“One of my biggest challenges,” Keith Collins told me recently, “is helping SAS understand how to communicate to IT organizations. We present workloads which look odd and different. IT does not know how to have an SLA (Service Level Agreement) around them. We take all of the compute and I/O capacity that they can give us.” …read more
An Android tablet brought back from North Korea by a tourist has provided a glimpse at some of the restrictions placed on IT users in the famously secretive country.
The Samjiyon is the third tablet to have gone on sale in North Korea. It was unveiled at a trade show in the capital, Pyongyang, last September and received some coverage on state television, but few westerners have had a chance to see it up close.
The tablet was likely manufactured outside of North Korea and the hardware itself is fairly unremarkable, but the software and the usage restrictions placed on the device provide some insights about life in the country.
The device has a 7-inch screen with 1,024 by 768 pixel resolution and runs Android 4.0.4, known as Ice Cream Sandwich. Under the hood is a 1.2GHz processor, 8GB or 16GB of internal storage, depending on the model, and a 2-megapixel camera.
Microsoft unleashed Windows 8.1 Enterprise Preview today. The early look at the enterprise version of Windows 8.1 follows the release of Windows 8.1 Preview at Microsoft’s BUILD conference last month, and includes a variety of tools that show Microsoft’s commitment to both BYOD and virtualization.
Aside from the slew of changes and enhancements in the regular Windows 8.1 Preview edition, Windows 8.1 Enterprise Preview also includes features uniquely designed for business customers. Windows 8.1 Enterprise Preview adds business-friendly elements like Direct Acess, and BranchCache. It also provides IT admins with the power to configure and lock down the Start screen on Windows 8 clients.
Microsoft also has tools in Windows 8.1 Enterprise Preview to help out with BYOD and virtualization: Windows To Go, and Virtual Desktop Infrastructure (VDI). Windows To Go lets the company put an entire managed Windows 8 desktop environment on a bootable USB thumb drive, and VDI gives the business the tools to enable users to use critical business software from virtually any Internet-connected device.
One of the hottest trends in business technology today is mobility and working remotely. The driving forces behind working remotely are the “bring your own device” (BYOD) trend and virtualization.
The video gaming industry is one of the most dynamic sectors in entertainment. As new features and functionality come online to evolve the game experience, the industry has intersected with another rapidly advancing IT sector: cloud computing. …read more
How do you find the right IT consultant for your business and specific IT needs? IT executives share their tips and advice on finding the right IT consultant for your organization. We also suggest five questions you should ask all prospective candidates. …read more
At DIRECTV, EVP and CIO Mike Benson told me recently, “There is not a single thing that the business can do without IT being involved. There is an IT component—a critical IT component—in all business activities, from creating a new offer to caring for our customers.” …read more
Back in the data-center day, we didn’t know how good we had it. Hardware and software options were fairly limited, so choice wasn’t a problem. (Indeed, one company was able to sell lots of equipment just by metaphorically waving its three-lettered logo in front of customers.) Operational management wasn’t terribly complex, either. IT worked fairly well, though developers tended to have more fun than support personnel and sysadmins. (For a discussion of this foundational thesis, see “Complexity Barrier Makes IT Matter More Than Ever.”) …read more
By Kimberly Whitler, Contributor As the second article (click here for the first article) in a series investigating how firms can create a stronger CMO-CIO partnership, I interviewed two CMO-CIO pairs to get different perspectives on the topic. The first pair interviewed was Dan Pingree and Michael Moore, the head of marketing and IT respectively, from Moosejaw Mountaineering, an online and brick and mortar retailer specializing in outdoor recreation apparel and gear for snowboarding, rock-climbing, hiking, and camping. The second pair interviewed was Nancy Costopulos and Bob Panger, the CMO and CIO from the American Marketing Association, one of the largest marketing associations in the world, with more than 30,000 global members who work, teach, and study in the field of marketing. …read more
U.S. law enforcement officials have charged eight people in an extensive bribery and kickback scheme it alleges involved fake companies, sham invoices and made-up IT consulting services. …read more
