News about Oracle's Solaris and Sun Hardware
System News
Aug 29th, 2016 — Sep 4th, 2016 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 222, Issue 5 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle News
Why Enterprise IT Has Heartburn With Most Public Cloud Infrastructure
Chuck Hollis, Forbes, Sept. 1st
Chuck writes, "Most enterprise IT leadership teams are under enormous pressure to move to public clouds, and quickly. The assaults are coming from everywhere: business leaders, industry pundits, and most of the vendor community. Most sane mortals would raise the white flag and get on with the transition.

But that's not happening en masse. Why?

I believe the main reason large IT shops are moving cautiously is quite simple and fundamental: Most of today's public cloud infrastructure services don't work the way that enterprise IT needs to work. It's not about technology, it's about process..."

3 Ways Healthcare Providers Can Take Advantage Of Social Media Disruption
By Roy Gum
Roy writes, "Social media and the internet are having a profound effect on healthcare - a digital disruption that currently impacts more than 1 billion potential patients and is estimated to affect 2.5 billion by 2018. For healthcare providers, this disruption presents both risk and opportunity as the traditional doctor-patient relationship is radically modified by digitally empowered patients, online channels for direct and immediate patient-doctor communication, and a plethora of freely available and easily searchable medical 'advice' that can lead to misguided self-diagnoses and impede proper treatment..."
Grupo Aeromexico Uses Cloud Analytics To Expand Network And Double Profits
Oracle, August 30th, 2016
Sasha Banks-Louie writes, "Air travel in Mexico is big business - and it's getting bigger: In 2015 almost 70 million travelers flew into, out of, or across Mexico, a 12% increase over 2014. And Grupo Aeromexico, already the county's largest airline, wants to take advantage of that growth by focusing on its most profitable travelers and adding new, profitable routes. Until recently, however, Grupo Aeromexico had trouble determining just which passengers and routes fit the criteria.

Grupo Aeromexico is a hub-and-spoke carrier, which means it transports passengers to and from its hub in Mexico City. But while the company could analyze financial performance for direct routes from its hub to various 'spoke' destinations, it was almost impossible for it to understand the economic potential for connecting flights- such as those departing from Managua, Nicaragua, connecting in Mexico City, and then flying to their final destination in Los Angeles..."

ODA X6-2S/M NOW Support SE/SE1
By Ramona Costea
Ramona blogs that the, "Oracle Database Appliance X6-2S and X6-2M Now Support Oracle Database Standard Edition and Oracle Database Standard Edition One.

The next Oracle Database Appliance software update (* will add support for Oracle Database 11g Standard Edition and Standard Edition One (release running on Oracle Database Appliance X6-2S and X6-2M.

Customers will be able to deploy and run Oracle Database Standard Edition (release on ODA S/M and utilize Oracle Database Standard Edition, Oracle Database Standard Edition One, or Oracle Database Standard Edition 2 licenses..."

10 Ways Artificial Intelligence Will Change The Customer Experience
Business 2 Community, August 31st, 2016
"The huge amount of data we generate is a mixed blessing. It gives us better insight into human behavior, but it's also a lot more stuff to sort through. For helping us wade through our data, and make better use of it, we'll turn to AI (artificial intelligence) for things as complicated as navigating the sales journey to just figuring out what the doggone temperature is outside.

Christophe Coenraets is the Principal Developer Evangelist for Salesforce. He talks about how our relationship with our data will change as we develop better tools to interact with it, and better insights to learn from it..."

    Baidu Open-Sources Paddlepaddle Deep Learning Platform
    eWeek, September 1st, 2016
    "At its Baidu World conference in Beijing, Baidu announced it has open-sourced its PaddlePaddle deep learning technology.

    Baidu, the provider of the leading search engine in China, has open-sourced PaddlePaddle - the company's deep learning software platform.

    Beijing-based Baidu has set up shop in Silicon Valley in Sunnyvale, Calif., where the company is acting like its born-on-the-web neighbors and open-sourcing core technology to share with the community. PaddlePaddle is now on GitHub with full documentation and specifications..."

      Nigel Artificial Intelligence Learns Common Sense Via Observation
      insideBIGDATA, September 3rd, 2016
      "Kimera Systems Inc. announced its Nigel artificial general intelligence (AGI) technology became a commercially deployable artificial intelligence technology to observe user behavior, comprehend context, and derive a common sense set of actions to apply under specific circumstances. This groundbreaking achievement in artificial intelligence comes decades before many experts believe it will be possible..."
        Scientists Look At How A.I. Will Change Our Lives By 2030
        ComputerWorld, September 2nd, 2016
        "By the year 2030, artificial intelligence (A.I.) will have changed the way we travel to work and to parties, how we take care of our health and how our kids are educated.

        That's the consensus from a panel of academic and technology experts taking part in Stanford University's One Hundred Year Study on Artificial Intelligence.

        Focused on trying to foresee the advances coming to A.I., as well as the ethical challenges they'll bring, the panel yesterday released its first study.

        The 28,000-word report, 'Artificial Intelligence and Life in 2030,' looks at eight categories -- from employment to healthcare, security, entertainment, education, service robots, transportation and poor communities -- and tries to predict how smart technologies will affect urban life..."

        New Oracle VM Templates for Oracle Database
        By Honglin Su
        Honglin blogs, "Many customers have been using Oracle VM to enable rapid application deployment. With the use of Oracle VM Templates, sophisticated applications such as Oracle Database or Oracle Real Application Clusters (Oracle RAC) can be deployed in minutes - up to 10x faster than with other solutions.

        We are pleased to announce the updated Oracle VM Templates for Oracle Database. The entire installation is automated, requesting minimal information (e.g. node names, IP addresses, etc.) from the user. Fully automated build of a Single Instance environment or a cluster using the Deploycluster tool on Oracle VM 3, including automated network setup for N-node clusters..."

        Oracle VM 3.4: Enabling Rapid Migration to a Private Cloud Environment
        By Simon Coter
        Simon writes, "Oracle VM Virtual Appliances, also known as Oracle VM Templates, provide an innovative approach to deploying a fully configured software stack by offering pre-installed and pre-configured software images. Use of Oracle VM Templates eliminates the installation and configuration costs, and reduces the ongoing maintenance costs helping organizations achieve faster time to market and lower cost of operations. Oracle VM Templates of many key Oracle products are available for download, including Oracle Linux, Oracle Solaris, Oracle Database, Fusion Middleware, and many more; see the complete list below.

        Traditional data centers are typically fragmented environments, with various applications installed and Server virtualization is the first step to simplify this..."

        Updated whitepaper: Optimizing Oracle VM Server for x86 Performance
        By Jeff Savit
        Jeff blogs, "I'm pleased to announce an update to the whitepaper Optimizing Oracle VM Server for x86 Performance.

        This update adds information about aligning virtual disk partitions on a 4K boundary for performance and references the KM note describing this in further detail. The update also adds text to clarify that Oracle VM does not buffer file writes, so there's no risk of data loss due to buffering..."

        IT - Storage
        At 34 Million, SSDs Outpace Forecast In 2Q16 - Trendfocus, August 31st, 2016
        "Trendfocus, Inc. has published this Executive Summary on NAND/SSD Information Service - CQ1 '16 Quarterly Update (August 22, 2016).


        Client SSDs grew to nearly 30 million units shipped, posting continued growth and rising attach rates in notebook. PCs SATA remains the dominant interface.

        Client modules increased 6.4% to 12.9 million units, while drive form factor (DFF) still leads the client segment, with 16.7 million units shipped; SATA represented 78% of all client SSDs shipped with the balance as PCIe.

        All three enterprise interfaces grew, highlighted by a sharp 25.6% sequential jump of PCIe to over 0.200 million units. Of the 4.051 million enterprise SSD units shipped, enterprise SATA SSDs represented almost 80% of all enterprise, SSDs shipped, while SAS shipments of 0.608 million captured over 15% of the enterprise SSD market.

        Capacity shipped for all SSDs reached almost 12.4EB, up 24.6% from the previous quarter..."

        Big Data Storage: Machine Learning And Scalable NAS
        Enterprise Storage Forum, August 31st, 2016
        "Big data definitions shift over time. When it first came into vogue, one of the definitions was simply a lot of data residing on primary systems. An updated definition is large data stores and/or datasets that are subject to active business processes like analytics.

        Now a growing subclass of big data is shifting the definition again: machine data. Yale Professor Daniel Abadi defines machine data as 'data that is generated as a result of a decision of an independent computational agent or a measurement of an event that is not caused by a human action.' In other words, humans invent the machines (this is not Skynet) but machines generate data without human input..."

        Copy Data Management Is Ready For Prime Time
        Storage-Switzerland, August 29th, 2016
        "The data center's biggest challenge is not dealing with the capacity growth of the primary data set, it is dealing with the growth of the secondary data set. The secondary data set is copies of data it creates from primary data to serve a variety of functions the organization needs, such as data protection, feed data to reporting or analytic software and using a copy of primary data for test and development. To perform these tasks, the storage capacity of secondary storage might need to be 10 to 20 times the capacity of the primary storage..."
          IT - Technology
          A Robot May Help You Buy a Hammer At Lowe's
          ComputerWorld, August 30th, 2016
          "If you go to Lowe's to buy a hammer or a stack of lumber this fall, you might have a robot offer to help you.

          The U.S.-based chain of home improvement stores announced Tuesday that, beginning next month, 11 stores in the San Francisco Bay area will begin using autonomous service robots.

          Dubbed LoweBot, the robot is designed to help customers by answering simple questions, such as where they can find light bulbs or where the paint section is ..."

          Autonomous Tractors Could Turn Farming Into A Desk Job
          ZDNet, September 2nd, 2016
          "CNH Industrial unveiled an autonomous tractor concept at the 2016 Farm Progress Show in Iowa during the last week of August. Theses self-driving tractors would be able to work around the clock while also providing real-time data monitoring. Farmers would program the tractors to accomplish specific tasks. Then, instead of sweating in the fields, they could tend to livestock or even sit in an air-conditioned office and monitor the tractors from a tablet or computer. In essence, automated equipment could turn farming into a desk job..."
          Facial Recognition Tech Nabs ID Fraudsters
          GCN, August 31st, 2016
          "A man with a suspended commercial driver's license attempted to get a new one using a stolen identity, but he was stopped. About two dozen people used fake information to get a second Social Security numbers and try to get new licenses, but they were stopped. Five individuals tried to take over someone else's account at the Department of Motor Vehicles, but they were stopped too.

          All of these people were foiled because of New York DM's use of facial recognition software. The technology was first piloted in 2008, and as the system improves, it is steadily detecting more fraud attempts..."

          Fujitsu Now Making DRAM' Killer With 1,000X Performance Boost
          ITWorld, August 31st, 2016
          "Fujistu Semiconductor Ltd. has become the first manufacturer to announce it is mass producing a new RAM that boasts 1,000 times the performance of DRAM but stores data like NAND flash memory.

          The new non-volatile memory known as Nano-RAM (NRAM) was first announced last year and is based on carbon nanotube technology.

          Fujitsu Semiconductor plans to develop a custom embedded storage-class memory module using the DDR4 interface by the end of 2018, with the goal of expanding the product line-up into a stand-alone NRAM product family from Fujitsu's foundry, Mie Fujitsu Semiconductor Ltd.; the stand-alone memory module will be sold through resellers, who'll rebrand it..."

          Iris Scans As ID Grow In Use
          ComputerWorld, September 1st, 2016
          "Iris scanner technology is emerging in smartphones, including the new Samsung Note 7, but is expected to come soon to cars and ATM machines to verify a user's identity.

