Search This Blog

Friday, February 27, 2015

Apple iPhone import ban sought by suit - Feb. 27, 2015

Networking giant Ericsson is trying to stop Apple from importing iPhones and iPads to the United States. It's part of a prolonged patent dispute between the two companies that has recently landed in several courts.



Up until last month, Apple (AAPL, Tech30) had been paying Ericsson patent licensing fees in exchange for using its critical cell phone technology. Ericsson's (ERIC) patents cover crucial cell phone functions, including making and receiving calls, GPS location and some software that controls apps.



Apple iPhone import ban sought by suit - Feb. 27, 2015

#TheDress goes viral: Sales soar 347% - Feb. 27, 2015

A social media frenzy about the color of a dress is bringing fame and fortune for one small British fashion company.



The retailer, Roman, said sales of the outfit that sparked #TheDress debate soared 347% Friday.



#TheDress goes viral: Sales soar 347% - Feb. 27, 2015

Google allows porn on Blogger after backlash - Feb. 27, 2015

In a reversal, Google says that porn will continue to be allowed on its Blogger site.



Google (GOOGL, Tech30) said it has received a big backlash after deciding earlier in the week that bloggers will no longer be able to "publicly share images and video that are sexually explicit or show graphic nudity." The ban was to have taken place on March 23.



Google allows porn on Blogger after backlash - Feb. 27, 2015

Facebook rewards 'white hat' hackers with $1.3m bounty

Facebook has announced that it paid out $1.3 million last year to ‘white hat’ hackers, as part of a bounty initiative that rewards developers for spotting flaws in the social network.
The Next Web reports that Facebook paid 321 researchers worldwide in 2014, offering an average reward of $1,788. The total sum is down slightly from the $1.5 million paid out last year, but the company says the number of reports has risen by 16% to more than 17,000.


Facebook rewards 'white hat' hackers with $1.3m bounty

Exploits: What are they and how do they work?

We are constantly talking about vulnerabilities and exploits in IT security news, but for a lot of users these concepts might still be a little unclear. That’s why we decided to write this article and clear up any confusion you might have on the topic.



Exploits: What are they and how do they work?

CNET News - I, 3D camera robot - YouTube

Video (2:25)



CNET News - I, 3D camera robot - YouTube

Apple Byte - Apple's official Spring Forward event happens March 9 - YouTube

Video from CNET (5:49)



Apple Byte - Apple's official Spring Forward event happens March 9 - YouTube

BuzzFeed's newest traffic driver: debate about the color of a dress - Feb. 27, 2015

There are debates on the Internet... and then there was "The Dress."



If you were online on Thursday night, you know what happened: social media services were overrun with comments about the colors of a woman's dress. Some people saw black and blue; others saw white and gold.



BuzzFeed's newest traffic driver: debate about the color of a dress - Feb. 27, 2015

Thursday, February 26, 2015

Four New LG Phones - Premium Features at a Medium Price

Very soon, some major smartphone manufacturers are going to release new models of their flagship devices.
LG is getting a jump on them by announcing four new LG phones. And the company is hoping to attract customers with some mid-range price tags on those phones.


Four New LG Phones - Premium Features at a Medium Price

Phishing, exploits and botnets – how can they affect your business?

More and more often, companies are the targets of cybercriminals, regardless of their size. The attacks usually end with sensitive information being stolen, leaving the business in a very difficult situation.
In fact, ransomware cases have multiplied over the the last few months. The attackers encrypt the information they get from companies in order to demand a ransom afterwards, threatening to otherwise destroy all data if it is not paid within a specified period of time. But how representative of the threats that companies have to face is this?


Phishing, exploits and botnets – how can they affect your business?

