Search This Blog

Saturday, February 27, 2016

Refine Vague Book Promotion with "Online Marketing for Busy Authors"

The rise of self-publishing has spawned a huge flood of eBooks in the market. What hasn’t grown along with this flood, however, is a step-by-step guide for how to market those eBooks. That’s where “Online Marketing for Busy Authors: A Step-by-Step Guide” steps in. Written by a veteran of the book publicity industry, the book aims to help authors make sense of the confusing world of marketing a book online.



Refine Vague Book Promotion with "Online Marketing for Busy Authors"

Safeguard Your Network with New Cisco Small Business Routers

The Internet provides small businesses with an incredible amount of access to resources, but this access comes with some caveats, and security happens to be one of them. The new Cisco Small Business Routers: the RV320 and RV325 with Web filtering look to add a layer of protection by preventing access to dangerous sites on the Web.
The security threat landscape in the digital world is well documented. While the data breaches in large public and private organizations grab the headlines, thousands of such events take place daily targeting small businesses and individual users.


Safeguard Your Network with New Cisco Small Business Routers

In the News: Google Ends Right-Side Ads, MailChimp Adds Preview Feature

Successful marketing plans need many different facets in order to be effective. You need to consider things like search ads, email marketing and more. And this week, marketers got some news that impacts the way that both their search ads and marketing emails might be displayed. Get these headlines and more below in this week’s Small Business Trends news and information roundup.



In the News: Google Ends Right-Side Ads, MailChimp Adds Preview Feature

Apple strikes again at FBI. What's next in the iPhone-hack battle?

Apple's working on an iPhone even it can't hack (Apple Byte)

Inside Scoop: Tim Cook talks privacy at Apple's shareholder meeting

Friday, February 26, 2016

How NOT to Use a Stock Photo

A lot of small businesses rely on stock photography services to add some high-quality images to their websites and other promotional materials.
The benefits of great visuals are obvious and have been discussed ad nauseum.


How NOT to Use a Stock Photo

Hong Kong leader falls victim to Facebook's 'angry face' feature - Feb. 26, 2016

Hong Kong's leader CY Leung is getting showered with angry faces.



Thousands of users are showing their dislike of Hong Kong's top official, clicking "angry" on his official Facebook entries.



Hong Kong leader falls victim to Facebook's 'angry face' feature - Feb. 26, 2016

Lisa Abbott of Genesys: Chat on Your Website Decreases Customer Abandonment by Half

Key findings in a recent Forrester Study on the benefits of using an omni channel engagement center, commissioned by customer experience platform provider Genesys, include:
  • 50 percent reduction in customer abandonment at key points in the customer journey 
  • Over $1 million in increased revenue through increased ecommerce and voice conversions


Lisa Abbott of Genesys: Chat on Your Website Decreases Customer Abandonment by Half

Why cybercrime isn’t fun and (video) games

For young people, the internet can be a vital source of information, recreation, escape and more, but without the right guidance it can also be unsafe. Online games particularly make prime targets for cybercriminals, and there are also concerns that gaming networks can lead players astray, or even act as a criminal breeding ground.
Whatever the reasons might be, the fact is that teenagers are getting involved in cybercrime at an increasingly early age. According to recent statistics by the UK’s National Crime Agency (NCA), for example, the average age of cybercrime suspects over the last year was just 17 years-old, dropping dramatically from 24 years-old the previous year. This is clearly a worrying shift, and – according to the NCA – it could stem from a lack of understanding around what constitutes cybercrime.


Why cybercrime isn’t fun and (video) games

Solutions - 65V, 3.5A/5A Peak (IOUT), Synchronous Step-Down Silent Switcher Delivers 94% Efficiency at 2MHz & Ultralow EMI Emissions

MILPITAS, CA - February 25, 2016 - Linear Technology Corporation announces the LT8641, a 3.5A, 65V input capable synchronous step-down switching regulator. A unique Silent Switcher® architecture, combined with spread spectrum frequency modulation, reduces EMI/EMC emissions by more than 25dB even with switching frequencies in excess of 2MHz, enabling it to easily pass the automotive CISPR25 class 5 peak and average limits. Synchronous rectification delivers efficiency as high as 94% with a switching frequency of 2MHz. Its 3V to 65V input voltage range makes it ideal for single or dual cell automotive/transportation and industrial applications.



Solutions - 65V, 3.5A/5A Peak (IOUT), Synchronous Step-Down Silent Switcher Delivers 94% Efficiency at 2MHz & Ultralow EMI Emissions

Google Right Side Ads End on Search Results

Google right side ads have appeared in search results since AdWords launched in 2000. No more. They’re history. R.I.P.
Google has confirmed a huge change to the way AdWords ads are displayed for desktop search results, and it is now rolling out for all of its users globally. Google right side ads are being killed off completely — although Product Listing Ads and ads in the Knowledge Panel will continue to be shown on the right — and adding a fourth ad for “highly commercial queries” above the organic search results.


