News about Oracle's Solaris and Sun Hardware
System News
Jan 30th, 2017 — Feb 5th, 2017 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 228, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Oracle News
x
Oracle Utilities Unveils Network Management Platform of the Future
Oracle Utilities Network Management System 2.3 supports transition to a customer-centric grid
Oracle introduced Oracle Utilities Network Management System 2.3, an expanded network management platform that enables utilities to make the transition to a customer-centric grid by giving operators real-time visibility across all grid and pipeline assets and eliminating the complexities of siloed data and applications.

Utilities are facing major shifts in their operations caused by a rapid increase in distributed energy resources (DERs) such as solar PVs, storage systems, electric vehicles and connected home devices, as well as continuing issues with aging water and gas pipelines.

4 Big Bets CHROs Should Make In 2017 So Your Workplace Is Relevant Come 2020
By Bertrand Dussert, Oracle, February 2nd, 2017
Bertrand writes in Forbes, "One month into the New Year, now is a good time for every chief human resource officer and his/her team to take stock of the big bets they should be making in 2017. These four rise to the top:

1. Get clear on organizational purpose and brand promise, to keep building trust.

After a tumultuous 2016 on this front, we're seeing stronger interest from CEOs and CHROs in clearly expressing their company's brand purpose and values, especially to establish a stronger connection with talent and customers. When evaluating a potential employer, job candidates cite 'culture and values as their most important consideration, according to the latest LinkedIn Global Recruiting Trends Report. 'Mission and vision' is the third most important consideration..."

Utilities Regulators See Value in the Cloud and Cloud Technology Investments as Critical to Utilities' Success
Oracle Utilities study highlights U.S. regulators' support and strategies for cloud technology use by utilities
Oracle Utilities announced the findings of its new U.S. regulators cloud study 'Clearing a Path to the Cloud: U.S. Regulator Perspectives on Cloud Technologies', highlighting that 83 percent of U.S. utilities regulators surveyed believe the cloud to be an important technology trend and 67 percent agree that the cloud will be critical to utilities' future success. The new study is a follow on to Oracle's 2016 utilities study 'On Cloud Now'.
McColl's Chooses Oracle Retail Stores Solutions and Hardware
Oracle, January 31st, 2017
Oracle announced that McColl's has invested in Oracle Retail Xstore Point-of-Service and Oracle MICROS Family Workstation 6 to improve the in-store guest experience. With 1,375 stores, McColl's is the UK's leading neighbourhood retailer serving the convenience and newsagent sectors. As part of its growth strategy, McColl's is investing to improve store standards and the customer experience.
SAS Sees The Next Tests For Data-Driven Problem-Solvers: Speed And Cloud
By Chris Murphy, Oracle, February 2nd, 2017
Chris writes in Forbes, "Among the employees in highest demand are what Paul Kent calls 'analytically creative problem-solvers.' Almost every company has mounds of data, but it's these creative problem-solvers who use it to make profit-oriented decisions, like which product to make, what price to charge, or when to send someone a coupon.

Paul Kent thinks about these star employees because, as vice president of big data initiatives in the R&D group at SAS Institute, his job is to look down the road and anticipate which kinds of creative problems to solve next with all that data..."

Are NFL Broadcasters The Next Poster Children For Disintermediation?
By Michael Hickins, Oracle, February 1st, 2017
Michael Hickins writes in Forbes, "The National Football League, arguably the most successful sports business in the US, is getting a new challenger. The Pacific Pro Football League will kick off its inaugural season during the summer of 2018, with four teams based in Southern California.

In addition to being a proving ground for players, coaches, and executives, the league will act as a 'football lab' for new technologies. More broadly, it will serve as a potential threat to the NFL's current content distributors, according to a release by the new league.

While other rival football leagues have come and gone, the Pacific Pro Football League expects to land distribution deals that the likes of the USFL couldn't get from the TV networks, says Don Yee, one of the Pac Pro League's cofounders (better known as NFL quarterback Tom Brady's agent)..."

Cloud Database Strategy: Buy A 'Smartphone,' Not A Bagful Of Gadgets
By Chris Murphy, Oracle, January 31st, 2017
"Juan Loaiza is a master of database technology, and, having spent his career explaining the business value of sophisticated technology, he's also pretty good with analogies," writes Chris in Forbes.

"Here's how Loaiza is talking about cloud databases: What you want is something like a really great smartphone, something that has the power to run any app you have and might want, while also simplifying your life by putting it all in one place. What you don't want is a bagful of gadgets - like a GPS, fitness tracker, and MP3 player - that each does one thing okay..."

IT - CxO
x
Can CIOs Help CEOs Unlock Innovation?
IT Proportal, February 1st, 2017
"Organisations face constant pressure brought about by the continued threat and opportunity of change...

Jack Welch once stated, 'if the rate of change on the outside exceeds the rate of change on the inside, the end is near.' With IT spend predicted to reach $3.5 trillion in 2017, it's vital that businesses ensure they keep up with today's disruptive landscape..."

    New, Must-Read Harvard Business Review Articles In February
    The Enterprisers Project, February 2nd, 2017
    "Each month, through our partnership with Harvard Business Review, we refresh our Business Library for CIOs with five new HBR articles we believe CIOs and IT leaders would benefit from reading. These curated pieces are available now through the end of February..."

    • The 5 skills that innovative leaders have in common
    • Right tech, wrong time
    • How artificial intelligence will redefine management
    • How we finally made agile development work
    • Make enterprise software people actually love

    Read on for details.

    Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
    Javaworld, January 31st, 2017
    "Three main threats companies aren't prepared to handle include outside attacks, data vulnerability and insider sabotage.

    Outsider attacks, data vulnerability and insider sabotage are the main threats companies aren't ready to handle, according to a Bitdefender survey of 250 IT decision makers at US companies with more than 1,000 PCs.

    CIOs also know that cybercriminals can spend large amounts of time inside organizations without being detected; Advanced Persistent Threats (APTs) are often defined as threats designed to evade detection..."

      Ransomware Recovery Cases Show It's Possible To Come Back From Attack
      Search Disaster Recovery, January 30th, 2017
      "Real estate, police and law organizations all had one thing in common: successful ransomware data recovery. These case studies detail how they were protected...

      Though the concept of ransomware dates back decades, the problem has hit an epidemic level in the last couple of years, with the FBI estimating it to be a billion-dollar 'industry' in 2016..."

        Splitting The CIO's Job - A Bad Movie Every Time
        Heller Search Associates, February 2nd, 2017
        "It appears we are experiencing a revival of a tried and failed axiom that the IT needs of a large enterprise are best served by the adoption of a joint technology leader configuration, bifurcating the role of the enterprise CIO.

        This concept is best described as having one bright, energetic technology leader charged with inventing new 'digital' capabilities for the enterprise, while the other IT leader (a.k.a. the CIO) oversees the legacy or 'traditional' systems, and possibly the IT infrastructure and IT operations.

        The insipid premise is that the digital technology leader will singularly lead the enterprise's venture into uncharted IT waters like those of the Internet, mobility, and the cloud. This voyage requires new expertise, increased speed, and above all else, cunning and wiliness - traits rarely, if ever, found in a traditional IT organization..."

        These Are The Threats That Keep Me Awake At Night
        ComputerWorld, February 2nd, 2017
        "Articles about predictions for 2017 can be entertaining, but I am concerned about the cybersecurity problems we face today.

        We have fortunately reached the date on the calendar when the myriad of articles predicting hot information security issues for 2017 have begun to wind down. I say fortunately, because I personally have never found much use for them..."

        Why It Innovation Follows Failure
        CIO, January 30th, 2017
        "What kind of leaders actively encourages failure? The good ones.

        All IT organizations strive for innovation. To succeed in today's digital market you to adapt to the needs of your customers, outflanking your competitors and disrupting the status quo. So what's the most important thing IT leaders of innovative IT companies do that set them apart?..."

          Oracle
          x
          New Product Launch: Oracle Database Programming Interface for C (ODPI-C)
          By Christopher Jones, January 30th, 2017
          Christopher blogs, "Oracle released a great new GitHub project - Oracle Database Programming Interface for C. It sits on top of OCI and offers an alternative programming experience.

          • ODPI-C is a C library that simplifies the use of common Oracle Call Interface (OCI) features for Oracle Database drivers and user applications.

          ODPI-C's goal is to expose common OCI functionality in a readily consumable way to the C or C++ developer. OCI's API is extremely flexible and is highly efficient. It gives a lot of fine-grained control to the developer and has a very wide range of use cases. ODPI-C is also flexible but is aimed primarily at language driver creators. These creators are programming within the confines of a scripting language's type system and semantics. The languages often expose simplified data access to users through cross-platform, 'common-denominator' APIs. Therefore it makes sense for ODPI-C to provide easy to use functionality for common data access, while still allowing the power of Oracle Database to be used..."

          IT - AI
          x
          Carnegie Mellon Creates A Poker-Playing AI That Can Beat The Pros
          TechCrunch, January 31st, 2017
          "To be great at poker you gotta know when to hold them, know when to fold them, know when to walk away, and know when to core dump. That's only part of the technique a new AI system created by researchers at Carnegie Mellon used to beat four of the 'world's best professional poker players - Dong Kim, Jimmy Chou, Daniel McAulay and Jason Les. The AI played the humans in a 20-day 120,000-hand Heads-up No-Limit Texas Hold'em binge that happened live on a casino floor in Pittsburgh..."
            How AI Will Transform Marketer-Machine Interactions
            Business 2 Community, January 31st, 2017
            "The Atlanta Falcons victory over the Green Bay Packers during this year's NFC Championship Game was a thriller. But it wasn't the only thing that caught my attention - did you happen to see the Century 21 TV commercial that aired during the game?

            The real estate company takes a bold stance against the notion that 'robots will replace us', asserting that machines cannot replace 'Insight, Hustle, or Handshakes' and, when it comes to making dreams come true, 'humans win every time.' While this is an interesting perspective, the current state of the AI market and the ongoing advancements suggest otherwise..."

              Where AI And Robotics Are Headed In 2017
              Datamation, January 31st, 2017
              "Artificial Intelligence showed some dramatic leaps in 2016, with robotics and autonomous devices gaining ground and popularity like never before. We've gone from the Roomba automated vacuum cleaner to self-driving cars in just a few years.

              At that rate of growth it becomes simultaneously easy and hard to predict the future of AI and robotics. Easy because you can see what's coming, hard because changes come out of left field with surprising speed. For that reason, we asked a group of AI experts where they think AI and robotics, which are first cousins, after all, are headed this year and beyond..."

                How AI Is Stopping Criminal Hacking In Real Time
                CSO Online, February 3rd, 2017
                "At the risk of overstating the obvious, criminals are winning the cyber war right now...

                Almost every day, there's news about a massive data leak -- a breach at Yahoo that reveals millions of user accounts, a compromise involving Gmail phishing scams. Security professionals are constantly moving the chess pieces around, but it can be a losing battle.

                Yet, there is one ally that has emerged in recent years. Artificial intelligence can stay vigilant at all times, looking for patterns in behavior and alerting you to a new threat..."

                Artificial Intelligence: Legal, Ethical, And Policy Issues
                ZDNet, January 30th, 2017
                "AI is surrounded by marketing hype, jargon, inflated expectations, and fear. Two experts offer realistic and thoughtful ideas about AI in our society and economy...

                Artificial intelligence has entered mainstream consciousness surrounded by marketing hype, jargon, inflated expectations, and fear. Given the importance of AI, we have started a new series of CXOTALK videos, speaking with experts in areas such as technology, data science, ethics, and public policy.

