Search This Blog

Saturday, January 31, 2015

Friday, January 30, 2015

AVT-PR Avnet, Inc. to Present at the 2015 Stifel Technology...

Stifel Technology, Internet & Media Conference 2015 Goldman Sachs Technology and Internet Conference 2015



AVT-PR Avnet, Inc. to Present at the 2015 Stifel Technology...

Google and Lending Club Team Up, Online Lenders Gain Steam

Getting small business loans can be difficult, particularly in today’s economic climate. But in recent years, some new options have completely changed the way some businesses go after financing. And this week, Google and Lending Club unveiled another option for small businesses seeking capital. Read about this and other small business news from the past week, in our weekly Small Business Trends news and information roundup.



Google and Lending Club Team Up, Online Lenders Gain Steam

These Are the Most Popular Days for Kickstarter Donations

Considering starting a crowdfunding campaign? You’ll need to know the best ways to promote it. That means knowing the best times to do so. Luckily, Kickstarter just released some insights from its 2014 campaigns, The Year in Kickstarter, that reveal the days and times when people were most likely to donate.
The site found that people were generally more inclined to donate during work hours. But the most popular day of the week was Wednesday, followed by Thursday and Tuesday. And in terms of timing, the hours between 11 a.m. and 3 p.m. were the most active, with a spike right around 1 p.m. And the most active month for the site was August.


These Are the Most Popular Days for Kickstarter Donations

Q4 DDoS attacks up 90% on previous quarter

The number of distributed denial-of-service attacks on websites in the final quarter of 2014 was up 90 percent on the previous quarter, according to research from Akamai Technologies.
The final quarter of 2014 saw a sharp increase on the third quarter, chiefly influenced by the 121 percent increase in infrastructure layer attacks. In the same period, application layer attacks rose just 16 percent.


Q4 DDoS attacks up 90% on previous quarter

US military explores 'cognitive fingerprints' as alternative to passwords

Sky News reports that the United States military is investing heavily in new identify verification techniques that could replace passwords and biometric solutions for security.
The deal – which Sky describes as a ‘multi-million dollar contract’ – will see researchers at West Point looking at ‘cognitive fingerprints’ rather than focussing on traditional biometric pointers, such as palm, facial, DNA or iris recognition.


US military explores 'cognitive fingerprints' as alternative to passwords

Facebook Super Bowl Ads to be Sold On-the-Spot, Realtime

The Super Bowl is as much about the advertising as it is about the game.
That’s nothing groundbreaking but this year’s game will have a new wrinkle.


Facebook Super Bowl Ads to be Sold On-the-Spot, Realtime

How to Find Niche Directories to Boost Your SEO

Directories have been given a bad reputation because they’re so easy to spam and they make it easy to publish poor quality content, but that doesn’t mean that all directories should be off limits. The key is not to find just any directory, but find niche directories. With a little bit of know-how when it comes to finding the right directories and using them correctly, the SEO benefits can be great, even now in 2015.



How to Find Niche Directories to Boost Your SEO

Samsung Galaxy S6 Will Offer Touch-Based Fingerprint Access

Samsung is bringing back fingerprint identification on its flagship smartphone, the Galaxy S6.
The smartphone hasn’t been released yet but early indications are that Samsung is going to try again with fingerprint scanning.


Samsung Galaxy S6 Will Offer Touch-Based Fingerprint Access

Thursday, January 29, 2015

Apple Byte - The Apple Watch is coming in April - YouTube

Tim Cook officially confirms it, but will it have enough battery life to last through a day? Apple's Q1 earnings are the best by any company in history, and a peek at what the iPad Pro might look like.



Video (5:12)



Apple Byte - The Apple Watch is coming in April - YouTube

Qblinks' Qmote Finally Makes It With Kickstarter

Success isn’t always achieved on the first try. More often the it comes following years of experience and some trial-and-error. Nobody wants to fail, but failure can be an excellent teacher. This is the case with Taiwan based company Qblinks. After several failed attempts to launch products through Kickstarter, Qblinks seems to finally have a winner.
Qblinks started with a product the company was calling a smartphone remote notification and control. It was a round palm sized device that would blink various colors to notify you when you received calls, texts, emails, and the like. In addition, you could also control certain smartphone functions from the remote, like activating Siri or taking a photo. The device was bulky, however, and failed to raise enough money to get off the ground.


Qblinks' Qmote Finally Makes It With Kickstarter

Google Fiber Is Coming To 4 New Metro Areas

Google Fiber might be coming near you. Google has confirmed that Google Fiber, the company’s gigabit fiber optic Internet connection, will be coming to four new metro areas.
Construction will begin in eighteen cities across Atlanta, Charlotte, Nashville, and Raleigh-Durham. Google is boasting their Internet connection is super fast, “with speeds up to 100 times faster than today’s basic broadband.”


Google Fiber Is Coming To 4 New Metro Areas

Apple Watch Ship Date Finally Revealed

Months after announcing their new wearable tech, Apple CEO Tim Cook has announced the Apple Watch is expected to be shipping in April.
This new information was given by Cook during Apple’s latest quarterly conference call with investors. Apple certainly is doing well. The company can’t complain with 74.5 million iPhones sold and a quarterly revenue of $74.6 billion.