WhatsApp – Top 5 security tips

WhatsApp – Top 5 security tips

Brocade | Brocade Shares Vision for New IP at Mobile World Congress

SDN, NFV and Analytics for Mobile Networks on Display in Barcelona



Brocade | Brocade Shares Vision for New IP at Mobile World Congress

Tomorrow Daily 136: Bionic reconstruction, a real armored Batsuit and more - YouTube

Video from CNET (26:41)



Tomorrow Daily 136: Bionic reconstruction, a real armored Batsuit and more - YouTube

Net neutrality battle gears up for Round 2 - YouTube

Video from CNET (4:25)



Net neutrality battle gears up for Round 2 - YouTube

Inside Scoop - Will March 9th event reveal more Apple Watch details? - YouTube

Video (4:58)



Inside Scoop - Will March 9th event reveal more Apple Watch details? - YouTube

CNET Update - Apple's event could be time for more than a Watch - YouTube

Video (3:01)



CNET Update - Apple's event could be time for more than a Watch - YouTube

CNET How To - Prevent your Mac password from being bypassed - YouTube

Video from CNET (1:58)



CNET How To - Prevent your Mac password from being bypassed - YouTube

FCC Chair Tom Wheeler on Open Internet Rules (C-SPAN) - YouTube

Video (11:41):



FCC Chair Tom Wheeler on Open Internet Rules (C-SPAN) - YouTube

Your New Phone May Have the Google Wallet App Pre-Installed

It’s going to be hard to lose Google Wallet in the very near future.
Google announced that it has reached a deal with major mobile carriers in the U.S. to get its Google Wallet app pre-installed on a lot of new smartphones later this year.


Your New Phone May Have the Google Wallet App Pre-Installed

The moment the FCC passed the new net neutrality rules | Mashable - YouTube

Video (0:58)



The moment the FCC passed the new net neutrality rules | Mashable - YouTube

Easily bypass and reset the password on any Mac - YouTube

Video from CNET (1:09)



Easily bypass and reset the password on any Mac - YouTube

Brocade | Brocade Executive to Present at Upcoming Financial Conferences

Brocade | Brocade Executive to Present at Upcoming Financial Conferences

Europol shuts down Ramnit botnet used to steal bank details

The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police, reports The BBC.
The botnet was used to spread malware through phishing emails and innocuous links posted on social networks, giving cybercriminals access to the bank accounts of users running Windows operating systems.


Europol shuts down Ramnit botnet used to steal bank details

Lenovo website hacked, Lizard Squad claims responsibility

Chinese computer manufacturer Lenovo has been victim to a website hack, just days after the company was forced to apologize over using the controversial Superfish software on some of its products.
According to The Verge, Lenovo’s website was hacked around 4PM ET. Visitors to the site would then see a “slideshow of disaffected youths, set to the song ‘Breaking Free’ from High School Musical.” The hijack was short-lived, however, and the site was fully back to normal by 5:30. The BBC reports that hacking group Lizard Squad claimed responsibility on Wednesday via their Twitter account.


Lenovo website hacked, Lizard Squad claims responsibility

Wednesday, February 25, 2015

What the FCC Net neutrality rules will mean for Internet users - YouTube

Video from CNET (1:37)



What the FCC Net neutrality rules will mean for Internet users - YouTube

Gemalto: SIM card hackers likely NSA, GCHQ -- but keys are safe - YouTube

Video from CNET (2:57)



Gemalto: SIM card hackers likely NSA, GCHQ -- but keys are safe - YouTube

New Dell XC Series V2 Appliances | Dell

Dell today announced its second wave of Dell XC Series of Web-scale Converged Appliances. These highly scalable integrated solutions help streamline the datacenter and now offer more than 50 percent storage capacity and up to twice the rack density to support customers deploying a wide range of workloads, including virtual desktop infrastructures (VDI), private cloud and big data.

The new Dell XC Series Version 2.0 appliances offer customers hyper-converged solutions based for the first time on Dell PowerEdge 13th generation server technology combined with Nutanix software and Dell global services and support. The appliances integrate enterprise-class storage, compute and hypervisor resources into a single solution, and further expand Dell’s broad software-defined storage (SDS) portfolio.


New Dell XC Series V2 Appliances | Dell

Adobe Kickbox, a Step-by-Step Guide to Innovation

A lot of small business owners have big ideas. The trick is turning those big ideas into the next big thing.
Innovators at Adobe think they can help businesses of any size turn those good ideas into real products or services with a concept called Kickbox.