                This series kicks off with episode number 203 of CXOTALK and a conversation between one of the top legal experts in the world on AI ethics and a respected expert on public policy..."

                  Artificial Intelligence: When Will The Robots Rebel?
                  Datamation, February 3rd, 2017
                  "It's a beautifully sunny day on the campus of UC-Berkeley, students rushing between classes, backpacks and smartphones everywhere. Here in the Robot Learning Lab it's pure geek heaven. Students code software at desktops, while others assemble odd machines with wires and multi-colored boxes. Earning a spot at this elite university isn't easy; UC-Berkeley accepted a mere 14.8 percent of applicants for the class of 2020. So this young crew will likely be tomorrow's tech leaders and pioneers..."
                    From Presentation To Conversation: How A.I. Will Transform Enterprise Apps
                    ComputerWorld, February 3rd, 2017
                    "Apps will soon shift from dumb repositories to deft assistants...

                    Enterprise apps, from CRM to ERP to marketing automation, have long had a common structure.

                    Whether in the cloud or on-premise they are anchored by a database layer, responsible for storing records concerning customers, products, and other entities. At the top is a presentation layer, responsible for displaying lists or summaries of the underlying records, and facilitating the entry of new records. Between these two layers is business logic that determines how to aggregate records, what restrictions to put on record entry, and the like..."

                      Review: The Best Frameworks For Machine Learning And Deep Learning
                      InfoWorld, February 3rd, 2017
                      "Over the past year I've reviewed half a dozen open source machine learning and/or deep learning frameworks: Caffe, Microsoft Cognitive Toolkit (aka CNTK 2), MXNet, Scikit-learn, Spark MLlib, and TensorFlow.

                      If I had cast my net even wider, I might well have covered a few other popular frameworks, including Theano (a 10-year-old Python deep learning and machine learning framework), Keras (a deep learning front end for Theano and TensorFlow), and DeepLearning4j (deep learning software for Java and Scala on Hadoop and Spark).

                      If you're interested in working with machine learning and neural networks, you've never had a richer array of options..."

                      This Neural Network-Based Software Will Automatically Color In Your Line Art
                      TechCrunch, February 2nd, 2017
                      "Maybe you enjoy sketching as a hobby, but you're not so crazy about the work that goes into colouring in your work, or you're just lacking in the talent department when it comes to that side of the digital art equation. Check out this tool based on Chainer, a flexible neural network framework that can support a number of different uses.

                      The so-called PaintsChainer project can take your basic line art, created using whatever drawing program you happen to use, in a number of ordinary file formats, including JPG, PNG, GIF or even TIFF, and then automatically apply color, in a dreamy watercolor/colored pencil style that's a pretty popular style among digital artists..."

                        The Future Of Ecommerce Is Looking Bright With AI
                        Business 2 Community, February 1st, 2017
                        "After the close of 2016, it's time for us to look back on the year and make resolutions for the new year. My new year's resolution is always the same: to eat healthier (and that resolution always goes right out the window when the Valentine's Day candy starts to appear!) Aside from our personal resolutions, businesses are also making changes and resolutions moving into 2017; and here at Monetate, it's no different.

                        As Monetate looks toward an exciting year ahead, there's one thing that seems to be a recurring topic around the ecommerce industry: Artificial Intelligence (AI). While ecommerce companies have been talking about AI for some time, it seems as if the promise of technology-enabled decision-making is coming to fruition..."

                          IT - Storage
                          x
                          4 Software-Defined Storage Trends
                          NetworkComputing, January 30th, 2017
                          "As enterprises move towards the software-defined data center (SDDC), many of them are deploying software-defined storage (SDS). According to Markets and Markets, the software-defined storage market was worth $4.72 billion in 2016, and it could increase to $22.56 billion by 2021. That's a 36.7% compound annual growth rate.

                          Enterprises are attracted to SDS for two key reasons: flexibility and cost. SDS abstracts the storage software away from the hardware on which it runs. That gives organizations a lot more options, including the freedom to change vendors as they see fit and the ability to choose low-cost hardware. SDS solutions also offer management advantages that help enterprises reduce their total cost of ownership (TCO)..."

                          4TB Toshiba and 8TB HGST HDDs Run Through 2016 Without Single Failure - Backblaze
                          Storage Newsletter, February 2nd, 2017
                          "Backblaze has recorded and saved daily HDD statistics from the drives in its data centers since April 2013.

                          At the end of 2016 we had 73,653 spinning HDDs. Of that number, there were 1,553 boot drives and 72,100 data drives.

                          This post looks at the HDD statistics of the data drives we monitor. We'll first look at the stats for Q4 2016, then present the data for all of 2016, and finish with the lifetime statistics for all of the drives Backblaze has used in its cloud storage data centers since it started keeping track. Along the way we'll share observations and insights on the data presented..."

                            The Move To Solid State Drives: Prevent The Loss Of Data
                            Information Age, February 1st, 2017
                            "Encryption and reformatting drives might seem convenient and reliable, but they're not fail-safe data protection measures...

                            According to Gartner, 2017 is the year that revenue from enterprise sales of SSDs (solid state drives) will surpass that of HDDs (hard disk drives).

                            However, according to a new study from Blancco Technology Group, many IT professionals widely misunderstand the way that these drives write and delete files, with 64% failing to identify the correct definition of 'data sanitisation'..."

                            IT - Technology
                            x
                            10 Emerging Technologies You Should Be Paying More Attention To (Slideshow)
                            Data Center Knowledge, February 2nd, 2017
                            "If you asked a hundred enterprise IT pros about the technology trends that will be important in 2017, you'd probably hear the same few things mentioned over and over again. Topics like the Internet of Things (IoT), artificial intelligence (AI), machine learning, cloud computing and virtual reality are at the top of everyone's mind.

                            Of course, all those technologies will undoubtedly be influential this year. But what about the technologies that aren't getting as much attention?

                            Are there any new innovations that could be really transformational in the next few years that people aren't talking about yet?..."

                            FCC Takes First Step Toward Over-The-Air 4K Broadcasting
                            ComputerWorld, February 2nd, 2017
                            "A proposal would allow TV stations to begin broadcasting in a new IP format...

                            The Federal Communications Commission on Thursday took the first step toward the eventual rollout of over-the-air terrestrial 4K television broadcasting in the U.S.

                            The FCC published a proposed regulation that would allow TV stations to begin broadcasts using the ATSC3.0 format, a newer version of the digital transmission format used today..."

                            Infoworld's 2017 Technology Of The Year Award Winners
                            Javaworld, February 1st, 2017
                            "Did you notice that Google is giving away its magic sauce? Google engineers used to merely write papers about their creations, then leave it to others to come up with the software. Now we're fortunate to get the real goods, for datacenter orchestration or deep learning or what have you, straight from the source....

                            You'll find these and other innovations that were born in, designed for, or inspired by the cloud among our latest Technology of the Year Award winners. Chosen by InfoWorld editors and product reviewers, these are the best tools for app dev, datacenter and cloud ops, data analytics, and information security that we encountered in the past year. Read on to meet our winners..."

                            Training
                            x
                            Friday Spotlight: Oracle Private Cloud Appliance Training Events
                            By Antoinette O'Sullivan
                            Antoinette blogs, "With the engineered system, Oracle Private Cloud Appliance, you create and maintain a highly configurable pool of memory, CPU, and storage resources for running applications in a virtualization environment.

                            Take the Oracle Private Cloud Appliance: Administration course to learn how to:

                            • Create, deploy and manage virtualized servers
                            • Configure the Private Cloud Appliance Oracle VM environment in which virtualized servers run

                            Attend a live event from your own desk on 2 March, 30 March or 30 May 2017. These live-virtual events are scheduled to suit different time-zones..."

                            IT - Bitcoin
                            x
                            Accepting Bitcoin Is Easy And Opens Businesses To New Customers
                            bitcoin.com, February 3rd, 2017
                            "As Bitcoin increases in value and popularity, merchants worldwide may wonder how they can accept the cryptocurrency at their ecommerce websites. Preparing to accept Bitcoin at your online shop is not only easy, but when complete it opens your business to a slew of new customers.

                            Bitcoin use worldwide has become widespread, and many are using the cryptocurrency for daily transactions. Because Bitcoin is gaining more acceptance online businesses may be enticed to accept the digital asset at their stores. Adding Bitcoin as a payment for services and goods opens the business to a whole new group of customers. Furthermore, the cryptocurrency has much smaller fees than traditional credit card networks, and is a decentralized currency for the people rather than funds issued by governments or corporations..."

                            Bitcoin In Numbers - A Collection Of Interesting And Recent Charts
                            Bitcoin.com, January 31st, 2017
                            "Bitcoin charts show many facets of the cryptocurrency's environment. So far Bitcoin has created a myriad of different markets, value correlations, mining data, and many more constellations of economic measurement.

                            This week Bitcoin.com gathered a bunch of different charts from our forum showcasing a visual view of everyone's favorite cryptocurrency. Over the years, many individuals and organizations have measured certain aspects of the Bitcoin network using graphs and charts. Some of these representations show how Bitcoin has performed over a period of time, and where it stands today..."

                            Greg Maxwell Breaks Down Blockchain: The 'Uncontrollable Noun'
                            CoinDesk, January 31st, 2017
                            "While bitcoin has created an economic network without a central authority, the chief technology officer at one of its leading development firms, VC-backed Blockstream, believes the chair of the US central bank has been largely accurate in her attempts to explain blockchain.

                            In a morning address at CoinDesk's Construct 2017 today, Maxwell addressed statements by Janet Yellen, commending her for acknowledging bitcoin as part of the broader blockchain conversation, even as he admitted his distaste for the broad label.

                            Overall, the remarks offered a high-level view of how one of bitcoin's most esteemed and longest-tenured developers views recent developments in the ecosystem, including the increasing interest in "permissioned" versions of the technology that seek to alter its model..."

                            IT - FOSS
                            x
                            From Food To Sofas: How Open Source Is Changing The World Beyond Software
                            The VAR Guy, February 1st, 2017
                            "Once upon a time, open source was a term used only within the software world. Today, the open source concept is being extended to many other industries -- from computing hardware to furniture. Here's a look at how the open source idea is eating the world beyond software.

                            The term open source software has existed since 1998. Before that, the only people who spoke about open source were in the intelligence community, where open source was a specialist term that referred to publicly available intelligence information..."

                            Libreoffice 5.3 Upgrade Brings Open-Source Office Suite To The Cloud (Slideshow)
                            eWeek, February 3rd, 2017
                            "The open-source LibreOffice office application suite has been improving steadily since 2010, when it was forked from the Oracle OpenOffice suite. The latest incremental milestone is LibreOffice version 5.3, released Feb. 1 and providing users with new features and improved performance. LibreOffice bundles multiple applications including the Writer Document, Calc Spreadsheet, Impress Presentation, Draw, Math Formula and Base Database. Among the numerous feature updates in Writer are new PDF document-handling capabilities that enable users to import and digitally sign existing documents..."
                            Libreoffice Vs. Microsoft Office: It'S A Format War
                            CIO, February 3rd, 2017
                            "Italo Vignoli, a co-founder of The Document Foundation, shares his thoughts on the past, present and future of LibreOffice...

                            Sun Microsystems was home to many critical open source projects including OpenOffice, MySQL, Java, and VirtualBox. When Oracle acquired Sun, members of these projects grew concerned about their projects. MySQL was forked, and the OpenOffice community created a body called The Document Foundation (TDF) to ensure the survival of the project.

