3, 4, 5
                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                    • Internet of Things (IoT) Cloud Service available
                                    • Oracle MiniCluster
                                    • Oracle Solaris Overview and Strategy (1hr Video)
                                    • SPARC S7 & Java - Wake Up and Smell the Coffee!
                                    • Why *Even You* Should Care About Java Code Libraries
                                    • A Picture's Worth A Thousand Words...And Maybe More
                                    • MySQL Utilities release-1.6.4 GA
                                    • Microservices and Java Hackathons
                                    • Practical Tips for a Smoother Cloud Project: Oracle's Steve Miranda
                                    • Canon Information and Imaging Solutions, Inc. (CIIS) Achieves Oracle Validated Integration with Oracle's PeopleSoft

                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                      IT - Encryption
                                      Does Encrypting Data Make Access Harder For Regulators?
                                      SearchSecurity , August 10th, 2016
                                      "Encrypting data going to the cloud is a security best practice, but does it add extra challenges for regulators that might need to access the data? Expert Mike Chapple discusses.

                                      At panel at the 2016 RSA Conference, the CSO of Sallie Mae talked about encrypting data going to the cloud for compliance. Sallie Mae encrypts all data going to the cloud so regulators can't get to it because it doesn't want any outside regulators -- or anybody -- to access its data. Is this a sound strategy? Does this make it more challenging for regulators? Does this cause friction between enterprises and compliance bodies?..."

                                      Encryption Basics: How It Works & Why You Need It
                                      SearchSecurity, August 11th, 2016
                                      "It's a problem no business can risk putting on the back burner anymore: securing data.

                                      We've entered a time when the conveniences of widespread connectivity, including the cloud, have put us at more risk than ever of getting hacked. When data does fall into the wrong hands, the consequences can be devastating. High-profile data breaches and ransomware attacks have organizations and individuals on red alert for the best ways to safeguard their data and networks, both now and for the future..."

                                        'Golden Keys' That Unlock Windows' Secure Boot Protection Discovered
                                        PC World, August 11th, 2016
                                        "Windows devices have a new threat thanks to a Secure Boot policy that leaked online...

                                        Microsoft just offered a masterclass on why building back doors into secure systems are a bad idea.

                                        Two security researchers who go by the handles @never_released and @TheWack0lian on Twitter recently announced in a blog post that malicious actors can bypass Windows' Secure Boot feature on vulnerable machines, as first reported by ZDNet..."

                                        IT - Server
                                        New Open Standard Seeks Home In The Enterprise Data Center Rack
                                        SearchDataCenter, August 10th, 2016
                                        "If the Open Compute Project is too big and scary for your enterprise, a new open standard for data center hardware has emerged to appeal to data centers big and small.

                                        A populist version of hardware could be coming to a data center rack near you, if a newly introduced open standard gains steam..."

                                          IT - Java
                                          Microservices, Java-on-Java Top Oracle's JVM Design Goals
                                          ITWorld, August 10th, 2016
                                          "Oracle's plans for the Java Virtual Machine include greater language support, as well as accommodations for microservices and a heavier reliance on Java programming itself.

                                          "We want a VM that will continue to be polyglot, that will interoperate with unmanaged languages, implement well-managed languages," said John Rose, Oracle JVM architect, during the company's recent JVM Language Summit conference in Silicon Valley...."

                                          IT - Developer
                                          Want Secure Code? Give Devs The Right Tools
                                          JavaWorld, August 11th, 2016
                                          "The Internet has serious security problems that need to be fixed. Despite many calls to action over the years for the industry to band together and work on solutions, progress has been mild. What's needed isn't necessarily more security technology. What's needed are better tools for developers so that they can improve the security of their code.

                                          In his keynote at Black Hat in Las Vegas, Dan Kaminsky, chief scientist and co-founder of White Ops, advocated for environments and coding frameworks that make it easier for developers to implement security without compromising usability or stifling creativity..."

                                          IT - HPC
                                          HPC Short Courses Consortium Announces Autumn Academy for HPC
                                          HPCWire, August 12th, 2016
                                          "The HPC Short Courses Consortium wishes to announce the fifth Autumn Academy for High Performance Computing which will take place 12th - 23rd September, 2016 at the Maxwell Centre, University of Cambridge.