Apple Watch Ship Date Finally Revealed

Dell XPS 13 Could Be Alternative to MacBook

Laptop owners looking for a MacBook Pro at non-MacBook Pro prices may have a new offering from Dell to consider.
If you’re willing to live without a few high-end pieces of hardware, the new Dell XPS 13 has a striking design and specs that won’t leave you hanging at an affordable price.


Dell XPS 13 Could Be Alternative to MacBook

Linux haunted by Ghost vulnerability

Security researchers have found a vulnerability inherent to a widely used component in most versions of Linux, reports Computer World.
The vulnerability – nicknamed ‘Ghost’ – is found in the GNU C Library (‘glibc’), which is a library that defines system calls. ‘Ghost’ is an appropriate name, as the bug, which dates back to glibc-2.2 released in 2000, was actually fixed on May 21 2013, but at the time was not recognized as a security risk, so wasn’t immediately modified in popular Linux distributions.


Linux haunted by Ghost vulnerability

AVT-PR-Avnet Technology Solutions to Distribute Oracle Cloud Services in Latin America and the Caribbean

Avnet extends its distribution agreement with Oracle to create new cloud computing opportunities for Oracle PartnerNetwork members in Brazil, Chile, Mexico, Venezuela and the Caribbean



AVT-PR-Avnet Technology Solutions to Distribute Oracle Cloud Services in Latin America and the Caribbean

Net@Work Joins the NetSuite Solution Provider Program

Top Sage Reseller Builds First Cloud ERP Practice with NetSuite



Net@Work Joins the NetSuite Solution Provider Program

Adaptive Road, BrainSell and FayeBSG Join NetSuite Solution Provider Program

New Partners to Build Out NetSuite-Focused Businesses with NetSuite Cloud



Adaptive Road, BrainSell and FayeBSG Join NetSuite Solution Provider Program

MSIL/Agent.PYO: Have botnet, will travel

ESET’s researchers recently encountered a piece of malware targeting the filling of the forms belonging to the Consulate of Poland. To understand why it is first necessary to have a brief look at the application process for visas.
Belarusians who wish to obtain a visa need to fill out a form to schedule an appointment at the consulate. The form needs to be filed on specific dates (for example, the applications for January 2015 were scheduled for December 20th and 21st) and the number of available appointments is very limited. According to multiple forum threads those appointments are quite difficult to obtain, so some people resorted to writing scripts to automate the process, reducing even more the odds of obtaining an appointment by filling out the form manually. To defeat those bots, the consulate added CAPTCHAs to their website and limited connections to the server to IPs in Poland and Belarus only.


MSIL/Agent.PYO: Have botnet, will travel

5,300 US automated tank gauges vulnerable to cyberattack

Around 5,300 gas stations in the United States could be vulnerable to a remote cyberattack on the automated tank gauges, causing the pumps to flag alerts or even shut down, reports Ars Technica.
The issue, explains SC Magazine, is that the serial port interfaces in the automated tank gauges (ATG) are not password protected. The research explains that the majority of the vulnerable automated tank gauges can be found in New York, Texas, Virginia, Florida, Illinois, Maryland, California, Pennsylvania, Connecticut and Tennessee.


5,300 US automated tank gauges vulnerable to cyberattack

Mellanox Technologies, Ltd. Announces Filing of 2013 10-K/A; Schedules Conference Call for January 29, 2015 (NASDAQ:MLNX)

SUNNYVALE, Calif. & YOKNEAM, Israel--(BUSINESS WIRE)-- Mellanox® Technologies, Ltd. (NASDAQ:MLNX), a leading supplier of end-to-end interconnect solutions for servers and storage systems, announced that it will conduct a conference call today, Thursday, January 29, 2015, at 5 a.m. Pacific Time (8 a.m. Eastern Time) to discuss and review its amended Form 10-K/A for fiscal 2013 filed today with theSecurities and Exchange Commission ("SEC").



Mellanox Technologies, Ltd. Announces Filing of 2013 10-K/A; Schedules Conference Call for January 29, 2015 (NASDAQ:MLNX)

Are you being tracked? How to spot a tracking app on your phone

A woman in the UK made headlines recently when she confessed that her husband monitors her phone – reading her messages and tracking her every move – using a stealthy tracking app that he installed. She may claim it’s not bothering her, but tracking apps and spyware are a genuine risk, and an extremely unpleasant invasion of privacy for many. Here are our tips on how to recognize if you have a tracking app on your phone, and what to do about it.



Are you being tracked? How to spot a tracking app on your phone

5 Strategies for Facebook Ad Targeting With Laser Precision

You can target audiences on Facebook with a dozen different ad formats and thousands of possible ad targeting parameters.
Mastering your Facebook targeting strategy gets you in front of very specific and often motivated segments of your audience, on the network where Americans religiously spend an average of 40 minutes of their day. Here are a few ridiculously powerful Facebook ad targeting strategies you probably haven’t heard of.


