Topics pertaining to technology, especially as they pertain to business issues are discussed. Such topics include using tech to boost productivity, marketing with social media, cybersecurity, and numerous other topics.
Search This Blog
Monday, February 29, 2016
Saturday, February 27, 2016
Refine Vague Book Promotion with "Online Marketing for Busy Authors"
The rise of self-publishing has spawned a huge flood of eBooks in the market. What hasn’t grown along with this flood, however, is a step-by-step guide for how to market those eBooks. That’s where “Online Marketing for Busy Authors: A Step-by-Step Guide” steps in. Written by a veteran of the book publicity industry, the book aims to help authors make sense of the confusing world of marketing a book online.
Refine Vague Book Promotion with "Online Marketing for Busy Authors"
Refine Vague Book Promotion with "Online Marketing for Busy Authors"
Safeguard Your Network with New Cisco Small Business Routers
The Internet provides small businesses with an incredible amount of access to resources, but this access comes with some caveats, and security happens to be one of them. The new Cisco Small Business Routers: the RV320 and RV325 with Web filtering look to add a layer of protection by preventing access to dangerous sites on the Web.
The security threat landscape in the digital world is well documented. While the data breaches in large public and private organizations grab the headlines, thousands of such events take place daily targeting small businesses and individual users.
Safeguard Your Network with New Cisco Small Business Routers
In the News: Google Ends Right-Side Ads, MailChimp Adds Preview Feature
Successful marketing plans need many different facets in order to be effective. You need to consider things like search ads, email marketing and more. And this week, marketers got some news that impacts the way that both their search ads and marketing emails might be displayed. Get these headlines and more below in this week’s Small Business Trends news and information roundup.
In the News: Google Ends Right-Side Ads, MailChimp Adds Preview Feature
In the News: Google Ends Right-Side Ads, MailChimp Adds Preview Feature
Friday, February 26, 2016
How NOT to Use a Stock Photo
A lot of small businesses rely on stock photography services to add some high-quality images to their websites and other promotional materials.
The benefits of great visuals are obvious and have been discussed ad nauseum.
How NOT to Use a Stock Photo
Hong Kong leader falls victim to Facebook's 'angry face' feature - Feb. 26, 2016
Hong Kong's leader CY Leung is getting showered with angry faces.
Thousands of users are showing their dislike of Hong Kong's top official, clicking "angry" on his official Facebook entries.
Hong Kong leader falls victim to Facebook's 'angry face' feature - Feb. 26, 2016
Thousands of users are showing their dislike of Hong Kong's top official, clicking "angry" on his official Facebook entries.
Hong Kong leader falls victim to Facebook's 'angry face' feature - Feb. 26, 2016
Lisa Abbott of Genesys: Chat on Your Website Decreases Customer Abandonment by Half
Key findings in a recent Forrester Study on the benefits of using an omni channel engagement center, commissioned by customer experience platform provider Genesys, include:
- 50 percent reduction in customer abandonment at key points in the customer journey
- Over $1 million in increased revenue through increased ecommerce and voice conversions
Lisa Abbott of Genesys: Chat on Your Website Decreases Customer Abandonment by Half
Why cybercrime isn’t fun and (video) games
For young people, the internet can be a vital source of information, recreation, escape and more, but without the right guidance it can also be unsafe. Online games particularly make prime targets for cybercriminals, and there are also concerns that gaming networks can lead players astray, or even act as a criminal breeding ground.
Whatever the reasons might be, the fact is that teenagers are getting involved in cybercrime at an increasingly early age. According to recent statistics by the UK’s National Crime Agency (NCA), for example, the average age of cybercrime suspects over the last year was just 17 years-old, dropping dramatically from 24 years-old the previous year. This is clearly a worrying shift, and – according to the NCA – it could stem from a lack of understanding around what constitutes cybercrime.
Why cybercrime isn’t fun and (video) games
Solutions - 65V, 3.5A/5A Peak (IOUT), Synchronous Step-Down Silent Switcher Delivers 94% Efficiency at 2MHz & Ultralow EMI Emissions
MILPITAS, CA - February 25, 2016 - Linear Technology Corporation announces the LT8641, a 3.5A, 65V input capable synchronous step-down switching regulator. A unique Silent Switcher® architecture, combined with spread spectrum frequency modulation, reduces EMI/EMC emissions by more than 25dB even with switching frequencies in excess of 2MHz, enabling it to easily pass the automotive CISPR25 class 5 peak and average limits. Synchronous rectification delivers efficiency as high as 94% with a switching frequency of 2MHz. Its 3V to 65V input voltage range makes it ideal for single or dual cell automotive/transportation and industrial applications.
Solutions - 65V, 3.5A/5A Peak (IOUT), Synchronous Step-Down Silent Switcher Delivers 94% Efficiency at 2MHz & Ultralow EMI Emissions
Solutions - 65V, 3.5A/5A Peak (IOUT), Synchronous Step-Down Silent Switcher Delivers 94% Efficiency at 2MHz & Ultralow EMI Emissions
Google Right Side Ads End on Search Results
Google right side ads have appeared in search results since AdWords launched in 2000. No more. They’re history. R.I.P.