Adobe Kickbox, a Step-by-Step Guide to Innovation

Mellanox ConnectX-4 100Gb/s Interconnect Adapter Delivers Record Performance Results (NASDAQ:MLNX)

Provides Superior Performance to HPC, Web 2.0, Cloud, Machine Learning, Storage and Enterprise Applications



Mellanox ConnectX-4 100Gb/s Interconnect Adapter Delivers Record Performance Results (NASDAQ:MLNX)

Spotlight: myInterview Offers an Alternative Hiring Process

Interviewing is an integral part of the hiring process. When you interview potential new employees, you can get a pretty good idea of whether or not they might be a good fit for your company within a few minutes. But doing a lot of interviews for every new opening can take up a lot of time and resources.
The startup myInterview thinks there’s a better way. The company uses video technology to bring interviews to the beginning of the hiring process. Read more about this interesting concept in this week’s Small Business Spotlight.


Spotlight: myInterview Offers an Alternative Hiring Process

FBI puts $3m bounty on Russian hacker

The FBI has offered a record $3 million reward for information leading to the arrest of a cybercriminal, reports the BBC.
Evgeniy Bogachev has been on the FBI’s radar since last year when he was formally charged on multiple counts, including conspiracy, wire fraud, bank and computer fraud, and money laundering. His cybercrime operation is alleged to have stolen more than $100 million.


FBI puts $3m bounty on Russian hacker

Top 5 security resolutions for 2015

Top 5 security resolutions for 2015

AVT-PR-Avnet’s Mike Buseman Named a 2015 Supply & Demand Chain Executive Pro to Know

PHOENIX – Avnet, Inc. (NYSE: AVT), a leading global technology distributor, today announced that Mike Buseman, chief global logistics and operations officer, has been named a 2015Supply & Demand Chain Executive Pro to Know. Pros to Know is an annual listing of the top supply and demand chain industry professionals. Buseman is the ninth Avnet executive to have made this distinguished list of supply chain professionals.



AVT-PR-Avnet’s Mike Buseman Named a 2015 Supply & Demand Chain Executive Pro to Know

Apple ordered to pay $533 million in iTunes patent lawsuit - Feb. 25, 2015

A Texas jury ordered Apple to pay $533 million for improperly using another company's patented technology in iTunes.



The technology is owned by Smartflash, a Texas-based company that licenses seven data storage patents owned by CEO Patrick Racz, who is also the company's only employee.



Apple ordered to pay $533 million in iTunes patent lawsuit - Feb. 25, 2015

Nine of the worst botnets ever seen

Botnets are responsible for a great deal of the hacking, spamming and malware that we read about in the news, yet public awareness of the hacker’s favorite tool remains relatively limited. The ability to control a large botnet gives hackers and cybercriminals the ability to send billions of spam emails, or orchestrate massive DDOS attacks at will. In a nutshell, a botnet is a collection of infected computers that have been infected with a virus to bring them under the control of one single hacker or organization.
If you want to know more about botnets, click here for an interview with ESET Security Intelligence Program Manager, Pierre-Marc Bureau. Here we take a look at some of the worst botnets ever found.


Nine of the worst botnets ever seen

Going on Spring Break? Load these apps first | Sprint Newsroom

Most of the country is fed up with the cold weather and snow. Families and college students alike, in colder climates, are sure to be looking forward to traveling somewhere warmer to enjoy Spring Break. Others may be heading to the mountains.

If travels are in your plans, you may want to consider arming your smartphone with some great apps that can enhance your travel experience.



Going on Spring Break? Load these apps first | Sprint Newsroom

Zdravstvuyte! Siri is learning Russian - Feb. 25, 2015

Zdrastvuyte, Siri. Apple's voice-controlled virtual assistant is now learning Russian.



A developer version of Apple's latest smartphone software, the OS 8.3., includes a number of new language options for Siri. Besides Russian, the updated version of Siri will speak Portuguese, Swedish, Turkish, and three other languages.