                                          Who should attend?"

                                          Most Unique Feature of NetBeans IDE!
                                          By Geertjan Wielenga
                                          Geertjan writes, "What's NetBeans all about, what makes it special, why would anyone use NetBeans rather than something else, what are its key features, what distinguishes NetBeans from other tools, etc etc etc. Set aside those questions for a moment and take a look at this photo taken last week at JCrete..."
                                          Nexenta News
                                          Nexenta to Present on Leveraging Lenovo Solutions with Open Source-Driven Software-Defined Storage at the Lenovo Server Roadshows
                                          Nexenta, August 9th, 2016
                                          Nexenta announced its participation and sponsorship of four upcoming Server Roadshows presented by Lenovo.

                                          In March 2016, Nexenta and Lenovo announced a strategic partnership as part of Lenovo's StorSelect program and introduced the Lenovo Storage DX8200N powered by NexentaStor solution, integrating Nexenta's award-winning, software-defined storage with Lenovo x86 servers. The combined solutions offer Lenovo customers both scale-up and scale-out reference architectures on all flash, hybrid, and spinning media systems. At the Lenovo Server Roadshows, Nexenta will discuss the ways in which their partnership with Lenovo has enabled the successful implementation of powerful products to simplify IT infrastructure, reduce costs and increase reliability, in the face of industry transformation.

                                          Nexenta and Western Digital to Feature IDC and Northern Backup on All-Flash SDS Webinar
                                          When Great Speed Comes with Great Efficiency
                                          Wednesday, August 17, 2016 at 9 a.m. PT

                                          Nexenta announced it is hosting a complimentary webinar with SanDisk, a Western Digital Corporation brand, titled 'All-Flash SDS: When Great Speed Comes with Great Efficiency,' featuring IDC (link is external) and Northern Backup.

                                          Eric Burgener, Research Director, Storage at IDC; Brent Thumlert, Systems Architect at Northern Backup; Steve Wilkins, product and solutions Marketing, Data Center Systems Business Unit at Western Digital; and Michael Letschin, Field CTO at Nexenta will share insights on All-Flash Array market trends, future outlooks and why an increasing number of companies are adopting All-Flash SDS.

                                          Cisco News
                                          Level 3 Delivers Automated Network-as-a-Service With Adaptive Network Control Solutions Powered By Cisco Network Service Orchestrator
                                          Company Reaps the Benefits of Cisco Network Service Orchestrator to Design and Deliver Adaptive Services More Quickly
                                          Offering advanced network solutions for enterprises and video providers, Level 3 Communications is delivering one of the most innovative, on-demand Network-as-a-Service (NaaS) solutions on the market using Cisco's Network Services Orchestrator (NSO), enabled by Tail-f.

                                          Level 3's Adaptive Network Control Solutions suite leverages the benefits of network automation and Software-Defined Networking (SDN) to deliver technology solutions to customers in a rapid, self-service manner, empowering them to be more agile and competitive.

                                          Microsoft News
                                          Microsoft acquires Beam interactive livestreaming service
                                          Microsoft, August 11th, 2016
                                          Team Xbox is proud to announce that Microsoft has signed an agreement to acquire Beam, an innovative and interactive livestreaming service that gives viewers the ability to watch and play along with their favorite game streamers in real-time.

                                          Based in Seattle, Beam has evolved game streaming from a passive, watch-and-chat experience into one with real-time participation by the viewer; directly into a streamer's game play and live broadcast.

                                          A hackathon winner crowned, an entrepreneur's heartfelt motivation and some inspiring careers
                                          Microsoft, August 12th, 2016
                                          An innovative idea that takes the tedium out of organizing facts, an entrepreneur who risked bankruptcy to help save the woman he loves, and a man's difficult journey to a career at Microsoft - it's been a week of inspiring news around Microsoft.

                                          We've rounded up the highlights for this latest edition of Weekend Reading.

                                          IBM News
                                          IBM Researchers Use Grocery Scanner Data to Speed Investigations During Early Foodborne Illness Outbreaks
                                          Study shows that Big Data and analytics can help identify potential sources of contamination
                                          Foodborne illnesses, like salmonella, E. Coli and norovirus infections, are a major public health concern affecting more than one out of six Americans each year, according to the Centers for Disease Control and Prevention (CDC)1. During a foodborne illness outbreak, rapidly identifying the contaminated food source is vital to minimizing illness, loss and impact on society.