Google has confirmed a huge change to the way AdWords ads are displayed for desktop search results, and it is now rolling out for all of its users globally. Google right side ads are being killed off completely — although Product Listing Ads and ads in the Knowledge Panel will continue to be shown on the right — and adding a fourth ad for “highly commercial queries” above the organic search results.
Google Right Side Ads End on Search Results
Thursday, February 25, 2016
Dell Strengthens Backup Capabilities Spanning Client to Cloud | Dell
Dell today announced a series of new data protection solutions to help organizations better protect business-critical systems, applications, and data – either on premises or in the cloud. Offerings include: the general availability of Dell Data Protection | Rapid Recovery; three new data deduplication appliances models; new Dell Data Protection | Endpoint Recovery – Free Edition; and the new Dell Data Protection | NetVault Backup 11. These updates to the data protection product portfolio reinforce Dell’s commitment to driving innovation and giving customers the choice and flexibility they need to quickly address evolving backup and recovery needs as they move data and applications to the cloud.
Dell Strengthens Backup Capabilities Spanning Client to Cloud | Dell
Dell Strengthens Backup Capabilities Spanning Client to Cloud | Dell
Google Seeks Small Business Owners as Trusted Testers
Small business owners now have an opportunity to try out Google My Business tools before they’re rolled out to the general pubic. Google My Business has announced its “trusted Partners” program as a way to test new products and features. Elisabeth Powers Google My Business community manager, posted in the Google My Business Help forums recently that the company is looking for beta testers from the business community. The new program applies not only to new products and features for Google My Business but in the Google Ads department too.
She further emphasized that this is a huge opportunity for all US-based small and medium sized businesses.
Google Seeks Small Business Owners as Trusted Testers
SoundCloud Still Struggles With Profitability
Audio-based social networking service SoundCloud is struggling financially. The company reportedly lost a total of $70.3 million in earnings in 2013 and 2014 combined.
The company’s struggles could be a bad sign for entrepreneurs who use the service either to create podcasts or market their music. In 2014, SoundCloud launched a partnership program with artists who wished to sell their music downloads from the platform. Since SoundCloud’s launch in Berlin in 2007, people have used it to record, share and promote a variety of different audio content. If the company were to fail, there are other options out there, but none with the exact same features.
SoundCloud Still Struggles With Profitability
Identity theft accounts for 'majority of data breaches'
Theft of identities along with personal information still accounts for the majority of data breaches, a new global survey by Gemalto has found.
According to the 2015 Breach Level Index (BLI), identity theft accounted for 53% of all data breaches as well as 40% of “all compromised records” last year.
Identity theft accounts for 'majority of data breaches'
16 Ways a Virtual Phone Service Can Help Your Business
When launching your small business, it’s unlikely that you thought hard about setting up a phone system, if you thought about it at all.
You’re not alone in this: out of the 25-plus startup checklists we looked at online while researching this article, only one listed phone systems and it was pretty far down in terms of priority.
16 Ways a Virtual Phone Service Can Help Your Business
MEDIA ALERT: BMC Transforms Mainframes for the Digital World at Share 2016
Discover how to unleash the value and power of the Mainframe at Booth 409
RSS Content - BMC Software
RSS Content - BMC Software
Solutions - 2kVAC Isolated µModule Converters, 2.8Vin to 40Vin Meet Information Technology Equipment Safety UL60950
MILPITAS, CA - February 24, 2016 - Linear Technology introduces the LTM8067 and LTM8068, DC/DC µModule® regulators with 2kVAC galvanic isolation. The LTM8067 and LTM8068 include an isolating transformer, control circuitry, power switches and other supporting components in a 9mm x 11.25mm x 4.92mm BGA package. Only one resister, plus input and output capacitors are required to complete the design. Pin creepage and clearance and other features permit these devices to be recognized by UL60950 Information Technology Equipment Safety. The LTM8068 includes an additional low noise linear regulator. Applications include ground loop elimination in systems with sensors or noise sensitive loads in industrial automation, test and measurement equipment.
Solutions - 2kVAC Isolated µModule Converters, 2.8Vin to 40Vin Meet Information Technology Equipment Safety UL60950
Solutions - 2kVAC Isolated µModule Converters, 2.8Vin to 40Vin Meet Information Technology Equipment Safety UL60950
Solutions - Linear Technology Expands In Singapore To Boost Worldwide Production Capacity
SINGAPORE, February 23, 2016 - Linear Technology Corporation (NASDAQ: LLTC) today opened the company’s third semiconductor test facility in Singapore. The additional space for staff, equipment and materials will allow the company to more than double its production capacity of advanced analog circuits and µModule® (micromodule) products. This will strengthen Linear Technology’s ability to meet the growing demand for high performance analog integrated circuits worldwide.