                            However, Oracle was displeased about the formation of TDF and the ensuing conflict led to LibreOffice becoming a fork of OpenOffice. The first release of LibreOffice came in 2011. By 2012, TDF was registered as an organization in Germany..."

                            IT - DevOps
                            x
                            5 Things DevOps Needs To Do To Secure Containers (Slideshow)
                            CSO Online, February 1st, 2017
                            "For security departments, adoption of containerization presents a multifaceted challenge...

                            Do deepening adoption and broader deployment of container technologies (from the likes of Docker, CoreOS and others) threaten to escalate into the latest skirmish between operations, developers and information security?

                            Certainly, the potential exists to widen the rift, but in fact there is far more common ground than would initially suggest. Containerization introduces new infrastructure that operates dynamically and is open in nature, with more potential for cross-container activity. Containerization presents an almost unprecedented opportunity to embed security into the software delivery pipeline - rather than graft on security checks, container monitoring and policy for access controls as an afterthought..."

                            A Six-Step Approach To Enterprise DevOps Transformation
                            devops.com, February 3rd, 2017
                            "Agility of businesses to transform and adjust to market conditions is perhaps the most important aspect of managing today's enterprise. With digitization of almost all facets of running an enterprise, it is safe to say that IT agility translates to either the success or failure of such adaptation. Smaller and new-age businesses are better able to adapt, while large, established enterprises struggle or are too slow to adapt. Large enterprises have been executing in an established, traditional way for decades and have solidified their existing processes and decision-making.

                            New-age businesses don't have a choice..."

                              DevOps And You: Advice For Building Your Career
                              CIO, February 2nd, 2017
                              "Portions of this post were originally posted on the Puppet blog, and are republished here with Puppet's permission.

                              Demand for people with DevOps skills is growing rapidly because businesses get great results from DevOps. Organizations using DevOps practices are overwhelmingly high-functioning: They deploy 200 times more frequently, with 2,555 times faster lead times. They recover 24 times faster from failures, and have one-third the change failure rate that other organizations experience, according to Puppet's 2016 State of DevOps Report.

                              If you believe DevOps is the future, our new ebook is for you. DevOps and You: Advice for Building Your Career includes stories of how people got started in DevOps, details on how to improve your DevOps skills, and advice for landing your next job.

                              What are DevOps skills?..."

                              The real ROI of DevOps
                              jaxenter, February 3rd, 2017
                              "Measuring the Return on Investment (ROI) from DevOps is critical to convince organizations which are falling behind that they can still shift course, transform and head to the IT future. It is also essential for companies that are embracing the industry's forward movement, so they know if they're on the right track and can keep turbo-charging their DevOps efforts.

                              Many established enterprises are stuck in reverse. Dragged down by legacy IT systems and sclerotic software work streams, these businesses simply cannot adapt and get up to speed in the continuously changing, high-velocity global marketplace of the 21st century..."

                              MySQL
                              x
                              Testing performance of MySQL Group Replication
                              ProxySQL, February 2nd, 2017
                              ProxySQL blogs, "MySQL Group Replication is a hot topic in MySQL ecosystem.

                              We have been evaluating it in , and it is now time to evaluate its performance, especially now that is GA. In our setup, we wanted to evaluate how it performs compared to standard asynchronous MySQL replication. Therefore MySQL 5.7.17 was first tested with regular async replication, MTS, semi-sync, and finally Group Replication..."

                              Automatic failover of MySQL Replication - New in ClusterControl 1.4
                              By Severalnines, January 30th, 2017
                              Krzysztof Ksiazek blogs, "MySQL replication setups are inevitably related to failovers. Unlike multi-master clusters like Galera, there is one single writer in a whole setup - the master. If the master fails, one of the slaves will have to take its role through the process of failover. Such process is tricky and potentially, it may cause data loss. It may happen, for example, if a slave is not up to date while it is promoted. The master may also die before it is able to transfer all binlog events to at least one of its slaves.

                              Different people have different takes on how to perform failover. It depends on personal preferences but also on requirements of the business. There are two main options - automated failover or manual failover..."

                              Linux
                              x
                              Training Thursdays: Oracle Linux and Cloud Computing
                              By Antoinette O'Sullivan, February 2nd, 2017
                              Antoinette blogs, "Oracle Linux is a key part of your journey to cloud. Alongside a wide range of core administration tasks, learn about the Linux images available on the Oracle Cloud, how to create an Oracle Instance on the Cloud, and much more by taking any of the following Oracle Linux system administration courses:

                              • Oracle Linux 7: System Administration
                              • Oracle Linux 7: Advanced Administration
                              • Oracle Linux 5 & 6 System Administration
                              • Oracle Linux 5 & 6 Advanced Administration

                              These courses are available in three formats:..."

                              IT - Cloud
                              x
                              7 Reasons Your Cloud Will Fail
                              Network World, January 31st, 2017
                              According to Gartner, a company with a corporate 'no-cloud' policy in 2020 would be as rare as a company today operating without Internet. IDG estimates that 70% of enterprises are running at least one application in the cloud today and that number is projected to reach 90% in the next 12 months. In other words, in a couple of years a company not in the cloud will be unfathomable.

                              While an efficiently deployed cloud environment can lead to agility and cost savings, for every benefit cloud can bring, a poorly deployed environment has a matching drawback. That's why you need to proceed with caution when outlining your cloud strategy, and avoid these top seven reasons cloud environments fail:

                              Cloud.Gov Clears FedRAMP
                              FCW, February 3rd, 2017
                              "The General Services Administration-run cloud.gov hosting platform has completed the final stage of Federal Risk and Authorization Management Program assessment.

                              The clearance makes Cloud.gov the first fully open-sourced service to attain FedRAMP authorization, according to a Feb. 2 blog post from GSA's 18F innovation shop.

                              Cloud.gov is a platform-as-a-service developed by 18F that aims to help agencies improve their IT management. The site, which runs on Amazon Web Services' GovCloud, handles many of the FedRAMP technical and compliance requirements of the underlying cloud platform, and allows agencies to focus on their web applications and code instead..."

                              Security And Privacy Concerns Dog The Cloud (Slideshow)
                              CIO Insight, February 3rd, 2017
                              "Security and privacy of data and systems in the cloud remain a top worry for the majority of IT professionals worldwide, according to a new survey. Furthermore, unauthorized access, malware and DoS attacks are the top three cloud security concerns today.

                              The survey, 'Netwrix 2nd Annual Cloud Security Survey,' asked 660 IT professionals from technology, government, health care, finance, manufacturing and other industries about security in the cloud, their readiness to adopt the technology, and ways to ensure data protection..."

                              Serverless Computing's Future Is Now - And Why You Should Care
                              Network World, February 1st, 2017
                              "Instead of allocating virtual machines in the cloud, you upload functions and let the IaaS service provider figure out how to deploy, run and scale those functions..

                              Serverless computing, a disruptive application development paradigm that reduces the need for programmers to spend time focused on how their hardware will scale, is rapidly gaining momentum for event-driven programming. Organizations should begin exploring this opportunity now to see if it will help them dramatically reduce costs while ensuring applications run at peak performance..."

                              Stacking up the Cloud Vendors: AWS vs. Microsoft Azure, IBM, Google, Oracle
                              ZDNet, February 3rd, 2017
                              "It's not easy tracking the girth of public cloud providers amid run rates, as-a-service sales projections, and a lack of transparency. Here's how AWS stacks up against Microsoft Azure, IBM, Google, and Oracle...

                              Amazon Web Services continues to lead the cloud pack as it delivered a 2016 operating profit of $3.1 billion on revenue of $12.22 billion, up from $7.88 billion in 2015..."

                              The Year Of The Cloud: Flexible, Agile And Scalable
                              Information Age, February 1st, 2017
                              "Organisations' use of cloud storage has surged in the past five years, and this trend of adoption is set to increase in 2017...

                              The cloud is a tool that offers organisations flexibility, agility and scalability in an increasingly connected world.The amount of data being processed by organisations is growing dramatically and the cloud - in all its forms - provides a haven to store, communicate and utilise the increasingly vast amount of data being generated..."

                                vBeers-SF
                                x
                                vBeers @ Broward (Funky Buddha)
                                Wednesday, February 1st, 2017: 5:30 PM to 8:30 PM
                                We meet in Oakland Park on the 2nd Wednesday of each month. Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida.

                                Please share this invitation with your IT colleagues and encourage them to attend!

                                These informal networking/social events provide a relaxed environment to meet with other hands-on IT professionals and promote the growth of IT in South Florida.

                                Feel free to arrive and depart at your convenience. People start gathering around 5:30 PM to 6:30 PM and most people leave by 8:30 or 9:00 PM.

                                Please register at The South Florida Technology Alliance (SFTA) events page.

                                vBeers - we're about:

                                IT - Operating Systems - Technology Startups - Open Source - New Technology - IT Professionals - Cloud Computing - Information Technology - Virtualization - Technology Professionals - Information Technology in Business - SaaS (Software as a Service) - vBeers - Linux - Unix - Web Technology - Security - Machine Learning - Containers - Networking - Referrals - Beer

                                Join the vBeers LinkedIn group. Network with fellow vBeers participants on-line.

                                John J. McLaughlin

                                Software
                                x
                                Oracle Secure Global Desktop Release 5.3
                                By Jan, February 1st, 2017
                                Jan blogs, "Oracle Secure Global Desktop is a secure remote access solution for cloud-hosted enterprise applications and hosted desktops running on Oracle Linux and other Linux distributions, Oracle Solaris, Microsoft Windows, and mainframe servers..."

                                SGD Provides Secure Application Access:

                                • Secure remote access to server-hosted applications and desktops
                                • Supports a wide variety of application platforms and desktops, including web-based Oracle applications, Windows applications, mainframe and midrange applications, Windows and Linux desktops and more
                                • Access from Linux, Solaris, Windows and Mac OS X computers, Apple iPad tablets, and Android devices
                                • Certified for web-based Oracle applications and Oracle Exalogic Elastic Cloud

                                This release features many improvements over the previous release including Support for Oracle Linux 7 as a client, application server and infrastructure node for Oracle SGD server and gateway.

                                IT - Networks
                                x
                                Are Free VPN Clients Secure Enough For Enterprise Users?
                                SearchSecurity, January 31st, 2017
                                "There are many free VPN clients on the market, but are they secure enough for enterprise users? Expert Judith Myerson looks at the pros and cons of ad-supported VPNs....

                                I've seen some free VPNs for mobile and client devices that are ad-supported. Are free VPN clients worth exploring as an option, or are they inadequate for enterprise security?

                                You probably have seen the free Hotspot Shield VPN client or other similar offerings for your devices. You can use Hotspot Shield over public Wi-Fi or a corporate wireless network with both mobile and client devices..."

                                Top 8 Tools That Will Bolster Network Security In 2017
                                Business 2 Community, February 2nd, 2017
                                "Have you updated your network security for 2017? If not, it's time to take a look at the new tools available that can help you prevent viruses, malware, and hackers from attacking your network. Hackers are creating new weapons of cyber-terrorism every day, which means you have to continually update your own arsenal in order to prevent them from harming your network. Here are eight new tools that you may want to add to your computer security toolkit this year in order to protect your business, your employees, and your customers from hacking..."
                                5 Subnetting Benefits
                                NetworkComputing, January 31st, 2017
                                "Learn how subnetting can help improve network performance and security.

                                Uh oh, traffic on your network has increased tremendously, causing it to run slower. It's time to consider subnetting your network. While subnetting takes some planning and can be time consuming, it's well worth the effort. Here are five subnetting benefits you should consider..."