5 Strategies for Facebook Ad Targeting With Laser Precision

Top 5 security tips for Android Lollipop

Top 5 security tips for Android Lollipop

The Biggest Hacks of 2014

The Biggest Hacks of 2014

Too Much Focus on Crowdfunding Can Be a Mistake

Technology has had a huge impact on the way we interact with one another. For businesses, the Internet has increased their reach in terms of customers, partners and even investors. In fact, it has even brought about a whole new investing concept — crowdfunding.
But while crowdfunding presents an interesting opportunity for some startups, it might be negatively impacting others. For those entrepreneurs looking for larger investments from more traditional sources, the same factors that help crowdfunding campaigns succeed don’t necessarily apply. And that can lead to some misguided assumptions for entrepreneurs seeking funding.


Too Much Focus on Crowdfunding Can Be a Mistake

Wednesday, January 28, 2015

Adobe Campaign explained - YouTube

Video (3:14)



Adobe Campaign explained - YouTube

Rounds Raises $12 Million, Allows Video Chat with Up To 12

Move over Skype.
Step aside Google Hangouts.


Rounds Raises $12 Million, Allows Video Chat with Up To 12

Mellanox Technologies, Ltd. Announces Fourth Quarter and Fiscal Year 2014 Financial Results; Announces Availability of 10, 25, 40, 50 and 100 Gigabit per Second Ethernet NICs and End-to-End 100 Gigabit InfiniBand Solutions (NASDAQ:MLNX)

Mellanox Technologies, Ltd. Announces Fourth Quarter and Fiscal Year 2014 Financial Results; Announces Availability of 10, 25, 40, 50 and 100 Gigabit per Second Ethernet NICs and End-to-End 100 Gigabit InfiniBand Solutions (NASDAQ:MLNX)

Introducing the FortiGate Cookbook Website | Fortinet Blog

The FortiGate Cookbook website, found at cookbook.fortinet.com, was launched at the end of 2014. You can now enjoy the Cookbook, and all its step-by-step recipes for using a FortiGate, in a whole new way.



Introducing the FortiGate Cookbook Website | Fortinet Blog

Mobile Gaming Revolution Creates a New Party Experience

Gaming has become a huge industry over the last few decades. What was once just a simple, innovative console game has blossomed into so many different games, platforms, and businesses. There are even parties dedicated to the activity.
Mobile Gaming Revolution is a company that provides mobile gaming parties to customers around the country. The company uses a franchise system to reach as many potential customers as possible. Read more about Mobile Gaming Revolution’s unique business model in this week’s Small Business Spotlight.


Mobile Gaming Revolution Creates a New Party Experience

Removing snow, ice and avoidable costs with wireless solutions from Sprint | Sprint Newsroom

Removing snow, ice and avoidable costs with wireless solutions from Sprint | Sprint Newsroom

5 Publication Channels Every Marketer Should Pursue

Did you know the blog started life as an online ‘Dear Diary’ where early Internet enthusiasts recorded their deep thoughts or vapid ramblings? Justin’s Links, widely recognized as one of the first blogs ever, was a collection of interesting links that Justin Hall, then a student at Swarthmore College, happened to discover in the early days of the Web — sort of like an early StumbleUpon, which then turned into a personal diary that Hall maintains to this day.
The blog has come a long way from its humble origins to become a powerful force to reckon with in the world of brands that benefit from it and individuals who earn their livelihoods out of it. Whether you are a mommy blogger making some extra cash on the side or are the content marketing brains behind your brand’s blogging efforts, there’s one thing that lies at the core of every blog — its readership.


5 Publication Channels Every Marketer Should Pursue

20 million dating site profiles targeted by hacker

20 million usernames and email addresses for a popular Russian dating website have been leaked,according to Bloomberg.
Techworld highlights the targeted website as Topface, which has 91.5 million users. Anti-fraud firm Easy Solutions claimed that of the leaked users, 50 percent were Russian citizens, and 40 percent from the EU. Seven million of the logins were Hotmail addresses, 2.5 million were Yahoo based, and 2.3 million were from Gmail.


20 million dating site profiles targeted by hacker

Electronic Frontier Foundation outlines plan to end NSA surveillance

The Electronic Frontier Foundation, an American civil-liberties group, has revealed its plans to end global mass surveillance, The Inquirer reports.
The eight point plan comes in at just over 4,500 words and covers everything from lobbying tech companies to block backdoors, to public education and the end of the Patriot Act.


Electronic Frontier Foundation outlines plan to end NSA surveillance

How Developers Use installCore to Monetize their Free Software

You’ve worked incredibly long and hard to create your software. You’ve kept the company going through the development phase. Finally, your software is ready for prime time — and you’re ready to market it.
Or maybe you’ve had a finished piece of software for a while, but want to get more financial return from it.


How Developers Use installCore to Monetize their Free Software

U.S. tax identity theft: dodging the $5 billion crime spree

In America, tax identity theft is a relatively easy way for criminals to make money at the expense of taxpayers. Using stolen data, crooks steal billions of dollars through fraudulent tax refund claims every year. How “popular” is tax identity theft with criminals? It now has its own week! That’s right, January 26th-30th is Tax Identity Theft Awareness Week in America, a week that encompassesData Privacy Day (hashtag #DPD2015) which occurs on January 28 every year (in many countries, not just in America).