Solutions - Linear Technology Expands In Singapore To Boost Worldwide Production Capacity
Solutions - Linear Technology Expands In Singapore To Boost Worldwide Production Capacity
Metrics Overload? How to Streamline Marketing Data
From Google Analytics to social media dashboards, too much data can lead to metrics overload.
How can you tell if your customers are happy with your service? How do you know whether your inbound marketing strategy is working? How do you know if your social media marketing is building strong brand awareness or getting lost in the Twittersphere?
Metrics Overload? How to Streamline Marketing Data
Handmade Business Industry Sees Robust Growth, Based on Etsy Results
Etsy announced strong full year 2015 results, a reflection of the overall robustness of the handmade business industry.
Etsy reported 21.3 percent growth in merchandise sales year over year for 2015 and 35.4 percent revenue growth.
Handmade Business Industry Sees Robust Growth, Based on Etsy Results
Dell and EMC Receive US Federal Trade Commission Clearance for Proposed Merger | Dell
Dell Inc. and EMC Corp. (NYSE: EMC) today announced the expiration of the waiting period under the Hart-Scott-Rodino Antitrust Improvements Act of 1976, as amended, in connection with the companies’ proposed combination. The expiration of the waiting period occurred at 11:59 p.m. EST on Feb. 22, satisfying one of the conditions to the closing of the proposed transaction. The transaction remains subject to approval by EMC’s shareholders, regulatory clearance in certain other jurisdictions and other customary closing conditions.
Dell and EMC Receive US Federal Trade Commission Clearance for Proposed Merger | Dell
Dell and EMC Receive US Federal Trade Commission Clearance for Proposed Merger | Dell
New MailChimp Feature Gives Better Idea How Emails Look to Clients
The email marketing service provider MailChimp has just recently unveiled a new feature, MailChimp Inbox Preview, which enables its users to preview its emails before they are sent out. MailChimp Inbox Preview is an upgraded version to its predecessor, Inbox Inspector.
Inbox Inspector helped marketing campaigns by offering previews to the users. However, live HTML versions were still rendered differently by different email clients. The Inbox Preview does away with this shortcoming by returning the preview exactly as it would look online in more than 40 clients. Not only this, Inbox Preview also recognizes which client is popular among subscribers. This will help enterprises to revise their designs accordingly.
New MailChimp Feature Gives Better Idea How Emails Look to Clients
Privacy and security ‘war’ must come to an end
Cybersecurity experts are joining forces with government officials to try and “end the war between privacy and security”.
The Digital Equilibrium Project, as it’s known, aims to “foster a new, productive dialogue on balancing security and privacy in the connected world”.
Privacy and security ‘war’ must come to an end
Wednesday, February 24, 2016
Internal Segmentation Firewalls—Securing the Inner Network | Fortinet Blog
Our threat landscape is constantly evolving. As known vectors are exposed and neutralized, new methods emerge to take their places. And the current wave of advanced threats are getting increasingly better at slipping past perimeter security to reach the unprotected internal network. While edge firewalls do an excellent job of protecting the network border, they can’t help after a breach occurs.
It might be malicious code that sits dormant for months before launching an opportunistic attack on critical infrastructure. Or it could be a hack that quietly exfiltrates sensitive data and intellectual property. Once something reaches the network interior, there’s traditionally been very little in place to spot their presence or activities—let alone stop them. This is why some of the recent breaches you may have heard of went undetected over extended periods of time, with damages snowballing into the millions of dollars.
Internal Segmentation Firewalls—Securing the Inner Network | Fortinet Blog
Sprint Recognized for its Outstanding Contribution Furthering the Development of TD-LTE | Sprint Newsroom
Sprint Receives GTI Market Development Award at Mobile World Congress
Sprint Recognized for its Outstanding Contribution Furthering the Development of TD-LTE | Sprint Newsroom
Sprint Recognized for its Outstanding Contribution Furthering the Development of TD-LTE | Sprint Newsroom
Sprint and Techstars Announce Ten Startups Entering the 2016 Sprint Mobile Accelerator | Sprint Newsroom
Third annual program in Kansas City runs February 22 through May 24
Sprint and Techstars Announce Ten Startups Entering the 2016 Sprint Mobile Accelerator | Sprint Newsroom
Sprint and Techstars Announce Ten Startups Entering the 2016 Sprint Mobile Accelerator | Sprint Newsroom
AVT-PR-Avnet Government Solutions Expands its GSA Schedule to Include
Avnet helps partners capitalize on converged infrastructure and cloud opportunities in the U.S. public sector
AVT-PR-Avnet Government Solutions Expands its GSA Schedule to Include
AVT-PR-Avnet Appoints Bob Bowen to Lead Global Trade Compliance
Phoenix – Avnet, Inc. (NYSE:AVT), a leading global technology distributor, today announced that Bob Bowen has joined the company as vice president of global trade compliance. In this role, Bowen will oversee Avnet’s global trade compliance program, which ensures that customers and suppliers remain compliant with the evolving laws and regulations in countries around the world. Bowen reports to Mike Buseman, chief global logistics and operations officer.
