Archive for the ‘ Oracle ’ Category


I am not a normal person. I run on Linux.

Written by admin
August 11th, 2012

An introduction to a new Linux blogger at Network World.

When big companies (and small ones) talk about their “target demographic” – they are never talking about Bryan Lunduke.

When video game companies want to make a hit video game, they never think “what would Bryan play?” I don’t really like things being in 3D. Good old 2D is more my cup of tea. And, if I’m being honest, I prefer lower-resolution games – the more pixilated the better. And words. I like my games to require me to do an inordinate amount of reading.

When was the last time you saw a platinum-selling video game with a resolution of 300×200 that required you to read a few novels-worth of prose just to get through the opening sequence? I am not the average gamer. And I’m okay with that.
Cisco CCNA Training, Cisco CCNA Certification
Best Oracle Certification Training and Oracle Exams Training
and more Cisco exams log in to Certkingdom.com

 

 
This applies to computers – including desktop environments and applications – almost more so.

The major OS companies of the world (the Microsofts, Apples, Googles, etc.) are not building their systems for me. And there are two key reasons for that.

The first is due to what I do with my computers. The second is… how.

Nowadays, most people live in a web browser. And that web browser is full-screen. This makes total sense – the vast majority of communication and work (that most people do) can be done inside a browser. And if you’re spending time in just one application, why not let it make use of every possible pixel you’ve got?

All of which means that there is an increased emphasis on browsing and web-based apps running full-screen (such as in Google’s ChromeOS and Windows 8). For most people this is…logical.

However, I am not most people. Right now I don’t even have a web browser open. I make indie video games (with nice pixilated graphics), programming tools, comic strips and comic books. All of which is damned near impossible to do in a web browser.

Truth be told, I spend most of my day in text editors, terminals and graphic design tools. My email is handled by a desktop client, not a web interface. Heck, I even read most of my websites through desktop RSS readers instead of loading up a browser.

And I don’t like things full screen.

I like my desktop environments to be highly configurable (weird, right?), light-weight and fast as lightning. Truth be told, I also couldn’t care less if my desktop was easy for someone else to learn to use or not. Right now, that means I’m running xmonad – and loving every second of it.

All of that is a rather long way of saying “Hi. My name is Bryan. I run, and make my living, on Linux. And I’ll be writing here now.”

Cisco CCNA Training, Cisco CCNA Certification
Best Oracle Certification Training and Oracle Exams Training
and more Cisco exams log in to Certkingdom.com

Online MCTS And MCITP Free Training

Written by katarnawikiera@gmail.com
June 4th, 2012

Microsoft MCTS Exams 70-642 Knowledge

 

Information Technology industry could be said to be entering in the forth wave, previous generation focused on speed, navigation, now the IT industry demands on security, reliability, and performance. The internet has become today’s single most important business platform, enabling connectivity to the entire IT major solutions providers, including Microsoft, Cisco, CompTIA, IBM, HP, Avaya, your are all well aware that a major problem in the IT industry is that there is a lack of quality here, we now turn to looking at larger issues and strategy required to enable companies to manage there business.

 

Our Certification Microsoft MCTS Exams Preparation Materials provide you everything you will need to take a certification examination.

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

===============================================================================================

This Microsoft Certification is created and designed for information technology (IT) professionals who work in the complex computing environment of medium-sized to large companies and who also plan to take the Microsoft Certified Technology Specialist (MCTS) 70-642 exam. We assume that before you begin using this kit you have a solid foundation-level understanding of Microsoft Windows server operating systems and common Internet technologies.
What you will learning in 70-642 Exams:

■ Configure IP addressing, routing, and IPsec

■ Configure name resolution using Domain Name System (DNS)

■ Configure remote and wireless network access

■ Configure Network Access Protection (NAP)

■ Configure file and print services

■ Monitor and manage a network infrastructure

 

Details are researched and produced by Certification Experts who are constantly using industry experience to produce precise, logical and verified explanations for the answers.

 

You may get questions from different web sites or books, but logic is the key. Microsoft MCTS Exam Preparation from certkingdom include: Comprehensive MCTS brain dumps questions with complete details Detailed explanations of all the questions (when available) Questions accompanied by exhibits Verified Answers Researched by Industry Experts Drag and Drop questions as experienced in the MCTS study guides and Actual Exams Questions updated on regular basis These questions and answers are backed by our GUARANTEE. Like actual certification exams our product is in multiple-choice questions (MCQs). Our Microsoft MCTS Exam will provide you with exam questions and verified answers that reflect the actual exam.

 

Most of the training tools require two computers or virtual machines running Windows Server 2008 using the default settings. “Protecting Network Traffic with IPSec,” require a third such computer or virtual machine.) All lab computers must be physically connected to the same network for most lessons. However, some lessons will describe different network configurations. We recommend that you use an isolated network that is not part of your production network to perform the practice exercises in this training.

To minimize the time and expense of configuring physical computers, we recommend that you use virtual machines for the computers. To run computers as virtual machines within Windows, you can use Virtual PC 2007, Virtual Server 2005 R2, Hyper-V, or third-party virtual machine software.

 

Make use of the Testing Engines that are available, as well as the free Webcasts. Practice test material is just for that… PRACTICE. It may help you pass the test but believe me you will only last one day in a job if you don’t know what you are doing, so if you use practice material, read the question and if you don’t know the answer, research it and learn it, don’t just memorize the answer….I will tell you right now that their answers are not always right.