                                Why Is VPN Is Considered Better And More Efficient Than Proxy Server?
                                Information Age, February 3rd, 2017
                                "The plethora of options for VPNs and proxy servers can cause confusion for users, who often struggle to decide which is the best...

                                VPN and proxy server users can struggle to judge which benefits they will provide. With the advent of a free VPN proxy, the confusion somewhat diminished.Just like any other proxy server, a VPN, otherwise known as a virtual private network, encrypts all of your internet traffic, replacing your ISP and routing all traffic through the VPN server..."

                                Preventing DoS Attacks: The Best Ways To Defend The Enterprise
                                SearchSecurity, January 31st, 2017
                                "Preventing DoS attacks may not always be possible, but with a strong defense, enterprises can reduce their impact and recover quickly. Expert Kevin Beaver explains the best approaches...

                                Denial-of-service attacks -- intentional attempts to compromise the availability of network servers, devices, applications and even internet access -- are a growing form of cyberattack, according to Verizon's '2016 Data Breach Investigations Report.'

                                With nearly 10,000 reported incidents over the survey period, a denial-of-service (DoS) attack proved to be one of the most visible ways malicious actors wreaked havoc on enterprise networks. Many people don't realize this until they end up on the receiving end of such an attack..."

                                  IT - IoT
                                  x
                                  10 Principles Of A Successful IoT Strategy
                                  CIO, January 30th, 2017
                                  "Former Amazon executive John Rossman says these 10 principles can help leaders successfully approach the internet of things...

                                  The internet of things (IoT) presents an opportunity for enterprises to rewrite the rules of their industry. The potential upside is massive: According to research firm Gartner, there will be nearly 20 billion devices on the IoT by 2020, and IoT product and service suppliers will generate $300 billion+ in revenue..."

                                  IPv4 in a World of IoT
                                  Data Center Knowledge, January 31st, 2017
                                  "If you've ever seen the movie 'Minority Report,' Steven Spielberg's sci-fi detective thriller set in a dystopian Washington, D.C., in 2054, you may remember a scene in which Chief of PreCrime-turned fugitive, John Anderton, ducks into a crowded shopping mall to escape the long arm of the law.

                                  'John Anderton!' a personalized advertisement calls out as he passes by. 'You can use a Guinness, right about now!' Entering a GAP, he sees and hears other simulated barkers clamoring for his attention, spurred by smart sensors.

                                  Elements of this IoT-enabled advertising universe are no longer the stuff of science-fiction. Personalized advertising is a very real and growing technology. And where there is IoT, there is IPv4..."

                                  Ready To Cash In On IoT?
                                  The Document Foundation, February 1st, 2017
                                  "The Internet of Things (IoT) has quickly evolved from buzz talk to a real-time application of intelligent, connected devices. IoT now represents a huge business opportunity for channel partners.

                                  2017 will be a defining year for channel partners who are sitting on the IoT fence. Many software vendors are looking for partners with vertical expertise and innovative approaches to deliver excellent business outcomes for customers. If you have the wherewithal to impact your customers, and markets, this could be the right time to move into the IoT ring..."

                                  IT - Operations
                                  x
                                  The Future Of Containerization Goes More Abstract
                                  Search IT Operations, February 2nd, 2017
                                  "Containers have benefits over VMs in the data center, but the future of containerization is broader than that...

                                  Virtual machines were once the ultimate means of easily creating and provisioning software packages into production. VMs seemed pretty clever, but in actual use, they require far more base resources than they really should -- and aren't always easy to manage. Although they still have a part to play in the tool set of an IT department, we're in need of a more optimized approach..."

                                  Understand The Benefits, Limits Of Composable Infrastructure
                                  Search Data Center, February 2nd, 2017
                                  "Composable infrastructure leads the next stage of data center evolution, changing the way admins manage IT resources. But lock-in and other hurdles may hinder adoption -- for now.

                                  While technologies such as virtualization, converged architecture and software-defined infrastructures accelerate the rate of workload provisioning and improve resource management, lingering silos and ongoing disconnects between hardware and software continue to restrain IT. Composable infrastructure -- a form of software-defined infrastructure that allows IT teams to scale resources and deliver them as a service in a matter of minutes or even seconds -- may be the next step in data center evolution..."

                                  IT - Security
                                  x
                                  Online Card Fraud Up As Thieves Avoid More Secure Chip Cards For In-Store Payments
                                  ComputerWorld, February 3rd, 2017
                                  "Increasing use of biometrics may help protect online payments..."

                                  One unfortunate side effect from the use of chip cards for in-store purchases has been an increase in online credit-card fraud.

                                  Hackers have taken the path of least resistance, moving from in-store fraud to e-commerce fraud, according to security experts.

                                  Deterred by the security capabilities of chip cards for in-store payments, thieves have resorted to stealing credit-card numbers and passwords or opening new accounts with false credentials to use in making online payments for purchases, according to recent studies. Botnets also comprise some of the biggest increases in online card fraud..."

                                  Six Best Practices For Managing Cyber Alerts
                                  HelpNet Security, January 31st, 2017
                                  "Security professionals know that the number of cyber alerts is growing at a frantic pace. Even a mid-sized company can face tens of thousands of alerts every month. As the 2011 Target breach demonstrated, failing to investigate alerts adequately and responding to them effectively can have serious consequences for a business as well as its customers.

                                  Ignoring alerts is not an option, so how can busy professionals help their staff members manage the increasing volume without jeopardizing the security of the organization? Here is a list of six best practices that can help..."

                                  Can You Spot The Phish?
                                  CSO Online, February 2nd, 2017
                                  "Cloud collaboration software provider Diligent recently conducted an online survey of 2,000 U.S. internet users to test their security savvy. 76% of survey respondents passed the phishing test, but that isn't the whole story. Here are some of Diligent's other findings:

                                  • Over 68% of respondents were tricked by emails that looked like they were from a coworker.
                                  • Messages from social media companies with the phrase, 'Did you see this pic of you? LOL' fooled nearly 61% of participants.
                                  • Fewer than 3% of respondents fell for an email claiming they won a big cash prize from a soft drink company.

                                  Following are the emails Diligent used in its survey. Can you spot the phish?..."

                                  CSOs Too Conservative To Buy Latest Technology, Says Check Point CEO
                                  IT World Canada Canada, January 31st, 2017
                                  "CSOs are too conservative in running their operations and don't invest in the latest technology that could better protect their firms, says the head of Israel's best-known security firm.

                                  "I think the biggest mistake 'they make' is not just being reactive but investing in the technology they already know, instead of saying 'We need a new strategy and we need to grow the architecture we're dealing with,'' Check Point Software Technologies CEO and co-founder Gil Shwed told a group of international reporters here on Monday..."

                                  Why You're Doing Cybersecurity Risk Measurement Wrong
                                  Dark Reading, January 30th, 2017
                                  "Measuring risk isn't as simple as some make it out to be, but there are best practices to help you embrace the complexity in a productive way. Here are five...

                                  Broadly speaking, cybersecurity is risk identification and risk mitigation in the cyber domain. Measuring risk quantitatively is good because it helps security teams measure their capabilities somewhat objectively, which helps everyone make better decisions. For example, when deciding whether to upgrade all your firewalls or invest in organization-wide two-factor authentication, that decision should be based, in part, on what risk exists now and what risk will be after you implement a change. It may surprise you but people are generally pretty bad at this, resulting in things like transportation disasters, major breaches, economic bubbles, wars, and bad movies..."

                                  10 Lessons Learned From 2016'S Biggest Data Breaches (Slideshow)
                                  Information Management, January 30th, 2017
                                  "Organizations are taking more of their data and applications to the cloud, increasing the risk of a cybersecurity incident. Here are 10 lessons IT can learn from 2016's biggest data breaches..."

                                  "Enterprises now use an average of 1,031 cloud apps, a figure that IT often underestimates by 10x and which represents just one of many avenues that hackers could breach in order to obtain sensitive data," Narayanaswamy explains..."

                                    CSOs Reveal True Cost Of Breaches
                                    Help Net Security, February 1st, 2017
                                    "Over one-third of organizations that experienced a breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent, according to the Cisco 2017 Annual Cybersecurity Report (ACR)...

                                    Ninety percent of these organizations are improving threat defense technologies and processes after attacks by separating IT and security functions (38 percent), increasing security awareness training for employees (38 percent), and implementing risk mitigation techniques (37 percent). The report surveyed nearly 3,000 chief security officers (CSOs) and security operations leaders from 13 countries in the Security Capabilities Benchmark Study, part of the Cisco ACR..."

                                    Here's Why - And How - You Should Hire An Ethical Hacker
                                    TechWorld, January 31st, 2017
                                    "Getting hacked is a matter of when, not if. Here's what your organisation should do about it...

                                    Two-thirds of large UK firms were targeted by cyber criminals in 2016. And with cyber crime costs reaching (UK Pound) 4.9 trillion last year, it's now more important than ever to secure your business.

                                    For organisations that don't invest in cyber security, getting hacked is just a matter of time. But even those that do are often breached using backdoors unknown to their security teams..."

                                    How To Eliminate Insider Threats
                                    CSO Online, January 30th, 2017
                                    "Statistics prove that more risk exists within an organization...

                                    For years, the primary security objective has been to protect the perimeter - the focus on keeping outsiders from gaining access and doing harm. But statistics prove that more risk exists within an organization. Indeed, many compliance regulations require monitoring of systems to identify and eliminate insider threat. According to Forrester, 58 percent of breaches are caused from internal incidents or with a business partner's organization. And 55 percent of attacks are originated by an insider as cited in the 2015 IBM Cyber Security Intelligence Index.

                                    Mike McKee, CEO of ObserveIT, lists some tips to help organizations quickly jump on any irregularities that come from within your company's network..."

                                    How To Predict The Next Major Hack
                                    InfoWorld, February 2nd, 2017
                                    "Code analysis is only part of rating website vulnerability. Add parameters like developer experience to your analysis, and you might even predict the next breach...

                                    I think we can all agree that Yahoo has really had an off decade (or so). Most recently, reports revealed that, basically, Yahoo's security mechanism was at best an honor system and at worst a giant fraud. This is only the latest major uh-oh in a string of them..."

                                    Hunting Hackers: An Ethical Hacker Explains How To Track Down The Bad Guys
                                    Homeland Security News Wire, February 2nd, 2017
                                    "When a cyberattack occurs, ethical hackers are called in to be digital detectives. In a certain sense, they are like regular police detectives on TV. They have to search computer systems to find ways an intruder might have come in - a digital door or window left unlocked, perhaps. They look for evidence an attacker left of entry, like an electronic footprint in the dirt. And they try to determine what might have been copied or taken. But how do people track down hackers, figuring out what they have done and who they are? What's involved, and who does this sort of work? ..."
                                      Mayhem Is A Robot Hacker And It Can Crack Any Code
                                      TechWorm, February 2nd, 2017
                                      "This awesome Robot Hacker known has Mayhem can hack any programming code

                                      The future world truly belongs to AI, Robots and machine learning. We have known about botnets and robots but now comes Mayhem, a software program that can hack any code. According to its developers, Mayhem is meant to be best option for automatically defending against cyber attacks and will very soon be launched in the real world to fix the internet.

                                      For those unfamiliar, Mayhem had won a $2 million hacking prize at the Cyber Grand Challenge held at the DefCon hacker conference in Las Vegas last year..."