AVT-PR-Avnet Appoints Bob Bowen to Lead Global Trade Compliance
AVT-PR-Avnet Appoints Bob Bowen to Lead Global Trade Compliance
Google Play porn clicker 'is a truly large-scale campaign'
We Live Security sat down with ESET’s Lukáš Štefanko to discuss the porn clicker family and other mobile malware.
Lukas, are you sure that those malicious apps you discovered really belong to the largest malware campaign Android users have ever faced at Google Play?
Google Play porn clicker 'is a truly large-scale campaign'
Porn clicker trojans keep flooding Google Play
ESET researchers have found 343 malicious porn clicker trojans, which ESET detects asAndroid/Clicker, on Google Play over the last seven months – and their numbers keep rising. In one of the largest malware campaigns on the Google Play Store yet, criminals continue to upload further variants of these malicious apps to the official app store for the Android mobile platform.
“There have been many malware campaigns on Google Play, but none of the others have lasted so long or achieved such huge numbers of successful infiltrations,” explains Lukáš Štefanko, a malware researcher at ESET, who specializes in Android malware.
Porn clicker trojans keep flooding Google Play
Porn clicker trojans at Google Play: An analysis
Malicious porn clickers are mostly fake versions of popular games with very similar names and icons to legitimate applications. For instance, there were more than 30 bogus Subway Surfers and more than 60 fake GTA applications.
These apps have nothing in common with the official Subway Surfers or GTA games. The trojans were mostly devoid of any legitimate functionality and took advantage of having been given similar names to those of popular applications.
Porn clicker trojans at Google Play: An analysis
Mellanox Partners with Nutanix to Deliver Effortless Enterprise Infrastructure (NASDAQ:MLNX)
Integration with Unique Ethernet Switch Makes the Network Invisible Too, Achieves "Nutanix Ready for Networking" Validation
Mellanox Partners with Nutanix to Deliver Effortless Enterprise Infrastructure (NASDAQ:MLNX)
Mellanox Partners with Nutanix to Deliver Effortless Enterprise Infrastructure (NASDAQ:MLNX)
Spotlight: ezCater Connects Businesses With Caterers, Restaurants
When you host a business meeting or event, you may find yourself in a situation where you need to provide food for attendees.
That’s exactly the situation in which ezCater aims to help. The company focuses its efforts specifically on business customers. Read more about ezCater’s offerings in this week’s Small Business Spotlight.
Spotlight: ezCater Connects Businesses With Caterers, Restaurants
Facebook's adds 'love,' 'haha,' 'wow,' 'sad' and 'angry' to its 'like' button - Feb. 24, 2016
Now you can do a whole lot more than "like" a Facebook post. "Love," "Haha," "Wow," "Sad," and "Angry" are five new Facebook buttons that people can click when responding to a post.
Anyone who uses Facebook can now choose from these "Reactions" on top of liking, commenting or sharing something.
Facebook's adds 'love,' 'haha,' 'wow,' 'sad' and 'angry' to its 'like' button - Feb. 24, 2016
Anyone who uses Facebook can now choose from these "Reactions" on top of liking, commenting or sharing something.
Facebook's adds 'love,' 'haha,' 'wow,' 'sad' and 'angry' to its 'like' button - Feb. 24, 2016
How Can You Prevent People from Using Your Wireless Network
Do you suspect your neighbor to use your wireless network? The reasons behind can be slow internet connection or that the devices keep disconnecting from the router. People connected to the wireless router may also access the shared folders on the network and thus, data theft is a threat here. Luckily enough, there are various ways to detect unknown connections to the network as well as stop them of getting connected.
How Can You Prevent People from Using Your Wireless Network
How Can You Prevent People from Using Your Wireless Network
Keys to Getting Your Content Featured by Google
Have you ever been searching for something on Google and seen “featured articles” that relate to your search? Although featured articles were first introduced in August 2013, it feels like a much newer feature to most businesses. These featured articles highlight long-form content for topics (usually generic in nature) that a user might be trying to research. Click Seed notes that according to a Google Webmaster blog on featured articles, “users often turn to Google to answer a quick question, but research suggests that up to 10 percent of users’ daily information needs involve learning about a broad topic.”
Keys to Getting Your Content Featured by Google
Keys to Getting Your Content Featured by Google
What is the Dark Web?
So exactly what is the Dark Web? The submerged part of the iceberg, the scary part of the Internet — these are just some depictions of the so-called “Dark Web.”
Here’s an exploration what’s behind this part of the Web’s infamous reputation.
What is the Dark Web?
Tuesday, February 23, 2016
Visage Unveils New Version of Design Tool for Content Marketers
Getting ahead in small businesses these days requires an online presence AND creativity. Visage, a business devoted to assisting small businesses with visual content, addresses both. Visage has announced an update of its design tool for content marketers called Visage 3.0, officially released Feb. 23, 2016.
Emerging from Column Five Media, a full service visual content company, in 2013, Visage was created to give the small business owner the freedom to create his or her own designs regardless of graphic design skills.