Zdravstvuyte! Siri is learning Russian - Feb. 25, 2015

How to turn Instagram into your profession - YouTube

Video (3:05)



How to turn Instagram into your profession - YouTube

Information Technology Leaders Feel Ill-Equipped to Handle Escalating Cyber Threats

From Lockheed Martin:


Information Technology Leaders Feel Ill-Equipped to Handle Escalating Cyber Threats

Survey of senior IT leaders in chemical, energy, financial services, federal government, healthcare, pharma and utilities industries highlights disconnect in cybersecurity approaches
GAITHERSBURG, Md., Feb. 19, 2015 – While the frequency and severity of cyberattacks against organizations are on the rise, a majority of information technology (IT) leaders do not feel confident in their leaderships’ ability to leverage intelligence that can predict a cyber vulnerability and effectively combat threats, according to a new survey commissioned by Lockheed Martin [NYSE: LMT].
A majority of survey respondents noted an increase in the severity (75 percent) and frequency (68 percent) of cyberattacks, but feared that they don’t have the budget (64 percent) or the expert personnel (65 percent) to address the threats.
“This survey illuminates areas of concern about cyber readiness across government and critical infrastructure industries,” said Guy Delp, director of cybersecurity and advanced analytics for Lockheed Martin. “The results highlight that the challenges in this domain are universal across both industry and government, and therefore our response needs to be equally holistic. The adoption of Intelligence-Driven Defense® techniques is critical to ensuring that not only IT officers, but also chief executives, boards of directors and customers have confidence in the security of their information.”
Other key findings include:
  • Many organizations are relying on intuition, rather than intelligence, to assess their security levels: Business and government respondents who felt that they were not presently being targeted for attack relied on their intuition (35 percent) or logical deduction (33 percent) rather than data or intelligence (32 percent) to justify their beliefs.
  • Whether malicious or negligent, insiders continue to be among the greatest perceived cyber threats: Thirty-six percent of respondents said that negligent insiders were the most significant network vulnerability facing their organization, and more than half (53 percent) ranked malicious insiders in their top four threats.
  • The most serious risks do not receive the most budget: The top two factors impacting an organization’s cybersecurity posture – employee cyber awareness and supply chain security – receive only four and 15 percent of cybersecurity budgets, respectively. Top budget items, such as mobile and cloud security, are both perceived to be lower threat levels.
“Compliance was rated the top cybersecurity business priority by the survey respondents,” added Delp. “Though somewhat surprising, it is a tell-tale sign that organizations feel the pressure to meet industry security compliance requirements. While satisfying compliance standards is important, organizations should view it as a foundation on which to build a more comprehensive security posture.”
The Intelligence-Driven Defense survey was independently conducted in November by data security research group Ponemon Institute. It polled 678 U.S.-based senior IT practitioners from a variety of sectors, including financial services, the federal government, healthcare, utilities, energy, pharmaceuticals and chemicals. The margin of error for survey questions ranged from ± 1.1 percent to ± 6.3 percent, with an overall average of ± 3.8 percent.
Headquartered in Bethesda, Maryland, Lockheed Martin is a global security and aerospace company that employs approximately 112,000 people worldwide and is principally engaged in the research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services. The Corporation’s net sales for 2014 were $45.6 billion.

Oracle Advances Vision for Enterprise Big Data

New technologies help integrate big data with enterprise computing, making big data insights a reality



Oracle Advances Vision for Enterprise Big Data

Oracle Launches Oracle Hospitality

Oracle Press Release

Oracle Launches Oracle Hospitality

Dedicated global business unit offers customers unparalleled expertise, scale, and innovation focused exclusively on the hospitality industry

REDWOOD SHORES, CA. – February 19, 2015

News Summary

Oracle, building on the strong foundation MICROS established serving the hotel and food and beverage industries, has launched Oracle Hospitality Global Business Unit to accelerate development of innovative cloud, mobile, and guest experience technology. With hundreds of thousands of systems already deployed in hotels, restaurants, cruise operations, and other venues on all seven continents, Oracle Hospitality extends MICROS’ commitment to providing fast, reliable service and solutions to customers both large and small.