                                        Preventing Insider Threats: How To Communicate The Risk Companywide
                                        Business 2 Community, January 30th, 2017
                                        "While recent news implies that corporate spies, whistle blowers or unethical raiders steal proprietary data from far too many organizations, the reality is that even more often, the culprit is actually the insider, a trusted member of the team. In fact, recent surveys such as the Insider Threat Spotlight Report show that nearly half of the organizations surveyed have seen an increase in insider attacks over the last 12 months, with the biggest threat coming from managers with access to sensitive information..."
                                          Why 2017 Will Be The Worst Year Ever For Security
                                          IT World, February 2nd, 2017
                                          "High-profile breaches are the tip of the iceberg. Many have never been detected or disclosed -- and without major infrastructure changes, it'll only get worse...

                                          Sony. Anthem. The Office of Personnel Management. Target. Yahoo. The past two years have seen one mega-breach after another - and 2017 promises to be the most catastrophic year yet.

                                          Security experts have long warned that most organizations don't even know they've been breached. Attackers rely on stealth to learn about the network, find valuable information and systems, and steal what they want. Only recently have organizations improved their detection efforts and started investing the time, capital, and people needed to uncover vulnerabilities. When they do, the results are often alarming..."

                                          3 Things Companies Must Do Before A Data Breach
                                          Dark Reading, January 31st, 2017
                                          "It's important to plan ahead for when you're attacked, and these tips will help you get ready...

                                          As attacks become more complex, more damaging, and more frequent than ever, the quality of your response becomes critical to limiting the impact. In fact, a strong incident response (IR) function saves an average of $400,000 in damages per data breach, according to the Ponemon Institute, in research sponsored by IBM Resilient..."

                                          Phishing Test Results In A Barely-Passing Grade For Users
                                          CSO Online, February 2nd, 2017
                                          "Find out if you, too, would be hooked by these scams.

                                          Perhaps hundreds of emails cross your screen every day. The day can drag on and in the monotony of your daily routine, you just keep clicking on links without a care in the world.

                                          OK, maybe things aren't that bad, but those phishing scams are tricky and it takes ever-vigilant users and security departments to keep them from spreading. Recently, Diligent, a vendor that provides secure collaboration for corporate boards, rolled out a test to 2,000 users to see how much attention they were paying to what enters their in-box..."

                                          10 Essential Elements For Your Incident-Response Plan
                                          Dark Reading, February 2nd, 2017
                                          "Failing to plan, as we know from Zen masters and MBA lecturers, is planning for failure. So when things go off the tracks with networks, servers, or your data, you need to have a plan, even if it's super-basic or seems gratuitous. Some back-of-the-envelope notes won't do the trick, nor will trying to recall hazy remnants of conversation from that night you and a coworker discussed incident response over a couple beers.

                                          The middle of a DDoS attack or ransomware infection is not the time to be talking about divisions of labor or who should do what, crisis communications experts remind us, and they're right. Have an incident response plan, even if you don't follow it to the letter, or are forced to improvise more pieces of it than you'd like. You can minimize the improvisation and come out the other side in better shape if your incident response plan incorporates many of these steps. You can also recover more quickly and get on with the business of serving customers and making money..."

                                            5 Shocking New Threats To Your Personal Data
                                            ComputerWorld, February 4th, 2017
                                            "I don't mean to alarm you, but these trends make panic sound like a good idea

                                            I'm not paranoid. Tinfoil hats aren't my scene.

                                            But watch out! In just the past month, the internet and smartphones have come up with five new and surprising ways to steal or expose our personal data.

                                            Of course, these new concerns can now be added to all the old ones. Companies like Google and Facebook still track you and harvest personal data. Hackers still want to steal your data. And the National Security Agency is still out there doing its thing.

                                            And now, these five new trends reveal that your security and privacy could be compromised in ways you probably never imagined..."

                                            IT - Careers
                                            x
                                            10 IT Skills That Employers Need In 2017 (Slideshow)
                                            CIO, February 1st, 2017
                                            "Unemployment rates in the IT industry are still hovering around historic lows, and some roles -- like network and security engineers and software developers -- are showing unemployment rates of around 1 percent. A recent survey from Robert Half Technology showed that the majority of CIOs will either expand their IT teams or focus on filling out vacant roles, while the 2017 IT Forecast from TEKsystems shows that confidence is high and IT budgets are rebounding. Overall, it's a fairly rosy outlook for IT professionals this year, especially those with specific skill sets. Here, our experts tell us which skills will be hottest in 2017..."
                                            13 Underappreciated Traits You Absolutely Need To Succeed
                                            Success, January 31st, 2017
                                            "Picture the most successful person you know. What is it about them that you admire the most? What characteristics do they have that you really respect? Is it their confidence? Their intelligence? Or maybe it's their work ethic?

                                            But what about the things you might not notice at first glance? Like an insatiable hunger, gratitude or patience? Often it's the traits that fly under the radar that can have the biggest impact on your ability to achieve.

                                            We asked members of the Young Entrepreneur Council which of these underappreciated traits they value the most. Because even though they're not as 'loud,' they're absolutely necessary to succeed..."

                                              5 Common Tech Hiring Mistakes To Avoid
                                              Network World, January 31st, 2017
                                              "Finding the right hire for IT can be a chore, and if you get it wrong, the consequences can be substantial. According to the U.S. Department of Labor, a bad hire costs at least 30% of the initial annual salary, but that number is believed to be much higher. It's a mistake that companies simply can't afford to make in today's increasingly competitive marketplace.

                                              To help avoid the pitfalls of a bad hire and net the tech talent you require, here are five common hiring mistakes to consider:.."

                                                How To Find Your Next Leadership Job: 5 Tips
                                                TechRepublic, January 30th, 2017
                                                "Now that you've left your C-level executive job and you're planning your next move, here are tips for making sure you land in the best spot.

                                                Considering a move to a leadership position at a new company can be daunting, but it's possible to position yourself for success early on in the process. Here are tips from executive coaches and C-suite members on how to find the best C-level position for the next phase of your career..."

                                                  How To Handle Four Awkward Situations Where You're Being Underpaid
                                                  Fast Company, January 31st, 2017
                                                  "How to get what you're worth when you know your coworkers are making more, or because you didn't negotiate a good initial salary...

                                                  Are you really underpaid, or does it just feel that way? American workers are earning less on average than they were 40 years ago, after inflation. But at a more personal level, determining whether you should be getting paid more isn't easy, and rectifying it can be even harder. Here's a look at four of those situations, and what it might take to set things aright..."

                                                    IT - Virtualization
                                                    x
                                                    Being Active In The Age Of Virtualization
                                                    The Datacenter Journal, January 30th, 2017
                                                    "The data center is a hub for stakeholders with backgrounds covering a broad range of disciplines: facility-management teams, server and storage admins, database specialists, and network engineers. The disconnect, however, lies in the fact that these groups are often siloed in separate organizational units. This situation makes orchestrated and synchronized collaboration a rarity in many contemporary data centers..."
                                                    Locking Down Containers
                                                    GCN, February 3rd, 2017
                                                    "Containerization can be a great way to control information sharing, but securing containers has a way to go toward maturity, said Kerry Long, a program manager at the Intelligence Advanced Research Projects Activity.

                                                    Containers virtualize a single application and package it with just the software, libraries and operating system features it needs to run, eliminating some of the dependencies that slow down deployments. They offer all the benefits of virtualization, but with better use of hardware and an already-broad ecosystem of applications, according to an article by Red Hat's Dave Egts..."

                                                    IT - Compliance
                                                    x
                                                    Managing Compliance Is Easier In The Cloud
                                                    InfoWorld, January 31st, 2017
                                                    "Rules and standards change, requiring constant IT effort to maintain compliance. Why not let the cloud take on that hassle instead?

                                                    Cloud doubters often raise compliance requirements as a barrier to cloud adoption, but in fact cloud providers have many tools to ease compliance with regulations and industry standards. They can help you maintain compliance with the least amount of resources..."

                                                      IT - Backup
                                                      x
                                                      The Role Of Snapshots In A Backup System
                                                      Storage-Switzerland, January 31st, 2017
                                                      "Snapshots are moving to the forefront of many data centers when it comes to data protection. Therefore, it's important to have a solid understanding of how they work and what to use them for. It's also very important to understand that their value is greatly limited if they are not replicated to another system.

                                                      A snapshot is a virtual view of a volume or file system from a particular point in time. After a snapshot is taken, the snapshot system preserves the view of that point in time by preserving any blocks that change after that point. A copy on write system copies to a snapshot area any blocks that are about to be overwritten with newer information..."

                                                        IT - Big Data
                                                        x
                                                        What To Consider When Hiring Data Science Talent
                                                        InformationWeek, February 1st, 2017
                                                        "Dealing with the data science talent crunch isn't just about competing for talent; it also requires the right data science strategy to help the analytics team be effective and efficient.

                                                        Let's face it: The corporate world is still struggling with how to best leverage its data. It's not a new challenge we face, but the problem is only exacerbated as more data is exchanged and created at petabyte scale. The proliferation of data, and its potential value for organizations have increased demand for data science professionals..."

                                                        Five Ways Data Analytics Will Storm The Stage In 2017
                                                        insideBIGDATA, February 3rd, 2017
                                                        "It is becoming more and more apparent how data analysis is driving e-commerce revenues. And this growing importance has forced e-tailers and e-commerce firms to hire more data scientists in order to better understand how customer engagement impacts revenue and sales.

                                                        This assessment comes from SOASTA, a leader in performance analytics, who reveals that data analytics is important in all aspects of the organization - from digital transformation to digital performance management..."

                                                        Why The Promise Of Big Data Hasn't Delivered Yet
                                                        TechCrunch, January 30th, 2017
                                                        "The ubiquity of big data is such that Gartner dropped it from their Hype Cycle of Emergent Technologies back in 2015.

                                                        Across sectors, businesses are scrambling to make every function 'data driven,' and there's no shortage of firms lining up to help them. The big data analytics industry, dedicated to helping big businesses leverage the petabytes of information they now generate and store, is worth $122 billion - and growing..."

                                                        How An Operational Data Hub Becomes The Data Detective
                                                        Data Center Knowledge, January 30th, 2017
                                                        "Data sleuths inclined to using logic and the science of deduction to ferret out patterns and establish links between clues take enjoyment in solving data problems. However, with the amount of data created and stored every day growing exponentially, discovering the relationships that exist among your data requires more than a keen mind. It requires the right technology, too.

                                                        For many organizations, data lies in multiple, disconnected data silos resulting from earlier departmental initiatives. The inability to undertake complex data integration across silos means organizations are missing out on a full view of their data, which can bring revenue-generating insights and customers' preferences, and avoiding the risk of fines due to difficulty complying with regulations..."

                                                          Big Data Facts Highlight Its Trendsetting Surge
                                                          Information Week, February 2nd, 2017
                                                          "As big data takes hold in the business world, the cloud enables small and mid-sized businesses to take advantage of the concept.

                                                          At its core, big data consists of large sets of information culled from various sources and then analyzed to derive statistical value. These metrics become particularly useful for measuring industries, humanistic tendencies, behavior and interactions. IBM's Watson supercomputer, for example, is a cultivator of big data, as are the back-end analytics engines companies like Facebook and Google have access to..."

                                                          Top10
                                                          x
                                                          Top Ten Articles for last few Issues
                                                          Vol 227 Issue 1, 2, 3 and 4; Vol 226 Issues 1, 2, 3 and 4
                                                          We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                          • Oracle Solaris Moving to a Continuous Delivery Model
                                                          • Friday Spotlight: Oracle RAC on Oracle VM environments
                                                          • Advance Your System Administration Career with Oracle Solaris 11
                                                          • Emerging Tech and the Enterprise
                                                          • Keeping Your IT Skills Relevant in the Age of Automation
                                                          • LibreOffice 5.2.5
                                                          • Working with JSON in MySQL
                                                          • Develop in Demand Expertise Using the World's Most Advanced SPARC M7-8 & M7-16 Server Components & Architecture
                                                          • MONDAY SPOTLIGHT: Whitepaper-Optimizing Deployment Flexibility and Increasing ROI
                                                          • Internet of Things OTN VTS free on-demand training by Bob Rhubart

                                                          The longer version of this article has list of top ten articles for the last 8 weeks.