U.S. tax identity theft: dodging the $5 billion crime spree

Protecting Privacy on Data Privacy Day and Every Day | Sprint Newsroom

Protecting Privacy on Data Privacy Day and Every Day | Sprint Newsroom

Taylor Swift hacked, but denies naked pictures will be leaked

Singer Taylor Swift has had her Twitter and Instagram accounts hacked, but laughed off claims that the hackers will release nude photographs of her, reports The Mirror.
Swift – who has the fourth most popular Twitter account in the world – discovered that her account had been hacked on Tuesday morning, but the offending tweets were quickly removed from the service, Reuters reports. “My Twitter got hacked but don’t worry, Twitter is deleting the hacker tweets and locking my account until they can figure out how this happened and get me new passwords,” the singer wrote on her personal Tumblr page.


Taylor Swift hacked, but denies naked pictures will be leaked

Brocade | Brocade Enables Pervasive Data Privacy Across Public and Private Cloud Deployments for the New IP

Industry's First Wire-Speed Inline Encryption for Modular Routers Now Available



Brocade | Brocade Enables Pervasive Data Privacy Across Public and Private Cloud Deployments for the New IP

Microsoft Word Add-Ons to Transform Your Business

Word processing software is so ubiquitous these days that it’s easy to overlook one of the most powerful tools in your small business arsenal, Microsoft Word Add-Ons. Word Add-Ons, or apps as they’ve recently begun to be called, turn an everyday application into a veritable Swiss-army knife that takes your work to a whole new level while saving you both time and effort.
Microsoft lists over 150 apps for Word, so we decided to dive in to discover the best ones for you to start with. Under each listing, we’ve included the price of the add-in (if any) as well as the compatible Microsoft Word version(s) if different from Word 2013 or later.


Microsoft Word Add-Ons to Transform Your Business

74.5 million iPhones is ... - Jan. 28, 2015

Apple had a record-setting quarter during the last three months of 2014, posting the biggest corporate profit for any company in history.



All of Apple's (AAPL, Tech30) products sold well. But the biggest ticket by far was a record 74.5 million iPhone sales.



74.5 million iPhones is ... - Jan. 28, 2015

Tuesday, January 27, 2015

Walk Off the Earth Band Gets Record Deal from YouTube

The dream of starting a band used to follow the basic formula. Play locally until you develop a following. Then get a manager. Then make a demo and hope someone discovers you and offers you ‘the big break’. However, with the introduction of the Internet, people can gain worldwide fame without leaving their homes.
One Canadian band, Walk Off The Earth of Burlington, Ontario, recently broke the mold with their online success. They formed in 2006 and found mild success covering songs by the American folk band The Gregory Brothers.


Walk Off the Earth Band Gets Record Deal from YouTube

Dell KACE offers more visibility into network-connected devices and Chromebooks. | Dell

Dell today announced the newest version of its award-winning Dell KACE K1000 Systems Management Appliance, which includes new and enhanced functionality to further transform how organizations discover, configure, secure and manage computers and devices in multi-platform environments. Dell KACE K1000 version 6.3 features first-to-market systems management support of Chromebook, with seamless integration of inventory integrated directly into the K1000’s asset management, reporting and service desk capabilities



Dell KACE offers more visibility into network-connected devices and Chromebooks. | Dell

Dell Precision M3800 mobile workstation receives exciting new updates. | Dell

Dell today announced updates to the Dell Precision M3800, the world’s thinnest and lightest true 15-inch mobile workstation, enabling video editors, graphic designers, engineers and other high-end users to create like never before with unmatched portability, breakthrough power and reliable performance. Dell has listened to its customers and responded by incorporating new features into its flagship mobile workstation, adding a 4K Ultra HD touch display option, introducing Thunderbolt™ 2 technology and offering an Ubuntu-based developer edition, among other updates. 



Dell Precision M3800 mobile workstation receives exciting new updates. | Dell

FCC to Marriott and other hotels: Never try to block Wi-Fi again - Jan. 27, 2015

After Marriott blocked Wi-Fi hotspots in parts of its hotels, the FCC sent a stern warning: don't even think about trying that again.



"The Communications Act prohibits anyone from ... interfering with authorized radio communications, including Wi-Fi," said FCC Chairman Tom Wheeler in a statement. "Marriott's request seeking the FCC's blessing to block guests' use of non-Marriott networks is contrary to this basic principle."



FCC to Marriott and other hotels: Never try to block Wi-Fi again - Jan. 27, 2015

Beyond Border Protection - Securing Internal Networks With INFWs | Fortinet Blog

Network security has traditionally focused on border protection strategies - If you could keep the bad guys out, then your computers, users, and data were safe. As next-generation firewalls (NGFWs) and unified threat management (UTM) appliances hit the market, system administrators and security pros found themselves with a pretty effective combination of visibility and protection.



Beyond Border Protection - Securing Internal Networks With INFWs | Fortinet Blog

Data Privacy Day 2015: Respecting privacy, safeguarding data, enabling trust

January 28 is Data Privacy Day, an international acknowledgment of the importance of privacy in an increasingly data-driven world. The main website for this event in America is here at StaySafeOnline.org. You may notice that ESET is a sponsor, and I think we can all get behind the key themes of Data Privacy Day this year: Respecting privacy, Safeguarding data, Enabling trust.
Personally speaking, I’m excited to be participating in a 2015 Data Privacy Day event in Atlanta that is focused on health data privacy, under the title: Health Privacy in a Fully Connected World. There will be a series of panel discussions between 1pm and 5pm Eastern, and the event will be live-streamed here.