 

If your ready for career change and looking for Microsoft MCTS Training, Microsoft MCITP Training or any other Microsoft Certification preparation get the best online training from Certkingdom.com they offer all Microsoft, Cisco, Comptia certification exams training in just one Unlimited Life Time Access Pack, included self study training kits including, Q&A, Study Guides, Testing Engines, Videos, Audio, Preparation Labs for over 2000+ exams, save your money on boot camps, training institutes, It’s also save your traveling and time. All training materials are “Guaranteed” to pass your exams and get you certified on the fist attempt, due to best training they become no1 site 2012.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

===============================================================================================
About The Author

Hi I educated in the U.K. with working experienced for 5 years in multinational companies, As an IT Manager and IT Instructor, I am attached with certkingdom.com here they provide IT exams study material, the study materials included exams Q&A with Explanation, Testing Engine, Study Guides, Training Labs, Exams Simulations, Training Videos, Audio Exams Training, etc. for certification like MCTS Training, MCITP MCTS, MCSD, MCSA, MCSE  Training, CCNA exams preparation, CompTIA A+ Training, and more Certkingdom.com provide you the best training 100% guarantee. “Best Material Great Results”
My Specialties

I’ve worked with a lot of technologies, but these are where my focus has been in recent years:

* Microsoft SQL Server (particularly high availability and disaster recovery)

* VMWare Virtualization

* Oracle (yes, Oracle, I’ve worked on 7-11)

* Microsoft Clustering

* Red Hat Linux (I can still write shell scripts)

Online Free MCTS and MCITP Training

Written by katarnawikiera@gmail.com
June 4th, 2012

Learning Microsoft MCTS 70-516 Exam

Microsoft certification exams are a great way to build your resume and let the world know about your level of expertise. Certification exams validate your on-the-job experience and product knowledge. While there is no substitution for on-the-job experience, preparation through study and hands-on practice can help you prepare for the exam. We recommend that you round out your exam preparation plan by using a combination of available study materials and courses. For example, you might use the Training kit and another study guide

for your “at home” preparation, and take a Microsoft Official Curriculum course for the classroom experience. Choose the combination that you think works best for you.

This article will let you understand the core developers who write or support applications that access

data written in C# or Visual Basic using Visual Studio 2012 and the Microsoft .NET Framework 4.0 and who also plan to take the Microsoft Certified Technology Specialist (MCTS) exam 70-516. Before you begin using this kit, you must have a solid foundation-level understanding of Microsoft C# or Microsoft Visual Basic and be familiar with Visual Studio 2012..

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

===============================================================================================

Topics to know in C# or Visual Basic using Visual Studio 2012

ADO.NET Disconnected Classes

ADO.NET Connected Classes

Introducing LINQ

LINQ to SQL

LINQ to XML

ADO.NET Entity Framework

WCF Data Services

Developing Reliable Applications

Deploying Your Application

 

Most of the examples in the article could run very well on a single server running both the Active Directory and Exchange Server 2010, if you do not have the time or resources to set up a fully functional lab. (Keep in mind that it is highly recommended that the Active Directory Domain Controller and the Exchange Server do not coexist on the same physical or virtual machine in the real world for a variety of reasons.)

 

Make use of the Testing Engines that are available, as well as the free Webcasts. Practice test material is just for that… PRACTICE. It may help you pass the test but believe me you will only last one day in a job if you don’t know what you are doing, so if you use practice material, read the question and if you don’t know the answer, research it and learn it, don’t just memorize the answer….I will tell you right now that their answers are not always right.

 

If your ready for career change and looking for Microsoft MCTS Training, Microsoft MCITP Training or any other Microsoft Certification preparation get the best online training from Certkingdom.com they offer all Microsoft, Cisco, Comptia certification exams training in just one Unlimited Life Time Access Pack, included self study training kits including, Q&A, Study Guides, Testing Engines, Videos, Audio, Preparation Labs for over 2000+ exams, save your money on boot camps, training institutes, It’s also save your traveling and time. All training materials are “Guaranteed” to pass your exams and get you certified on the fist attempt, due to best training they become no1 site 2012.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

===============================================================================================
About The Author

Hi I educated in the U.K. with working experienced for 5 years in multinational companies, As an IT Manager and IT Instructor, I am attached with certkingdom.com here they provide IT exams study material, the study materials included exams Q&A with Explanation, Testing Engine, Study Guides, Training Labs, Exams Simulations, Training Videos, Audio Exams Training, etc. for certification like MCTS Training, MCITP MCTS, MCSD, MCSA, MCSE  Training, CCNA exams preparation, CompTIA A+ Training, and more Certkingdom.com provide you the best training 100% guarantee. “Best Material Great Results”
My Specialties

I’ve worked with a lot of technologies, but these are where my focus has been in recent years:

* Microsoft SQL Server (particularly high availability and disaster recovery)

* VMWare Virtualization

* Oracle (yes, Oracle, I’ve worked on 7-11)

* Microsoft Clustering

* Red Hat Linux (I can still write shell scripts)

Written by katarnawikiera@gmail.com
June 4th, 2012

Over View Microsoft Exchange Server 2010 : MCTS 70-662 and MCITP 70-663

A number of articles have been published on Windows PowerShell, but very few of these are dedicated to Exchange Server 2012. I am an Exchange administrator. I am not a developer. Yet, I have found an increasing need to improve my development skills in order to be an effective administrator—first with Exchange Server 2007, then with Windows Server 2008, and now with Exchange Server 2010. Fortunately, with Windows

PowerShell and Exchange Management Shell, I can do so without having to learn a complicated language and extensive developmental concepts—something I really have no desire to do as an administrator. With just a simple verb-noun combination, I can achieve fantastic things in the Exchange organization and still be able to sleep at night without pieces of code swirling around in my head as I dream.

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

===============================================================================================

What’s New in PowerShell 2.0
Microsoft Windows PowerShell is a combined command-line shell and scripting language designed primarily for administrators, not developers. Prior to the introduction of Windows PowerShell into operating systems, administrators were forced to learn a programming language such as Visual Basic to fully manipulate objects in the Active Directory and Exchange environment if the graphical user interface (GUI) did not provide

an easy means for administration. Mainly, an administrator found the need for additional tools, such as custom VB scripts, when he or she wanted to manage objects in bulk. PowerShell 2.0 includes significant changes from the original version.