                                                            LibreOffice
                                                            x
                                                            Libreoffice 5.3 Upgrade Brings Open-Source Office Suite To The Cloud
                                                            eWeek, February 3rd, 2017
                                                            "The open-source LibreOffice office application suite has been improving steadily since 2010, when it was forked from the Oracle OpenOffice suite. The latest incremental milestone is LibreOffice version 5.3, released Feb. 1 and providing users with new features and improved performance. LibreOffice bundles multiple applications including the Writer Document, Calc Spreadsheet, Impress Presentation, Draw, Math Formula and Base Database. Among the numerous feature updates in Writer are new PDF document-handling capabilities that enable users to import and digitally sign existing documents..."
                                                            Libreoffice Vs. Microsoft Office: It'S A Format War
                                                            CIO, February 3rd, 2017
                                                            "Italo Vignoli, a co-founder of The Document Foundation, shares his thoughts on the past, present and future of LibreOffice.

                                                            Sun Microsystems was home to many critical open source projects including OpenOffice, MySQL, Java, and VirtualBox. When Oracle acquired Sun, members of these projects grew concerned about their projects. MySQL was forked, and the OpenOffice community created a body called The Document Foundation (TDF) to ensure the survival of the project.

                                                            However, Oracle was displeased about the formation of TDF and the ensuing conflict led to LibreOffice becoming a fork of OpenOffice. The first release of LibreOffice came in 2011. By 2012, TDF was registered as an organization in Germany..."

                                                            IT - Java
                                                            x
                                                            Oracle Bets Java EE Future On Rest APIs
                                                            Javaworld, February 2nd, 2017
                                                            "Oracle is banking on REST and JSON to modernize Java EE for microservices and the cloud.

                                                            It may seem like ages since REST stole thunder from SOAP as a mechanism for providing web services communications. REST, in conjunction with JSON and HTTP, proved a far simpler means for delivering web services than SOAP, which has long been criticized for complexity.

                                                            Fast-forward to the present, and Oracle is now positioning REST and JSON as critical cogs in its Java EE upgrade plans. The company began retooling Java EE for microservices and cloud platforms last year, after community protests that Oracle had been neglecting the enterprise platform. The initial result of those plans, Java EE 8, is due this October..."

                                                            IT - Developer
                                                            x
                                                            4 Trends In 2017 That Every Developer Needs To Understand
                                                            InformationWeek, February 3rd, 2017
                                                            "Developers need to be ready for the opportunities that quantum computing, big data, and mixed reality might bring to all computing sectors, including commercial computing, in 2017.

                                                            2017 takes us one step closer to a future articulated in classic and influential science fiction (such as the Jetsons). Artificial intelligence, virtual reality, and quantum computing teeter on the brink of mainstream. As a coding instructor and curriculum designer I spend a lot of time thinking about where the tech industry is headed, to prepare my students for that new world. Here are several trends I think will dominate software development in 2017..."

                                                            Nexenta News
                                                            x
                                                            Leading Global Cloud Service Provider Deploys Market-Leading Nexenta Open Software-Defined Storage Solutions on Western Digital All Flash Platform
                                                            Peak 10 Achieves 35% Lower TCO while Providing Higher Performance, Simplified Management, and Increased Agility
                                                            Nexenta, the global leader in Open Source-driven Software-Defined Storage (OpenSDS), announced, in conjunction with the release of IDC's Buyer Case Study, that Peak 10 (@Peak_Ten), a national IT infrastructure, connectivity and cloud service provider, selected the NexentaStor and Western Digital InfiniFlash platform storage solution. This decision has enabled Peak 10 to future-proof their Disaster Recovery-as-a-Service (DRaaS) offerings and provide an economic, agile, and flexible solution to their customers...
                                                            Cisco News
                                                            x
                                                            Cisco 2017 Annual Cybersecurity Report: Chief Security Officers Reveal True Cost of Breaches and the Actions Organizations are Taking
                                                            On 10th anniversary of report, classic attack vectors re-emerge; Cisco reduces 'Time to Detection' to six hours
                                                            According to the Cisco 2017 Annual Cybersecurity Report (ACR), over one-third of organizations that experienced a breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent.

                                                            Ninety percent of these organizations are improving threat defense technologies and processes after attacks by separating IT and security functions (38 percent), increasing security awareness training for employees (38 percent), and implementing risk mitigation techniques (37 percent).

                                                            The report surveyed nearly 3,000 chief security officers (CSOs) and security operations leaders from 13 countries in the Security Capabilities Benchmark Study, part of the Cisco ACR.

                                                            Cisco Tetration Analytics Secures Business Applications and Delivers New Deployment Options
                                                            Tetration Analytics provides consistent and holistic policy enforcement
                                                            Cisco announced that Cisco Tetration Analytics now automates policy enforcement, enabling organizations to build secure environments for their business applications and also expands Tetration with new deployment options. Building on Tetration's original discovery and visibility capabilities, Cisco's latest software for Tetration Analytics now provides the industry's first consistent security policy enforcement applied holistically across each application.

                                                            Policy is enforced regardless of where the application resides: virtual, bare metal, physical servers, or in private or public clouds, across any vendor's infrastructure. This new enforcement model binds policies to workload characteristics and behaviors while ensuring that the policy stays intact even as the workload moves..."

                                                            Cisco Introduces New Innovations for Digital Buildings: Sinclair Sets the Bar by Using Cisco Digital Building Series Switch in Marriott Hotel
                                                            Sinclair Sets the Bar by Using Cisco Digital Building Series Switch in Marriott Hotel
                                                            What if the next time you walk into a store to buy your favorite brand of shampoo, the floor literally lights up and shows you the way? Or you enter a shared office space, and the room simply 'knows' who you are and adjusts the lights and temperature to your liking?

                                                            Businesses want to set the bar with innovation. They want to outsmart the competition. And they want to inspire their customers and employees. They also want to get it done fast and without breaking the bank. Digital transformation not only creates better experiences for workers and guests, but saves money and energy. To make it happen, a multitude of systems that control everything from badge swipes to lighting and air conditioning must work together as if they were one. And it must be secure.

                                                              Dell News
                                                              x
                                                              SecureWorks Drives Managed Security Services Market with Managed Detection and Response Solutions that Slash Time to Identify and Combat Threats
                                                              Dell, January 31st, 2017
                                                              SecureWorks Corp. is leveraging its real-time visibility, advanced threat detection, and incident response capabilities to provide cutting-edge Managed Detection and Response (MDR) solutions to reduce the time it takes to identify, contain and eradicate cyber-threats.

                                                              Since 2013, SecureWorks has been leading the charge amongst managed security service providers (MSSPs) to deliver advanced threat services to clients leveraging multiple styles of advanced threat defense. Backed by the latest threat intelligence and the expertise of the SecureWorks Counter Threat Unit (CTU) research team, SecureWorks' Managed Detection and Response solutions can proactively detect and disrupt malicious activity and help a client reduce the time it takes to evict threat actors from their environment. Fast detection and response is critical since the longer a threat actor is in an environment, the higher the costs and damage.

                                                              Microsoft News
                                                              x
                                                              Stopping Cyberthreats in a new era
                                                              Microsoft, February 2nd, 2017
                                                              Microsoft blogs, "The explosive growth in the scale and sophistication of cyberthreats is remaking the security landscape. Today, it's not a matter of if your organization's data will be compromised, but a matter of when. Having a proactive protection strategy that includes pre- and post-breach components is critical to addressing advanced attacks.

                                                              Fortunately, Windows 10 has comprehensive pre-breach solutions and with Windows Defender Advanced Threat Protection (ATP) we added a post-breach layer to the Windows Security stack. And the best part? Windows Defender ATP is built in to Windows 10 and designed to provide the best performance experience on your machine. It doesn't require any additional software deployment and management..."

                                                              Symantec News
                                                              x
                                                              Symantec and Norton Security Solutions Win Prestigious 'Best Protection' Award from AV-TEST Institute
                                                              Innovative endpoint solutions achieve highest protection scores in consecutive years
                                                              Symantec Corp. announced that Symantec Endpoint Protection and Norton Security won AV-TEST Institute's "Best Protection Award 2016" in consecutive years for its industry-leading capabilities to stop sophisticated cyberattacks. Symantec is the first company to win this prestigious award in both the Business and Consumer categories two years in a row.

                                                              AV-TEST, globally recognized for its rigorous independent testing practices, evaluates the efficacy of endpoint security solutions against advanced attacks throughout the year. Security solutions are subjected to more than 1,000 live zero-day attacks delivered via infected websites and e-mail to measure a product's complete protection ability. In addition, AV-TEST measures the security solution's detection of more than 100,000 current and widespread threats.

                                                              Symantec Reports Third Quarter Fiscal Year 2017 Results
                                                              Q3 GAAP revenue met, GAAP operating margin and EPS exceeded prior guidance; Q3 Non-GAAP revenue, operating margin, and EPS exceeded prior guidance on constant currency basis
                                                              Symantec Corp. reported its third quarter of fiscal year 2017 results, ended December 30, 2016.

                                                              Greg Clark, Symantec CEO, said, "We're very pleased by our third quarter performance as it shows clear evidence that Symantec's transformation is producing results and delivering innovation to our customers in the cloud generation. Our Integrated Cyber Defense Platform is resonating with enterprise customers and we closed important wins that underscore the unmatched value of our threat intelligence and the depth of our cloud security stack. We expect to see new momentum in our consumer business with the release of Norton Core, a favorite at CES this year. When joined with LifeLock, we will have created a new Digital Safety Platform to protect consumers' digital lives and identities."

                                                              IBM News
                                                              x
                                                              IBM Closes Acquisition of Agile 3 Solutions
                                                              Will be 'Agile 3 Solutions, an IBM Company'
                                                              Security announced it has completed the acquisition of Agile 3 Solutions. The software is used by the C-Suite and senior executives to better visualize, understand and manage risks associated with the protection of sensitive data. IBM Security had previously announced it had entered into a definitive agreement to acquire Agile 3 Solutions. Financial terms were not disclosed.

                                                              The company, now known as Agile 3 Solutions, an IBM Company, joins the IBM Security business unit and will be part of the IBM Data Security Services portfolio of offerings. The acquisition also builds on the growth of IBM's end-to-end Guardium data security and protection platform, which helps to analyze the risk associated with sensitive data, monitor and protect sensitive data at rest, and in motion.

                                                              IBM and United Airlines Collaborate on Enterprise iOS Apps to Transform Travel Experience
                                                              IBM MobileFirst for iOS apps will help digitally transform the mobile landscape for United's employees for the benefit of their customers and harness the power of iPhone and iPad
                                                              IBM and United Airlines announced a collaboration to deliver a robust suite of enterprise iOS apps, unleashing the power of the more than 50,000 iOS devices in the hands of the airline's front-line employees. As part of IBM and Apple's global partnership to redefine the way work gets done, these made-for-business apps will be powered by analytics and customized to further drive the airline's digital transformation, enhancing how United serves its customers.