Visage Unveils New Version of Design Tool for Content Marketers
Turn Your Smartphone or Tablet Into a Laptop with NexDoc
Small is beautiful, especially when your business operates on a tight budget or when you need to be constantly on the move.
Nex Computer’s new 14-inch monitor with a built-in battery and Bluetooth keyboard transforms smartphones, tablets, mini PCs and more into a laptop addressing small businesses’ need for smaller and smarter innovation.
Turn Your Smartphone or Tablet Into a Laptop with NexDoc
Haystacks and Needles: IoT Security through "Pico"-Segmentation | Fortinet Blog
Over the past year or so we’ve heard lots about segmentation and micro-segmentation as new ways to build effective cyber defences in enterprise networks and data centres… but is it enough? Can we delve even deeper? I believe there may be a third leg to the segmentation stool: pico-segmentation.
Haystacks and Needles: IoT Security through "Pico"-Segmentation | Fortinet Blog
Haystacks and Needles: IoT Security through "Pico"-Segmentation | Fortinet Blog
Dell Enters Embedded PC Market with New Embedded Box PCs | Dell
Dell today announced the launch of its first purpose-built industrial PC (IPC) products, Embedded Box PC 3000 Series and 5000 Series, aimed at taking the embedded PC market mainstream. Available this summer, the products are fanless, ruggedized and built to provide customers fast time to market. With a long history of rugged engineering innovation and extensive experience in OEM Solutions, the products expand Dell’s Internet of Things (IoT) portfolio. Dell will bring the benefits of short lead times, enterprise-class lifecycle, stability, service and support to customers who may be underserved by current embedded solutions.
Dell Enters Embedded PC Market with New Embedded Box PCs | Dell
Dell Enters Embedded PC Market with New Embedded Box PCs | Dell
AVT-PR-Avnet Showcases Latest in Healthcare IT Solutions and Services
Avnet and its partner ecosystem in the U.S. and Canada demonstrate how they are helping drive the future of healthcare delive
AVT-PR-Avnet Showcases Latest in Healthcare IT Solutions and Services
The industrialization of cybercrime may be upon us
We are slowly seeing the “industrialization” of cybercrime according to an expert.
Dr. Adrian Nish, head of cyber threat intelligence at BAE, said that cybercriminals are becoming more “professionalized”, the Telegraph reported.
The industrialization of cybercrime may be upon us
AVT-PR-New Issue of Supply Chain Navigator from Avnet Puts Spotlight
PHOENIX – For decades, sustainability advocates have been lobbying to convince the corporate world that doing what’s right for the environment and society is good business. But, until recently, the bottom line benefits of corporate social responsibility (CSR) remained unclear. The Winter 2016 issue of Supply Chain Navigator released today by Avnet, Inc. (NYSE: AVT), a leading global technology distributor, examines the growing recognition that not only is it possible to do well while doing good, but that supply chain leadership is essential to realizing the strategic advantages of social, environmental and economic sustainability.
AVT-PR-New Issue of Supply Chain Navigator from Avnet Puts Spotlight
AVT-PR-New Issue of Supply Chain Navigator from Avnet Puts Spotlight
BMC Discovery Empowers IT to Be Lean, Secure and More Agile While Delivering a 470 Percent Return on Investment
"Start anywhere" application mapping empowers IT organizations to understand how their responsibilities impact the business
RSS Content - BMC Software
RSS Content - BMC Software
Mellanox Technologies Completes Acquisition of EZchip (NASDAQ:MLNX)
Mellanox Technologies Completes Acquisition of EZchip (NASDAQ:MLNX)
UN aviation agency bans lithium-ion batteries as cargo on passenger flights — RT News
Lithium-ion batteries can no longer be transported as cargo on planes, the UN aviation agency has ruled, alleging a serious safety risk. The rechargeable phone and laptop batteries have been ruled a fire hazard, and the decision will stand until new packaging standards are agreed.
UN aviation agency bans lithium-ion batteries as cargo on passenger flights — RT News
UN aviation agency bans lithium-ion batteries as cargo on passenger flights — RT News
Do You Really Need a New Website?
You would think that, as a Web developer and content marketer, the last question to ask a potential client is whether they really need a new website. And yet, that’s one of the most productive questions to ask.
Far from talking clients out of working with you, it frequently helps solidify their thinking, which in turn makes your job much easier. It’s always easier to succeed if you’ve defined what success looks like before you begin.
Do You Really Need a New Website?
Digital childhoods: How different nations bring up their kids
Most parents think carefully about when to give their children their first set of house keys, or let them go out to play with no adult supervision. Yet in our digitalized world, the same caution should be exercised in the virtual world, such as on social networks or when giving children their first smart gadgets.
ESET has looked deeper into what parents in the United States, Germany, the United Kingdom and Russia regard as the appropriate age for digital activities.
Digital childhoods: How different nations bring up their kids
4 internet-savvy countries agree: Kids go digital too early
Nowadays, the internet and technology have become so important for business, travel and many other everyday tasks that they practically surround us all the time. This is true for the younger generation as well, including even the smallest children, but online surveys by ESET show that a majority of parents in Russia, the United Kingdom, Germany and the United States are not at all happy about this.