 

Topics To Understand Exchange Server 2010 Portable Command:

An Overview of Windows PowerShell 2.0 for Exchange 2010

New Features and the Exchange Management Shell

Basic Techniques

Achieving a Comfort Level with PowerShell

Advanced Techniques

Customizing the PowerShell Environment

PowerShell and the Exchange 2010 Deployment Process

Standard Deployments

Disaster Recovery Deployments

PowerShell and Recipient Objects

Working with Recipient Objects

Bulk Management of Recipients

PowerShell and the Transport Roles Message Routing

The Hub Transport Role

The Edge Transport Role

Configuring Rules and Agents on Transport Servers

PowerShell and the Client Access Server Role

CAS Services

Working with Certificates

PowerShell and the Mailbox Role

Mailbox Servers and Databases

Working with Mailboxes

Using the Recovery Database (RDB)

PowerShell and the Unified Messaging Role

Working with Unified Messaging (UM) Role Objects

Managing Unified Messaging (UM) Users

PowerShell and Message Routing

Exchange Server 2010 Message Routing

Integrating Exchange Server 2010 into an Existing Exchange

Server 2003 Environment

PowerShell and High Availability in Exchange 2010

Database Availability Groups (DAGs)

Mailbox Database Copies

Using DAG to Mitigate Failures

Monitoring Highly Available Databases

PowerShell and Public Folders

Public Folder Database Management

Managing Public Folders

Public Folder Permissions

Troubleshoot Exchange Server 2010 Using PowerShell

Troubleshooting with the Test Cmdlets

Event Logging with PowerShell

PowerShell and Automating Exchange Server 2010 Administration

Using and Finding Scripts to Automate

Monitoring Role-Based Access Control (RBAC) Permissions,

Mailbox Audit Logging, and Reporting with PowerShell in Exchange Server 2010

Configuring Role-Based Access Control (RBAC) Permissions

Using Mailbox Audit Logging to Monitor Exchange Server

Reporting and Other Useful Cmdlets

 

Most of the examples in the article could run very well on a single server running both the Active Directory and Exchange Server 2010, if you do not have the time or resources to set up a fully functional lab. (Keep in mind that it is highly recommended that the Active Directory Domain Controller and the Exchange Server do not coexist on the same physical or virtual machine in the real world for a variety of reasons.)

 

Make use of the Testing Engines that are available, as well as the free Webcasts. Practice test material is just for that… PRACTICE. It may help you pass the test but believe me you will only last one day in a job if you don’t know what you are doing, so if you use practice material, read the question and if you don’t know the answer, research it and learn it, don’t just memorize the answer….I will tell you right now that their answers are not always right.

 

If your ready for career change and looking for Microsoft MCTS Training, Microsoft MCITP Training or any other Microsoft Certification preparation get the best online training from Certkingdom.com they offer all Microsoft, Cisco, Comptia certification exams training in just one Unlimited Life Time Access Pack, included self study training kits including, Q&A, Study Guides, Testing Engines, Videos, Audio, Preparation Labs for over 2000+ exams, save your money on boot camps, training institutes, It’s also save your traveling and time. All training materials are “Guaranteed” to pass your exams and get you certified on the fist attempt, due to best training they become no1 site 2012.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

===============================================================================================
About The Author

Hi I educated in the U.K. with working experienced for 5 years in multinational companies, As an IT Manager and IT Instructor, I am attached with certkingdom.com here they provide IT exams study material, the study materials included exams Q&A with Explanation, Testing Engine, Study Guides, Training Labs, Exams Simulations, Training Videos, Audio Exams Training, etc. for certification like MCTS Training, MCITP MCTS, MCSD, MCSA, MCSE  Training, CCNA exams preparation, CompTIA A+ Training, and more Certkingdom.com provide you the best training 100% guarantee. “Best Material Great Results”
My Specialties

I’ve worked with a lot of technologies, but these are where my focus has been in recent years:

* Microsoft SQL Server (particularly high availability and disaster recovery)

* VMWare Virtualization

* Oracle (yes, Oracle, I’ve worked on 7-11)

* Microsoft Clustering

* Red Hat Linux (I can still write shell scripts)

Oracle moved quickly on Friday to lay out its plans for the HCM (human capital management) software market, a couple days after rival SAP did the same thing.

Cisco CCNA Training, Cisco CCNA Certification

Best Oracle Certification Training and Oracle Exams Training  and more Cisco exams log in to Certkingdom.com

SAP and Oracle have each made significant acquisitions of cloud-based HCM vendors in the past few months, with SAP paying US$3.4 billion for SuccessFactors and Oracle announcing plans to buy Taleo for $1.9 billion earlier this month.

While many companies have already invested in a core human-resources software system for areas such as payroll and benefits management, Taleo will bring Oracle applications on the fringes of the HCM category, such as recruitment and employee onboarding, that can be sold into existing and new accounts. Taleo will also give Oracle increased relevance in the cloud software market, as well as staff with hands-on experience running a SaaS (software-as-a-service) business. SAP is seen as getting similar benefits from SuccessFactors.

Once the Taleo acquisition is complete, Oracle will have “the most comprehensive set of enterprise cloud offerings in the world,” said Oracle Co-President Mark Hurd during a webcast event on Friday. And Taleo’s software “clips directly into” Oracle’s own Fusion HCM cloud application, he added.

Oracle wants to offer customers a complete suite of HR applications that includes embedded BI (business intelligence), social network and mobile capabilities, said Thomas Kurian, executive vice president of product development. “We feel we’ll allow organizations to find the best people, have lower turnover and have the best results.”

Kurian sought to explain how Taleo’s products will work alongside Oracle’s existing HR software.

Customers will be able to “plan, predict, and optimally source [their] workforce,” he added. They’ll also gain the ability to identify employees who may be at risk of leaving through predictive analytics, Kurian claimed. Those top performers can then be retained with help from a combination of Taleo and Oracle’s software for internal career development, compensation management and other areas, he added.

Taleo’s recruitment and employee on-boarding software, for which it is well-known, will become preferred offerings, according to a slide Kurian presented.

But Oracle intends to unify the companies’ performance management software into a single product, while providing “a seamless upgrade for all customers,” Kurian said.

Oracle intends to integrate Taleo with its Oracle Public Cloud, on which Fusion HCM runs. This will give the Taleo applications new capabilities for identity management, data services and analytics, Kurian said.

Executives repeatedly noted that Taleo Business Edition, which is aimed at smaller companies, will continue to be offered and supported. This was likely done to quell concerns from customers about that version, since Oracle has focused mostly on how Taleo’s Enterprise version will fit in with its products, said IDC analyst Lisa Rowan.

Kurian also emphasized that Oracle will continue offering talent management software for use with Oracle as well as non-Oracle HR systems, both on-premises and in the cloud.

This likely reflects a fear on Oracle’s part of losing Taleo customers who are now running applications from competitors like SAP, Rowan said.

Maintenance fee nerves jangling at Oracle?

Written by IT Trainer
February 23rd, 2012

Oracle bending to customer demand or playing a crafty hand?