                                                              Over the past several years, United has increasingly sought to untether its global workforce by putting the unique capabilities of iPhone and iPad in the hands of employees. This collaboration will further heighten that strategy, with IBM set to develop a suite of IBM MobileFirst for iOS apps - both market ready and custom iOS apps - for the airline's growing deployment of iOS devices...

                                                              H&R Block with IBM Watson Reinventing Tax Preparation
                                                              From the Cloud to the Tax Desk, Watson to Help Tax Pros Maximize Tax Outcomes
                                                              H&R Block, Inc. is reinventing the category it founded more than 60 years ago by introducing a new, exclusive, consumer-facing experience that incorporates IBM Watson. The technology will be used by H&R Block's tax professionals this tax season to help deliver the best outcome for each unique tax situation, while helping clients better understand how different filing options can impact their tax outcome.
                                                              Jupiter Medical Center Implements Revolutionary Watson for Oncology to Help Oncologists Make Data-Driven Cancer Treatment Decisions
                                                              Jupiter Medical Center is first community hospital in U.S. to adopt IBM Watson for Oncology technology, which is now available for breast, lung, colorectal, gastric, cervical and ovarian cancers
                                                              IBM and Jupiter Medical Center announced that Jupiter will adopt Watson for Oncology trained by Memorial Sloan Kettering, a cognitive computing platform to provide insights to physicians to help them deliver personalized, evidence-based cancer treatment. Jupiter is the first U.S. community hospital to adopt Watson for Oncology, which will go live at the facility in the beginning of March.

                                                              In the U.S., there will be an estimated 1.7M new cancer cases this year, with 125,000 in Florida alone. As healthcare providers and systems seek to enable data-driven, evidence-based cancer care, an explosion of medical information has created both challenges and opportunities to improve quality care. Currently, approximately 50,000 oncology research papers are published annually, and by 2020 medical information is projected to double every 73 days, outpacing the ability of humans to keep up with the proliferation of medical knowledge.

                                                              IBM: Your Computer Can Help Scientists Search for New Childhood Cancer Treatments
                                                              Researchers in Japan, Hong Kong and U.S. launch crowdsourced research effort using IBM's World Community Grid
                                                              Medical researchers and IBM are asking for the public's help in finding prospective treatments for childhood cancers.

                                                              Scientists are searching for chemical drug candidates that can affect the key molecules and proteins that control cancer cells in several common childhood cancers. However, finding drug candidates is normally an expensive and slow process.

                                                              To accelerate the process and broaden the search, IBM is providing those scientists with free access to World Community Grid, an IBM-funded and managed program that advances scientific research by harnessing computing power 'donated' by volunteers around the globe. This resource is the equivalent of a virtual supercomputer that helps enable scientists to more quickly conduct millions of virtual experiments. These experiments aim to pinpoint promising drug candidates for further study.

                                                              Fujitsu News
                                                              x
                                                              Fujitsu Reports Fiscal 2016 Third-Quarter Financial Results
                                                              Momentum continued in domestic Technology Solutions, and cost reductions and efficiencies improved results in Ubiquitous Solutions
                                                              Fujitsu reported a profit for the third quarter attributable to owners of the parent of 20.3 billion yen, representing an improvement of 15.0 billion yen compared to the third quarter of fiscal 2015.

                                                              Consolidated revenue for the third quarter of fiscal 2016 was 1,115.4 billion yen, down 51.4 billion yen from the third quarter of fiscal 2015, but was essentially unchanged on a constant-currency basis. Revenue in Japan rose 3.5%. Revenue in the Services sub-segment increased, primarily from system integration business, and revenue from network products also rose. On the other hand, revenue outside of Japan decreased 15.0%. Results were significantly impacted by foreign exchange movements, and, in addition, there was a decline in revenue from infrastructure services in Europe. Compared to the same period in the prior fiscal year, the appreciation of the yen against the US dollar, the British pound, and other currencies served to reduce revenue by roughly 60.0 billion yen.

                                                              VMware News
                                                              x
                                                              VMware NSX Network Virtualization Platform Enables Businesses to Accelerate Digital Transformation
                                                              VMware NSX for vSphere 6.3 advances security, automation and application continuity; VMware NSX-T 1.1 expands support for new application frameworks and architectures
                                                              VMware, Inc. announced new releases of the VMware NSX network virtualization platform to meet the diverse and evolving needs of both IT and developers. With the release of VMware NSX for vSphere 6.3 and VMware NSX-T 1.1, VMware is advancing support for the most critical IT use cases -- automation, security and application continuity -- while offering development organizations an agile software-defined infrastructure to build-out cloud-native application environments.

                                                              With more than 2,400 customers, VMware NSX delivers networking and security focused on the application independent of the underlying infrastructure.

                                                              Red Hat News
                                                              x
                                                              Friday Five - February 3, 2017
                                                              Red Hat, February 3rd, 2017
                                                              The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.

                                                              • Nextgov - Creating a More Secure and High-Quality Open-Source Supply Chain
                                                              • Red Hat and Boston University Collaborate to Advance Emerging Technologies and Open Source Research and Education
                                                              • Red Hat Assists Monash University with Deployment of Software-Defined Storage to Support Advanced Research Capabilities
                                                              • Red Hat Technologies Support TransUnion's Migration to New IT Environment
                                                              • European Bioinformatics Institute and Red Hat Collaborate to Enhance Global Biological Research Capabilities

                                                              Read on for details.

                                                              Red Hat and Boston University Collaborate to Advance Emerging Technologies and Open Source Research and Education
                                                              Red Hat plans five-year, $5 million commitment to Boston University's Cloud Computing Initiative to advance research on cloud computing, machine learning and automation, and big data
                                                              Red Hat announced a collaborative research and education agreement with Boston University (BU), an internationally recognized institution of higher education and research, to advance research and education on open source and emerging technologies, including cloud computing, machine learning and automation, and big data. Via the five-year agreement, Red Hat plans a broad educational and research collaboration with BU with grants totaling $5 million administered by BU's Cloud Computing Initiative.
                                                              European Bioinformatics Institute and Red Hat Collaborate to Enhance Global Biological Research Capabilities
                                                              Collaborative big data cloud solution, Embassy Cloud, enabled by Red Hat OpenStack Platform
                                                              Red Hat, Inc. announced that the European Bioinformatics Institute (EMBL-EBI), part of the European Molecular Biology Laboratory, is using Red Hat OpenStack Platform to deliver the scale and flexibility required to drive its Embassy Cloud project. The goal of Embassy Cloud is to transform the way collaborative research, such as pan-cancer analysis, tackles the world's toughest biological challenges.

                                                              EMBL-EBI provides freely available data from life science experiments to researchers worldwide. On average per day, there are more than 16 million requests to use data on its websites. EMBL-EBI actively encourages collaboration, inspires new research and provides advanced bioinformatics training to scientists at all levels. Increasingly, it is working to provide a common IT infrastructure on which research organizations of all sizes can work.

                                                              Red Hat Assists Monash University with Deployment of Software-Defined Storage to Support Advanced Research Capabilities
                                                              Leading science and technology research institution selects Red Hat Ceph Storage to support five-petabyte storage cluster
                                                              Red Hat announced that Monash University, one of Australia's most prestigious research universities, has implemented a massive multi-petabyte deployment on Red Hat Ceph Storage.

                                                              Founded in 1958, Monash University was established to create a science and technology-focused research institution. Almost 60 years later, Monash is Australia's largest university, and now includes a curriculum that spans multiple disciplines and across five international campuses. The University's eResearch Centre fosters international collaboration and advanced research of both fundamental and applied sciences, with an emphasis on imaging and data science. Eventually, the critical need to manage a continually growing pool of research data collided with the prohibitively huge investment presented by its previously deployed proprietary hardware solutions, leaving the University at a crossroads.

                                                              Monash University selected Red Hat to implement a software-defined solution using Red Hat Ceph Storage on Dell EMC PowerEdge R630 and R730xd rack servers that can accelerate application performance, simplify systems management and address workloads at any level. Using Red Hat Ceph Storage as an object store, Monash projects that its software-defined storage solution will significantly reduce costs and give researchers the freedom to independently and incrementally add capacity and performance for future growth.

                                                              Level3 News
                                                              x
                                                              Level 3 Publishes the First Information Security Index in Brazil
                                                              New Level 3 Security Index by Leading Analyst Firm Reveals 61 Percent of Companies Believe Few Professionals are Qualified To Use the Tools Available To Certify Information Security in a Company
                                                              Level 3 Communications is sharing the results of the Level 3 Security Index, a study conducted by leading analyst firm IDC to identify the information security and corporate IT infrastructure maturity of Brazilian organizations. In the Level 3-sponsored study, Brazil received an overall score of 64.9 points out of a possible total of 100 points.

                                                              Key Findings:

                                                              • On average, companies in Brazil have two professionals dedicated to information security.
                                                              • About 57 percent of interviewed organizations already use Managed Security Services (MSS) as a response to the lack of qualified professionals.
                                                              • Approximately 25 percent of companies cannot measure the impacts stemming from incidents related to information security.
                                                              • Only 42 percent of organizations claim to practice and generate metrics on the compliance of their information security policies.

                                                              The report researched four topics: Awareness, Tools, Prevention, Mitigation.

                                                              HP News
                                                              x
                                                              HPE Acquires Niara to Enhance Security at the Intelligent Edge
                                                              Advances HPEs strategy for transforming workplace and operational experiences for mobile and IoT devices
                                                              Hewlett Packard Enterprise (NYSE:HPE) announced it has acquired Niara Inc., a Sunnyvale, California-based leader in the emerging User and Entity Behavior Analytics (UEBA) security market segment. Niara will operate within HPE Aruba to enhance the company's ClearPass network security portfolio for wired and wireless network infrastructure. Terms of the transaction were not disclosed.

                                                              "With this transaction, we are continuing to innovate at the Intelligent Edge with software-defined solutions to better protect our customers' business and IoT data," said Keerti Melkote, Senior Vice President and General Manager, HPE Aruba. "With over 20 billion IoT devices expected to be connected to networks by 2020, security is the number one concern for our customers. Combining Niara's next-generation behavior analytics software with Aruba's ClearPass network security portfolio will deliver the industry's most complete visibility and attack detection system."

                                                              Comcast News
                                                              x
                                                              Shields Health Care Group Keeps Network Healthy With Comcast Business
                                                              Leading Healthcare and Imaging Provider Relies on Agile Ethernet and Internet Services to Improve Performance and Reduce Costs to Better Assist Patients and Providers
                                                              Comcast Business announced that Shields Health Care Group, the leading provider of MRI, PET/CT and radiation therapy services in New England, is using Comcast Business Ethernet and Internet at its 36 locations throughout Massachusetts, New Hampshire and Maine. The performance and reliability of the Comcast infrastructure allows radiologists to share large imaging files quickly across offices for fast diagnoses and patient service...
                                                              F5 News
                                                              x
                                                              F5 Networks Appoints Francois Locoh-Donou as President and CEO
                                                              John McAdam, longtime leader, to remain on F5 Board of Directors
                                                              F5 Networks announced that Francois Locoh-Donou has been named the company's President and Chief Executive Officer and a member of F5's Board of Directors, effective April 3, 2017.

                                                              Locoh-Donou succeeds current President and CEO, John McAdam, who will remain a Director on F5's Board upon his retirement on April 3, 2017. Since McAdam joined in 2000, he has led F5 to $2.0 billion in annual revenue, with 49 of the Fortune 50 as customers, and numerous industry and community awards.