The slide below will be familiar to just about anyone who has seen me present. I have used the Threat Hierarchy, first portrayed by my predecessors at Gartner, for a dozen years to launch my narrative on what drives the IT security industry. As I explain at least twice a week to eager investors who want to develop a security portfolio, IT security is different than any other technology sector. There is no maturation. There will not be three or four big players who dominate the space as there are in PCs, databases, ERP, or CAD/CAM. Because there is an outside driving force: threat actors. …read more
The slide below will be familiar to just about anyone who has seen me present. I have used the Threat Hierarchy, first portrayed by my predecessors at Gartner, for a dozen years to launch my narrative on what drives the IT security industry. As I explain at least twice a week to eager investors who want to develop a security portfolio, IT security is different than any other technology sector. There is no maturation. There will not be three or four big players who dominate the space as there are in PCs, databases, ERP, or CAD/CAM. Because there is an outside driving force: threat actors. It was only in 2008 that I realized the threat hierarchy was actually a predictor of future trends. In 2001 I would argue that cybercrime was not really a threat, it did not exist in a big way, there was no Lex Luther skimming pennies off of every transaction on the Internet. Obviously that changed pretty dramatically within a couple of years. It was that realization that led me to research what used to be called Information Warfare, now cyberwar. …read more
The House of Representatives Infrastructure and Communications Committee has today released its report based on its extensive inquiry into IT pricing in Australia. Specifically, the inquiry investigated claims that Australian consumers pay significantly higher prices for IT products, including games, than consumers overseas.
“The committee found that big IT companies and copyright holders charge Australians, on average, an extra 50 per cent, a practice consumers call the ‘Australia Tax’”, said committee chair Nick Champion MP in a statement. “High IT prices can have significant impacts given the critical role IT plays in many areas of Australian life.”
IBM and Pivotal announced at the O’Reilly Open Source Convention (OSCON) that the two would collaborate on development of the popular Cloud Foundry development platform. The partnership will be make it easier for developers to deploy and manage cloud applications, and will be great for businesses looking to take advantage of the cloud.
The Cloud Foundry website describes it as an open source platform-as-a-service (PaaS) that gives developers the freedom to choose the cloud services, developer frameworks, and application services that meet their needs. According to the Cloud Foundry About page, “Cloud Foundry makes it faster and easier to build, test, deploy and scale applications.”
IBM may not have the clout it once carried before the rise of Microsoft, but Big Blue is still a powerful name in IT, and recently it has been a driving force behind open source cloud projects. IBM has been a leading supporter of OpenStack, an open source cloud infrastructure initiative. By working with Pivotal to foster development of the Cloud Foundry platform, IBM is now expanding its support for both open source, and the cloud.
Al Hilwa, an IDC analyst focused on application development software, shared some thoughts on the Cloud Foundry news. “Given this announcement, I expect to see IBM invest in this project and help drive its governance forward to really achieve critical mass. Cloud Foundry has already garnered significant support from many players and has built up an ecosystem, but putting IBM’s imprimatur and resources behind it will be felt in the industry.”
That IT professionals work on vacation is as obvious as sand on a beach. Some see it as part of the job bargain, and maybe there’s something to relish about being indispensable. …read more
Microsoft recently rolled out Windows Server 2012 R2 Preview. The update for Microsoft’s flagship server OS includes a number of features to improve and enhance managing virtual servers with Windows Server 2012.
Virtual servers are crucial for small and medium businesses. Most SMBs don’t have an IT department or data center to work with and need tools that simplify management and allow them to operate an entire IT infrastructure from a single box. Virtual servers allow businesses to maximize the value and productivity of their investment in hardware.
With Windows Server 2012 R2 Preview, Microsoft has streamlined the performance of Hyper-V. Replication between virtual servers is faster, and more frequent, and Microsoft has added more disaster recovery options. The new Hyper-V also allows you to assign QoS (quality of service) to prioritize disk access for virtual machines that need it more, such as a database server.
Linux VMs
One of the best improvements in Windows Server 2012 R2, though, is the enhanced support for Linux virtual machines. Previous versions of Hyper-V have technically supported Linux, but the capabilities were very limited.