Cisco CCNA Training, Cisco CCNA Certification

Best Oracle Certification Training and Oracle Exams Training  and more Cisco exams log in to Certkingdom.com

Chris Kanarakus reports that Oracle has waivered extended support fees. Given what we know about Oracle’s masterful account control in its customer base you might be forgiven for wondering why this is the case. Citing Forrester analyst Paul Hamerman, Kanaracus offers several possible explanations including:

Keep customers happy while not force marching to Fusion
Waiting for Fusion to reach feature/function parity with eBusiness Suite
Keep customers from straying into the arms of third party maintenance providers like Rimini Street

I sense the decision is much more pragmatic. As Kanaracus observes, maintenance fees are extraordinarily lucrative, generating gross margin north of 90%. Until recently, maintenance fees have been a small fraction of total IT spend. When weighed against for example the cost of upgrade, they often look like little more than a rounding error. So what has changed? I sense there are several factors in play:

Direct IT department spend has stagnated or is falling yet demands for IT to deliver value are rising.
Newer technologies and especially those that are sold on a consumption basis are coming in directly via line of business departments rather than IT.
While most commenters recognise that cloud based applications will remain a minor part of the overall landscape for the immediate future, the long term threat is real for incumbents like Oracle.
Oracle, like every other incumbent on-premise player is desperate to maintain margins while figuring out a way of getting on the cloud bus.

My guess is that Oracle is viewing this combination of factors as creating an environment where treading lightly keeps the cash register ticking over while giving the company breathing space. The question in my mind is just how long that breathing space will last.

In The New Technology Elite, Vinnie Mirchandani makes the bold statement:

For too long IT has been an expensive and low-payback back-office investment. Now technology in the companies’ products is allowing them to generate revenue and growth.

As I look back over time and think about the numerous ERP failures, the lack of genuine innovation, the stress that some companies have felt and yet balance that against the fat margins companies like Oracle, SAP, Infor, Microsoft and others make I wonder whether the maintenance chickens are finally coming home to roost.

In Oracle’s case, the problems are compounded by a less than stellar performance in its hardware story. As Larry Dignan observed:

The problem, however, is that Oracle saw new software license revenue gain only 2 percent in the second quarter from a year ago to $2 billion. Updates and support revenue was up 8 percent to $4 billion. Hardware systems revenue fell 14 percent from a year ago to $953 million in the second quarter. In addition, Oracle couldn’t blame currency fluctuations either—the growth rates in constant currencies mirrored the actual results.

As Oracle closes out its Q3, analysts will be watching all line items to better understand where the real weaknesses are in Oracle’s business model.

Oracle and SAP given June court date for TomorrowNow retrial

Written by IT Trainer
February 17th, 2012

Oracle and SAP may be back in court on June 18 to begin a retrial of Oracle’s corporate theft lawsuit involving SAP’s former TomorrowNow subsidiary, according to a judge’s order Thursday.

 

MCTS Certification, MCITP Certification

Microsoft Oracle Exam Training , Oracle Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

Oracle was awarded US$1.3 billion in damages from SAP last November as compensation for TomorrowNow’s theft of software and support materials from an Oracle website.

SAP argued the sum was unfairly high, and the court agreed, overturning the jury’s award. Oracle was given a choice of accepting a lower damages amount of $272 million or going into a new trial, and earlier this month it picked the new trial.

The two weeks starting June 18 are the only two weeks free on the judge’s calendar this year, Judge Phyllis Hamilton of the Northern District Court of California said in her scheduling order Thursday. If Oracle and SAP reject that date, they can choose Aug. 13, 2013, or else hope an opening comes up before then.

It will be a busy year for Oracle in the courts. The company is fighting two other big cases that are due to go to trial this year. One was brought by Hewlett-Packard, over Oracle’s decision to drop support for Itanium. The other is Oracle’s suit against Google for alleged patent and copyright violations in Android.

Should your small business virtualize?

Written by admin
October 30th, 2011

Virtualization is one of the hottest IT topics today. Everyone’s talking about it, but few are really doing it — and there’s a big gulf between enterprise and small business adoption, even though many of the benefits are the same. Small business is one of my favorite technology segments, because of its diversity, unique needs, large size, yet small IT footprint. When working as an analyst during the mid-Noughties I launched JupiterResearch’s SMB practice. I’ve been remiss by not writing more about small business tech at BetaNews.

 

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

There is much confusion about what is a small business — how official statisticians and high-tech vendors segment sizes. Small businesses account for 97 percent of employee firms, according to US government agencies. But that segmentation counts firms with fewer than 500 employees as small business — large by my measure — and ignores the enormous number of operations with non-payroll employees. This segment is often overlooked by high-tech vendors, many of which count them as consumers. By the US Census Bureau’s reckoning, there are nearly 27.3 million small businesses, but only 5.9 million have payrolls and 3.62 million employ fewer than five people. So there are 21.4 million businesses employing less than 5 people — that’s 78 percent of them.

Integrated Approach

For JupiterResearch, I segmented small businesses differently. Small is small. Companies with less than 50 employees counted as small businesses, those with fewer than 10 employees as very small businesses and those with no payroll employees were sole proprietorships. It’s typical for business owners in this segment to run their establishments on the side or to have more than one operation. I am surprised to see how few high-tech firms address the unique needs of very small businesses or sole proprietorships.

Among PC manufacturers, HP and Dell stand out for their small business offerings, for no other reason than size, being No. 1 and No. 2 in global shipments, according to Gartner and IDC. But both vendors are going through dramatic realignments. Earlier this summer, HP announced plans to either sell off or spin off its PC division, separating it from valuable services necessary to support business needs of all sizes. Today, HP made the decision to keep its PC division.

Dell’s changes are different, as the company makes the cloud, virtualization and supporting services priorities. Dell’s emphasis is integration — one place for software, hardware and services. IBM also is good at vertical integration but Big Blue sold its PC business to Lenovo years ago. Meanwhile IBM defines small businesses by the thousands of employees, which to most other vendors would qualify as enterprises. HP also is big on services, but uncertainty about the future of its PC business (including x86 servers) and recent CEO changes create competitive opportunities.

Dell, which has long had strong small business offerings, is trying to seize the opportunity and also take its renewed integration focus to mid-size and large organizations. Forrester analyst Richard Fichera says the company is “really trying to change its image. Old Dell was boxes, discounts and low-cost supply chain. New Dell is applications, solution, cloud (now there’s a surprise!) and investments in software and integration. OK, good image, but what’s the reality? All in all, I think they are telling the truth about their intentions, and their investments continue to be aligned with these intentions”.