4 internet-savvy countries agree: Kids go digital too early
4 internet-savvy countries agree: Kids go digital too early
Annual Threat Report details the cybercrime trends that shaped 2015 and identifies top emerging secu | Dell
Dell today announced the results of the Dell Security Annual Threat Report detailing the cybercrime trends that shaped 2015 and identifying top emerging security risks for 2016. The report, based on data collected throughout 2015 from the Dell SonicWALL Global Response Intelligence Defense (GRID) network with daily feeds from more than one million firewalls and tens of millions of connected endpoints, Dell SonicWALL network traffic and other industry sources, equips organizations with practical, evidenced-based advice so they can effectively prepare for and prevent attacks.
Annual Threat Report details the cybercrime trends that shaped 2015 and identifies top emerging secu | Dell
Annual Threat Report details the cybercrime trends that shaped 2015 and identifies top emerging secu | Dell
Monday, February 22, 2016
AVT-PR Jeff Bawol and Gavin Miller of Avnet Recognized as 2016 CRN Channel Chiefs
Executives honored for their roles in accelerating growth in the Americas for Avnet and its channel partners
AVT-PR Jeff Bawol and Gavin Miller of Avnet Recognized as 2016 CRN Channel Chiefs
LG’s Latest Budget-Priced Smartphone Includes Nano Coated Tip Stylus Pen
LG will be introducing the latest version of its flagship smartphone at the upcoming Mobile World Congress conference this week. At the event, the South Korean company will show off the new LG5, but fans of stylus devices will be more interested in the 5.7-inch phablet LG Stylus 2.
Currently there is one phone that dominates the stylus segment on mobile, the Samsung Galaxy Note. But other players are introducing their own versions, including LG and Huawei.
LG’s Latest Budget-Priced Smartphone Includes Nano Coated Tip Stylus Pen
Instagram Makes It Easier to Have Multiple Accounts
Recently, Instagram announced a new feature which has been included in its mobile app. You can now have multiple accounts on Instagram and switch easily between them from within the Instagram mobile app without having to sign out.
This will no doubt come as a delight to Instagram’s huge user base, especially business users. These users in particular have had need to manage multiple accounts on Instagram for some time.
Instagram Makes It Easier to Have Multiple Accounts
Introducing Galaxy Forever, Only from Sprint; Gives Customers Annual Upgrade to Samsung Flagship Galaxy Smartphones | Sprint Newsroom
Get one Samsung Galaxy S7 and Samsung Galaxy S7 edge, get one for half price;Available March 11; Pre-order begins Feb. 23 at sprint.com/gs7
Introducing Galaxy Forever, Only from Sprint; Gives Customers Annual Upgrade to Samsung Flagship Galaxy Smartphones | Sprint Newsroom
New PayPal Commerce Lets You Stick Buy Buttons Almost Anywhere
PayPal has unveiled the new PayPal Commerce, a shopping platform that enables merchants and partners to embed “Buy” buttons into blogs, social feeds, emails, apps and ads through a set of APIs.
Shortly after splitting from eBay in 2015, the newly independent PayPal acquired commerce startup Modest — a company that basically made it possible for merchants to integrate ecommerce into their emails and apps. The merged companies spent six months in what Harper Reed, Modest’s co-founder, describes as “fun and focused” product development.
New PayPal Commerce Lets You Stick Buy Buttons Almost Anywhere
How to Print from Your Android Phone
Mobile technology has eliminated some of the need for printing hard copies of business documents and images. But you don’t have to do away with printing completely. In fact, there are plenty of apps and methods out there that allow you to print directly from your mobile device.
If you use an Android phone or tablet, you can use the methods below to print from your Android phone any documents or images that you have on your mobile device.
How to Print from Your Android Phone
Mellanox Technologies, Ltd Partnering with Hewlett Packard Enterprise to Boost NFV and Telco Network Performance (NASDAQ:MLNX)
Record-setting 33 Mpps DPDK Packet Rate Achieved with ConnectX®-4 Lx 25Gb/s Ethernet NIC
Mellanox Technologies, Ltd Partnering with Hewlett Packard Enterprise to Boost NFV and Telco Network Performance (NASDAQ:MLNX)
Mellanox Technologies, Ltd Partnering with Hewlett Packard Enterprise to Boost NFV and Telco Network Performance (NASDAQ:MLNX)
What is Facebook Livestreaming?
Facebook Live was launched in August of 2015 with a clever campaign that made the platform available only to celebrities. This of course gave the app a lot of attention as Meerkat and Twitter’s Periscope were gaining traction. And by December of the same year, Facebook decided it was time to let more people in on the fun.
However, there is a big but! The Facebook Livestreaming app is only available to a limited group of iPhone owners. Although Facebook still hasn’t announced the availability of a Live app for Android based devices, you can use the Facebook Mentions app to stream live video if you don’t happen to own an iPhone.
What is Facebook Livestreaming?