Data Privacy Day 2015: Respecting privacy, safeguarding data, enabling trust

Marriott fixes Android app exploit that could expose personal data

Marriott International has fixed an exploit in their Android app, that could expose personal details for customers of the hotel chain, highlighted by a security researcher.
Randy Westergren, a senior software developer with XDA Developers found that the Marriott Android app was checking rewards members’ reservations against a Marriott server without any authentication. As Westergren noted, this meant anyone could “query the reservations of any rewards member by simply specifying the Membership ID.”


Marriott fixes Android app exploit that could expose personal data

AVT-PR-Avnet Technology Solutions Introduces Maintenance ServicesNow

Avnet helps partners in the U.S. capture lost revenue opportunities related to maintenance services and increase their profitability



AVT-PR-Avnet Technology Solutions Introduces Maintenance ServicesNow

Android Wi-Fi Direct bug means hackers can reboot your device

A vulnerability in Android’s Wi-Fi Direct functionality has been uncovered by security researchers.
Wi-Fi Direct – the technology that allows two devices (including printers, cameras and PCs) to connect directly via a peer-to-peer Wi-Fi connection without a wireless router – has an issue affecting a number of Android devices. The bug is in the form of a remotely exploitable denial-of-service vulnerability, specifically an uncaught exception, and it affects certain Android devices scanning for other Wi-Fi Direct products.


Android Wi-Fi Direct bug means hackers can reboot your device

Facebook, Instagram and Tinder hit by outages, but deny cyberattack

Social Media giants Facebook, Instagram and Tinder were hit by simultaneous outages on Tuesday, which led many to suspect a coordinated cyberattack, reports City AM.
All three social media services are now back up and running after outages early on Tuesday, starting around 12:10 AM, EST. Initially, it appeared to be another hit from the Lizard Squad hacking collective, who appeared to take credit with a tweet reading “Facebook, Instagram, Tinder, AIM, Hipchat #offline #LizardSquad”


Facebook, Instagram and Tinder hit by outages, but deny cyberattack

HR and Accounting Colleagues Make Great Big Data Teams

It seems that while CFOs and chief human resource officers (CHROs) manage two of the most strategic enterprise resources — financial capital and human capital — CEOs focus their technology investments in other directions. According to the Harvard Business Review, this suggests that today’s CFOs and CHROs may want to join forces in the pursuit of big data agendas.
Creating new ways to gather and analyze big data is no longer the domain of marketing, sales and product development. Finance and human resource departments, often in collaboration, are discovering that they too can determine new insights and improve strategic decision making — thanks to harnessing the power of big data.


HR and Accounting Colleagues Make Great Big Data Teams

Regin Malware Unmasked as NSA Tool after SPIEGEL Publishes Source Code - SPIEGEL ONLINE

Just weeks ago, SPIEGEL published the source code of an NSA malware program known internally as QWERTY. Now, experts have found that it is none other than the notorious trojan Regin, used in dozens of cyber attacks around the world.



Regin Malware Unmasked as NSA Tool after SPIEGEL Publishes Source Code - SPIEGEL ONLINE

Pen Testing 101 | Fortinet Blog

Penetration testing. Ethical hacking. Call it what you will, but businesses are quickly learning that their security is only as good as their test measures.



Pen Testing 101 | Fortinet Blog

Monday, January 26, 2015

How Smosh Gets 60 Million Visits a Month on YouTube

Smosh began back in 2002 when Anthony Padilla created Smosh.com. He says the name came from a friend’s misunderstanding of the word ‘Mosh pit’. Soon after, Padilla’s close friend, Ian Hecox, joined in.
The duo began creating short animations which they uploaded to their website. They also uploaded content to Newgrounds, a popular animation and flash site. However, traffic to their site was limited as they had yet to get their name to the public.


How Smosh Gets 60 Million Visits a Month on YouTube

Dell Services named Leader in Everest Group PEAK Matrix Report | Dell

Dell Services today announced that for the third consecutive year, Everest Group has positioned Dell’s Healthcare Services in the Leader category as Healthcare IT Outsourcing (ITO) Provider. The results were published in the2014 IT Outsourcing in the Healthcare Provider Industry – Service Provider Landscape with PEAK MatrixTMAssessment report.
Dell Services maintained its Leader position because of its success in signing and continuing large-sized deals with health systems as well as its demonstrated capabilities for buyers in the healthcare provider space. Based on the PEAK Matrix results, in 2014 Dell Services noticeably enhanced its market standing, effectively positioning itself as a Leader by driving the market in terms of revenue and headcount for provider ITO.


Dell Services named Leader in Everest Group PEAK Matrix Report | Dell

By migrating from EMC to Dell storage, servers and networking, Wheeling Hospital’s IT staff is able | Dell

Wheeling Hospital, a community hospital in Wheeling, West Virginia, is boosting system performance and supporting new initiatives with new data center technology based on Dell solutions. By migrating from EMC to Dell storage, servers and networking, the hospital’s IT staff is able to spend less time on data center administration and instead focus on implementing critical new technology initiatives to improve healthcare delivery.