Virtualization Interest

The “new Dell”, as Fichera calls it, has been hot pushing cloud computing and virtualization solutions to small businesses. While writing this post I wondered why? The cloud is plain as day, but virtualizaton? Cisco, Microsoft and VMWare are among the many other vendors looking at this segment, too. But is that small business by that 499 employees, lesser number or something really small? Do the smallest of the lot even need virtualization?

There surely is interest. In August, Symantec published the “Small Business Virtualization Poll”. The security firm surveyed 658 small businesses with 5 to 249 employees in 28 countries. Symantec found that “70 percent of the small businesses surveyed are considering virtualization”, but only “10 percent have deployed virtualized servers, and another 17 percent are now doing so. This leaves 43 percent in technology trials or discussions”. Thirty-percent aren’t considering virtualization at all.

Top-three applications being virtualized: Web, database management and email/calendaring. Who does the work for the small business, whether those with dedicated IT organizations or small shops where the business owner oversees tech? For 58 percent of small businesses, its the “hardware or software vendor’s professional services organization”, which makes lots of sense of Dell and other PC manufacturers focusing more on providing small businesses with vertically integrated hardware, software and services.

Small businesses’ top two reasons for virtualizing are about money: “reduce capital expense” (70 percent) and “reduce operating expense” (68 percent), which doesn’t surprise given economic crises in Europe and North America. No 3: “Use less servers for the same amount of applications”. Surely server consolidation matters more to companies with larger numbers of employees than those with fewer. But Symantec didn’t provide the important granular view — priorities of businesses with 5 employees versus 249.

The Mobile Problem

Small businesses all share two common problems not revealed by Symantec’s poll, which offers too many enterprise-like reasons to small businesses to choose from: Proliferation of mobile devices and the mixing of personal and corporate data. Virtualization can help solve both these problems, which I’d argue are more pronounced in the smallest businesses — the ones not represented at all by Symnatec’s survey or as strong sales segment focuses by many vendors selling hardware, software or services (if not all three).

In my experience as an analyst and journalist, non-payroll operations typically use the same devices for personal and professional purposes — there is tremendous overlap of data and behavior. This situation is pervasive among very small businesses, too, with tight tech budgets being one reason. Perhaps an employee uses a personal laptop for work purposes or the small business lets the worker use the official-issue notebook personally. Personal and professional data also commingles on smartphones and tablets. Larger operations share similar problems, but more because of so-called “consumerization of IT”, where workers bring in personal devices like tablets. Stronger IT management mitigates the extent compared to smaller shops where there is no dedicated IT person or someone else, often the small business owner, wears two hats.

Businesses of all sizes suffer from the larger mobility problem — data leaving the safe confines of the firewall on all kinds portable devices — laptops, smartphones and tablets, among them. These devices can become infected with malware or be lost or stolen — creating unnecessary privacy and security risks. Cloud services and virtualization can help small businesses keep precious data where it belongs and mitigate the risks when devices are lost or stolen.

Server virtualization has led the way for providing this kind of service, but some vendors are adding client virtuatization and privately hosted web services to the mix. For example, Intel is taking this approach for its IT infrastructure, because employees want to use a broader range of devices, “including personally owned smartphones and tablets”. Obviously, Intel is no small business but its approach to virtualization as a solution to the two aforementioned problems could be applied on smaller scale. You can download the white paper here.

Circling back to the question: Should your small business virtualize? Probably yes. For the smallest of businesses, that could be in tandem with setting up a private cloud or outsourcing purely cloud services like Office 365 and Salesforce.com. The smallest businesses get something they also probably don’t have now — centralized IT management. The case for operations with 10 or more employees is stronger, whether to consolidate servers, better manage applications, reduce costs, provide employees anytime, anywhere access or separate personal and professional workspaces on the same devices.

Black Hat: Lots of hacks and a patriotic plea

Written by admin
August 6th, 2011

Research reveals vulnerability to a key router protocol, as well as threats to critical infrastructure

Celebrating its 15th anniversary, Black Hat this year went beyond technical hacking and entered the realm of politics and patriotism with its choice of keynote speaker Cofer Black, former counterterrorism chief at the CIA, who called on attendees to consider joining government anti-cyberterrorism programs.

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

 

The implications are severe enough that he briefed the Department of Homeland Security about the problem, and he says the department is following up with vendors of vulnerable gear as well as owners of the critical infrastructure that might be at risk as a result.

Bailey says he and fellow researchers took a look at devices that are attached to phone networks for the purpose of receiving control messages and discovered two types. Then they figured out how to distinguish these devices from the less-interesting devices connected to phone networks such as phones, modems and faxes.

By following clues in owner’s manuals or with a little reverse engineering of some hardware, they were able to send control messages to individual devices. He says they were able to compromise the car alarm in about two hours.

 

Black Hat: Lots of hacks and a patriotic plea

Written by admin
August 6th, 2011

Research reveals vulnerability to a key router protocol, as well as threats to critical infrastructure

Celebrating its 15th anniversary, Black Hat this year went beyond technical hacking and entered the realm of politics and patriotism with its choice of keynote speaker Cofer Black, former counterterrorism chief at the CIA, who called on attendees to consider joining government anti-cyberterrorism programs.

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

“My world of terrorism has gone,” says Black, now retired after 28 years in the CIA. “Now it’s your turn.”

Stuxnet has forever changed the face of terrorism and the consequences of cyberattacks, Black says. The sophisticated worm that took over control mechanisms for centrifuges in Iran’s nuclear refinery and wore them out, had the impact of a physical assault.

“Stuxnet is the Rubicon of our future,” he says. “What had been college pranks cubed and squared has now changed into physical destruction of a national resource. This is huge.”

Black says budding cyber-counterterrorists must be ready to contribute but also be ready to encounter decision-makers being unprepared to accept that cyberattacks are the coming wave.

He says that leading up to 9/11, his CIA group knew a large-scale attack was coming, but not exactly when or where. The group had trouble convincing the Bush administration of its urgency, he says, until the World Trade Venter fell. “Men’s minds have difficulty accepting things with which they have no previous experience,” he says.