SINGAPORE — After five years of explosive growth sales of high-end smartphones have hit a plateau and the $2 trillion industry — telecom carriers, handset makers and content providers — is buckling up for a bumpier ride as growth shifts to emerging markets, primarily in Asia.
While carrier subsidies have helped drive sales of high-end devices in mature markets, the next growth chapter will be in emerging markets where cost-conscious users demand cheaper gadgets and cheaper access to cheaper services.
This year, the number of mobile Internet users in the developing world will overtake those in the developed world for the first time — growing 27 times since 2007, compared to the developed world’s fourfold growth, according to estimates from the International Telecommunications Union.
“The center of gravity in the mobile ecosystem is likely to shift from the United States and Western Europe toward Asia,” Mary Ellen Gordon, director at mobile advertiser Flurry, said in an emailed interview.
That shift is a challenge to profit margins at the likes of Apple (AAPL) and Samsung Electronics, which together sell half of the world’s smartphones. Both companies announce quarterly results this week.
Samsung has indicated its second-quarter operating profit will fall short of estimates as demand for high-end smartphones slows. Apple is also exploring cheaper iPhone models that come in different colors to tap the mass segment, sources have said.
Neither faces any kind of crisis. But, industry experts say, many users in mature markets who want a smartphone already have one. European smartphone shipments grew 12 percent in January-March from a year ago, the slowest growth since IT research-firm IDC started tracking the mobile market in 2004.
Asia: A Driving Force
Many of the new mobile users will be in Asia Pacific. The region will this year have more mobile Internet users than Europe and the Americas combined, ITU predicts. And there’s plenty of room to grow: fewer than 23 in 100 in Asia are mobile Internet users, versus 67 in Europe and 48 in the Americas.
“Asia will be the driving force of global growth for the next two decades,” says Scott Lee, head of Asia at Appsnack, a division of U.S. based digital advertising company Exponential Interactive.
The catch: much of this growth will come from users of devices that are up to 10 times cheaper than those in the developed world. Cheaper components, easy and fast access to latest versions of Google’s (GOOG) Android operating system, reference designs from chipmakers and falling prices of the chipsets themselves are pushing this, says Frederick Wong, a portfolio manager at tech-focused eFusion Investment, who owns four smartphones.
China, the world’s biggest mobile market — where only about a fifth of …read more
sqlplus -s $USER_ID@$SID/$PWD<$CUR_DIR/sql_output.txt
set feedback off
set heading off
select distinct account_no from adj WHERE ADJ_TRANS_CODE=-2401 and request_status=1 and bill_ref_no=0
order by account_no;
EOF
if [ $? -eq 0 ]
then
echo " SQLPLUS Connection Successful "
else
echo " SQLPLUS Connection Failed "
fi
##echo " The account numbers to be used in BIP are "
if [ ! -s "$CUR_DIR/sql_output.txt" ]
then
echo "No account number for bad debt"
else
for i in `cat $CUR_DIR/sql_output.txt`
do
echo "bip $i is running"
sh $SCRIPT_DIR/bip.sh 01 0 $i > $CUR_DIR/bip_log_1.txt
sleep 180
done
fi
My error is in error.log
Code:
LOGGING STARTS
SQLPLUS CONNECTION
SQLPLUS Connection Successful
bip 114034 is running
cat: cannot open /.arborpw
my error is bip_log_1.txt
Code:
ERROR: $ARBORDBU environment variable is not set
This script requires that the $ARBORDBU environment variable be set.
Usage(){
echo "nn Usage is: `basename $0` n"
echo " where is a number between 01 and 99"
echo " is a number. Use 0=production, 3=proforma, 6=backout"
echo " is an arbor accout numbernn"
exit 0
}
# Check number of arguments
if [ "$#" -ne 3 ] ; then
Usage
fi
# Check to see if ARBORDBU is set
if [ -z "${ARBORDBU}" ] ; then
echo "ERROR: $ARBORDBU environment variable is not setn"
echo "This script requires that the $ARBORDBU environment variable be set.nn" ...read more