By migrating from EMC to Dell storage, servers and networking, Wheeling Hospital’s IT staff is able | Dell

Sprint Prepares for Winter Storm Juno | Sprint Newsroom

As winter storm Juno approaches, residents throughout the Northeast are preparing for the potential for heavy snowfall and high winds beginning today.
 
Such conditions have the potential to cause power outages, so Sprint’s network teams are closely monitoring the developing situation and areas of potential impact.
Sprint is actively preparing for this winter storm by:



Sprint Prepares for Winter Storm Juno | Sprint Newsroom

Microsoft sales soar for all its non-Windows products - Jan. 26, 2015

Microsoft sales are growing for just about every product it makes ... except for Windows.



A couple years ago, that would have caused a panic -- Windows has been Microsoft's cash cow since 1985. In 2015, Microsoft (MSFT, Tech30) isn't sweating it too much. Microsoft would now much rather give Windows away for next to nothing to grow its customer base and support its other products.



Microsoft sales soar for all its non-Windows products - Jan. 26, 2015

Sprint News - Week in Review: January 19 - 25 | Sprint Newsroom

Sprint News - Week in Review: January 19 - 25 | Sprint Newsroom

Flurry of cyberattacks causes concern for Davos elites at World Economic Forum

Cybercrime was the focus of everyone’s attention at this year’s World Economic Forum in Davos. Recent high profile attacks have made victims of the likes of Sony Pictures, eBay, Target and JP Morgan in particular, each making headline news in recent months, and they have certainly caught the attention of the Davos elites.
It is believed that a failing to improve cybersecurity across the world would cause the global economy an unprecedented $3 trillion, which is why banks are investing more heavily than ever in the protection of their online services.


Flurry of cyberattacks causes concern for Davos elites at World Economic Forum

AVT-PR-Avnet Memec Demos IoT and Industrie 4.0 Expertise at Embedded World 2015

Connected products, solutions and technologies showcased will help embedded systems designers address opportunities in Smart Manufacturing and the Internet of Things



AVT-PR-Avnet Memec Demos IoT and Industrie 4.0 Expertise at Embedded World 2015

AVT-PR-Mario Orlandi appointed President of Semiconductor Distributor SILICA

Orlandi succeeds Miguel Fernandez who took over as Avnet Electronics Marketing EMEA President



AVT-PR-Mario Orlandi appointed President of Semiconductor Distributor SILICA

Lizard Squad hits Malaysia Airlines website

The website for Malaysia Airlines was taken offline, in an attack claimed to be by the Lizard Squad hacking group, according to the BBC.
Earlier on Monday, the website was replaced with the words ‘404 – Plane Not Found’ – somethingInternational Business Times describes as a “cruel and mocking reference” to the missing Flight MH370 – alongside the Lizard Squad logo (a lizard in a top hat, with a monocle and pipe) and the words “Hacked by LIZARD SQUAD – OFFICIAL CYBER CALIPHATE”


Lizard Squad hits Malaysia Airlines website

AVT-PR-Avnet Technology Solutions Benelux Extends Dell Wyse Portfolio to Offer Data Centre Solutions to Address Market Demand

Eindhoven, Netherlands – Avnet Technology Solutions, the global IT solutions distribution leader and an operating group of Avnet, Inc. (NYSE: AVT), has today announced it will offerDell Wyse Data Centre Solutions, in addition to Dell Wyse Thin Clients, in the Benelux region. The extension of Avnet’s Dell Wyse portfolio in the region addresses the demand for efficient data centre infrastructure in an increasingly digital, data-driven world.



AVT-PR-Avnet Technology Solutions Benelux Extends Dell Wyse Portfolio to Offer Data Centre Solutions to Address Market Demand

WhatsApp Security Tips

WhatsApp recently announced that it has more than 700 million monthly active members, sending a combined total of 30 billion messages a monthThat’s an enormous volume of personal information being communicated, and even though WhatsApp now encrypts all of its messages and data, it pays to be secure with your chats. Here are our top WhatsApp security tips.



WhatsApp Security Tips

Online Lenders Complement Bank Lending to Small Businesses

The recent initial public offerings of the Lending Club and OnDeck Capital, have some observers claiming that online lending platforms will soon replace banks as a major source of small business credit. I disagree.
Rather than substituting for bank loans, online lenders are filling a niche, providing capital primarily to small companies that previously had been unable to borrow. Where they have been substituting for other lenders, online lenders have been replacing high cost alternatives to traditional bank loans, like credit card debt and merchant cash advances.


Online Lenders Complement Bank Lending to Small Businesses

Google reveals trio of security vulnerabilities in OS X

Google’s Project Zero has released information on three as yet unpatched vulnerabilities in Apple’s OS X operating system, reports Ars Technica.
CNET describes the three exploits in detail. The first involves “circumvention of commands in the network system”, but may already be a non-issue for users on OS X Yosemite. The second documents “OS X IOKit kernel code execution due to NULL pointer dereference in IntelAccelerator.” The final bug is an exploit relating to OS X’s kernel structure. All three of the exploits would requite an attacker to have access to a targeted Mac.