          Experts say an iris scan can be more reliable than a fingerprint scan, which is a big reason it is expected to be used in more devices in coming years. Each iris, the colorful part of the eye that forms a ring around the pupil, is unique and therefore a good biometric indicator.

          Samsung's Android 6-based Note 7, which shipped on Aug. 19, takes advantage of the technology as well as the Windows 10 Mobile-based HP Elite X3..."

          New version of USB-C lets you connect to a screen via HDMI without a dongle
          CNET, August 31st, 2016
          "Dongles begone! HDMI Licensing has announced a new version of USB-C that has native HDMI support. That means you'll be able to connect compatible tablets, phones and laptops directly to a display without the need for a separate converter.

          A simple USB-C-to-HDMI cable will replace the $70 dongles that currently exist, though the source device will need to have been designed to output HDMI via USB-C. According to HDMI Licensing it's not backwards compatible with existing devices or upgradeable via software..."

            Sony Previews Prototype Xperia Gadgets
            CIO, September 3rd, 2016
            "Prototypes from Sony's R&D labs show how our gadgets will understand our voice and gestures in future

            Sony is looking at taking the Xperia brand beyond smartphones and is showing off some prototype gadgets at the IFA trade show in Berlin.

            It was keen to underline that not all of them might make it to manufacturing, but those on display were fully working prototypes with hardware and software stable enough that the company let a reporter test them out..."

              Swarm Robots Can Learn By Simply Observing
              Science Daily, August 30th, 2016
              "It is now possible for machines to learn how natural or artificial systems work by simply observing them, without being told what to look for, according to researchers...

              It is now possible for machines to learn how natural or artificial systems work by simply observing them, without being told what to look for, according to researchers at the University of Sheffield.

              This could mean advances in the world of technology with machines able to predict, among other things, human behaviour..."

                Why Augmented Reality Is Much Bigger Than Pokemon Go
                Business 2 Community, September 2nd, 2016
                "The increasing use of virtual reality (VR) is a Hard Trend that will continue to grow, and with the release of several high-profile VR systems, 2016 was supposed to be the year that VR finally went mainstream. However, users around the world queuing up to immerse themselves in a virtual world have yet to materialize. The less fancied augmented reality (AR) consists of using your smartphone camera or smart glasses to overlay virtual elements to the physical world. AR is not immersive and was dismissed by many as just another tool for tech enthusiasts only. For those of you who read my 2016 annual list of 25 Hard Trends shaping the future, augmented reality was listed, and the revolution has now started..."
                  Security Learning Subscription - Preview for FREE Now!
                  By Ramona Costea
                  Ramona blogs, "As the world becomes more digitized, serious breaches of data security are increasingly hitting the headlines globally. How can you ensure that your customers are not next in line?

                  Learn how you can help your customers protect sensitive data from Oracle University's Security Learning Subscription. Oracle and industry experts will teach you about security concepts and best practices.

                  Our interactive information security training deep dives into the following areas:..."

                  IT - Bitcoin
                  Bitcoin Is The Fuel We Need For The Industrial Internet Of Things
        , August 30th, 2016
                  "Industrial giant G.E. has announced the new Internet revolution: The Industrial Internet of Things. G.E. promises the Industrial Internet will bring a new wave of digital products, which combines 'Machine-to-Machine (M2M) communication, industrial Big Data analytics, technology, cyber security and automation.' The Industrial Internet, if successful, will expand the IoT astronomically. This, in turn, will further exacerbate the already existing IoT challenges related to frictionless payments, security, reliability, resiliency, and stability. This is precisely why Bitcoin and its blockchain technology can play a decisive role..."
                  If I Only Had 5 Minutes To Explain Blockchain
                  CIO, August 30th, 2016
                  "Are you struggling to understand how blockchain works, why blockchains are secure or why blockchain technologies will transform the world? Here's a five-minute answer to all those questions...

                  The bursting of the U.S. housing bubble underpinned the global financial crisis of 2007-08 and caused the value of securities linked to the U.S. real estate to nosedive. Easy access to subprime loans and the overvaluation of bundled subprime mortgages all leaned on the theory that housing prices would continue to climb..."

                    Industry Leaders Reach Agreement On Blockchain Governance
                    CryptoCoinsNews, August 30th, 2016
                    "Prominent leaders in the blockchain space have formed a new group with the aim of promoting blockchain's use cases, increasing collaboration within the industry and addressing blockchain governance. According to a newly published ten points agreement participants state that despite the blockchain being a decentralized technology:

                    'Like-minded people and groups can self-organize to voice their valuable perspectives, collaborate and solve problems in a bottom-up, multi-stakeholder fashion. Especially as the Internet Provides new means and mechanisms to do so.'

                    The agreement is the result of a meeting between 16 prominent blockchain experts and industry leaders at the family compound of Don Tapscott, best-selling author of numerous books, including Wikinomics, and his son Alex Tapscott, who together have recently published Blockchain Revolution..."

                      Visa To Test Blockchain System For International Money Transfers
                      ZDNet, September 1st, 2016
                      "Visa has a new pilot project in Europe designed to test how blockchain technology could be used in cross-border money transfers.

                      The pilot is taking place through Visa Europe Collab, Visa's London-based innovation hub, in cooperation with Canadian blockchain startup BTL Group.

                      Visa plans to use BTL's interbank settlement platform Interbit to see whether blockchain can reduce costs, settlement times, and credit risks associated with international transfers between banks..."

                        We've Hit Peak Blockchain Hype, Says New Report
              , September 1st, 2016
                        "According to the latest Gartner Hype Cycle report, Blockchain technology is just about at the Peak of Inflated Expectations. Meanwhile, cryptocurrencies such as Bitcoin and related businesses like exchanges are further ahead in the Trough of Disillusionment.

                        Gartner has recently released its report Hype Cycle for Emerging Technologies, 2016, which states that blockchain technology is at the peak of inflated expectations. The Connecticut-based firm is one of the leading data and research providers when it comes to information technology (IT). It provides research and advisory in regards to maturity, adoption, and real world application of new technologies..."

                        What Is The Future Of Bitcoin?
                        NEWSBTC, September 1st, 2016
                        "Digital payment platform Bitcoin began in 2008 as a secure cryptocurrency, and it has evolved into a valuable digital exchange system. Bitcoins can be 'mined' by anyone with a suitable computer - they can use their machine's processing power to handle transactions and pick up Bitcoins of their own. Those coins can be stored in a digital Bitcoin wallet and are secured with the user's private key, which is required in order to make transactions or trade Bitcoins. The digital coins can be traded and sold securely online, with over 100,000 global merchants accepting the payment method..."
                        IT - FOSS
                        Myth Versus Fact: Open Source Projects And Federal Agencies
                        CSO Online, September 2nd, 2016
                        "Many agencies in the federal government use approved public repositories for open source software development. According to the General Services Administration (GSA) GitHub dashboard, there are 236 federal organizations using a combined 5,254 project repositories.

                        More federal agencies are increasing their use and creation of open source software to achieve their IT objectives. In order to best prepare for the implementation of even more open source projects, federal agencies need to understand the facts among the many misconceptions and myths surrounding public repositories..."

                        Survey: Infographic Shows Open Source Increasingly Embraced By Developers
                        The VAR Guy, August 31st, 2016
                        "Open source platforms are no longer just for a small group of hardcore coders. A recent study by Black Duck and North Bridge of developers and security professionals shows that 65 percent of respondents have embraced open source as a critical element of their development strategy.

                        Emerging technologies such as containers are also on the rise; 59 percent of respondents already utilize containers in a variety of deployments to speed up their go-to-market strategies, from development and testing to internal and external production environment..."

                        Next Generation Solaris Technology at Oracle OpenWorld 2016
                        By Markus Flierl
                        Markus blogs, "I'm very excited about OpenWorld 2016 which is starts on September 18: We will be providing a preview of the next release of Solaris and all the breakthrough capabilities that we'll be introducing to take enterprise computing to the next level. We will talk about our differentiating new security, compliance, life cycle management, global analytics, DevOps and container capabilities. During my General Session (Tuesday, September 20 at 11am at the Mariott Marquis hotel in SF) I will provide an overview of what's in the new release as well as the investments beyond...."
                        IT - DevOps
                        DevOps Storytime: The Line, The Loop And The Cube
              , September 1st, 2016
                        "In a time not so long ago, but long enough to be before the mainstreaming of magical ideas such as 'configuration as code' or 'platform as a service (PaaS),' in a period where the enterprise IT shops were ruled by the one-two punch of Six Sigma and ITIL, there were three magical artifacts sought by the people who spent their working days lubricating the gears of the consulting, development and operations factories throughout the lands of corporatedom..."
                        Why DevOps Should Care About SDN
              , September 2nd, 2016
                        "Software-defined networking (SDN) and DevOps are not mutually exclusive. Actually, DevOps wants SDN, whether it knows it yet or not.


                        If software is going to eat the world, then SDN is going to eat networking.

                        Networks are becoming more complex, and one way to manage them more effectively is through SDN. Also, organizations are demanding faster changes, yet networking changes traditionally have been a manual process.

                        In a profession where network engineers typically work in seclusion and use significant manual processes, it can provide a set of tools to align with DevOps. This is why DevOps needs to care about it..."

                        MHA (Master High Availability Manager and tools for MySQL) Quick Start Guide
                        By Percona
                        "MHA (Master High Availability Manager and tools for MySQL) is one of the most important pieces of our managed services. When properly set up, it can check replication health, move writer and reader virtual IPs, perform failovers, and have its output constantly monitored by Nagios. Is it easy to deploy and follows the KISS (Keep It Simple, Stupid) philosophy that I love so much.

                        This blog post is a quick start guide to try it out and play with it in your own testing environment. I assume that you already know how to install software, deal with SSH keys and setup replication in MySQL. The post just covers MHA configuration..."

                        How Uber Engineering Massively Scaled Global Driver Onboarding
                        By Jonathan Pepin
                        "Here's the behind-the-scenes story about how Uber Engineering's Driver Team continues to develop our virtual onboarding funnel to get hundreds of thousands of driver-partners on the road earning money with Uber...

                        Our team cares about growth. We built the first partner web onboarding process to solve our scaling issues, and we had to completely revise that initial version for the same reason. Uber grows fast.

                        Signing up as a rider with Uber might be straightforward, but partnering with Uber is inherently a more complex process. As late as 2013, onboarding was purely manual. Potential driver-partners had to go to a local Uber office - before we created regional Greenlight locations - and go through a series of paperwork with an operations manager to create an account.

                        After six years of operation, we recently reached 2 billion trips on our platform. Uber is now in 400+ cities and 70+ countries. Delivering rides in all these places means we need to attract and approve driver-partners all over the world. Each week, hundreds of thousands of new drivers take their first trip and start earning money on our platform. At this scale, doing everything in person is not a solution. We had to make a better experience for our driver-partners, so we took this on as an engineering challenge..."

                          Big Data SQL Quick Start. Schema on Read and Schema on Write
                          By Alexey Filanovskiy
                          "So, when we talking about data loading, usually we do this with a system that could belong on one of two types. One of this is schema on write. With this approach, we have to define columns, data formats and so on. During the reading, every user will observe the same data set. As soon as we performed ETL (transform data in the format that most convenient to some particular system), reading will be pretty fast and overall system performance will be pretty good. But you should keep in mind, that we already paid a penalty for this when we're loading data. Like an example of the schema on write system you could consider Relational database, for example, like Oracle or MySQL..."
                          Cloud Computing
                          Oracle Service Cloud August 2016 - Now Generally Available (GA)
                          By Ramona Costea
                          Ramona blogs, "Check out the Oracle Service Cloud August 2016 release, now Generally Available (GA). The August 2016 release of Oracle Service Cloud introduces a multi-platform Mobile Accelerator to easily create a tailored mobile app, enabling an organization's employees to seamlessly access customer and case information, tasks, view dashboards, and more on their own mobile device.