                                          IBM Research Almaden announced its scientists have discovered that analyzing retail-scanner data from grocery stores against maps of confirmed cases of foodborne illness can speed early investigations. In the study, researchers demonstrated that with as few as 10 medical-examination reports of foodborne illness they can narrow down the investigation to 12 suspected food products in just a few hours...

                                          21 Hospitals Across China to Adopt Watson for Oncology to Help Physicians Personalize Cancer Care
                                          IBM Partners with Hangzhou CognitiveCare to Bring Watson to China
                                          IBM and Hangzhou CognitiveCare announced 21 hospitals across China plan to adopt Watson for Oncology trained by Memorial Sloan Kettering, a cognitive computing platform for physicians to help them deliver personalized, evidence-based cancer treatment options. The initial 21-hospital introduction is part of a far-reaching, multi-year partnership through which Hangzhou CognitiveCare will introduce Watson for Oncology to hospitals across China. This is Watson Health's first partnership in China.

                                          Hangzhou CognitiveCare, which was established to bring cognitive computing to the fight against cancer in China, will provide sales, service and customer support including localization of Watson's insights for doctors in China. For example, while Watson for Oncology will initially be available in the English language only, CognitiveCare will provide some translation support to ensure Watson's treatment insights - such as drug labels and treatment guidelines - are available to customers in appropriate Chinese dialects. Additionally, CognitiveCare will localize dosing based on Chinese medical guidelines.

                                          IBM and Vodafone India launch new IBM Hybrid Cloud platform
                                          to enhance customer experience
                                          IBM and Vodafone India announced a multi-million dollar five year agreement for IBM to manage IT services support for Vodafone India's IT infrastructure and applications environment.

                                          By bringing together Vodafone India's enterprise data and cloud ready applications into a scalable environment that keeps data local, private and secure, the new IBM hybrid cloud platform will enable delivery of faster and more insightful data intelligence and support faster decision-making.

                                          Scientists Discover New Chemical Catalyst to Create Cheaper, Biodegradable Plastics from Plants
                                          IBM Research and Stanford University researchers create inexpensive method to bring plant-based plastics mainstream
                                          While biodegradable forks and spoons already exist on store shelves, consumers often opt for more cost-effective, petroleum-based alternatives. Announced that scientists have identified a chemical catalyst that can be used to create cheaper, biodegradable plastics from plants such as palm trees and beets. These inexpensive plastics can be used for making common consumer plasticware, such as eating utensils, as well as medical devices.
                                            IBM Research - Almaden Celebrates 30 Years of Innovation in Silicon Valley
                                            IBM TrueNorth brain-inspired computer chip accepted into the Computer History Museum
                                            IBM announced the 30th anniversary of IBM Research - Almaden in San Jose, California. The research and development lab is known as the birthplace of the world's first hard-disk drive, the relational database, DVD and Blu-ray encryption technology and brain-inspired supercomputing chips. Almaden is one of IBM's 12 global research facilities. It moved into its current location in 1986.
                                            Fujitsu News
                                            Fujitsu Develops High-Speed Technology to Process Deep Learning
                                            Press releases 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 Fujitsu Develops High-Speed Technology to Process Deep Learning Using 'AlexNet,' 64 GPUs in parallel achieve 27 times the speed of a single GPU for world's fastest proces
                                            Fujitsu Laboratories Ltd. today announced the development of software technology that uses multiple GPUs to enable high-speed deep learning powered by the application of supercomputer software parallelization technology.

                                            A conventional method to accelerate deep learning is to use multiple computers equipped with GPUs, networked and arranged in parallel. The issue with this method is that the effects of parallelization become progressively harder to obtain as the time required to share data between computers increases when more than 10 computers are used at the same time.