Google reveals trio of security vulnerabilities in OS X

Sunday, January 25, 2015

6 Ways CRM Can Power Your Sales Pipeline Today

To rise to the next level, a business must leverage the right tools to streamline and automate processes that drive sales and marketing performance. For businesses at the tipping point of growth, moving to a CRM solution can significantly boost marketing campaigns, accelerate sales opportunities and maximize customer engagement.



6 Ways CRM Can Power Your Sales Pipeline Today

Adobe FormsCentral Service Retired Due To Lack of Use

Small businesses relying on Adobe’s FormsCentral to collect information from their customers or employees will have to find an alternative soon.
Adobe has decided to scrap FormsCentral. After three years, not enough people were using the service to justify keeping it online.


Adobe FormsCentral Service Retired Due To Lack of Use

Week Is a Busy One For Online Business Events

If your looking for online business events, this week could be  particularly busy one. The new year is well under way and there are lots of events coming up to keep you busy. Lots will also be happening in locations as different as New York and even in Israel for those interested in events they can attend in person. First have a look at some of our featured events over the next few months listed below.
To see a full list or to submit your own event, contest or award listing, visit theSmall Business Events Calendar.


Week Is a Busy One For Online Business Events

Saturday, January 24, 2015

Yelp Reviews are Getting More Positive AND More Negative

Yelp reviews are getting both more positive and more negative. You might wonder how that’s even possible. But it’s actually pretty simple. In 2014, more customers left 1-star reviews on Yelp than they did back in 2005. But they also left more 5-star reviews.
That’s according to an analysis of over a million Yelp reviews conducted by Max Woolf using the Yelp Dataset Challenge. He found that in 2014, 42.6 percent of all reviews in the dataset were 5-star reviews, and 12.8 percent were 1-star reviews.


Yelp Reviews are Getting More Positive AND More Negative

Top Stories: New Microsoft Tech, The Grid Changes Design

Technology has provided so many different tools for small businesses. And companies are constantly coming out with new solutions and offerings. This week, we looked at tech solutions from providers big and small. Take another look at the tech stories this week and the rest of our news coverage. Read on for this week’s Small Business Trends news and information roundup.



Top Stories: New Microsoft Tech, The Grid Changes Design

Friday, January 23, 2015

Why Business Software Reviews Matter Now More Than Ever

A positive review of your software in a major publication or on a website can be an invaluable marketing tool. Instant recognition and endorsement from a trusted source are just two of the immediate benefits. If the review is good enough to bring in new users, it can become a self-sustaining vehicle for growth, as the new users can help increase word-of-mouth branding and create a channel for your customers to become your cheerleaders.
Unfortunately, this is an area where many startups fail to make the grade. This may be because of two issues: not knowing where to have their software reviewed, or attempting to do so prematurely.


Why Business Software Reviews Matter Now More Than Ever

Sprint Guarantees T-Mobile Customers $200 Minimum Trade-In Value for Their Smartphone and Up to $350 per Line to Cover Switching Costs | Sprint Newsroom

Sprint Guarantees T-Mobile Customers $200 Minimum Trade-In Value for Their Smartphone and Up to $350 per Line to Cover Switching Costs | Sprint Newsroom

The Year Customer Experience Management Comes to SMBs

Medallia, a cloud-based customer experience management platform provider, authored a blog post citing eight major trends businesses should be on the lookout for in 2015. Alongside trends like the digitization of wallets and the Internet of Things connecting us with more sources of feedback, Medallia thinks this is the year small and mid-size businesses will get serious about customer experience management (CEM).
Jasen Lew, Medallia’s Entrepreneur-in-Residence, shares why customer experience management at the SMB level will be a major trend this year. And why it’s more about offense, not defense, and how to understand the impact it can have on top and bottom lines. (This transcript has been edited for publication. To hear audio of the full interview, click on the audio player at the end of this article.)


The Year Customer Experience Management Comes to SMBs

Private cybersecurity school set to open in London

A school entirely focussed on teaching cybersecurity skills has launched in the UK, reportsComputer Business Review.
The Global Institute of Cyber, Intelligence & Security is opening in London, and will offer short courses covering areas such as cyber resilience, security, military, policing, counter terrorism and financial crime, according to IT Pro Portal.


Private cybersecurity school set to open in London

Edward Snowden doesn't use an iPhone for privacy reasons

NSA whistleblower Edward Snowden has claimed he doesn’t use an iPhone for fear of surveillance technology in the smartphone, reports The Independent.
Snowdon’s attorney, Anatoly Kucherena, explains that Snowden does not use an iPhone, due to alleged secret software that can be activated to monitor the user. Speaking to Russian news agency RIA Novosti, Kucherena explained, “Edward never uses an iPhone, he’s got a simple phone.”


Edward Snowden doesn't use an iPhone for privacy reasons

Blackhat: Lessons from the Michael Mann, Chris Hemsworth movie?

The hacker flick Blackhat definitely uses the language of cybersecurity, real terms like: malware, proxy server, zero day, payload, RAT, edge router, IP address, PLC, Bluetooth, Android, PGP, bulletproof host, and USB, to name just a few. But how real is the plot of Blackhat, with its malware-induced scenarios of physical and financial mayhem?
I went along to a screening of the film with some of my ESET colleagues to find out if there were any useful lessons to be learned from this latest contribution to the hacker movie genre (for a review of this genre from the security expert’s perspective check out Hacker Movies We Love & Hate on Dark Reading).