                          For complete August 2016 release details, check our additional resources..."

                          IT - Cloud
                          3 Ways Cloud Will Matter The Most In Future
                          Business 2 Community, August 31st, 2016
                          "Researchers endorse that social media, mobile and analytics are on the fastest ever growth path. Companies and investors are just pouring more funds into it and bringing in new features and solutions. However, there is another technology that has seen wider adoption and investment - and that is cloud storage.

                          Just check a few stats:.."

                          Cloud Security Alliance: 10 Ways To Achieve Access Control For Big Data (Slideshow)
                          Dark Reading, September 3rd, 2016
                          "A look at granular access control of the big data security and privacy...

                          The Cloud Security Alliance (CSA) Big Data Working Group recently released a new handbook: The Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy. The handbook includes 10 categories of consideration for the biggest challenges in big data security, including:

                          • Secure Computations in Distributed Programming Frameworks
                          • Security Best Practices for Non-Relational Data Stores
                          • Secure Data Storage and Transaction Logs
                          • Endpoint Input Validation / Filtering
                          • Real-Time Security / Compliance Monitoring
                          • Scalable and Composable Privacy-Preserving Analytics
                          • Cryptographic Technologies for Big Data
                          • Granular Access Control
                          • Granular Audits
                          • Data Provenance

                          ..." read on for details

                          Cloud News From VMworld: Software, Software-Defined Infrastructure And More
                          Data Center Knowledge, September 1st, 2016
                          "Here are the latest news and product announcements related to cloud computing that have emerged from the event so far.

                          The VMworld conference is now in its twelfth year. That makes it pretty old for a technology event. And in an era when virtual machines are old news, VMworld lacks some of the luster of its earlier days..."

                          A Blueprint For Selecting Security Technologies Inside The Cloud
                          Business 2 Community, September 1st, 2016
                          "Cloud security operations teams, especially ones that are looking at security technologies for the first time, are often faced with a daunting list of vendors who offer technologies with wide-ranging capabilities. Understanding the pros and cons of each might seem difficult or impossible at first, especially because the enterprise security sector is inundated with technologies that address security from a defense in depth perspective, offering different technologies at each layer. These include Firewalls, VPNs, IDS, IPS, log collection tools, SIEM tools, routers and switches with security capabilities, endpoint security tools, vulnerability management tools, threat management tools, etc..."
                          IT - CxO
                          Global Cost Of Cybercrime Predicted To Hit $6 Trillion Annually By 2021, Study Says
                          Dark Reading, August 30th, 2016
                          "A report out by Cybersecurity Ventures predicts global annual cybercrime costs will grow to $6 trillion by 2021."

                          While a $6 trillion estimate might be a little high, 'a trillion dollars plus is a real possibility,' says Larry Ponemon, chairman and founder of the Ponemon Institute. Though this isn't a number he saw coming down the pipeline. 'If you asked me five or six years ago, I'd fall over,' he says.

                            How To Talk About Security With Every C-Suite Member
                            Dark Reading, September 1st, 2016
                            "Communicating with C-suite leaders about the ongoing security threats your company faces can easily turn into an exercise in futility. Their eyes glaze over as you present metrics and charts that illustrate the current state of the business's IT infrastructure, and your attempts to justify investments in additional security tools and systems end up being unsuccessful.

                            You and your department may believe that you're conveying clear, accurate, and valid arguments for why the company needs to devote more of the budget toward information security. But your audience only sees metrics that are too technical for them to understand and strange graphs that display complicated trends..."

                            IDC: IT Spending To Hit $2.7 Trillion By 2020
                            InformationWeek, August 30th, 2016
                            "Companies that invest in third platform services such as cloud, mobility, and big data as part of their digital transformation efforts will drive IT spending growth, according to IDC.

                            Led by the financial services, manufacturing, and healthcare sectors, information technology spending worldwide is projected to hit $2.7 trillion by 2020, according to a report from IT research firm IDC.

                            The company's semi-annual report, which looks at IT spending across more than 100 technology categories and 53 countries, covers 20 industries and projected healthcare IT spending would remain the fastest growing industry with a five-year compound annual growth rate (CAGR) of 5.7%, despite concerns that spending growth may have peaked..."

                            Is Leadership in Your Organization's DNA?
                            Smart Brief, August 30th, 2016
                            Jill writes, "I have had the opportunity to work and consult at high levels in the upper echelons of corporations, and I've been on the board of Luby's/Fuddruckers since 2003. I can tell you unequivocally that I wouldn't have gotten there without being mentored by men; men who did not see my success as a threat; men who placed the well-being of their organizations ahead of their own interests; unselfish people, all.

                            But there's more: Mentoring was in the DNA of those organizations, and both I and the organization were benefactors.

                            If you want to build one of those organizations that are growing great leaders, here is a good place to start: It's a formula that I have found for leadership success, a template if you will. It goes like this:.."

                              New Roles for Business Intelligence in IT Decision-Making
                              eWeek, August 31st, 2016
                              "Back at the beginning of the calendar year, I published an article here in eWEEK titled, "Why Cognitive Intelligence Will Play Pivotal Role in Tech 2016." Putting artificial brains to work in business use cases is hard to do well, but it hasn't deterred the bolder enterprises from investing, testing and deploying intelligent applications here in 2016.

                              By definition, cognitive intelligence is the capability to reason, plan, solve problems, think abstractly, comprehend complex ideas, learn quickly and learn from experience. Humans are born with this; machines need humans to make them "smart." But humans are finding new ways to insert intelligence into IT machines wherever and whenever possible for business purposes.

                              A cognitive intelligence system such as IBM Watson can ingest scads of data and process it far faster and more accurately than any human can. It also can offer various solutions based upon various use cases, and then lay all of them out to be decided upon by a human..."

                              So You Want to Be a CIO
                              Government Technology, August 31st, 2016
                              "Los Angeles CIO Ted Ross, who also serves as general manager of the city's Information Technology Agency, kicked off his city's Digital Government Summit* on Tuesday, Aug. 30, by advising the more than 500 attendees to be guided in their pursuits by their north star. Ross' north star is the people - the nearly 4 million residents of California's largest city. The three principles at the center of IT, according to Ross, are that it is responsive, responsible and excellent..."

                              'As government, we are delivering digital tools and capabilities to people so that they can live healthy lives, they can earn a living, they can raise a family, they can simply pursue happiness,' he said.

                              We're Learning the Wrong Lessons from Airline IT Outages
                              Network World, August 30th, 2016
                              "Blaming airline IT outages on equipment failure or the ghost in the machine misses the point ...

                              This summer, multiple high-profile organizations have experienced embarrassing and financially costly business disruptions.

                              The explanations and excuses for these service interruptions - delivered by company executives and Monday Morning Quarterbacks alike - fail to address the underlying cause of these issues: lack of rigorous senior management oversight.

                              Southwest Airlines and Delta both experienced widespread consumer dissatisfaction and business outages over the last month due to what executives have blamed on equipment failures. Pundits blame the meltdowns on cobbled-together legacy infrastructure.

                              Both miss the point..."

                              What Differentiates a Great CIO from Simply a Good One?
                              Help Net Security, August 31st, 2016
                              "Earlier this month, Sophos announced the appointment of Tony Young as the company's new global Chief Information Officer (CIO).

                              Young started his career as a software developer at HP, and stayed there for 11 years while occupying different IT and marketing roles. Before joining Sophos, he was the CIO at GoPro, and before that at Informatica, where he was also VP of Cloud and Subscription Sales..."

                              IT - Wireless
                              9 Things To Check After Installing Wireless Access Points
                              ComputerWorld, August 30th, 2016
                              "Whether you're upgrading equipment or building out a whole new Wi-Fi network, use this checklist to make sure everything's shipshape before you let users connect.

                              After all the work of performing a Wi-Fi site survey, running cable to key locations in the building and hooking up your access points, you might be eager to quickly fill the airwaves. However, there are some things you should check just after powering on those new or upgraded APs and before letting users connect to them.

                              You can never be too careful when it comes to Wi-Fi security and performance, and you don't want to start off by ignoring them. That said, you can follow these tips at any time..."

                              vBeers @ Palm Beach Gardens - Twisted Trunk
                              Wednesday, September 7th, 2016: 6:00 PM to 9:00 PM
                              Come out and connect with other professionals in your industry!

                              The South Florida Technology Alliance (SFTA) vBeers events happen four times each month, once each in these cities: Palm Beach Gardens, Oakland Park, Boca Raton and Miami.

                              These informal networking/social events provide a relaxed environment to meet with other IT professionals and promote the growth of IT in South Florida.

                              vBeers start at 6PM

                              Wednesday, September 7th @ Twisted Trunk Brewing

                              Pleaase register @

                              John Mclaughlin, SFTA

                              vBeers @ Ft. Lauderdale (Funky Buddha)
                              Wednesday, Sept. 14th, 2016: 6:00 PM to 9:00 PM
                              Come out and connect with other professionals in your industry!

                              The South Florida Technology Alliance (SFTA) vBeers events happen four times each month, once each in these cities: Palm Beach Gardens, Oakland Park, Boca Raton and Miami.

                              These informal networking/social events provide a relaxed environment to meet with other IT professionals and promote the growth of IT in South Florida.

                              vBeers start at 6PM

                              Wednesday, September 14th @ Funky Buddha Brewery

                              Pleaase register @

                              John Mclaughlin, SFTA

                              IT - DR
                              What Facebook Has Learned From Regularly Shutting Down Entire Data Centers
                              Data Center Knowledge, August 31st, 2016
                              "As we have reported before, Facebook has one of the boldest approaches to testing its infrastructure resiliency. The Facebook data center team regularly shuts down entire sites to see how its application will behave and to learn what improvements can be made.

                              During his keynote this morning at the Facebook @Scale conference in San Jose, California, Jay Parikh, the company's head of engineering and infrastructure, shared some of the big lessons his team has learned so far from these fire drills.

                              The idea to do these kinds of stress tests was born after Hurricane Sandy wreaked havoc on internet infrastructure on the East Coast in 2012, Parikh said. Many data centers went down and stayed down for prolonged periods of time..."

                              IT - PM
                              7 Must-Have Tools For Smart Project Managers
                              Business 2 Community, August 31st, 2016
                              "In today's hyper-competitive market, organizations make use of disciplined project management to ensure that required results get delivered with consistency. Project managers are now, more than ever before, required and expected to remain on top of their game. So, what takes a Project Manager from good to great ? Conventionally, the mark of a smart Project Manager was the ability to lead the project from beginning until the end with optimum allocation of resources.

                              However, nowadays, owing to the globalization of operations, increasingly complex procedural requirements and rigorous performance checks; state-of-the-art project management tools are a Project Manager's true strength. A smart Project Manager of 2016 uses these tools to maximize efficiency and drive the project home in a way that adds value to the organization.

                              So, what are these amazing instruments and gizmos?..."

                              How To Spot Signs Your Project Is About To Fail
                              CIO, August 29th, 2016
                              "There are many possible reasons a project is headed for problems. While some are easy to spot and correct, others may signify more deep-rooted issues that can derail even the best-laid plans...

                              Project management has many facets and anyone of them could derail even the best-laid plans. Recognizing the signs of an impending disaster can give a project manager the 'heads up' before it happens. To help you spot the telltale signs, here are some of the more common signs grouped into three key categories..."

