Oracle extends cloud suite to cover entire order-fulfillment process

Oracle took another step forward in its efforts to bolster its cloud offerings Monday with the launch of two new products designed to help companies conduct their entire order-fulfillment processes in the cloud.Oracle Order Management Cloud and Oracle Global Order Promising Cloud are both extensions of the company’s Supply Chain Management Cloud and aim to provide modern order-management, visibility and fulfillment capabilities.The new Order Management Cloud focuses on order capture and fulfillment with the goal of improving order handling. Among the potential benefits for users are centralized order monitoring and the ability to proactively manage order exceptions. Companies can also define, implement and maintain their own fulfillment policies without the need for technical programming tools, Oracle said.To read this article in full or to leave a comment, please click here

Interviewing for the “Ideal Candidate”: Looking for “Nerdvana” – New Packet Pushers Blog

I was going through a stock photo website the other day and came across a “formula” that was supposed to equal the “perfect job candidate”.  I chuckled a little out loud.  The person sitting next to me looked over at what was on my laptop screen. Paused. Then asked me what I look for when I’m interviewing someone.  What is my “perfect job candidate?”

perfect_job_candidate_136353023

 

 

 

 

 

 

 

…. For the rest please go to Packet Pushers

packetpushers (1)

http://packetpushers.net/interviewing-for-the-ideal-candidate-looking-for-nerdvana/

Speaking Geek at Solarwinds’ Thwack Community

geekspeak

Thwack!

For the new few months in addition to posting here, I’ll be making some blog posts over on SolarwindsThwack Community in their “Geek Speak” blogs, on the general topic of network management. I won’t be reposting the content here, but I’ll be sharing the links each time I post, and I hope you can find a moment to read them, rate the post if you are that way inclined, and maybe even comment! I know have some very smart readers, and Thwack has some smart users too, so the conversation should be great!

Solarwinds Thwack is a light-hearted community providing specific product support and templates for Solarwinds products, but also offering more general support on networking-related issues through blogs, community forums and product forums. It’s kind of a fun place to dig around, and the users are usually not short of an opinion on most topics. Signing up for an account is easy and free, and then you can post comments and join in the discussion!

Here’s the intro to the first post in the series, called “Do You Monitor Your Network Interfaces? at Geek Speak

Thwack Blog Post 1

Hope to see you over there!

 

Disclosures

I am participating in the Solarwinds Continue reading

Cyberespionage group Pawn Storm uses exploit for unpatched Java flaw

A sophisticated group of hackers known for targeting military, government and media organizations is currently using an exploit for a vulnerability in Java that hasn’t been patched by Oracle.The zero-day exploit was recently observed by researchers from antivirus vendor Trend Micro in attacks against the armed forces of an unnamed NATO country and a U.S. defense organization. Those targets received spear-phishing emails that contained links to Web pages hosting the exploit.The cyberespionage group, known as APT28 and Pawn Storm, has been active since at least 2007. Some security vendors believe that it operates out of Russia and has ties to that country’s intelligence services.To read this article in full or to leave a comment, please click here

Huawei buys software networking tech from Irish Amartus

Chinese networking giant Huawei has bought the software-defined networking (SDN) division of Irish telecom software maker Amartus.Amartus’ senior team and product staff in Ireland will join Huawei, which sees the acquisition as a way to expand its investment in research and development in Ireland and Europe, it said in a news release.The part of privately held Amartus that remains unsold will continue serving current customers and will focus on providing telecom software development, integration expertise and services to vendors and service providers.Amartus’s main product is Chameleon SDS, which it describes as a “service orchestration platform” for cloud and network services. It allows telecom operators to control networks virtually and automate the delivery of network services.To read this article in full or to leave a comment, please click here

IoT analytics brings new levels of innovation to new product development

Studies show that around 40% of products fail. But what if product designers could understand what features are most and least popular, which components tend to fail sooner than others, and how customers actually use products versus how designers think they use them? And, what if product developers could then utilize these insights to develop products that perform better, potentially cost less and, most importantly, are aligned with actual customer needs?

Innovative product development teams in pretty much every industry are beginning to look at ways to translate enormous streams of real time machine data into actionable information to improve the product development process by understanding where product innovation is necessary, which features are most desirable, and how to lower their overall cost of ownership.