Linux Mint site hacked, users unwittingly download backdoored operating system
I hope you weren’t one of the hundreds of people who downloaded a compromised version of the Linux Mint operating system on Saturday.
Because if you were, it’s possible that you’re not just running one of the more user-friendly flavours of Linux on your computer but also playing host to a Linux ELF trojan called Tsunami, that can be used to steal files from your system and launch distributed denial-of-service (DDoS) attacks.
Linux Mint site hacked, users unwittingly download backdoored operating system
The security review: The state of security in companies in the EMEA region
Welcome to this week’s security review, which includes a detailed report from ESET on the state of information security in companies in the EMEA region, helpful advice on support scams and the rise of Android ransomware.
The security review: The state of security in companies in the EMEA region
The security review: The state of security in companies in the EMEA region
Using Technology to Improve Your Email Sales
Email is a great marketing tool. A study by the global information services company Experian found that companies generate more than $44 in email sales revenue for each dollar of email marketing expense. That’s a massive return.
There’s just one problem. Customers are getting inundated with sales emails, and fewer of them are clicking through. In the first quarter of 2014, the average email click through rate was 4.3 percent, down from nearly 7.5 percent in the third quarter of 2006, the Epsilon Email Trends and Benchmark Report shows.
Using Technology to Improve Your Email Sales
4 Tips For Protecting Your Online Reputation
As an entrepreneur, your reputation is everything, isn’t it? If you don’t maintain a positive reputation, your business won’t survive. Prospects won’t be attracted to your brand and you will find it increasingly harder to gain more business.
Managing your reputation is one of the most crucial things you will need to do as a business owner. This is even more crucial when it comes to the Internet. It only takes a few online attacks to cause serious damage to the reputation you have worked so hard to build.
4 Tips For Protecting Your Online Reputation
Link Building Lessons from the Real Estate Industry
Are links doing more harm than good? With the rules for link building constantly changing, it can be hard to know what’s a smart link building strategy and what will land you in hot water with Google.
Last year, Google’s webmaster trends analyst, John Mueller, surprised the SEO world with his pronouncement that link building, once considered essential to SEO, was no longer advisable.
Link Building Lessons from the Real Estate Industry
Analysis of CVE-2016-0059 - Microsoft IE Information Disclosure Vulnerability Discovered by Fortinet | Fortinet Blog
This month Microsoft patched two vulnerabilities which were discovered and reported by me, one is an information disclosure vulnerability in Internet Explorer (IE) (CVE-2016-0059 in MS16-009), the other is a memory corruption vulnerability in Microsoft Office (CVE-2016-0055 in MS16-015). In this blog, we will provide in-depth analysis of CVE-2016-0059. The vulnerability exists because Microsoft Hyperlink Object Library improperly discloses the contents of its memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability, an attacker must convince a user to either click a link in an email message or open an Office file, and then click a link in the file.
In my original vulnerability report to Microsoft, I marked the vulnerability as Microsoft Office Excel heap overflow vulnerability. Because the vulnerability actually lies in the library hlink.dll (Microsoft Hyperlink Object Library) which is a component in Internet Explorer, Microsoft classifies it as Internet Explorer information disclosure vulnerability. In this blog, I still use Microsoft Office to demonstrate and analyze this vulnerability.
Analysis of CVE-2016-0059 - Microsoft IE Information Disclosure Vulnerability Discovered by Fortinet | Fortinet Blog
Sunday, February 21, 2016
Word 2013 (Office 365): A Full Tutorial of Most Features Part 1 of 2
Here is a tutorial featuring Word for Office 365. - JBK
Overview of the New Office 365
I am looking for some good tutorials on Office 365. This one seems to be a pretty good overview. - JBK
Saturday, February 20, 2016
Friday, February 19, 2016
eBay Changes Strategy, Etsy Opens First Retail Store and More
eBay was once the biggest name in ecommerce. But the online auction site has fallen behind other big names like Amazon. Now, eBay has plans to make a comeback, which involves making some major changes.
And eBay wasn’t the only ecommerce company to make changes this week. Handmade business giant Etsy opened its first physical store in New York City.
These headlines and more are included in this week’s Small Business Trends News and Information Roundup.
eBay Changes Strategy, Etsy Opens First Retail Store and More
Average cost of cybercrime rises by 200% in just five years
Cybercrime is costing the global economy up to $450 billion annually, a new report by Hamilton Place Strategies reveals.
The paper, entitled Cybercrime Costs More Than You Think, opens by stating that: “In an increasingly interconnected world fueled by the expansion of digital technology, cybercrime has become a big business.”
Average cost of cybercrime rises by 200% in just five years
Google Accelerated Mobile Pages Speeds Up Mobile Content Delivery
Google is getting ready to roll out an ambitious Google Accelerated Mobile Pages(AMP) project this month to speed up mobile content delivery and create a better user experience.
According to the search giant, Google Accelerated Mobile Pages is an open source initiative designed to give publishers a way to create mobile optimized content once and have it load instantly everywhere on the mobile web.