                              PaaS 4 SaaS webcast on-demand
                              By Juergen Kress
                              Juergen blogs, "With Oracle CX Cloud, companies not only get the most comprehensive CX offering, but also an innovative and powerful cloud platform to extend, analyze and integrate these applications with the rest of the enterprise resources, as well as to optimize them for every user. This session outlines the Cloud Platform (PaaS & IaaS) solutions that Oracle provides to streamline cloud development and empowers you to deliver enterprise-grade solutions rapidly and cost effectively. Join this event if you are interested in the most advanced way to extend, analyze and integrate the Oracle CX solutions. In subsequent webinars, we will drive you through further Integration Solutions' details.

                              Watch the webcast on-demand..."

                              IT - Networks
                              EU Outlines Stiff new Net Neutrality Rules
                              Network World, August 30th, 2016
                              "An EU regulatory group Tuesday imposed tough new rules on European ISPs, in a move that advocates for net neutrality are hailing as a great victory.

                              The Body of European Regulators for Electronic Communications published a 45-page report that essentially bans paid prioritization of network traffic, and imposes strict requirements on any specialized services that ISPs want to offer..."

                                Spotting Network Vulnerabilities Before Hackers Do
                                Network Computing, September 1st, 2016
                                "To protect the network, you need to understand how attackers think and use their techniques to test your network security.

                                If there's one thing I remember from Boy Scouts, it's their motto, 'always be prepared.' I soon learned that understanding the world from someone else's point of view can also help you get ahead. Coincidentally, both of these life lessons apply to network security.

                                As many IT professionals have experienced firsthand, your network security strategy isn't adequate if you only react to security issues after they occur; by then, it's too late. To better lock down your data, you need to plan ahead by preparing and implementing a security policy that covers people, processes, and technology..."

                                Named Data Networking Is On the Horizon, and SDN Will Help Make It a Reality
                                Network World, August 30th, 2016
                                "Named Data Networking (NDN) may be in the early stages of development, but the strides being made are compelling. Gartner predicts NDN won't hit the 'Plateau of Productivity' on their Hype Cycle for more than ten years, but when it does, a monumental shift in data organization and retrieval will come with it. We know a massive influx of data is on its way - NDN might be the key to managing the data, and Software Defined Networking (SDN) will be integral to helping NDN do just that.

                                The current Internet framework is built on the idea that communications is a conversation between a client and a server, an exchange of information between two points. NDN shifts the focus of networking from locations (origins and destinations) to the information itself. Networking will no longer be about connecting to a server to find information as much as requesting the information itself..."

                                IT - IoT
                                6 IoT Innovations Making Cities Smarter (Slideshow)
                                InformationWeek, September 1st, 2016
                                "From sensors that measure water leaks to smart parking meters and self-driving buses, internet of things (IoT) technologies are a major contributor to the rise of smart cities. Here is a look at 6 innovative uses of IoT in municipalities around the world...

                                Increasing urbanization is putting unprecedented pressure on city officials to constantly balance the challenge of resource constraints against environmental sustainability concerns. As a result, governments are turning to the internet of things (IoT) technologies to help make the world's metropolises run more efficiently..."

                                Array Of Things Takes Off In Chicago
                                GCN, August 31st, 2016
                                "Look! It's a bird! - Or it's a stack oversized of shuttlecocks, maybe?

                                No, those funky-looking contraptions being mounted on electric poles and traffic lights around Chicago are sensors, or, actually, housing for multiple sensors. They are the first sensors installed in Chicago's much-anticipated Array of Things project. Fifty are expected to be up by September.

                                The first two sensors were placed at intersections where they will collect data on air and surface temperature, barometric pressure, light, vibration, carbon monoxide, nitrogen dioxide, sulfur dioxide, ozone, and ambient sound intensity. Two cameras will collect data on vehicle and foot traffic, standing water, sky color and cloud cover, according to the announcement..."

                                  How Homeserve Labs Plans To Use The IoT To Shake Up The Insurance Business
                                  The Datacenter Journal, September 1st, 2016
                                  "Home maintenance services provider HomeServe grows its internet of things startup internally, and is now targeting the insurance industry with a leak detection system

                                  HomeServe Labs, a startup division sitting within home services provider HomeServe, is aiming to shake up the insurance industry by using the internet of things (IoT) to bring down costs incurred by water damage.

                                  HomeServe has been providing home maintenance assistance to consumers in the UK, mainland Europe and the US for almost 20 years, building itself into a £500m FTSE 250 business in that time..."

                                  Mobile Experts Slices Up the IoT Pie
                                  The Datacenter Journal, August 30th, 2016
                                  "Mobile Experts released the most comprehensive analysis ever published on the Internet of Things market space. The new report, titled IoT: The Big Picture 2016 takes a very broad look at 36 different technologies and mapping 26 applications of the Internet of Things.

                                  Mobile Experts LLC has taken a Darwinian approach to the IoT market, analyzing key companies in each technology space to understand their ability to survive competition with very different technologies. The result is a quantitative five-year forecast of how much share each technology can capture..."

                                  Why Agencies Must Work Harder To Prep For IoT Security
                                  FCW, August 31st, 2016
                                  "Government agencies tasked with regulatory and security responsibilities are running out of time to address security challenges associated with the increased connectivity of the Internet of Things, according to Department of Homeland Security Assistant Secretary for Cyber Policy Robert Silvers.

                                  Increased connectivity for devices means expanded attack surfaces. The challenge, Silvers said at an Aug. 31 National Institute of Standards and Technology meeting, is developing flexible, living security standards while preserving the innovation and productivity gains that come with increased internet..."

                                  IT - Linux
                                  5 Best Linux Distros For Security
                                  Datamation, August 29th, 2016
                                  "Security is nothing new to Linux distributions. Linux distros have always emphasized security and related matters like firewalls, penetration testing, anonymity, and privacy. So it is hardly surprising that security conscious distributions are common place. For instance, Distrowatch lists sixteen distros that specialize in firewalls, and four for privacy.

                                  Most of these specialty security distributions, however, share the same drawback: they are tools for experts, not average users. Only recently have security distributions tried to make security features generally accessible for desktop users.

                                  These accessible security distros are often still in development, but they are worth investigating now before they become mainstream. In alphabetical order, here are five of the leading distributions for accessible:..."

                                  6 Linux Kernel Changes IT Pros Need To Know
                                  InformationWeek, August 30th, 2016
                                  "The 4.7 Linux kernel includes enhancements to security, automated testing prior to release, and an average 7.8 additions per hour over 10 weeks of development. Here is a look at what IT pros need to know about the OS that powers everything from mobile devices to servers and supercomputers...

                                  Linux is everywhere -- from Android smartphones and tablets to corporate servers and supercomputers. Most, if not all, IT professionals touch Linux, which turned 25 this month, in one way or another. And the reach of the open source OS is expanding..."

                                  Car Manufacturers Cooperate To Build The Car Of The Future
                        , August 30th, 2016
                                  "Few of us appreciate the software middleware that is part of all the cars we drive today. The integration of in-vehicle infotainment (IVI) systems, along with instrument clusters and telematics, is a very complex subset of priorities for today's automotive industry.

                                  According to a recent article that appeared on CNET, Open-source Linux a step closer to automotive use, current development practices are incompatible and fragmented:.."

                                  IT - Operations
                                  9 Data Center Automation Tools IT Pros should Know (Slideshow)
                                  InformationWeek, August 31st, 2016
                                  "Pressure to increase productivity and deliver greater business value while limiting headcount has many organizations considering data center automation. Fortunately, there are many tools available to get it done. Here are nine to know if you're thinking about automating all or part of your data operation...

                                  Here's some breaking news for you: Human beings have limits. It's hard for most of us to accept, especially when we're being pushed to increase productivity and business impact while we limit or reduce headcount in the data center. Fortunately, there's a way to amplify the impact of staff with data center automation..."

                                    A Physical Security Checklist For Your Data Centre
                                    ITProPortal, August 31st, 2016
                                    "When IT executives talk about security, it often revolves around defence against cyber attacks using clever technology. However, cyber security is just part of the equation; physical security - keeping the bad guys from physically accessing servers - is also essential. With businesses placing more and more operations outside of traditional IT into the data centre thanks to emerging trends like big data, the advent of the Internet of Things (IoT) and cloud, there is a real drive towards greater demands on the physical security of commercial Data Centres. The loss or compromise of a facility could have a disastrous economic impact or cause significant reputational damage as customers and trading partners could be affected by the inability to operate..."
                                    How Free Food Brought Down Guzman Y Gomez
                                    IT News, September 2nd, 2016
                                    "When it launched an online ordering app late in July, the IT team at Mexican fast food chain Guzman Y Gomez never fully comprehended just how compelling a free burrito could actually be.

                                    The battle scars of the restaurant's CTO Julian Dabbs were still fresh when he fronted the Future IT Infrastructure forum in Melbourne this week.

                                    He said he didn't realise quite how far people - mainly university students - would go to get their hands on free food when the marketing team came up with the idea of offering the first burrito ordered through the app at no charge..."

                                    The 8 Fallacies Of Distributed Computing Are Becoming Irrelevant
                                    Network World, September 1st, 2016
                                    "Thanks to modern computing, the 8 fallacies of distributed computing are being rendered obsolete..

                                    In 1969, the U.S. Department of Defense created ARPANET, the precursor to today's internet. Around the same time, the SWIFT protocol used for money transfers was also established. These are both early examples of distributed systems: a collection of independent computers that appear to users as a single coherent system.

                                    Many come to know they have a distributed system when the crash of a computer they've never heard of affects the whole system. This is often the result of assumptions architects and designers of distribution systems are likely to make..."

                                      IT - Security
                                      Are Infosec Vendors 'Sowing Confusion' And Selling 'Useless' Products?
                                      CSO Online, August 29th, 2016
                                      "As a journalist, you know the drill at media briefings. Hosted and paid-for by a vendor, and with speakers from the company - as well as (usually) an end-user or an academic, the idea is to bring journalists together with the experts to discuss the prominent matters in the industry. And if those issues and industry challenges can be resolved with one of the vendor's solutions then everyone's a winner.

                                      The vendor gets the business, the press coverage and the thought leadership, while the journalist gets the story, the contacts and the free lunch. The speakers get some media air-time. It's no surprise then, that these are usually enjoyable, if tame, affairs..."

                                        Gap Widens Between IT Pros And End Users While Security Worsens
                                        SC Magazine, September 2nd, 2016
                                        "Over half (52 percent) of IT practitioners believe that policies against the misuse or unauthorised access to company data are being enforced and followed, yet only 35 percent of end users say their organisations enforce those policies.

                                        A new study from the Ponemon Institute analysed responses from 1,371 end users and 1,656 IT and IT security professionals from various industries in the UK, US, France and Germany..."

                                        Have Passwords Become Inadequate For The Cyber Security Industry?
                                        Information Age, September 1st, 2016
                                        "Automated cyber security solutions are vital in detecting malware and other incidents as they happen...

                                        IT security has been built around one simple thing: the password.

                                        However with the rise and innovation of cybercrime, the common password no longer stands a chance.

                                        According to a survey by Lieberman Software, 77% of IT professionals think passwords are inadequate for IT security. The study looked at the attitudes of nearly 200 cyber security professionals.

                                        Over half (53%) of those surveyed also thought that modern hacking tools could easily crack passwords within their company. So it seems that a change in the way passwords are handled is long overdue..."

                                        How It Departments Can Manage The Security Skills Shortage
                                        Dark Reading, September 1st, 2016
                                        "A lack of skilled cybersecurity talent is putting organizations at risk. Which skills are in highest demand, and how can IT managers secure the right people to protect their information?