                                            VMware News
                                            VMware Named a Leader in 2016 Magic Quadrant for x86 Server Virtualization Infrastructure
                                            Partnership delivers Windstream's high-performance product portfolio to Cologix customers in four markets
                                            Windstream, a leading provider of advanced network communications, announced it has recently completed construction of a new colocation point of presence (PoP) in Dallas, Texas, and plans to complete construction of a new colocation PoP in Columbus, Ohio, in October - both in facilities operated by Cologix, a network-neutral interconnection and data center company. This adds to Windstream's already-established presence in the Cologix Minneapolis and Jacksonville data centers, and aligns with Windstream's continued aggressive Data Center Interconnect (DCI) efforts, adding carrier neutral data centers to its network and giving its wholesale and enterprise customers more options to access cloud resources.
                                              Red Hat News
                                              Friday Five - August 12, 2016
                                              Red Hat, August 12th, 2016
                                              The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.

                                              • Gartner Positions Red Hat in the Visionaries Quadrant of the 2016 Magic Quadrant for x86 Server Virtualization Infrastructure
                                              • Fundamental shifts in the virtualization market
                                              • Business Insider - A new technology called 'containers' is creating 'winners and losers' says Red Hat CEO
                                              • Maximizing your virtualization investment
                                              • Matsui Securities' trading environment boasts superior usability with Red Hat JBoss Data Grid

                                              Read on for details.

                                              Red Hat Positioned in the Visionaries Quadrant of Gartner's 2016 Magic Quadrant for x86 Server Virtualization Infrastructure
                                              Red Hat, August 10th, 2016
                                              Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions, announced that Red Hat Enterprise Virtualization has been positioned by Gartner, Inc. in the 'Visionaries' quadrant of the August 2016 x86 Server Virtualization Infrastructure Magic Quadrant. With Red Hat Enterprise Virtualization, companies around the world are building a foundation for future technologies while integrating with existing technologies with an open, scalable, and high-performance virtualization infrastructure.
                                              Level3 News
                                              Level 3 Communications (LVLT) to Introduce NaaS Solution
                                              Level(3), August 12th, 2016
                                              Leading U.S. fiber optic network service provider, Level 3 Communications Inc.LVLT has launched its automated on-demand Network-as-a-Service (NaaS) with Adaptive Network Control Solutions, which is powered by Cisco System's CSCO Network Service Orchestrator (NSO). The latest offering will allow customers to control their Ethernet service bandwidth for cloud connections among other things.
                                              HP News
                                              Hewlett Packard Enterprise Wins 'Gold' in Data Analytics, High-Performance Computing with Acquisition of SGI
                                              HPE, August 11th, 2016
                                              Antonio Neri, Executive Vice President and General Manager, Enterprise Group, blogs. "Once the domain of elite academic institutions and government research facilities, high-performance computing (HPC) - the use of 'super' computers and parallel processing techniques for solving complex computational problems - is rapidly making its way into the enterprise, disrupting industries and accelerating innovation everywhere. That's because businesses today are recognizing the big potential in the seas of their corporate data.

                                              Organizations large and small are adopting HPC and big data analytics to derive deeper, more contextual insights about their business, customers and prospects, and compete in the age of big data.'1' These businesses see revenue opportunity in the explosion of data being generated from new sources, like the proliferation of mobile devices, the Internet of Things, the ever-expanding volumes of machine-generated data, and the increase of human data in the form of social media and video..."

                                              Hewlett Packard Enterprise to Acquire SGI to Extend Leadership in High-Growth Big Data Analytics and High-Performance Computing
                                              Strengthens position in $11 billion HPC segment which is growing at an estimated 6-8% CAGR, and in the data analytics segment, which is growing at over twice that rate
                                              Hewlett Packard Enterprise announced that it has signed a definitive agreement to acquire SGI, a global leader in high-performance solutions for compute, data analytics and data management, for $7.75 per share in cash, a transaction valued at approximately $275 million, net of cash and debt.

                                              SGI products and services are used for high-performance computing (HPC) and big data analytics in the scientific, technical, business and government communities to solve challenging data-intensive computing, data management and virtualization problems. The company has approximately 1,100 employees worldwide, and had revenues of $533 million in fiscal 2016.