Black Hat offered a glimpse of the potential power of facial recognition combined with social network data mining to reveal personal information about individuals based solely on a photo of them. The technique calls for linking faces of random individuals to images in databases that contain other information about them and using that information to project Social Security numbers, says Alessandro Acquisti, a professor at Carnegie Mellon University, who presented the research.

He admits the method is far from foolproof, but that the individual pieces of technology are developing rapidly and could be ready for use in the real world in the foreseeable future. He is working on projections of how long it will take for the technologies involved to develop to the point of being reliable.

The point, Acquisti says, is to show that a framework of digital surveillance that can go from a person’s image to personal data exists today and will only get better as technologies improve, making privacy more scarce and making surveillance readily available to the masses. “This, I believe and fear, is the future we are walking into,” he says.

Another frightening presentation showed how simple it is to hack devices connected to phone networks, with the most dangerous implication being potential attacks against the control systems in utility networks, power grids and industrial manufacturing plants.

Don Bailey, a consultant with iSec Partners, demonstrated compromising a car alarm via vulnerabilities in phone networks, but made the point that the technique works equally well against Supervisory Control and Data Acquisition (SCADA) systems used in critical infrastructure.

IT workers with heart

Written by admin
July 25th, 2011

For these companies, employee volunteerism means improved collaboration and productivity on the job

Computerworld – You might think Steve Kranson, who works at Comerica Bank in Auburn Hills, Mich., is your average IT manager. But he’s also been known to log hours dressed up like the Easter Bunny, to the delight of local kids.

 

Best Microsoft MCTS Training, Microsoft MCITP Training at certkingdom.com

 

Amy Crow, who spends most of her working hours as an IT project manager at Texas Health Resources, has been spotted stepping away from her computer to work on gardening and landscaping projects at nursing homes, organize donated linens and other household items for local disaster relief agencies and sing holiday songs at elementary schools in the neighborhood.

And Paychex Inc. employees Dan Canzano, vice president of IT operations and support, and Tammy Hall, director of enterprise service management, have spent some of their worktime polishing their poker-playing skills and raking in some big bucks for charity.

In all three cases, these IT professionals performed these activities with the blessing of their employers, who often allow workers to take paid time off to donate their skills, talents and time to charities and other nonprofit organizations.
I just interviewed two people under 30. They both asked about personal days for volunteering. Younger folks are asking about community involvement.
Marcia Riley, vice president of talent management and human resources, ESI International

Employers also benefit from these arrangements. In fact, they are increasingly more than happy to subsidize employees’ volunteer efforts outside the workplace, because they’ve noticed an undeniable link between employee volunteerism and improved collaboration and productivity on the job.

“Outside volunteer activities afford workers an opportunity to view their co-workers through a different lens,” says David Ballai, CIO at Reed Technology in Horsham, Pa.

“You see them assisting in the community and interacting in a different environment. When they come back to work, they have a more holistic view of their peers and can appreciate how they view the world,” he says. “It’s great for team-building.”

Moreover, volunteerism can enhance a company’s image in the communities where its employees and customers live. And offering time off — either paid for unpaid — for charity work can also help organizations attract younger, more community-minded and tech-savvy employees, experts say.

“I just interviewed two people under 30. They both asked about personal days for volunteering. Younger folks are asking about community involvement,” says Marcia Riley, vice president of talent management and human resources at ESI International, an Arlington, Va.-based training and consulting firm. “I was not asked that question 20 years ago. Younger folks are demanding this benefit, and good employers are responding.”

Anecdotal evidence indicates that an increasing number of companies are offering paid time off to employees who want to volunteer, either on company-sponsored initiatives or at a charity or agency of their own choosing. Comerica, for example, has donated more than 100,000 hours of its employees’ time in the past two years, which translates to more than $2 million worth of volunteer activities in the communities it serves.

Led by IBM President Thomas Watson Jr., Big Blue’s building boom cemented IBM’s role as design patron

In the mid-20th century, as the U.S. asserted its role as global economic powerhouse, architecture provided the perfect outlet for companies like IBM to define their corporate identity.

 

Best Microsoft MCTS Training, Microsoft MCITP Training at certkingdom.com

 

Between 1956 and 1971, IBM constructed approximately 150 plants, labs and office buildings around the world. The building boom was orchestrated by IBM President Thomas Watson Jr. and architect and industrial designer Eliot Noyes, who commissioned many of the period’s greatest architects, graphic designers and artists to do work for Big Blue.

Eero Saarinen, Charles and Ray Eames, Paul Rand and Ludwig Mies van der Rohe are among the designers whose work cemented IBM’s role as a leading patron of modern design and architecture, beginning in postwar America and continuing into the 1980s.

Get Daily News by Email

“There were other corporations that were also focusing on design quality and using buildings to express their corporate culture, but it’s fair to say that IBM was a vanguard. It was really the scope and ambition of IBM’s efforts that stood out,” says Martin Moeller, senior vice president and curator of the National Building Museum in Washington, D.C.

This period in IBM’s 100-year history — the company is celebrating its centennial anniversary this week — started with a walk down Fifth Avenue in New York. As the story goes, Watson Jr. saw the showroom of Italian office equipment maker Olivetti and was impressed by its cohesive approach to industrial design, graphic design and architecture. Watson Jr. wanted the same for IBM. He recruited Noyes to develop a corporate design program, and Saarinen was the first architect hired.

Saarinen had just completed the landmark General Motors Technical Center, a sprawling corporate campus built around a manmade lake in Warren, Mich. Saarinen adopted fabrication techniques and industrial materials from GM’s assembly lines. For instance, instead of traditional caulking to seal the buildings’ windows, Saarinen specified Neoprene gaskets similar to those GM used for car windshields.

His first building for IBM — a research and manufacturing facility in Rochester, Minn., with sweeping expanses of blue-hued glass — likewise is an expression of modern architecture and modern science. “It was architecturally advanced in the same way that the new IT technologies were technologically advanced,” says Donald Albrecht, curator of architecture and design at the Museum of the City of New York.

Saarinen’s work for GM and IBM epitomizes what many U.S. corporations were trying to achieve during that period: a forward-thinking image, conveyed through progressive architecture. Edward Durrell Stone’s PepsiCo world headquarters in Purchase, N.Y., is another example.