                                        If you're struggling to hire employees for your cybersecurity team, you're not alone. A security skill shortage is leaving businesses across industries vulnerable to attacks.

                                        As cyberthreats become more complex and dangerous, IT departments are challenged to find employees with the skill sets to discover vulnerabilities and employ sophisticated protective technologies to address them..."

                                        Insider Threats: Who Is The Biggest IT Security Threat In Your Organisation?
                                        ITProPortal, September 2nd, 2016
                                        "Before you begin addressing the dark world of cybercrime, remember that 'cyber security begins at home...

                                        It is an undeniable fact that in today's digital world, we are all pretty much reliant on information technology and the Internet to run our businesses. It is also a fact that it is not 'if' - but 'when' will our IT Infrastructure and Business Applications be under attack? Before you even begin to address the dark world of cybercrime or state sponsored attacks, plotting to compromise your IT systems; you should first remember that 'cyber security begins at home.' ..."

                                        The 5 Key Characteristics Of A Strong Security Culture
                                        Business 2 Community, August 29th, 2016
                                        "The internet can be a hazardous place for employees and companies alike - phishing attacks, malware, and hackers are all things we need to protect ourselves against. But protecting against these threats requires more than just updating software, installing firewalls, and monitoring access. People are often considered to be 'the weakest link' in cyber security circles and security awareness training doesn't always work.

                                        We take security very seriously at ThisData, because well, that's what we do. But taking security seriously requires having a strong security culture and allocating resources appropriately to prevent, mitigate, and respond to security issues.

                                        So, I've come up with 5 key characteristics of a strong security culture that when implemented, will have your company well on the road to being better protected for the current threat landscape:..."

                                        The Security Ratings Game Grades Third-Party Vendors
                                        SearchSecurity, September 1st, 2016
                                        "Can security ratings services patterned on consumer credit scores offer insight into the security postures of third parties and other business partners?

                                        When Christopher Porter became Fannie Mae's CISO earlier this year, the company started digging into third-party security..."

                                        "Think of the scope of Fannie Mae," Porter said. "We have tens of thousands of business partners that include mortgages sellers and servicers, banks, investors and our vendors for software and other related business services."

                                        What Is Access Governance? A Brief Deep Dive
                                        Help Net Security, September 2nd, 2016
                                        "Access governance is the evolution, the next great step if you will, in the identity and access management world. Access governance is a more robust, holistic approach to managing user access, network shares, permissions, and allows organizations to peer easily into the entire goings on of an organization. Access governance is like king of the hill, where the view is long and clear and there's little that can knock it down..."
                                        Deception Technology Grows And Evolves
                                        CSO Online, August 29th, 2016
                                        "Deception technologies such as honeypots are becoming increasingly popular with enterprises

                                        Deception technologies such as honeypots are becoming increasingly popular with enterprises as the products get more flexible and the tools allow security analysts swamped with incident reports to zero in on cases of actual ongoing infiltration.

                                        According to a report released in August by research firm Technavio, the deception technology market is growing at a compound annual growth rate of 9 percent, and is predicted to reach $1.33 billion by 2020..."

                                        IT - Careers
                                        Six Brain Hacks To Learn Anything Faster
                                        Fast Company, August 30th, 2016
                                        "Whether it's a new technology, a foreign language, or an advanced skill, staying competitive often means learning new things. Nearly two-thirds of U.S. workers have taken a course or sought additional training to advance their careers, according to a March 2016 study by Pew Research Center. They report that results have included an expanded professional network, new job or different career path.

                                        Being a quick learner can give you an even greater edge. Science proves there are six ways you can learn and retain something faster..."

                                          Big Data Salaries Set To Rise In 2017
                                          ComputerWorld, September 1st, 2016
                                          "Starting salaries for big data pros will continue to rise in 2017 as companies jockey to hire skilled data professionals.

                                          Recruiting and staffing specialist Robert Half Technology studied more than 75 tech positions for its annual guide to U.S. tech salaries, including 13 jobs in the data/data administration field.

                                          In the big picture, starting salaries for newly hired IT workers are forecast to climb 3.8% next year..."

                                          Do IT Certifications Really Matter?
                                          InformationWeek, September 1st, 2016
                                          "Technical certifications can advance careers and lead to better pay, but they're not a golden ticket to success.

                                          Information technology professionals may be able to boost their earning potential through IT certifications -- or maybe not, depending on whom you ask.

                                          Companies that sell certification training, perhaps unsurprisingly, tout the value of certifications. IT training company Global Knowledge, for example, earlier this year published its list of the 15 Top-Paying Certifications for 2016. Thirteen of these were associated with average salaries over $100,000..."

                                            How To Retain Top IT Talent
                                            InformationWeek, August 31st, 2016
                                            "If your organization can't move beyond traditional work hours, it may have trouble keeping valuable tech employees happy. Here's what IT leaders need to know.

                                            The cost of tech talent is expected to rise next year, making talent retention even more of an issue for IT organizations than it is already.

                                            According to staffing firm Robert Half International, starting salaries in the technology sector will increase 3.8% in 2017 over 2016, a sign that demand for tech talent is growing..."

                                              Tech Skills That Will Earn You More Money (Slideshow)
                                              CIO, August 30th, 2016
                                              "Technology jobs are profitable. But certain skills are growing increasingly in-demand and businesses are will to pay a premium for them as they embrace digital transformation.

                                              It's a great time to be in tech. According to data from Dice, technology salaries in the U.S. rose to an average of $96,370 per year. That's a 7.7 percent increase and the biggest year-over-year jump in average tech salaries since Dice began tracking this data over 10 years ago..."

                                                The IT Job Hunter's Playbook
                                                ComputerWorld, September 1st, 2016
                                                "This comprehensive toolkit contains everything you need to kickstart your IT job search, including detailed salary data, best places to work in IT, in-demand titles and hottest cities for tech pros, and more...

                                                It's September, the psychological start to a new year. If your IT career spent the summer in the doldrums, maybe it's time to channel your inner student -- open up a fresh notebook, sharpen your proverbial pencil and get serious about launching an A+ job search..."

                                                  8 Ways You're Making People Tune Out when You Speak
                                                  Fast Company, August 31st, 2016
                                                  "In meetings, emails, conversations, and conference calls, business leaders spend roughly 80% of their time communicating. So, it's a significant waste of time and resources if that communication isn't effective. When it comes to the way we speak to others - either groups or individuals - we can often be inadvertently doing or saying things that undermine our effectiveness.

                                                  American English is typically spoken at roughly 183 words per minute, but we can listen and understand at up to 400 words per minute. The difference can lead to distraction, says speech coach Ethan F. Becker, PhD, president of the Speech Improvement Company, a speech and communications coaching firm, and author of Mastering Communication at Work: How to Lead, Manage and Influence. "There are all sorts of conversations in the back of our mind," he says. "When I add filler words or something like that, I increase the chance of miscommunication."

                                                    IT - Social Media
                                                    Social Media Size Cheat Sheet 2016 [Infographic]
                                                    Business 2 Community, August 31st, 2016
                                                    "In the world of the internet and social media, the one constant is that things never stay the same. The same holds true for the social networks we use, when we post content and how content is seen on different platforms and devices. To make sure your audience is always seeing your content in the best way possible, it's important to format your social images by the requests sizes for each social network. If you don't, your audience will see images that are cut off and this will likely lower your engagement and click through numbers as well..."
                                                      IT - Virtualization
                                                      Container Security: Why Bother?
                                                      Container Journal, August 31st, 2016
                                                      "Are containers secure?

                                                      Probably not. But knowing each approach's strengths and risks-and available options-could help ease adoption.

                                                      Such a decision requires two primary considerations:

                                                      • Containers do not provide the same level of isolation between apps running on the same host as virtual machines (VMs) provide.
                                                      • Containers don't provide the same level of isolation on the host, especially where running with root privileges.

                                                      VMware is a great supporter of the concept of running each containerized application in a single virtual machine, which increases security. Placing a container in its own dedicated virtual machine provides better isolation from the host machine and, naturally, from other VMs and containers running on those VMs..."

                                                      IT - Database
                                                      How Next-Generation Databases Boost Performance (Slideshow)
                                                      CIO Insight, September 1st, 2016
                                                      "The majority of organizations predict that their deployment of next-generation database tech will outpace traditional database deployment within the next two years, according to a recent survey from Datos IO. The resulting report, titled "Data Protection for Next-Gen Databases," defines next-generation databases as distributed or scale-out databases or cloud databases, including NoSQL databases. Clearly, interest in these databases is on the rise, with organizations now deploying at least 10 nodes for them - if not 50 or more. Subsequently, they benefit from greater scalability and performance, with lower cost of ownership. However, many still struggle with performance, availability and data protection issues..."
                                                      IT - Big Data
                                                      How To Choose A Perfect Data Control Solution For Your Enterprise
                                                      HelpNet Security, August 30th, 2016
                                                      "Not long ago, people used to come to work and work off of a desktop computer, tied to the network. Today, they work on their mobile devices, physically untethered to it.

                                                      In fact, the majority of the work and email is done on mobile devices, and this changed how people interact with data and how we keep it safe.

                                                      This shift is why it's important for businesses to maintain a certain level of visibility when it comes to data, and have the ability to use tools like Dynamic Data Protection (DDP) to ensure that if policies need to be adjusted for specific users, IT admins can do so in real-time..."

                                                        Top Tools For Preventing Data Leaks (Slideshow)
                                                        Network World, August 29th, 2016
                                                        "We tested data loss prevention (DLP) tools from Comodo, Digital Guardian and Forcepoint. These products are designed to stop protected data from being shared in multiple ways, everything from e-mail attachments to printing to even screen captures. Forcepoint Triton was the most mature, easiest to setup and had the most features. Digital Guardian DLP was able to eliminate almost all false positives and would be a good choice for organizations with huge amounts of intellectual property. Comodo DLP offered a lot of flexibility as well as extras like a VPN, firewall, patch and mobile device manager, making it a good choice for organizations getting up to speed with their overall cybersecurity defenses..."
                                                        IT - Mobile
                                                        Mobile Ransomware Increases 200 Percent
                                                        Help Net Security, September 2nd, 2016
                                                        "There's been a startling 200 percent increase in mobile ransomware detection in Q2, according to Quick Heal. This amounts to nearly 50 percent of the ransomware detected in all four quarters of 2015 combined.

                                                        Given the free and widespread reach of the internet, adware has become a cash-generating machine for hackers. Adware and PUAs are now being laced with destructive functionalities and are capable of damaging or crashing boot sector records of infected computers. Additionally, adware is increasingly used for delivering ransomware into targeted systems..."

                                                          Top 20 Enterprise Mobile Apps
                                                          Datamation, September 1st, 2016
                                                          "Demand for enterprise mobile apps is alive and well. According to the Pew Research Center, almost two-thirds of all Americans own a smartphone, with 59% stating they use their mobile apps frequently throughout the day. This is no exception for enterprise employees, with Gartner stating that demand for enterprise mobile apps will outpace current development capabilities five to one.

                                                          Following the current trajectory, smartphone users will only increase in number while expecting enterprise mobile apps that help them perform their daily work tasks better. With the enterprise mobile app market poised to become a $100 billion dollar annual revenue opportunity, enterprise employees will have more app options than ever to help them be more efficient and organized..."