News Facts

The launch of Oracle Hospitality combines the deep domain expertise of MICROS, acquired by Oracle in 2014, with the power of Oracle’s scale and innovation, to help customers succeed in an environment that has been fundamentally changed by the rise of social, mobile, and cloud technologies.
Oracle’s platform for the hospitality industry offers comprehensive and integrated software, modern cloud offerings, and hardware solutions for hotels, casinos, table and quick-service restaurants, sports and entertainment venues, and cruise operations from small independents to large global chains.
Leveraging Oracle’s integrated technology stack and cloud portfolio, Oracle Hospitality brings unmatched technical breadth, depth, and scale combined with significant R&D and dedicated resources focused exclusively on serving the needs of the hospitality industry by helping them:
Exceed guest expectations. Guests now expect the delivery of personalized experiences through the entire guest journey, both on and off property. By offering comprehensive, integrated systems that serve guests during every interaction, businesses can inspire loyalty, surpass guest expectations, and remain competitive in a rapidly evolving industry.
Realize faster time to cloud. Oracle Hospitality’s comprehensive, scalable, and globally deployable cloud solutions enable the hospitality sector to accelerate its move to the cloud in response to fast-changing guest expectations. By eliminating the cost and complexity of managing on-premises applications, hospitality organizations can focus on their guests and their business, delivering a consistent experience across venues.
Leverage mobile innovation. Mobile is a catalyst behind the radical changes and guest expectations in the hospitality industry. Oracle Hospitality delivers fully integrated mobile solutions that enable staff to conduct transactions and have informed engagement with guests anywhere onsite, not just from behind a counter.
Simplify their IT architecture. Comprehensive integrated solutions take advantage of Oracle’s proven technology to help drive greater business benefits, speed time to value, and reduce total cost of ownership.

Supporting Quotes

“The launch of Oracle Hospitality builds on Oracle’s industries strategy of creating dedicated global business units that help our customers solve their most important business challenges, with a combination of best-of-breed technology and extensive industry-specific expertise and experience,” said Bob Weiler, executive vice president, Global Business Units, Oracle. “Oracle Hospitality delivers solutions that allow our hospitality customers to compete more effectively in a business landscape that has been wholly reshaped by disruptive technologies.”
“By combining these two great brands we’re creating a portfolio that has never before been seen in the hospitality industry,” said Mike Webster, senior vice president and general manager, Oracle Retail and Hospitality. “We have assembled a strong team of industry veterans that wake up every day and focus on one thing and one thing only—how do we help our hospitality customers succeed in providing their guests a great experience.”

Supporting Resources

Oracle Hospitality at Oracle Industry Connect: March 25 and 26, Washington DC

About Oracle

Oracle engineers hardware and software to work together in the cloud and in your data center. For more information about Oracle (NYSE:ORCL), visit oracle.com.

Trademark

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.
# # #

New Oracle and Forbes Insights Study Shows Companies Moving Toward Modern Customer Service

Oracle Press Release

New Oracle and Forbes Insights Study Shows Companies Moving Toward Modern Customer Service

Investments grow despite organizational barriers to adopting modern customer service strategy and best practices

Redwood Shores, Calif. – February 18, 2015 – Oracle today announced the results of a Forbes Insights study that examined the adoption of modern customer service best practices. Commissioned by Oracle, the study “Modern Customer Service: Are You Outpacing Your Executive Peers?” surveyed 415 customer service executives, from organizations representing 10 different industries. The study shows that while companies are investing in new technologies to realize the business benefits of modern customer service best practices, the majority of organizations (62 percent) still fail to grasp the full importance and impact customer service can have when it is an organization-wide strategic goal.
And although 88 percent of respondents believe they are making significant progress delivering modern customer service, the study identified a number of barriers that are preventing companies from leveraging customer service as a true organizational strategy, including limited definitions of customer service, poor knowledge management and customer visibility, and a reliance on traditional channels and metrics.
Despite the barriers to adopting customer service as an organizational strategy, companies are realizing the importance of investing in modern customer service technologies to deliver the best customer experiences when, where, and how customers want it. Popular areas slated for investment in 2015 include additional online customer service capabilities (55 percent), self-service technology (47 percent), mobile apps (52 percent), social media (43 percent) and knowledge management systems (51 percent).
“Consumers today are engaged and empowered like never before and want to get answers to their questions anytime, anywhere, and on any device,” said David Vap, group vice president, Oracle Applications. “The jump from good to excellent customer service is a fairly big one and involves consistent, personalized customer service in every interaction, across every channel. But it can have a huge business impact by helping organizations increase sales, strengthen relationships, and reduce costs.”
“Brands realize that customer service is a great opportunity, especially in this omni-channel environment, to begin a dialogue with consumers and to engage and interact with them in creative ways” said Frank Pettinato, senior vice president and general manager of Consumer Connexions, Telerx. “In the world of social media, we see two-way communication and, candidly, millennials are expecting that.”