To read this article in full or to leave a comment, please click here

How OPM data breach could have been prevented

The recently disclosed data breach at the U.S. government's Office of Personnel Management follows a long history of lax security at the agency, according to the inspector general's office.In testimony before a joint House subcommittee hearing, Michael Esser, OPM's assistant inspector general for audits, told lawmakers that the agency's "long history of systemic failures to properly manage its IT infrastructure" may have invited a pair of related hacking incidents that compromised more than 21 million current and former government employees' personal information.[ Related: The OPM lawsuit will only make the lawyers rich ]To read this article in full or to leave a comment, please click here

DEF CON: Come hack the Internet of Things

The Internet of Things is talked about a lot and many people are unsure what it really is, but at DEF CON 23 this summer in Las Vegas, that should become a lot more clear as attendees compete to hack IoT devices.“Pwning IoT via Hardware Attacks” is a competition starting this year as part of IoT Village, a new sector of the conference focusing on security of proliferating device such as sensors, meters, industrial controls and smart appliances.A LOOK BACK: Leftovers of Black Hat, Defcon As part of the village attendees can enter their successful compromises against IoT devices in an attempt to win prizes. The entries will be judged on the severity of the compromise – how thoroughly a machine is taken over – and how it can be accessed, such as remotely or without being detectable, says Chase Schultz, a security researcher for Independent Security Evaluators (ISE), which is organizing the competition.To read this article in full or to leave a comment, please click here

False Dichotomy

Last week wasn’t a good one for the cause of network engineering. United Airlines grounded flights because of a router failure, the New York Stock Exchange stopped trading for several hours because of a technical problem, and the Wall Street Journal went off line for several hours due to a technical malfunction. How should engineers react to these sorts of large scale public outages? The first option, of course, is to flail our arms and run out of the room screaming. Panic is a lot of fun when you first engage, but over time it tends to get a little boring, so maybe panic isn’t the right solution here.

Another potential reaction is to jump on the “it’s too complex” bandwagon. sure, a lot of these systems are very complex — in fact, they’re probably too complex for the actual work they do. Complexity is required to solve hard problems; elegance is choosing the path with the least amount of complexity that will solve the problem. Far too often, in the engineering world, we choose the more complex path because of some imagined requirement that never actually materializes, or because we imagine a world where the solution we’re putting in Continue reading

Hacking Team’s arsenal included at least three unpatched exploits for Flash Player

Recently breached surveillance software maker, Hacking Team, had access to three different exploits for previously unknown vulnerabilities in Flash Player. All of them are now out in the open, putting Internet users at risk.Milan-based Hacking Team develops and sells surveillance software to government agencies from around the world. On July 5, a hacker released over 400GB of data stolen from the company on the Internet, including email communications, business documents, source code and other internal files.On Tuesday, researchers found a proof-of-concept exploit among Hacking Team’s files that worked against the latest version of Flash Player. Cybercriminals were quick to adopt it and were already using it in large-scale attacks by the time Adobe Systems released a patch for it on Wednesday.To read this article in full or to leave a comment, please click here

New products of the week 07.13.15

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Unified Communications Command Suite 8.1Key features: UCCS 8.1 helps gain insights into workforce activity, email usage and trends, and communication consumption across multiple UC platforms. It also drives cross-platform adoption and usage to realize maximum ROI. More info.To read this article in full or to leave a comment, please click here

New products of the week 07.13.15

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Unified Communications Command Suite 8.1Key features: UCCS 8.1 helps gain insights into workforce activity, email usage and trends, and communication consumption across multiple UC platforms. It also drives cross-platform adoption and usage to realize maximum ROI. More info.To read this article in full or to leave a comment, please click here

China retains supercomputing crown in latest Top 500 ranking

A supercomputer developed by China’s National Defense University remains the fastest publically known computer in the world while the U.S. is close to an historic low in the latest edition of the closely followed Top 500 supercomputer ranking, which was published on Monday.The Tianhe-2 computer, based at the National Super Computer Center in Guangzhou, has been on the top of the list for more than two years and its maximum achieved performance of 33,863 teraflops per second is almost double that of the U.S. Department of Energy’s Cray Titan supercomputer, which is at Oak Ridge National Laboratory in Tennessee.The IBM Sequoia computer at Lawrence Livermore National Laboratory in California is the third fastest machine, and fourth on the list is the Fujitsu K computer at Japan’s Advanced Institute for Computational Science. The only new machine to enter the top 10 is the Shaheen II computer of King Abdullah University of Science and Technology in Saudi Arabia, which is ranked seventh.To read this article in full or to leave a comment, please click here