“There’s this feeling from around 1945 to the mid-’60s,” Albrecht says. “As the United States is confirmed as a global power and as American business becomes, in a sense, our ambassador overseas, the question was how we would present ourselves as a modern, technologically advanced, economic powerhouse. Architecture was one way that was done.”

Dirty IT jobs: Partners in slime

Written by admin
May 9th, 2011

Dirty Job No. 2: The shadow
You probably don’t want to know where your coworkers are going on the Web. But sometimes you have no choice. Nancy Hand knows this, well, firsthand.

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

Until three years ago, Hand was a network engineer for a large public utility in the Southwest. When any of that site’s 3,000 employees got a malware infection, Hand received an alert via the utility’s McAfee software. She was then called in to investigate by remotely combing through the employee’s browser cache, looking for the source of the attack.

[ Get a $50 American Express gift cheque if we publish your anonymous experiences from tech's front lines. Send your story of a lesson learned, of dealing with frustrating coworkers/end-users/managers, or a humorous happening to offtherecord@infoworld.com. ]

Along the way, Hand got to see where these employees had been surfing while they were allegedly working. Most of the time what she found was benign — a lot of sites devoted to cooking, fashion, cars, and day trading. Inevitably, though, she’d encounter the darker side.

Like the employee who swore it was a spam email that caused his browser to visit that members-only bondage site, though how that email also managed to create a member profile for him was less clear. (Hand says the head of  IT security jokingly awarded her the “Golden Garter Belt” for uncovering that one.)

Or the company vice president whom Hand discovered had been spending work time visiting TeenageVirginSluts.com. Naturally, he was the VP of IT.

“He was my boss’s boss’s boss,” she says. “After I found this I contacted my manager and said, ‘We have a zero-tolerance policy for this kind of thing, so I am officially notifying you of what I found.’ To my knowledge nothing was ever done. About a year later that VP got fired for another sexually related infraction.”

Some employees ended up being escorted from the facility by armed guards, though Hand never knew whether it was due to something she had found.

“Sometimes it was a little unsettling to be on the machine of someone I’d met in another part of my job who seemed like a very toe-the-line type of person, only to discover it wasn’t true,” she said. “People aren’t as innocent as they seem. And the next time they complained about catching a virus, I’m thinking ‘Well, you sort of did this to yourself.'”

Dirty jobs survival tip: Be prepared to go it alone.

“Management didn’t seem to take any of it very seriously, even after we got hit with a denial-of-service attack that put us out of business for almost an entire day,” she says. “It all becomes political, even though you think it shouldn’t be. The VP is given a pass, but the secretary gets fired.”

The Administration Service lets IT departments enforce software configurations, IT policies and connectivity profiles while also managing the kinds of applications users can have on their PlayBooks. RIM is also providing IT departments with a catalog of business-approved applications that can be safely downloaded onto PlayBooks and given access to corporate data.

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

When you combine these three security features – Balance, Bridge and the Administration Service – it becomes clear that RIM’s PlayBook gives enterprise users the most security features and options of any other tablet on the market. The tablet’s ultimate success, though, could come down to whether corporate users feel they need these strong precautions or whether they can mostly get by with the more limited security features available on the iPad

Halo 2 Released for Certification

Written by admin
May 1st, 2011

Bungie Studios has commenced the final countdown to Halo 2. Halo 2, a wildly popular Xbox title, has been turned over for release to certification (RTC). Barring any last minute showstoppers, the game is scheduled to hit the shelves November 9 — just in time for the holidays. In Halo 2, the Covenant — an invasive alien race bent on the destruction of mankind — has set its sights on Earth. All that stands between the citizens of Earth and total annihilation is a genetically altered “super solider” named Master Chief. Halo 2 is available via preorder from most retail outlets.

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

How to Recycle Your Technology

Written by admin
April 20th, 2011

Recycle with Computer Manufacturers and Mobile Carriers

Computer Manufacturers Most will take their own stuff, but how you go about it depends on the maker. You can find a quick chart on the Environmental Protection Agency’s Plug-In to eCycling site.

Mobile Carriers
Every one of the four major mobile phone service providers will take cell phones back for recycling, either to dispose of safely or, better yet, to refurbish for special use as 911 emergency phones for those in need, such as abuse victims or active duty military soldiers. Just remember to erase the data from your phone before you drop it off. If it’s from AT&T or T-Mobile, take out the phone’s SIM card, too. All of the carriers’ efforts are also part of the EPA Plug-In to eCycling campaign.

 

 


Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com


AT&T Reuse & Recycle
Takes any phone, plus batteries and accessories. Just drop them at the nearest AT&T store.

Sprint Re:cycle
Sprint offers to buy-back some phones from existing customers and provides credit toward a new one, but if that doesn’t work, it will take any phones, batteries, and accessories you want to drop off or send in by creating a pre-printed, postage-paid shipping label.

T-Mobile’s Handset Recycling Program
Again, T-Mobile will take any carrier’s phone and accessories—it’s a good idea to also donate the charger—either in the story or by mail with a pre-printed label with postage already paid.

HopeLine from Verizon
Specifically targeted to get recycled phones to victims of domestic violence, Verizon’s program is no different for you, the donate—you can drop phones, batteries, and accessories at the stores around the country or use the pre-paid shipping label. Start your own HopeLine Phone Drive to get involved.

Asia-Pacific Runs Out of IPv4 Internet Addresses

Written by admin
April 16th, 2011

The Asia-Pacific region effectively ran out of IPv4 addresses on Friday, meaning that the region is now conserving addresses for the IPv4-to-IPv6 transition.

The region officially moved into its planned “Phase Three” of the transition, where new and existing members will have restricted access to the existing IPv4 addresses used by most PCs today. All new and existing APNIC members will be entitled to a maximum delegation of a “/22″, or (1,024 addresses) of IPv4 space, the Asia Pacific Network Information Centre said.

 

Microsoft MCTS Certification, MCITP Certification and over 2000+ Exams at Actualkey.com

 

APNIC is the first regional Internet registry to exhaust its IPv4 address space, which experts have warned about for some time. When the available IPv4 addresses are exhausted, new devices coming onto the network, from phones to network switches, must be assigned an IPv6 address unless some intermediary technology is used.