Summary of Key Findings:

Modern customer service is not yet considered a high-priority strategic goal: The study showed that the majority of organizations are not fully embracing a modern customer service mindset, with only 38 percent of respondents viewing modern customer service as a companywide priority.
The role of customer service is still largely misunderstood: Many organizations still narrowly define customer service as a post-purchase function, with executives often not viewing customer service as a key agent for increasing sales (60 percent), retaining existing customers (47 percent), or enhancing their brand and marketing message (85 percent).
Organizations are more comfortable with traditional customer service channels and traditional measures of success: Respondents indicated that they have a number of concerns about new customer service channels, including integrating them with existing systems (44 percent), cost (43 percent), implementation (39 percent), and technological limitations such as lack of support (36 percent). When evaluating customer service initiatives, respondents indicated there was a relatively low use of new measurement tools such as net promoter score (22 percent) and customer effort score (37 percent).
Customer understanding is becoming a customer service priority: While only 35 percent of organizations surveyed currently leverage knowledge management systems, 51 percent plan to invest in knowledge management technology in the future, indicating they recognize its importance in delivering what the customer wants—consistent answers, delivered seamlessly.
2015 will be a year of modern customer service investment: Organizations plan to significantly increase investments in online customer service (55 percent), self-service technology (47 percent), social media (43 percent) and mobile apps (52 percent) as they strive to deliver a seamless omni-channel experience.
“Customer service is paramount to our organization because we are a monthly recurring revenue business,” said Denise Connors, vice president customer service, at Trupanion. “We know that to be successful we have to retain our customers. Our whole approach is around having a highly engaged customer base and keeping them happy.”
Oracle and Forbes Insights defined “modern customer service” as going beyond standardizing services across channels to achieve personalized customer engagement at every touchpoint.

Supporting Resources:

About Oracle

Oracle engineers hardware and software to work together in the cloud and in your data center. For more information about Oracle (NYSE:ORCL), visit oracle.com.

Trademarks

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.
###

BMC and Qualys Join Forces to Improve Enterprise Security

Integrated solution combines BMC BladeLogic and Qualys Vulnerability Management to quickly identify and remediate threats and boost collaboration between Security and IT Operations teams



RSS Content - BMC Software

At least 8.8 million NON-customers of Anthem put at risk by data breach

It’s bad enough when a company you are doing business with gets hacked, and your personal information is exposed.
But it’s even more annoying when a company that you have no relationship with suffers a serious data breach by hackers, and your details *still* get exposed.


At least 8.8 million NON-customers of Anthem put at risk by data breach

What Reddit's privacy update means for revenge porn - Feb. 25, 2015

Reddit is updating its privacy policy to prohibit posting nude and sexual images without the consent of the subject.



The change, which will go into effect March 10, is a departure for the sprawling online community, which has avoided policing non-consensual explicit content.



What Reddit's privacy update means for revenge porn - Feb. 25, 2015

New HP Officejet Pro X Series Printers: What Do They Offer?

When thinking about efficiency and productivity in your business and areas you can easily improve, you might first think about your employees, software, and apps. But when was the last time you thought about your printer? It may not be the first thing to pop into your mind, but it’s time to change that thinking, as HP has recently introduced the HP Officejet Pro X Series of printers . . . and they are changing the way we look at business printing and productivity.
Research shows that printing is an often neglected part of running a business. For example:
  • 90 percent of business’s don’t keep track of what they spend on office printing.
  • Companies underestimate printing costs by 30 to 40 percent.
  • The average business spends one to three percent of its revenue on printing.


New HP Officejet Pro X Series Printers: What Do They Offer?

Relax! The NSA failed to hack your phone - Feb. 25, 2015

Ok, so the U.S. National Security Agency may have attempted to hack your mobile phone. But relax! It looks like it failed to pull off the attack successfully.