                                                          IT - BYOD
                                                          How Much of a Risk Is BYOD to Network Security?
                                                          HelpNet Security, August 29th, 2016
                                                          "We're all familiar with BYOD dangers: data breaches exploited because of a lack of proper security protocols and encryption on devices or missed operating system updates; data leakage as a result of device software not being regularly updated; malware on the device finding its way onto the corporate network. Then there are the tech savvy employees who try to bypass restrictions, or misuse Wi-Fi and the careless ones who lose these 'always-on' personal devices..."
                                                          Why Chromebooks are becoming more appealing than the iPad
                                                          CIO, September 1st, 2016
                                                          "Acer has announced a 13" Chromebook that converts into a tablet, and is capable of running Android apps. Currently there are only three Chromebooks that officially support Google Play Store: Asus Chromebook Flip, Acer Chromebook R11 / C738T, and Google Chromebook Pixel (2015). Users have to enable beta/dev channels on these devices to install Android apps.

                                                          I am assuming that Google may bring Android support to stable channel, before the holiday season, so that users who are not tech-savvy can also start using Android apps. That would make this holiday season extremely exciting for desktop Linux. Android support makes Chromebooks more appealing than tablets like the iPad, which have very limited functionality..."

                                                          Top Ten Articles for last few Issues
                                                          Vol 222 Issues 1, 2, 3 and 4; Vol 221 Issues 1, 2, 3, and 4
                                                          We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                          • Happy Birthday Linux!
                                                          • Oracle VM Server for SPARC Released
                                                          • Oracle Database Appliance X6-2S / X6-2M Support Oracle Database Standard Edition and Oracle Database Standard Edition One
                                                          • Java EE and JavaScript Applications
                                                          • Critical Cloud ERP Questions A Big Focus At Oracle OpenWorld
                                                          • Video: System Methodology - Holistic Performance Analysis on Modern Systems
                                                          • Updates to 'Moving to a Plugin-Free Web'
                                                          • Oracle UX Team Collaborates with NASA on Interactive Tool for Asteroid Watchers
                                                          • Why Your Business May Need Regime Change
                                                          • MySQL Group Replication Docker Images

                                                          The longer version of this article has list of top ten articles for the last 8 weeks.

                                                            IT - Encryption
                                                            More Than 40% Of Attacks Abuse SSL Encryption
                                                            Dark Reading, August 31st, 2016
                                                            "There's an important caveat about encrypted traffic from new research released this week: Encryption works so well that hackers are using it as cover.

                                                            A new study from A10 and the Ponemon Institute found that 80% of respondents say their organizations have been the victim of a cyberattack or malicious insiders in the past year -- and 41% of the attacks have used encryption to evade detection. In addition, 75% say malware hidden within encrypted traffic is a risk to their organizations.

                                                            At issue: The report found that SSL encryption not only hides data from would-be hackers but also from common security tools..."

                                                            IT - Java
                                                            5 Great Java Performance Optimization Tricks
                                                  , August 31st, 2016
                                                            "Optimizing your Java code requires an understanding of how the different elements in Java interact, and how it interacts with the operating system that is it running on. Use these five tips and resources to start learning how to analyze and optimize your code.

                                                            Before we get to the good stuff, you might be concerned about licensing. Java is owned by Oracle, and is under Oracle's BCL license which is not a free/open source license. Even so, Oracle Java is part of many open source projects. OpenJDK is the free software implementation of the Java platform, licensed under GPL v2. (See Free Java implementations on Wikipedia for more information.).."

                                                            The Top 5 Java 8 Features For Developersthe Top 5 Java 8 Features For Developers
                                                            JavaWorld, August 30th, 2016
                                                            "The release has been seen as a huge step toward making Java better, thanks to these upgrades in particular...

                                                            When Java 8 was released two years ago, the community graciously accepted it, seeing it as a huge step toward making Java better. Its unique selling point is the attention paid to every aspect of the programming language, including JVM (Java Virtual Machine), the compiler, and other help-system improvements.

                                                            Java is one of the most searched programming languages according to Tiobe index for July 2016, where Java ranks number one. Its popularity is also seen on Livecoding, a social live coding platform for engineers around the world, where hundreds and thousands of Java projects are broadcasted live..."

                                                            IT - Developer
                                                            Why Every IT Pro Needs Software Development Skills
                                                            Network Computing, August 31st, 2016
                                                            "Basic programming and scripting skills are essential in the world of DevOps and software-defined systems.

                                                            If the word developer dredges up images of the nerdy guys from the HBO comedy 'Silicon Valley,' hopped up on caffeine and hammering away on a keyboard late at night, you're probably watching too many movies. Programming, maybe once the exclusive realm of developers, has grown and expanded well beyond those early confines. With the explosion of DevOps, almost every professional in the field of IT is either already a developer or needs to add to his or her skill set right away..."

                                                            Nexenta News
                                                            NexentaConnect Offers Software-Defined File Services for Enterprise VMware Virtual SAN Customers
                                                            Free License Promotion to Speed Adoption of File Services for the leading Hyper-converged Infrastructure Software-only Storage Solution
                                                            Nexenta announced that validated VMware Virtual SAN(VSAN) customers are eligible for an exclusive promotion of NexentaConnect. NexentaConnect for VMware Virtual SAN provides NFS and SMB file services for Virtual SAN with integrated management through VMware vCenter. The resulting solution brings software-defined file services to VMware Virtual SAN hyper-converged infrastructure (HCI) customers.

                                                            The promotion is available through December 30th, 2016 and includes a NexentaConnect for VMware Virtual SAN license with an unlimited number of licensed sockets to match customer's VMware Virtual SAN licenses as well as day-zero Nexenta technical support for 12 months.

                                                            Nexenta Continues to Lead Storage Market Disruption with Advanced Open Software-Defined Storage (OpenSDS) Platform
                                                            Simple, Intelligent and Enterprise-Proven Deployment, Management and Operation on Any Hardware Infrastructure via Any Cloud at Any Scale
                                                            Nexenta announced the general availability (GA) of the enterprise and community editions of NexentaFusion 1.0, simplified storage management and analytics, and the newest version of NexentaStor 5.0, the company's flagship OpenSDS solution.

                                                            "The data center is in a state of transformation as the enterprise embraces software-defined and all-flash technologies,' said Eric Burgener, Research Director, Storage at IDC. "The introduction of solutions like NexentaStor 5.0 and NexentaFusion 1.0 is accelerating this change and simplifying the deployment and management of the storage infrastructure for the end customer."

                                                            With a modern state-of-the-art graphical user interface, intuitive workflows, DevOps friendly self-documenting REST APIs and rich storage analytics, NexentaFusion 1.0 and NexentaStor 5.0 deliver operational cost savings that rival the capital cost savings that have made Nexenta the undisputed SDS market leader.

                                                            Veritas News
                                                            Veritas Announces New Feature Pack 5 For Leading Backup And Recovery Solution Backup Exec 15
                                                            Backup Exec 15 provides Instant Recovery for VMware and Hyper V, S3 Private Cloud Connectors and additional support of SQL Server 2016 for free to existing customers
                                                            Veritas Technologies, the global leader in information management, announced the release of Feature Pack 5 for Backup Exec 15, its leading data protection solution for mid-sized organizations. Backup Exec delivers powerful, flexible, and easy-to-use backup and recovery for the entire IT infrastructure regardless of platform: virtual, physical and cloud. With the new release, administrators can migrate their backup smoothly to the cloud while adhering to critical disaster recovery processes without increasing complexity. They can also improve their recovery times for virtual environments and minimize the downtime of critical services within the company.

                                                            Feature Pack 5 comes with an array of new features and improvements including instant recovery for VMWare and Hyper-V, a new customizable cloud connector, support for Cloudian HyperStore and SQL support.

                                                            Cisco News
                                                            Cable & Wireless partners with Ericsson and Cisco to Enhance its Caribbean IP Networks
                                                            Will serve as backbone for IPTV services, fixed operations and part of business-to-business services
                                                            Ericsson and Cisco announced an agreement to supply and install IP networks for C&W Communications, which operates the retail brand Flow, in three Caribbean markets. The plans include an upgrade to the IP backbone network in the Bahamas to improve performance and support increase of traffic and a new business-to-business IP/MPLS network in Jamaica and Barbados.

                                                            The partnership is part of C&W's investment plan for the region to continue to transform its customer experience. As part of the partnership, Cisco will provide the necessary hardware while Ericsson will provide project management services.

                                                            Cisco Announces September 2016 Events with the Financial Community
                                                            Global technology services company collaborates with Cisco to provide a solution that accelerates OTT services for media companies.
                                                            Encompass Digital Media, a global technology services company delivering end-to-end video playout and distribution solutions to broadcast and digital media companies, introduces CloudStream, a cloud-based platform powered by Cisco, to its suite of digital services. Encompass' CloudStream solution enables TV networks, OTT operators and live event providers to quickly and efficiently generate new revenue opportunities by creating broadcast-quality multiscreen streams for their viewers.
                                                            Videocon d2h Enhances Video Experiences with Cisco Virtualized Video Processing
                                                            Cisco Virtual DCM Provides Picture Quality and Flexibility Enabling Videocon d2h to Lead the Market with Innovative Consumer Video Services
                                                            Cisco announced that Videocon d2h India's leading DTH platform has selected the Cisco Virtual DCM to provide its subscribers with superior video experiences. The deployment provides Videocon d2h with a flexible infrastructure and simplified operations for advanced video processing functionality taking advantage of virtualization and orchestration from Cisco's Virtualized Video Processing (V2P) platform. The Virtual DCM provides Videocon d2h the bandwidth efficiencies to deploy new services and meet ever-increasing consumer demands for 4K, multiscreen, OTT and Cloud DVR. The Cisco Visual Networking Index Forecast 2015-2020 predicts that by 2020, 82% of IP traffic by will be video, and 50% of IP video traffic will be HD/UHD, and mobile devices will drive most of the growth, making 43% of IP traffic. With availability of more content for an ever­increasing number of video-enabled devices, it is critical to maximize video delivery over available bandwidth and multiple networks.
                                                            Encompass Launches Cloudstream, A Cloud-Based Platform Powered by Cisco
                                                            Global technology services company collaborates with Cisco to provide a solution that accelerates OTT services for media companies.
                                                            Encompass Digital Media, a global technology services company delivering end-to-end video playout and distribution solutions to broadcast and digital media companies, introduces CloudStream, a cloud-based platform powered by Cisco, to its suite of digital services. Encompass' CloudStream solution enables TV networks, OTT operators and live event providers to quickly and efficiently generate new revenue opportunities by creating broadcast-quality multiscreen streams for their viewers.

                                                            'Encompass offers our clients a complete portfolio of video services providing a cost-effective alternative to building out their own operations,' said Chris Walters, Encompass CEO.

                                                            Dell News
                                                            Dell SonicWALL Previews Cloud Security Management Solution at PEAK16 Partner Conference
                                                            Dell, August 29th, 2016
                                                            Dell SonicWALL announced the technology preview of Cloud Global Management System (GMS) at the annual PEAK16 conference in Las Vegas. The cloud-based security management and reporting solution removes financial, technical support and system maintenance hurdles associated with managing security. Delivered to partners as a unique, comprehensive, low cost monthly subscription based on the number of firewalls under management, SonicWALL Cloud GMS allows partners to deliver high caliber SonicWALL security to their customers.
                                                            Dell SonicWALL Unveils Reward for Value Partner Program at Annual PEAK16 Conference
                                                            Partners saw significant momentum year-over-year including a 30 percent average growth
                                                            Dell SonicWALL announced the new Reward for Value partner program and strong channel momentum at its sold-out annual North American PEAK16 conference in Las Vegas. Seven hundred forty-four channel partners from North America and Latin America are attending the conference to deepen their knowledge of SonicWALL solutions through keynotes, breakout sessions and demonstrations. Dell One Identity solutions will be the focus of a simultaneous event, which will include an executive summit and technical bootcamp sessions. The PEAK16 conference is co-sponsored by Accelerated Customer Care, D&H Distributing,EIMS,Global Knowledge,Ingram Micro,MRP,NSS Labs,Seceon,Securematics, SYNNEX and Tech Data.
                                                            Dell Unveils New Systems and Solutions to Accelerate the Adoption of Converged Infrastructure and Simplify Virtualized Environments from Thin Client to the Cloud
                                                            The industry's most flexible converged system to-date.
                                                            At VMworld 2016, Dell ushered in the next phase of the multi-billion dollar converged systems market with the introduction of the Dell Validated System for Virtualization, the industry's most flexible converged system to-date. Dell also announced new client virtualization solutions with enhanced performance for demanding power users and VMware has selected Dell Financial Services as its preferred financing partner.