“Considering the ongoing demand for IP addresses, this date effectively represents IPv4 exhaustion for many of the current operators in the Asia Pacific region,” said Paul Wilson, director general of APNIC, in a statement. “From this day onwards, IPv6 is mandatory for building new Internet networks and services.”

Current IP addresses use the IPv4 format, which assigns users an IP address using four numbers, each from 1 to 256. (8.8.8.8 is an available DNS server IP address administered by Google, for example.) Addresses like pcmag.com are translated behind the scenes into their numeric equivalents, just like 800-DOMINOS equates to an actual phone number. Each new device that connects to the Internet is assigned a new IP address, although home networks can assign their own non-unique IPs via network address translation, or NAT.

While the IPv4-to IPv6 shift will be a worry for networking vendors, ISPs, and domain-name registrars, the transition shouldn’t be as much of a concern for ordinary consumers, networking vendors told PCMag.com. ISPs like Comcast can also run in dual-stack mode, internally translating addresses from IPv4 to IPv6.

“You can certainly run dual-stack in the routers to serve both types of packets,” said Vint Cerf, the so-called “father of the Internet” and a chief Internet evangelist for Google, in an interview earlier this year. “You can certainly run dual-stack at edge devices, if the device has been provided with both address types. The IPv4 address might be a NAT assignment using so-call ‘private IP address space.’

“Eventually there will be no more IPv4 ‘public address space,'” he continued. “When that exhaustion occurs (and it won’t happen in a uniform way—some places will run out before others), then there will be some devices that only have IPv6 assignments. They will not be able to directly interact with IPV4-only devices.”

Adobe Alerts, Patches Latest Flash Zero-Day Hole

Written by admin
April 16th, 2011

Adobe said Friday that it has identified and issued a patch for Adobe Flash Player, just days after issuing a similar patch.

Adobe issued Adobe Flash Player 10.2.159.1 on Friday, for users of Flash version 10.2.153.1, and Adobe Flash Player 10.2.154.25 for those that use Chrome. Adobe also said it recommends users of Adobe AIR 2.6.19120 and earlier versions for Windows, Macintosh and Linux update to Adobe AIR 2.6.19140.

 

Best Microsoft MCTS Certification – Microsoft MCITP Training at Certkingdom.com

 

 

Adobe expects to make available an update for Adobe Flash Player 10.2.156.12 and earlier versions for Android no later than the week of April 25, 2011, the company added.

Why? According to Adobe, there have been reports that this vulnerability is being exploited in the wild in targeted attacks via a malicious Web page, or a Flash (.swf) file embedded in a Microsoft Word (.doc) or Microsoft Excel (.xls) file delivered as an email attachment, targeting the Windows platform. The updates resolve a memory corruption vulnerability that could lead to code execution, Adobe said.

That’s basically the same vector that a previous vulnerability exploited on Wednesday.. Adobe said then that it was not aware of PDF-related attacks in Reader or Acrobat, and Adobe Reader X Protected Mode mitigations would prevent that type of exploit from happening.

As PCMag’s Larry Seltzer points out, this type of vulernability might sound familiar. It’s quite similar to another Flash zero-day from several weeks ago that was embedded in an Excel file and used to attack RSA.

Adobe Reader 9.x for UNIX, Adobe Reader for Android, and Adobe Reader and Acrobat 8.x are not affected by this issue, Seltzer noted.

Adobe Alerts, Patches Latest Flash Zero-Day Hole

Written by admin
April 16th, 2011

Adobe said Friday that it has identified and issued a patch for Adobe Flash Player, just days after issuing a similar patch.

Adobe issued Adobe Flash Player 10.2.159.1 on Friday, for users of Flash version 10.2.153.1, and Adobe Flash Player 10.2.154.25 for those that use Chrome. Adobe also said it recommends users of Adobe AIR 2.6.19120 and earlier versions for Windows, Macintosh and Linux update to Adobe AIR 2.6.19140.

 

Best Microsoft MCTS Certification – Microsoft MCITP Training at Certkingdom.com

 

 

Adobe expects to make available an update for Adobe Flash Player 10.2.156.12 and earlier versions for Android no later than the week of April 25, 2011, the company added.

Why? According to Adobe, there have been reports that this vulnerability is being exploited in the wild in targeted attacks via a malicious Web page, or a Flash (.swf) file embedded in a Microsoft Word (.doc) or Microsoft Excel (.xls) file delivered as an email attachment, targeting the Windows platform. The updates resolve a memory corruption vulnerability that could lead to code execution, Adobe said.

That’s basically the same vector that a previous vulnerability exploited on Wednesday.. Adobe said then that it was not aware of PDF-related attacks in Reader or Acrobat, and Adobe Reader X Protected Mode mitigations would prevent that type of exploit from happening.

As PCMag’s Larry Seltzer points out, this type of vulernability might sound familiar. It’s quite similar to another Flash zero-day from several weeks ago that was embedded in an Excel file and used to attack RSA.

Adobe Reader 9.x for UNIX, Adobe Reader for Android, and Adobe Reader and Acrobat 8.x are not affected by this issue, Seltzer noted.

Oracle to Make OpenOffice.org Community-Based

Written by admin
April 16th, 2011

When a group of developers broke off from Oracle last year to establish the Document Foundation and create the new LibreOffice open-source office suite, it was unclear what would become of the well-known OpenOffice.org project they left behind. Today, Oracle has announced that it will no longer offer a commercial version of the OpenOffice.org software, and that it plans to move the suite to a purely community-based open source project.

 


Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

 

In a statement, Oracle Chief Corporate Architect Edward Screven said, “Given the breadth of interest in free personal productivity applications and the rapid evolution of personal computing technologies, we believe the OpenOffice.org project would be best managed by an organization focused on serving that broad constituency on a non-commercial basis. We intend to begin working immediately with community members to further the continued success of Open Office. Oracle will continue to strongly support the adoption of open standards-based document formats, such as the Open Document Format (ODF).”

“Oracle has a long history of investing in the development and support of open source products,” Screven continued. “We will continue to make large investments in open source technologies that are strategic to our customers including Linux and MySQL. Oracle is focused on Linux and MySQL because both of these products have won broad based adoption among commercial and government customers.”

Oracle provided no additional information about OpenOffice.org, or its own proprietary Web-based office suite, Oracle Cloud Office, which also supports ODF.

The LibreOffice developers released their first stable version of that software earlier this year.