Blackhat: Lessons from the Michael Mann, Chris Hemsworth movie?

ESET Security Researcher to Speak at Healthcare Data Privacy Day at Georgia Institute of Technology

Panel to Focus on Challenges Facing Healthcare Privacy in a Fully Connected World



ESET Security Researcher to Speak at Healthcare Data Privacy Day at Georgia Institute of Technology

Google Custom Search Will Boost Your SEO

Getting started with Google Custom Search is actually incredibly easy, but it’s something that many marketers are still missing. The tool is a great way to help make the Internet a little bit smaller, so if you’re hoping to simply search for something on a particular domain, specific page, or on a particular topic, a Google custom search makes that happen.
For those who are unfamiliar, it’s essentially a search bar that you can add to your website to help ensure that your visitors are searching within your website. It’s also a great way to find competitor links easier or use when you’re surfing the web for something specific (discussed in the next section.) In other words, you’re essentially creating your own custom search engine full of only a certain type of results. For marketers looking for a new quick fix for the start of the New Year, custom search is a great place to start.


Google Custom Search Will Boost Your SEO

There's Something About Angler - Flash Zero-Day FAQ | Fortinet Blog

There's Something About Angler - Flash Zero-Day FAQ | Fortinet Blog

Can Businesses Make Use of the Upcoming WiFi Standards?

Small businesses are often more receptive than large ones because the playground for them is very competitive and the only way to survive the intense competition is to keep improving, for which they need new ideas.
One such idea was “bring your own device (BYOD)”. Employees were supposed to bring their own devices to the office and use them for office works. The reaction toward the idea was lukewarm.


Can Businesses Make Use of the Upcoming WiFi Standards?

Thursday, January 22, 2015

KLA-Tencor Reports Fiscal 2015 Second Quarter Results (NASDAQ:KLAC)

KLA-Tencor Reports Fiscal 2015 Second Quarter Results (NASDAQ:KLAC)

Mobile health IT security challenge: way bigger than HIPAA?

Wearable technology and other health-related devices were big at the 2015 Consumer Electronics Show (CES) earlier this month. The potential benefits of mobile medical technology and telemedicine are enormous, from better quality of life to saving lives, not to mention controlling healthcare costs. Yet keeping data safe when it is beyond the confines of hospitals and clinics is a serious challenge, one that cannot be met merely through regulatory compliance.



Mobile health IT security challenge: way bigger than HIPAA?

Business Outcomes: Why Your Solutions Don’t Really Matter! | Fortinet Blog

Business Outcomes: Why Your Solutions Don’t Really Matter! | Fortinet Blog


Tags:  Relationships, solutions,

Zero-day vulnerability in Flash Player exploited by attackers

A zero day vulnerability in Flash is being actively used by cybercriminals, according to Forbes.
The vulnerability uses the Angler exploit kit, and targets users in drive-by-download attacks via compromised websites, PC World explains. Fortunately, not everyone is affected, with Windows 8.1 users seemingly immune, along with those that use the Chrome web browser.


Zero-day vulnerability in Flash Player exploited by attackers

Madonna hacking suspect arrested by Israeli police

Israeli police, working in co-operation with the FBI, have arrested a 38-year-old man who allegedly hacked into computer systems and stole unfinished versions of songs from Madonna’s upcoming “Rebel Heart” album, leaking the Material Girl’s material online.
According to police spokesperson Luba Samri, Madonna was not the only recording artist to have suffered at the hands of hackers:


Madonna hacking suspect arrested by Israeli police

Public Wi-Fi hacked by seven year old in 10 minutes

The danger of public Wi-Fi hotspots has been exposed by a seven year old girl following a short video tutorial, reports ITV.
The experiment – part of a public awareness campaign by VPN provider ‘Hide My Ass’ – provided seven year old British girl Betsy Davies with a laptop, a tutorial, and a subject willing to be hacked in an environment imitating that found in many of the United Kingdom’s 270,000 public Wi-Fi spots. The results were worrying: not only did Betsy complete the hack, she managed to pull off the attack in just over 10 minutes, according to Information Age.


Public Wi-Fi hacked by seven year old in 10 minutes

Twitter's Digits expands to web platforms

Twitter has announced the release of its Digits password alternative for websites, reports ZDNet.
Digits, which was released last October (reported by We Live Security here) for iOS, Android and mobile web, allows users to log into apps, services and now websites, using just a phone and a one-off password.
Twitter's Digits expands to web platforms





Tags:  alternative, app, Digits, login, password, Twitter, web,

New MacBook Air Radically Different With Foot Long Keyboard

We’re getting closer to the release of the purported new MacBook Air.
And as we inch closer to the unknown date of its release, the rumor mill is really spinning.


New MacBook Air Radically Different With Foot Long Keyboard



Tags:  bezel, charge, connector, cord, device, headphone, jack, key, keyboard, laptop, MacBook Air, MagSafe connection, market, MicroSD card, port, release, retina display, SD card, size, Type C, USB,