                                                            'For more than a decade, Dell and VMware have closely collaborated to help customers achieve greater efficiencies from their datacenters and simplify IT operations,' said Jim Ganthier, vice president and general manager, Dell Engineered Systems, HPC and Cloud. 'With today's announcements, we continue to demonstrate how our innovations can enable customers of all sizes to accelerate their journey to hyperconvergence, convergence, and the cloud.'

                                                            Historic Dell and EMC Transaction Set to Close on September 7, 2016
                                                            New company to begin operating as Dell Technologies following close of the transaction
                                                            Dell Inc. and EMC Corp. (NYSE: EMC) announced that they intend to close the transaction to combine Dell and EMC on Wednesday, September 7, 2016. Dell Technologies, the name of the new combined company, will begin operating immediately following the close of the transaction.

                                                            This announcement follows regulatory approval of the Dell and EMC transaction by China's Ministry of Commerce (MOFCOM), which has granted clearance for the companies' proposed combination. MOFCOM approval was the final regulatory condition to closing the transaction. EMC shareholders approved the transaction on July 19, with approximately 98 percent of voting EMC shareholders casting their votes in favor of the merger, representing approximately 74 percent of EMC's outstanding common stock.

                                                            New Alienware Gaming Notebooks Power VR Out-of-the-Box and PAX Fans See Them First
                                                            Notebooks feature the latest NVIDIA GeForce GTX 10-Series mobile graphics
                                                            Alienware celebrates 20 years of innovation and its first VR-ready notebooks with the excited crowd of game fans at PAX West in Seattle. The new line of notebooks boast the NVIDIA GeForce GTX 10-Series family of GPUs; desktop-class graphics performance comes to notebooks for enhanced capabilities and realistic gameplay. Alienware's latest engineering advancements include the integration of new construction materials to improve thermal management for these new powerful components, as well as add durability and rigidity to the celebrated Alienware design aesthetic.

                                                            'Gaming is in a time of renaissance right now; awesome games and development, amazing resolutions and technology, plus the pure excitement around VR experiences - it's an incredible driving force and it feels similar to the energy that started Alienware 20 years ago,' said Frank Azor, general manager of Alienware and XPS, Dell. 'These new notebooks are a product of that history and approach, but also of the demands and expectations of gamers today. Being true to both is what Alienware is about and we're proud to bring these notebooks to gamers.'

                                                            IBM News
                                                            IBM Watson Powers Wave of Innovation in Consumer Electronics
                                                            Whirlpool, Panasonic, Nokia and Bragi Tap IBM Watson Internet of Things Technologies to Change the Way We Live
                                                            At IFA Berlin - one of the world's leading trade shows for consumer electronics - IBM was joined by some of the biggest names in the industry to highlight how Watson IoT technologies are poised to drive a new wave of innovation in the home and play a key role in one of the biggest technological transformations in the history of the world.

                                                            Whirlpool, Panasonic, Nokia and 'hearables' pioneer Bragi and 3D-printed, autonomous car Olli, joined IBM's Global Head of Watson IoT, Harriet Green on stage at IFA. Together they highlighted the power of cognitive computing and how it's helping deliver on the full potential of the Internet of Things: transforming our relationship with the physical world and making appliances, machines, devices, homes and cars better, safer, more intuitive and interactive.

                                                            Sky Selects IBM Aspera for High-speed Delivery of News and Programming
                                                            Aspera FASP solutions speed content ingest and delivery for European media giant
                                                            IBM announced that Sky, Europe's leading entertainment company, has deployed IBM Aspera solutions to help speed up the ingest retrieval and delivery of news, programming and other content internally and with external suppliers across Europe and around the world.

                                                            Sky's need for a new transfer solution became apparent following the recent acquisition of Sky Italia and Sky Deutschland, which opened the door to sharing a host of new, valuable content between the organizations. Additionally, Sky's move away from magnetic tape-based workflows accelerated the need for a more efficient file-based solution that is reliable, secure and fast to acquire content from suppliers and share materials internally.

                                                            IBM Study: Hybrid Clouds Dominate
                                                            Enable Companies to Innovate, Exceed Expectations
                                                            Almost every company is using the cloud, but not for everything, finds a new IBM study. Seventy-eight percent of respondents say their cloud initiatives are coordinated or fully integrated, compared to just 34 percent in 2012. And, among high performing organizations, that number climbs to 83 percent. At the same time, nearly half of workloads -- 45 percent -- are expected to remain on-premises with dedicated servers.

                                                            "Enterprises are moving to the cloud, especially hybrid cloud, faster than anyone expected to support their digital transformation, drive business model innovation and fuel growth," said Marie Wieck, IBM. "As clients continue to reap the benefits of integrating their on-premises infrastructure with the cloud, we see them increasing their investments in new workloads on public clouds. Successful clients have integrated plans to place workloads where they fit best, and IBM's hybrid cloud strategy provides this on-ramp for flexibility and growth."

                                                            IBM Watson Serves Cognitive Insights at the 2016 US Open Tennis Tournament
                                                            IBM and USTA team to enhance the fan experience with cognitive computing, cloud and analytics
                                                            IBM and the United States Tennis Association (USTA) announced that IBM Watson is coming to the US Open Tennis Championships for the first time via a new cognitive concierge feature being piloted within the tournament's official mobile apps to enhance the fan experience at the Billie Jean King National Tennis Center.

                                                            The US Open mobile app Guest Services companion will pilot a Watson-enabled discovery tool that allows fans to input natural language questions and receive immediate responses about a range of tournament topics, such as transportation and directions, food and drink options, on-site services and facilities, as well as other topics.

                                                            IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption
                                                            More than 500 new clients, including Marriott International are now running VMware software on IBM Cloud since the strategic cloud partnership was announced
                                                            At VMworld 2016, VMware and IBM announced the availability of industry-first cloud services that enable organizations to quickly and easily move enterprise workloads to the cloud. With more than 500 clients engaged, the global partnership between IBM and VMware is helping more organizations extend existing workloads to the cloud in hours, versus weeks or months.

                                                            Earlier this year, IBM and VMware set out to tackle one of the industry's most pressing challenges: extending existing VMware workloads from on-premises environments to the cloud without incurring the cost and risk associated with retooling operations, re-architecting applications and re-designing security policies.

                                                            IBM Named a Strong Performer in Global Public Cloud Platforms for Enterprise Developers
                                                            clients with complex hybrid cloud requirements demanding a mix of on-premises and public cloud services should consider IBM Cloud
                                                            IBM announced today that Forrester Research named IBM a strong performer in its latest Wave report1 evaluating global public cloud platforms for enterprise developers. Forrester analyzed and scored numerous public cloud platforms and identified IBM as a 'strong performer'for combining its broad and deep portfolios of application and development services with solid infrastructure offerings. IBM also received the highest possible score in the private and hybrid cloud strategy criterion, and it secured the top ranking in the infrastructure services criterion.

                                                            The 34 evaluation criteria used in the report are designed to help application development and delivery (AD&D) professionals select the right public cloud platform partner for their needs. Cloud platforms were evaluated on current offerings, strategy and market presence.

                                                            Fujitsu News
                                                            Fujitsu and Microsoft Japan Strengthen Alliance to Promote Implementation of Global Communications Platform
                                                            With new platform that transforms work styles, the companies will develop global business worth 50 billion yen annually based on the experience gained implementing Office 365 for the 160,000 employees of the Fujitsu Group
                                                            Fujitsu Limited and Microsoft Japan Co., Ltd. today announced that they are strengthening their alliance to promote the implementation of a global communications platform that will transform customers' work styles. This will help Fujitsu's and Microsoft's customers rapidly accelerate their digital transformations.

                                                            In Japan, Fujitsu is the leading vendor of communication-systems solutions based on Microsoft products, and has implemented a private-cloud-based global communications platform centered on Microsoft products for its approximate 160,000 employees worldwide. Microsoft Japan provided technical assistance for Fujitsu's internal implementation of this platform. In addition, based on the knowledge and experience gained from this internal implementation, Fujitsu, in collaboration with Microsoft Japan, offers its global communication platform as a solution that helps customers transform their work styles, and is currently supporting 1.2 million people in Japan - more than any other vendor.

                                                            Fujitsu Semiconductor and Mie Fujitsu Semiconductor License Nantero's NRAM And Have Begun Developing Breakthrough Memory Products for Multiple Markets
                                                            Agreement covers joint development and licensing of ultrafast, ultrahigh-density NRAM, non-volatile RAM using carbon nanotubes
                                                            Fujitsu Semiconductor Limited and Mie Fujitsu Semiconductor Limited announced that they have reached an agreement with US-based Nantero, Inc. to license that company's technology for NRAM, non-volatile RAM using carbon nanotubes, and to conduct joint development towards releasing a product based on 55-nm process technology.

                                                            Three companies are aiming to develop a product using NRAM non-volatile RAM that achieves several 1000 times faster rewrites and many thousands of times more rewrite cycles than embedded flash memory, making it potentially capable of replacing DRAM with non-volatile memory. Fujitsu Semiconductor plans to develop an NRAM-embedded custom LSI product by the end of 2018, with the goal of expanding the product line-up into stand-alone NRAM product after that. Mie Fujitsu Semiconductor, which is a pure-play foundry, plans to offer NRAM-based technology to its foundry customers.

                                                            VMware News
                                                            IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption
                                                            More than 500 new clients, including Marriott International are now running VMware software on IBM Cloud since the strategic cloud partnership was announced
                                                            At VMworld 2016, VMware (NYSE: VMW) and IBM (NYSE: IBM) announced the availability of industry-first cloud services that enable organizations to quickly and easily move enterprise workloads to the cloud. With more than 500 clients engaged, the global partnership between IBM and VMware is helping more organizations extend existing workloads to the cloud in hours, versus weeks or months. Earlier this year, IBM and VMware set out to tackle one of the industry's most pressing challenges: extending existing VMware workloads from on-premises environments to the cloud without incurring the cost and risk associated with retooling operations, re-architecting applications and re-designing security policies.
                                                            VMware Delivers Innovations to the Digital Workspace With Unified Endpoint Management, Windows 10 Support and Enhanced Identity Management
                                                            New Unified Endpoint Management Technology Combines Enterprise Mobility Management With Traditional PC Lifecycle Management for Comprehensive Windows 10 Support
                                                            At VMworld 2016, VMware, Inc. announced a new unified endpoint management approach for managing Windows 10, along with advancements to VMware Horizon and VMware Workspace ONE. These innovations help advance the digital workspace embraced by the industry and solve the challenge of supporting an increasingly mobile workforce that demands anytime, anywhere access to all applications from any device.

                                                            The evolution of client-server applications to cloud and mobile applications is challenging businesses everywhere. With the added complication of the consumerization of endpoints, companies are adopting digital workspaces for a simplified approach to managing, delivering and consuming applications from the cloud. Using the principles of consumer simple and enterprise secure, the digital workspace delivered by VMware aggregates all devices, applications and services while securely managing them through unified common access and identity...