                                                              Netapp News
                                                              x
                                                              New NetApp All-Flash Innovations Improve Data Center Economics
                                                              Provider of world's fastest and most efficient cloud-connected enterprise storage delivers breakthrough performance with new all-flash array, announces industry best storage capacity guarantee
                                                              NetApp introduced the industry's top- performing enterprise all-flash array and a new efficiency guarantee that give customers performance without compromise to meet the demands of the data-powered digital era.

                                                              The new NetApp All Flash FAS (AFF) A700s array delivers breakthrough performance in a compact form factor to modernize IT for demanding enterprise applications, analytic workloads and cloud integration. Customers can dramatically shrink data center footprint and power and cooling costs due to the extreme flash density and industry-leading storage efficiencies. NetApp also announced a new All-Flash Guarantee that ensures up to 5X storage savings, depending on workload, giving customers confidence they will achieve the capacity and efficiency that are promised.

                                                              Aerohive Networks News
                                                              x
                                                              New Aerohive Connect Product Line Offers Adaptable, Scalable, and Affordable Connectivity
                                                              Enterprise-Class Wi-Fi Starting at $229 per Access Point
                                                              Aerohive Networks, the fastest growing enterprise Wi-Fi vendor, announced the introduction of Aerohive Connect, a new cloud networking solution that delivers enterprise connectivity and centralized management starting at $229 per access point. Aerohive Connect is built on the power of cloud networking, Aerohive's unique Cooperative Control Wi-Fi architecture, and access to the industry's best customer support. Connect allows organizations to grow as they go, simplify their network operations, and effortlessly upgrade to the full suite of Aerohive solutions as their needs change.

                                                              As part of the new Connect offering, Aerohive also announced the launch of the AP122, a new enterprise-grade 802.11ac access point. Aerohive Connect and the AP122 are available immediately.

                                                              Druva News
                                                              x
                                                              New Year's resolutions for 2017: storage, cloud and compliance
                                                              By Jaspreet Singh, CEO at Druva
                                                              Resolution #1 - check that you know where all your data is getting stored

                                                              Storing data is getting more complex again. The growth of cloud applications like Office365 means that more data is getting stored in the cloud rather than on centralised storage platforms. At the same time, more users are working from their mobiles, tablets and laptops rather than corporate PCs.

                                                              The upshot of all this is that more data is moving outside the enterprise - Gartner and IDC have both predicted that more than 50% of all enterprise data will be reside exclusively on endpoint devices by 2020.

                                                              Citrix News
                                                              x
                                                              Citrix Completes Spin-Off and Merger of GoTo Family of Service Offerings with LogMeIn
                                                              Citix, February 1st, 2017
                                                              Citrix Systems announced that it has completed the spin-off and merger of its GoTo family of service offerings with LogMeIn, Inc. (Nasdaq: LOGM). As a result of these transactions, in addition to retaining the shares of Citrix common stock they currently own, Citrix stockholders will receive approximately 0.1718 of a share of LogMeIn common stock for each share of Citrix common stock that they owned of record as of January 20, 2017. No fractional shares of LogMeIn will be issued, and Citrix stockholders will instead receive cash in lieu of any fractional shares. No action is required by Citrix stockholders to receive their shares of LogMeIn common stock in the merger.
                                                              Commvault News
                                                              x
                                                              Leading The Way In Backup And Recovery...
                                                              Highest Ability To Execute, Furthest In Completeness Of Vision - Two Great Reasons To Get To Know Us
                                                              The Gartner Magic Quadrant for Data Center Backup and Recovery Software is the definitive independent ranking. For the sixth straight year, Commvault has been named a leader. And this year we're furthest on the 'completeness of vision' and highest on the 'ability to execute.'

                                                              In a competitive environment mired with mergers and divestitures, Commvault is a consistent and reliable choice. If you aren't already familiar with us, the time is now.

                                                              Enter your email address here to receive an instant link to download your complimentary copy of the full Gartner report

                                                              ExaGrid News
                                                              x
                                                              We're building a wall and the over-30TB market is going to pay for it
                                                              ExaGrid CEO Bill Andrews on backup's major players
                                                              After our relatively crude attempt to segment the backup market, ExaGrid CEO Bill Andrews got in touch wanting to talk about their way of divvying up the market. What he described seemed a neat enough way of doing it, and far better than our three-group attempt.

                                                              Bill is a say-it-as-he-sees-it guy who deals with backup, not digital transformation, IT agility, cognitive IT nor any other buzzword-driven marketing abstractions. Read what he says and see if his refreshing, cant-free views strike a chord with you...

                                                              Juniper News
                                                              x
                                                              Juniper Networks Introduces Unite Cloud for the Data Center to Simplify Hybrid, Multi-Cloud Environments
                                                              The Addition to Juniper Networks Unite Brings New Offerings for Advanced Automation, Scalability and Ease of Deployment
                                                              Juniper Networks, an industry leader in automated, scalable and secure networks, announced Juniper Networks Unite Cloud, a transformative data center framework that gives enterprises the end-to-end solutions to simplify the creation and management of hybrid, multi-cloud environments. As part of Juniper Networks Unite, a secure, agile enterprise architecture, Unite Cloud is designed to reduce the total cost of ownership while increasing long-term return on investments. In addition to Juniper's existing comprehensive data center solutions, Unite Cloud also includes an enhanced Junos Space Network Director management application that leverages advanced automation to analyze and control data centers, the new Juniper Networks QFX5110 switch with 100 Gigabit (GB) capabilities to scale with evolving bandwidth demands, and the new Juniper Networks Contrail JumpStart service offerings that help enterprises rapidly deploy technologies at lower risk to embrace the cloud seamlessly.
                                                              Tokyo Stock Exchange Selects Juniper Networks for Extensive Trading Platform Upgrade
                                                              The MX480 3D Universal Edge Router Increases Performance, Agility and Stability, while Significantly Improving Efficiency and Reducing Costs
                                                              Juniper Networks, an industry leader in automated, scalable and secure networks, announced that Tokyo Stock Exchange, Inc. (TSE) has chosen the Juniper Networks MX480 3D Universal Edge Router for an extensive upgrade of 'arrownet v2', the network platform responsible for its proprietary trading system 'arrowhead'.

                                                              As one of the world's top stock exchanges and the largest in Asia, building and maintaining a cutting-edge network featuring world-class reliability and performance has always been key for TSE. As technology evolves alongside rapidly changing customer needs, TSE required an upgraded, innovative network infrastructure with the ability to integrate across all financial trading in Japan, which Juniper is able to provide...

                                                              Mellanox News
                                                              x
                                                              Mellanox Introduces Data Center Packet Processing Platform Based on Company's New Indigo Network Processor
                                                              Cost Effective and Scalable Security and Network Applications in Data Centers
                                                              Mellanox Technologies, Ltd., a leading supplier of high-performance, end-to-end smart interconnect solutions for data center servers and storage systems, today announced the IDG4400 Flex Network platform based on Indigo, Mellanox's newest network processor (previously known as NPS-400).

                                                              The Indigo high-end network processor is capable of sophisticated packet processing combined with unprecedented performance. Indigo's L2-L7 packet processing solution offers powerful capabilities positioning it to become a world-leading platform for a wide range of applications, including router-type functions, intrusion prevention and detection, application recognition, firewall, DDoS prevention and more. Indigo hardware acceleration features, coupled with powerful software libraries, have demonstrated stateful packet processing at record rates of 500Gb/s and deep packet inspection (DPI) at 320Gb/s over millions of flows; 20 times higher versus other offerings at this scale.

                                                              Nutanix News
                                                              x
                                                              Nutanix Announces Third Annual .NEXT Conference for Enterprise Cloud Professionals
                                                              Prominent Chief Executives and Thought Leaders to Share Insight into Enterprise Cloud and Datacenter Infrastructure Innovation
                                                              Nutanix, a leader in enterprise cloud computing, announced .NEXT Conference 2017, the company's third annual user conference dedicated to innovation in enterprise cloud and datacenter technologies. The event will take place June 28-30, 2017 at the Gaylord National Resort and Convention Center in the Washington, D.C. metro area.

                                                              .NEXT 2017 attendees will gain strategic advice in designing next-generation datacenter infrastructure, as well as learn proven best practices for building and operating enterprise clouds. In addition to more than 60 technical and vision sessions, attendees can also get on-site training for the Nutanix Enterprise Cloud Platform and its broad technology ecosystem, as well as network with thousands of industry leaders and Nutanix experts...

                                                              Palo Alto Networks News
                                                              x
                                                              Palo Alto Networks Honored as Coolest Cloud Vendor by CRN
                                                              Palo Alto Networks, February 2nd, 2017
                                                              Palo Alto Networks, the next-generation security company, announced today that CRN, a brand of The Channel Company, has named Palo Alto Networks to its 100 Coolest Cloud Computing Vendors of 2017 list. This annual lineup recognizes the most innovative cloud technology suppliers in each of five categories: infrastructure, platforms and development, security, storage, and software.

                                                              The Palo Alto Networks Next-Generation Security Platform, a natively integrated and highly automated platform designed to safely enable applications and prevent cyber breaches, is an integral innovation in solving the cloud security conundrum that many customers face today. With support for a range of deployment approaches, including public, private or hybrid cloud, and by integrating into such cloud environments as Microsoft Azure, Amazon Web Services, Microsoft Hyper-V, VMware NSX, ESXi, and KVM with OpenStack, the platform enables organizations to move data and applications to any cloud deployment while ensuring applications and data are secure - no matter where the data resides.

                                                              SuperMicro News
                                                              x
                                                              Supermicro Introduces Latest SUPERO Desktop and Gaming Solutions at CES 2017
                                                              Wide New Range of 7th Generation Intel Core processor-based Motherboards and Systems
                                                              Super Micro Computer, Inc., a global leader in compute, storage, and networking technologies and green computing is introducing an extensive range of next-generation desktop and gaming motherboards and solutions during CES 2017 in the Bellagio Hotel, Penthouse Suite 31063.

                                                              Fueled by the latest 7th generation Intel Core processor (formerly Kaby Lake) innovations, the new range of motherboard products come with Z270, H270, Q270, as well as the most cost-effective B250 chipsets. Relying on decades of expertise in designing professional server and storage solutions, these SuperO motherboards are equipped with a rich set of features optimized for users ranging from SOHO customers to the most demanding BYOC gamers and PC enthusiasts with the following series:

                                                              Zerto News
                                                              x
                                                              Law Firms Break Silence to Beat Cybercrime and Mitigate Cloud Risk
                                                              Databarracks and Zerto Reveal Findings of Legal Industry IT Roundtable
                                                              Databarracks, a provider of award winning business continuity services, and Zerto, a leading provider of IT resilience solutions, today announced the findings from a legal industry IT roundtable on the challenges of cloud and dangers of cybercrime.

                                                              Discussions revealed the legal sector has been cautious to engage in peer experience exchanges regarding cyberattacks such as ransomware, despite the success mitigating attacks seen by leading financial institutions that have adopted this approach. It was suggested that the lack of inter-firm communication has allowed hacking groups to repeat tactics within the legal industry that could have been prevented if law firms had shared their knowledge gained from previous attacks or attempted attacks.

                                                              Ubuntu News
                                                              x
                                                              Cloud Chatter: January 2017
                                                              By James Donner
                                                              Jame writes, "Welcome to the first edition of 2017. In this issue we showcase what you can expect from us and invite you to meet with us at Mobile World Congress if you're planning to be in Barcelona. We share our latest eBook on server provisioning and what Network Admins and IT Pros need to know to get ahead of the curve. Read on for informative webinars, videos/tutorials and our involvement at upcoming events. As always we conclude with a roundup of industry news..."
                                                                Trending in
                                                                Vol 232, Issue 2
                                                                Trending IT Articles