                                              Hewlett Packard Enterprise to Highlight Future of Intuitive and Powerful Cybersecurity at HPE Protect 2016
                                              Headliner Alex Tapscott, co-author of Blockchain Revolution, to deliver keynote address on expansion and impact of blockchain on security industry
                                              Hewlett Packard Enterprise (HPE) announced the keynote speakers and technically focused breakout sessions for its annual enterprise security user conference, HPE Protect 2016, taking place Sept. 13-16 in National Harbor, Md.

                                              HPE Protect 2016 will bring together more than 2,000 security professionals to network, collaborate and explore more powerful approaches to overcome the increasing complexities of creating, deploying and maintaining an effective enterprise security posture.

                                              Hewlett Packard Enterprise Modernizes Medicaid System for Kansas Department of Health
                                              Adoption of HPE services streamlines IT operations, lowers overhead costs, and improves Medicaid service for the State
                                              Hewlett Packard Enterprise announced that the Kansas Department of Health and Environment (KDHE), has selected HPE to upgrade the state's Medicaid Management Information System (MMIS). As part of the $215 million dollar contract, HPE will establish the Kansas Modular Medicaid System (KMMS) - a new high-tech foundation to assist the administration of Medicaid. Adopting a variety of HPE technologies, commercial off-the-shelf (COTS) software, and superior partner solutions from Cerner and SAS, HPE will strengthen the state's ability to manage Medicaid policies and finances across disparate programs and agencies.
                                              Brocade News
                                              Brocade vADC Solution Now Available On The Microsoft Azure Marketplace
                                              Enables Hybrid Enterprises to Access and Deliver Applications Quickly, Securely and Cost-Effectively
                                              Brocade announced the availability of the Brocade Virtual Application Delivery Controller (vADC) solution on the Microsoft Azure Marketplace. With just a few clicks, customers can now deploy the Brocade vADC solution to optimize and secure applications in the Microsoft Azure cloud platform, paying only for the specific resources they use.

                                              Brocade's solution is the industry's first software-based Layer 7 application delivery controller with integrated capabilities for web content optimization and application firewall. Designed to work within cloud environments, it is easily integrated into an application stack. Deployed via a template that utilizes Azure Scale Sets, the Brocade vADC solution is already integrated with Azure Key Vault to enable fast, reliable and secure application delivery to users anywhere.

                                              Windstream News
                                              Windstream expands partnership with Cologix, broadens cloud connectivity options for customers
                                              Partnership delivers Windstream's high-performance product portfolio to Cologix customers in four markets
                                              Windstream announced it has recently completed construction of a new colocation point of presence (PoP) in Dallas, Texas, and plans to complete construction of a new colocation PoP in Columbus, Ohio, in October - both in facilities operated by Cologix, a network-neutral interconnection and data center company. This adds to Windstream's already-established presence in the Cologix Minneapolis and Jacksonville data centers, and aligns with Windstream's continued aggressive Data Center Interconnect (DCI) efforts, adding carrier neutral data centers to its network and giving its wholesale and enterprise customers more options to access cloud resources.

                                              The addition of these sites offers Cologix customers access to Windstream's robust fiber network - the sixth-largest network in the nation, spanning more than 125,000 miles - providing multiple diverse routing options to protect their business critical services supported from the Meet-Me-Rooms of Cologix's impressive network of data centers

                                                Netapp News
                                                NetApp Takes Top Honors for Customer Implementation, Brand Leadership at Flash Memory Summit 2016
                                                NetApp wins 2016 Flash Memory Summit Best of Show for Customer Implementation, sweeps categories for all-flash NAS and unified SAN/NAS arrays in 2016 IT Brand Leader Survey
                                                NetApp announced that it won the Flash Memory Summit Best of Show for Most Innovative Flash Memory Customer Implementation and swept all six brand leadership categories for all-flash NAS and unified SAN/NAS arrays in the 2016 Brand Leader Survey.

                                                The Flash Memory Summit Best of Show award for The Most Innovative Flash Memory Customer Implementation recognized NetApp SolidFire for its innovative implementation of flash memory for Internet Solutions (IS), a converged communications service provider operating in 14 countries across Africa, with international offices worldwide. With NetApp SolidFire, IS was the first service provider to offer performance-based tiering services in Africa, a major differentiator for the company, enabling it to meet increasingly complex customer demands.

                                                Trending in
                                                Vol 234, Issue 2
                                                Trending IT Articles