                                                            VMware Extends Capabilities of vSphere Integrated Containers to Help Enterprises Embrace Digital Business
                                                            New VMware Container Registry and Management Console Features Streamline Delivery of Containers and Application Services in Virtual Environments
                                                            VMware unveiled two new capabilities of VMware vSphere Integrated Containers, which enables IT operations teams to provide a Docker compatible interface to their app teams, running on their existing vSphere infrastructure. New container registry and management console features round out VMware vSphere Integrated Containers to further help IT teams operate containers in production with confidence. It is now available as open source software and registration for a beta program is now open.
                                                            VMware Further Simplifies Production Deployment of OpenStack Clouds With VMware Integrated OpenStack 3
                                                            VMWare, August 30th, 2016
                                                            At VMworld 2016, VMware introduced VMware Integrated OpenStack 3, the latest release of VMware's OpenStack distribution now based on the OpenStack Mitaka release. VMware is introducing new features to make deploying OpenStack clouds simpler and more cost-effective as well as allow customers to use existing VMware vSphere workloads in an API-driven OpenStack cloud.

                                                            Traditional businesses today must effectively transform into software companies to differentiate themselves through applications and services that deliver new customer experiences. To hasten their digital business transformation, enterprises are embracing cloud computing to help speed application development lifecycles to realize and respond to new business opportunities rapidly. VMware is helping IT enable developers to become more productive.

                                                            VMware Offers Cloud Freedom and Control With Cross-Cloud Architecture on First Day of VMworld
                                                            VMware CEO Pat Gelsinger Takes the Stage and Unveils Company's Extensive Cloud Strategy; Technology Preview of Cross Cloud Services Impress Attendees
                                                            VMware announced it has made huge strides in helping customers transform into digital businesses. The company's Cross-Cloud Architecture will help make private clouds easy and deliver cloud freedom and control for its customers.

                                                            On the VMworld stage in Las Vegas, VMware CEO Pat Gelsinger highlighted the massive adoption of cloud but also the minimal connection across these clouds and how businesses are grappling with this constraint. Gelsinger cited an August 2016 Economist Intelligence Unit global survey, commissioned by VMware, which found that the majority of its 600 respondents noted IT complexity is harming the operations of the enterprise. It also found that 36 percent of senior IT executives said that IT could not move fast enough to support business users. Cloud is contributing to this complexity and if not done right, can contribute to the inefficiencies as well.

                                                            VMware Unveils New Cross-Cloud Architecture to Give Customers Cloud Freedom and Control
                                                            VMware Cloud Foundation(TM) Makes It Easy to Manage and Run SDDC Clouds; New Cross-Cloud Services Will Enable Customers to Manage, Govern, and Secure Applications Running Across Public Clouds, Including AWS, Azure and IBM Cloud
                                                            VMware announced the extension of the company's hybrid cloud strategy with the new VMware Cross-Cloud Architecture, enabling customers to run, manage, connect, and secure their applications across clouds and devices in a common operating environment.

                                                            In support of the company's cloud strategy, VMware also announced the following:

                                                            • VMware Cloud Foundation is a unified Software-Defined Data Center (SDDC) platform that makes it easy for customers to manage and run their SDDC clouds; Technology Preview of Cross-Cloud Services to showcase how customers can manage, govern, and secure applications running in private and public clouds, including AWS, Azure and IBM Cloud;
                                                            • VMware vCloud Availability, a new family of disaster recovery offerings purpose-built for vCloud Air Network partners; A new release of VMware vCloud Air Hybrid Cloud Manager to provide VMware vSphere® users zero downtime application migration to VMware vCloud Air.

                                                            "Customers are increasingly relying on multiple public and private clouds to run their applications, but are daunted by the challenge of managing and securing applications across diverse cloud platforms," said Raghu Raghuram, executive vice president and general manager, Software-Defined Data Center Division, VMware. "When customers combine a best-in-class private cloud with leading public clouds, all enabled by VMware, they have the strongest, most flexible hybrid cloud strategy. VMware is delivering cloud freedom and control by providing a common operating environment for all clouds with our unique Cross-Cloud Architecture."

                                                            What 23,000 Attendees Took Away From VMworld 2016
                                                            eWeek, September 1st, 2016
                                                            "Every year VMworld proves itself as one of the most important IT conferences in the world. This is because VMware products are key components in 90-plus percent of the world's systems and touch everything about which we write each day in eWEEK: data centers, cloud services, mobility, storage, security, apps, edge devices - we could go on.

                                                            The company's markets, both big and small, are many and varied. VMware sells into all vertical industries, governments, military, education, scientific, oil and gas exploration, media - you name it, and there's a VMware footprint.

                                                            Does this indicate VMware is trying to be the one-stop shop for everything virtualization and cloud in order to remain one of the more relevant IT products and services providers of the 21st century?"

                                                            Red Hat News
                                                            Red Hat still plans on being The OpenStack company
                                                            ZDNet, September 1st, 2016
                                                            "Other companies -- Canonical, SUSE, and Mirantis -- all plan on being OpenStack powers, but Red Hat shows it's determined to be number one with its latest OpenStack cloud release.

                                                            Of course, you think of Red Hat as being The Linux company. Everyone does. But, if Red Hat has its way, you'll think of them as The cloud company. Red Hat is showing once more its intention to be the king of the OpenStack hill with its release of Red Hat OpenStack Platform (RHOP) 9..."

                                                            Friday Five - September 2, 2016
                                                            Red Hat, September 2nd, 2016
                                                            The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.

                                                            • Forbes Names Red Hat One of the World's Most Innovative Companies
                                                            • PCWorld - Fedora project leader Matthew Miller talks world domination on Linux's 25th birthday
                                                            • OStatic - Red Hat's Latest OpenStack Platform Boasts New Management Features
                                                            • Certification Magazine - Red Hat leading the charge in OpenStack certification
                                                            • The New Stack - LinuxCon 2016: Evaluating Containers For Production Work

                                                            Read on for details.

                                                            Level3 News
                                                            Level 3's Colocation Services at Brazil-based Data Centers Achieve PCI DSS Report on Compliance
                                                            Level(3), August 30th, 2016
                                                            Level 3 Communications, Inc.'s colocation services at data centers in Curitiba, Sao Paulo and Rio de Janeiro, Brazil, have achieved a Report on Compliance with applicable portions of Payment Card Industry Data Security Standard (PCI DSS) version 3.2. A PCI Security Standards Council (PCI SSC) Qualified Security Assessor's audit confirms Level 3's colocation services at three Brazilian data centers meet all data security standards outlined in requirements 9 and 12 of PCI DSS version 3.2...
                                                            Attack of Things
                                                            Level(3), August 29th, 2016
                                                            The Level 3 Threat Research Labs, Level 3 Communications' (LVLT) threat intelligence and research arm, unveiled new research about the botnet size and behavior for the malware commonly referred to as Lizkebab, BASHLITE, Torlus or gafgyt, including botnet size and victim stats...
                                                              EMC News
                                                              Historic Dell and EMC Transaction Set to Close on September 7, 2016
                                                              New company to begin operating as Dell Technologies following close of the transaction
                                                              Dell Inc. and EMC Corp. (NYSE: EMC) announced that they intend to close the transaction to combine Dell and EMC on Wednesday, September 7, 2016. Dell Technologies, the name of the new combined company, will begin operating immediately following the close of the transaction.

                                                              This announcement follows regulatory approval of the Dell and EMC transaction by China's Ministry of Commerce (MOFCOM), which has granted clearance for the companies' proposed combination. MOFCOM approval was the final regulatory condition to closing the transaction. EMC shareholders approved the transaction on July 19, with approximately 98 percent of voting EMC shareholders casting their votes in favor of the merger, representing approximately 74 percent of EMC's outstanding common stock.

                                                              HP News
                                                              Hewlett Packard Enterprise Accelerates Application Development With HPE Haven OnDemand Combinations
                                                              New Machine Learning Cloud Service Offers Pre-Built Customizable API Combinations to Help Create Next-Generation Cognitive Applications
                                                              Hewlett Packard Enterprise announced the availability of HPE Haven OnDemand (HoD) Combinations, a new cloud-based offering built on the HPE Haven OnDemand platform that enables developers to apply the power of machine learning to build next generation applications.

                                                              The new offering provides a pre-built catalogue of cognitive services and an intuitive drag and drop interface. Developers can chain together multiple machine learning APIs into combinations and copy and paste the code directly into their development projects, to quickly and easily create breakthrough mobile and enterprise applications.

                                                              "HPE HoD Combinations represents the next step in our vision to democratize machine learning for mainstream developers and help them build the next generation of cognitive applications," said Fernando Lucini (@fernandolucini), Chief Technology Officer, Big Data Platform, HPE Software. "Through HPE HoD Combinations, enterprise developers now have access to the building blocks required to take their application development to the next level through an easy and intuitive solution."

                                                              Hewlett Packard Enterprise Introduces HPE Vertica 8; Enables Organizations to Deploy and Analyze Data Anywhere
                                                              Unified Architecture Adds Apache Spark Integration, Advanced In-Database Machine Learning and Support for Microsoft Azure
                                                              Hewlett Packard Enterprise announced the next release of HPE Vertica, codenamed "Frontloader." HPE Vertica 8 introduces a unified architecture and advanced in-database analytics capabilities that enable users to conduct sophisticated analysis at industry-leading scale and speed, regardless of where their data resides.

                                                              One of the biggest issues facing organizations today is extracting intelligence from data residing in multiple silos across the datacenter. HPE Vertica 8 provides organizations with a unique, analyze-in-place, unified architecture that enables businesses to continually gain intelligence from their information, wherever it lives. Organizations can use HPE Vertica 8's flexible deployment options across on-premise, private, and public clouds, and in Hadoop data lakes, to adopt a best-fit solution that allows them to choose where and how they run analytics.

                                                              Windstream News
                                                              Windstream expands metro fiber network in Atlanta
                                                              Expansion is part of Windstream's multi-city investment to connect even more data centers and commercial buildings to the company's national backbone
                                                              Windstream, a leading provider of advanced network communications, announced a major expansion of its advanced metro fiber network in the Atlanta area. Windstream's expansion will provide Atlanta's growing business community with world-class fiber and fixed-wireless infrastructure that connects more commercial buildings with Windstream's high-speed, highly available nationwide network.

                                                              'Today's announcement reflects a significant expansion of the Windstream network in the Atlanta area, including Downtown, Midtown, Buckhead/Lenox Square, Alpharetta and Roswell,' said Eric Warren, regional president of enterprise sales for Windstream. 'This project expands both our fiber and fixed wireless footprint, allowing Windstream to provide companies with next-generation solutions such as unified communications, managed services, network security, business continuity, network and cloud services. And all of these services are provided with the support of a truly local Windstream team.'

                                                              F5 News
                                                              F5 Networks Named a Leader in Gartner Magic Quadrant for Application Delivery Controllers for 10th Consecutive Year
                                                              F5 celebrates a decade in the Leaders quadrant, positioned as highest in execution by prominent industry analysts
                                                              F5 Networks announced that it has again been positioned by Gartner, Inc. in the Leaders quadrant of its Magic Quadrant for Application Delivery Controllers (ADCs), published August 29, 2016.

                                                              'With cloud and as-a-service offerings joining hybrid deployments at the forefront of the market, it's an exciting time in the ADC space,' said Ben Gibson, EVP and Chief Marketing Officer at F5. "We believe F5's standing in the Magic Quadrant over time mirrors the value customers see in our technology and services portfolio, with differentiated capabilities across software and hardware solutions."

                                                              Trending in
                                                              Vol 235, Issue 2
                                                              Trending IT Articles