Google Accelerated Mobile Pages Speeds Up Mobile Content Delivery
The Four “A”s of Account Management
Many suggest that the biggest vulnerabilities in a network environment are its users. If only there were some way to control those unruly users… Oh, but there is! By implementing a combination of different techniques, you can limit the damage that can be done by users (or attackers in users’ guise). I refer to those techniques as the “Four ‘As’ of Account Management”, as a mnemonic device to help me remember those aspects of user account wrangling.
This article is intended as a brief introduction to the various techniques, and how they interact to improve security in your network environment. In future articles, I will go in more depth about those techniques to give you a better idea of their specific applications and importance.
The Four “A”s of Account Management
Apple and 'exceptional access' to crypto protection
Apple is the latest in a host of technology players to be requested to allow exceptional access, that is, access in exceptional cases where it would be deemed to have high value relative to an active investigation. But they are certainly neither the first nor the last.
We recently wrote about ProtonMail’s attempt to curtail government pressure to allow backdoor access to email content, to which they’ve rallied the privacy advocates to force a public vote in Switzerland. They are not alone in the email space either, a host of other providers have been asked to defend similar positions both domestically and abroad.
Apple and 'exceptional access' to crypto protection
7 Ways to Get Great Results with Gmail Ads
Gmail Ads are one of the more intriguing opportunities Google has given advertisers to reach people where they spend a lot of their time online – in their inboxes. I’ve been obsessed with mastering them lately and today I’m going to reveal what I’ve learned.
7 Ways to Get Great Results with Gmail Ads
7 Ways to Get Great Results with Gmail Ads
Halogen Software Joins Dell Boomi Partner Network | Dell
Dell Boomi announces today that it has partnered with Halogen Software (TSX: HGN) to deliver a high-performance application integration platform to reduce implementation times for its cloud-based talent management suite. The Dell Boomi AtomSphere® iPaaS (integration platform as a service) enables Halogen Software to more easily and rapidly connect a customer’s existing employee data in their core HRIS/HRMS system to Halogen TalentSpace, improving the customer experience and making TalentSpace easier to connect to external HR systems.
Halogen Software Joins Dell Boomi Partner Network | Dell
Halogen Software Joins Dell Boomi Partner Network | Dell
Wednesday, February 17, 2016
How to Use the Twitter Video Message to Generate Massive Engagement
A trending hashtag at one time was #DescribeTwitterIn3Words. That can only be described as an avant garde approach to constructive criticism. Or, at least, that is what I hope.
The general sentiment for what Twitter has been turned into lately is “Scrollin’, Trollin’, Scrollin’”, “marketers ruin everything”, or my favorite, “FIRE HOSE ON.”
How to Use the Twitter Video Message to Generate Massive Engagement
Google CEO stands firm with Apple - Feb. 17, 2016
Apple has another friend in its fight against the FBI.
Google CEO Sundar Pichai has come out in support of Apple (AAPL, Tech30), which is fighting an order to help the FBI break into the iPhone owned by one of the San Barnardino shooters.
Google CEO stands firm with Apple - Feb. 17, 2016
Google CEO Sundar Pichai has come out in support of Apple (AAPL, Tech30), which is fighting an order to help the FBI break into the iPhone owned by one of the San Barnardino shooters.
Google CEO stands firm with Apple - Feb. 17, 2016
Share.to Builds Networks with Partners, Clients
The ways in which companies build their teams are changing.
No longer are many teams just made up of a specific group of people in a specific office. Instead, more and more companies are working with freelancers, outside contractors or other non-traditional workers.
Share.to Builds Networks with Partners, Clients
Anonymous leaks 18GB worth of data belonging to Turkey’s national police force
The hacktivist group Anonymous has released close to 18GB worth of sensitive data from Turkey’s national police database, according to reports.
The information, which was taken from the Turkish General Directorate of Security (EGM), has purportedly been posted on file sharing sites available for free public download.
Anonymous leaks 18GB worth of data belonging to Turkey’s national police force
A Closer Look at Locky Ransomware | Fortinet Blog
A new ransomware named “Locky” is currently circulating in the wild and making the headlines. There are some good reports regarding Locky ransomware already available over the Internet. This blog intends to focus on some technical areas that (we believe) have not been covered yet, namely, its domain generation algorithm, command and control communication, and file encryption.
For reference, the following is a screenshot of Locky’s Decrypter page (cropped to save space):
A Closer Look at Locky Ransomware | Fortinet Blog
Major vulnerability found in GNU C Library
Security researchers have identified a serious vulnerability in an open-source library of code that is known as GNU C Library (glibc).
Experts believe hundreds of thousands of devices and apps are at risk of a cyberattack as a result of the flaw, which has been present since 2008.
Major vulnerability found in GNU C Library
AVT-PR-Avnet Government Solutions Launches New Cloud-Based Security
Avnet Government Solutions and IBM Unveil Security-as-a-Service Solutions Aimed at Public Sector
AVT-PR-Avnet Government Solutions Launches New Cloud-Based Security
Subscribe to:
Posts (Atom)