Gemalto, the world's largest manufacturer of SIM cards, said it believes it was jointly hacked by U.S. and U.K. spy agencies.



Relax! The NSA failed to hack your phone - Feb. 25, 2015

Top 10 breaches of 2014 attacked 'old vulnerabilities', says HP

A report by HP has found that 44 percent of all of the breaches in 2014 were caused by known vulnerabilities, between two and four years old.
In fact, The Cyber Risk Report 2015 highlights that every one of the top 10 vulnerabilities exploited in the year just gone took advantage of code that was years – and in some cases decades – old, suggesting that for hackers, known ‘tried and tested’ exploits remain the low-hanging fruit.


Top 10 breaches of 2014 attacked 'old vulnerabilities', says HP

Dell Positioned in the “Challengers” Quadrant of the Gartner Magic Quadrant for Advanced Analytics P | Dell

Dell today announced it has been positioned by Gartner, Inc. in the "Challengers" quadrant of the Gartner Magic Quadrant for Advanced Analytics Platforms (February 2015).

The Gartner Magic Quadrant is a graphical portrayal of vendor performance in a market segment, including categories for leaders, challengers, visionaries and niche players. Criteria by which the vendors are measured include a company's completeness of vision and ability to execute.



Dell Positioned in the “Challengers” Quadrant of the Gartner Magic Quadrant for Advanced Analytics P | Dell

App Developer and Father Created Augmented Reality Children's Book

Bradley C. Grimm is a software developer and father who has combined his experience as both to create apps for kids. His apps such as Goofy Glass andFunny Voice Changer have earned him millions of downloads. Now Grimm has set his sights on combining an app with an illustrated story to create Goodnight Lad, an augmented reality children’s book.
For more information on Goodnight Lad check out the Kickstarter video below:


App Developer and Father Created Augmented Reality Children's Book

AVT-PR-Avnet, Inc. to Present at the Raymond James 36th Annual Institutional Investors Conference

Phoenix - Avnet, Inc. (NYSE: AVT) today announced that the Company is scheduled to present at the Raymond James 36th Annual Institutional Investors Conference in March.
Rick Hamada, Avnet’s chief executive officer, will be presenting at the conference to be held at the JW Marriott Grande Lakes, in Orlando, FL on March 3, 2015 at 3:25 p.m. Eastern time. 


AVT-PR-Avnet, Inc. to Present at the Raymond James 36th Annual Institutional Investors Conference

Tuesday, February 24, 2015

Googlicious - The phones we know about before Mobile World Congress 2015 - YouTube

Video from CNET (3:45)



Published on Feb 24, 2015
http://cnet.co/1LB6wCi
There's leaks and teases a week before Mobile World Congress 2015. Google Wallet is looking to make a comeback, and Pebble's latest smartwatch is for sale.


Googlicious - The phones we know about before Mobile World Congress 2015 - YouTube

IBM News room - 2015-02-20 IBM Studio Opens in London to Transform the Client Experience - United States

London, UK - 20 Feb 2015: IBM (NYSE: IBM) today announced the opening of IBM Studio  London, where IBM design and digital experts will work with clients to help them engage with customers using big data, mobile, cloud and social innovations.



IBM News room - 2015-02-20 IBM Studio Opens in London to Transform the Client Experience - United States

IBM Unveils Next Generation Flash Storage Solutions

From IBM:


IBM Unveils Next Generation Flash Storage Solutions

Coca-Cola Bottling Co. Consolidated Tapping IBM FlashSystem to Boost Big Data Analytics and Improve Operations
ARMONK, N.Y. - 19 Feb 2015: IBM (NYSE: IBM), the worldwide leader in flash storage arrays, today announced two new all-flash enterprise storage solutions that provide industry-leading performance and efficiency, along with outstanding reliability to help lower costs and accelerate data-intensive applications and infrastructures. The new solutions can provide customers real-time analytical insights with up to 50 times better performance than traditional enterprise storage, and up to four times better capacity in less rack space than EMC XtremIO flash technology.
Enterprises around the globe face the rising challenges posed by escalating data volumes, velocity, and variety. Flash – the memory technology used in everything from mobile phones to enterprise storage – is being used to help businesses address these challenges and transform the flood of information into tangible value and business insight.
IBM FlashSystem® storage can enable organizations to address new IT challenges while continuing to accelerate application performance and helping lower IT infrastructure cost and complexity. IBM FlashSystem V9000 offers the advantages of software-defined storage at the speed of flash. By deploying FlashSystem V9000, customers can consolidate their existing storage systems under one management domain, and implement leading-edge virtualization and storage services throughout. Meanwhile, IBM FlashSystem 900 will continue providing extreme performance, enterprise reliability, and macro efficiency that can be deployed in as little as two hours, rather than the days required for conventional systems.
At the heart of these all-flash storage arrays lies IBM FlashCore™ technology, the suite of innovations and capabilities that can enable FlashSystem to help deliver better performance than enterprise disk systems, making it flexible as well as easy to deploy across entire IT ecosystems. These technology enhancements can translate into tangible benefits for customers that want to build cost-effective cloud architectures, gain quick insight from analytics, engage with mobile customers at every opportunity, and help detect and prevent cyber fraud and datasecurity threats in real time.
FlashSystem V9000 and FlashSystem 900 take enterprise storage to the next level, by helping to enable businesses such as Coca-Cola Bottling Co. Consolidated (CCBCC) unleash the power of big data, achieve real-time business insights, make better decisions, and gain competitive advantage. For more than two years, CCBCC has been deploying IBM FlashSystem storage to address the mounting volumes of data challenging the company’s ability to keep Coke products on store shelves. Leveraging FlashSystem technology, CCBCC was able to go from processing 100,000 data points to 3.5 million data points each day. As a result, the company improved their demand forecasting by narrowing the focus from warehouses down to individual customers to better predict how much of which products are needed on any given day and in any particular store or vending machine. CCBCC is currently rolling out IBM’s newest flash storage technology to process data even faster.
“The data we’re generating and analyzing daily is critical to our ability to stock Coke product on store shelves at the right time,” said Tom DeJuneas, IT Infrastructure Manager for Coca-Cola Bottling Co. Consolidated. “We turned to FlashSystem storage in 2013. It has helped us achieve a 75 percent reduction in data processing, reducing jobs that took 45 minutes down to just six. Today, we’re using IBM’s newest FlashSystem solution to process data and draw key insights even faster, so we can dramatically improve our demand forecasting and get our products on the right shelves at the right time.”
This announcement further illustrates IBM’s commitment to developing and offering flash-based storage solutions to enterprises of all sizes and industries and builds on the investment in flash storage which IBM announced in April 2013. The company made a one billion dollar investment in flash storage research, partnerships, product development, enhancements to flash sales and support infrastructures, and 12 new Centers of Competency across the globe.
“Many of our customers are pressured to derive greater business value from an ever-growing amount of data,” said Jamie Thomas, General Manager, Storage and Software Defined Systems at IBM. “In order to unlock key insights from big data through analytics, more and more customers, like Coca-Cola Bottling Co. Consolidated, are using IBM FlashSystem to accelerate mission-critical applications and improve operations and services. These IBM solutions can offer extraordinary advantage to any business eager to make more, spend less, and move faster.”
IBM FlashSystem technology features Micron’s MLC flash chip technology. FlashSystem takes advantage of the chip’s density and cost benefits resulting in stronger data protection, improved reliability and enhanced application economics.
“IBM is a powerful leader in storage, globally recognized for delivering solutions that transform businesses,” said Darren Thomas, Vice President of Storage at Micron. “For FlashSystem, IBM draws on Micron’s flash expertise and deep flash media knowledge to deliver a truly differentiated storage solution. This unique collaboration signifies the future of enterprise storage.”
About IBM
Building on decades of storage leadership, IBM offers a comprehensive portfolio of integrated, flash-optimized storage solutions, including the new IBM FlashSystem V9000 and IBM FlashSystem 900, to help propel organizations into the next era of IT. The company’s easily integrated flash solutions can help accelerate critical applications for faster decision making, and deliver enterprise-level reliability and efficiencies across the entire business environment for a faster return on investment.
For more information about IBM Flash Storage, visit www.ibm.com/storage/flash and follow us on twitter @ibmstorage