Google Right Side Ads End on Search Results

Thursday, February 25, 2016

Dell Strengthens Backup Capabilities Spanning Client to Cloud | Dell

Dell today announced a series of new data protection solutions to help organizations better protect business-critical systems, applications, and data – either on premises or in the cloud. Offerings include: the general availability of Dell Data Protection | Rapid Recovery; three new data deduplication appliances models; new Dell Data Protection | Endpoint Recovery – Free Edition; and the new Dell Data Protection | NetVault Backup 11. These updates to the data protection product portfolio reinforce Dell’s commitment to driving innovation and giving customers the choice and flexibility they need to quickly address evolving backup and recovery needs as they move data and applications to the cloud.



Dell Strengthens Backup Capabilities Spanning Client to Cloud | Dell

Dell to Announce Fiscal 2016 Q4 and Year-End Financial Results March 10 | Dell

Dell to Announce Fiscal 2016 Q4 and Year-End Financial Results March 10 | Dell

Google Seeks Small Business Owners as Trusted Testers

Small business owners now have an opportunity to try out Google My Business tools before they’re rolled out to the general  pubic. Google My Business has announced its “trusted Partners” program as a way to test new products and features. Elisabeth Powers Google My Business community manager, posted in the Google My Business Help forums recently that the company is looking for beta testers from the business community. The new program applies not only to new products and features for Google My Business but in the Google Ads department too.
She further emphasized that this is a huge opportunity for all US-based small and medium sized businesses.


Google Seeks Small Business Owners as Trusted Testers

SoundCloud Still Struggles With Profitability

Audio-based social networking service SoundCloud is struggling financially. The company reportedly lost a total of $70.3 million in earnings in 2013 and 2014 combined.
The company’s struggles could be a bad sign for entrepreneurs who use the service either to create podcasts or market their music. In 2014, SoundCloud launched a partnership program with artists who wished to sell their music downloads from the platform. Since SoundCloud’s launch in Berlin in 2007, people have used it to record, share and promote a variety of different audio content. If the company were to fail, there are other options out there, but none with the exact same features.


SoundCloud Still Struggles With Profitability

Identity theft accounts for 'majority of data breaches'

Theft of identities along with personal information still accounts for the majority of data breaches, a new global survey by Gemalto has found.
According to the 2015 Breach Level Index (BLI), identity theft accounted for 53% of all data breaches as well as 40% of “all compromised records” last year.


Identity theft accounts for 'majority of data breaches'

16 Ways a Virtual Phone Service Can Help Your Business

When launching your small business, it’s unlikely that you thought hard about setting up a phone system, if you thought about it at all.
You’re not alone in this: out of the 25-plus startup checklists we looked at online while researching this article, only one listed phone systems and it was pretty far down in terms of priority.


16 Ways a Virtual Phone Service Can Help Your Business

RPC Powered by Red Hat Webinar







#Rackspace


MullenLowe Profero :: Deploying Digital Marketing with Rackspace Managed...







#Rackspace


Rackspace Hybrid Cloud Powers SLI Systems SaaS-based Ecommerce Solutions







#Rackspace


Real Estate Webmasters Scales on Rackspace Private Cloud





Rackspace


Customer Architecture: Hybrid Meets Security and Compliance







#Rackspace


Building with Watson - Beyond the Basics for Conversational Apps

Brocade Executives to Present at Upcoming Financial Conferences (NASDAQ:BRCD)

Brocade Executives to Present at Upcoming Financial Conferences (NASDAQ:BRCD)

MEDIA ALERT: BMC Transforms Mainframes for the Digital World at Share 2016

Discover how to unleash the value and power of the Mainframe at Booth 409



RSS Content - BMC Software

Solutions - 2kVAC Isolated µModule Converters, 2.8Vin to 40Vin Meet Information Technology Equipment Safety UL60950

MILPITAS, CA - February 24, 2016 - Linear Technology introduces the LTM8067 and LTM8068, DC/DC µModule® regulators with 2kVAC galvanic isolation. The LTM8067 and LTM8068 include an isolating transformer, control circuitry, power switches and other supporting components in a 9mm x 11.25mm x 4.92mm BGA package. Only one resister, plus input and output capacitors are required to complete the design. Pin creepage and clearance and other features permit these devices to be recognized by UL60950 Information Technology Equipment Safety. The LTM8068 includes an additional low noise linear regulator. Applications include ground loop elimination in systems with sensors or noise sensitive loads in industrial automation, test and measurement equipment.



Solutions - 2kVAC Isolated µModule Converters, 2.8Vin to 40Vin Meet Information Technology Equipment Safety UL60950

Solutions - Linear Technology Expands In Singapore To Boost Worldwide Production Capacity

SINGAPORE, February 23, 2016 - Linear Technology Corporation (NASDAQ: LLTC) today opened the company’s third semiconductor test facility in Singapore. The additional space for staff, equipment and materials will allow the company to more than double its production capacity of advanced analog circuits and µModule® (micromodule) products. This will strengthen Linear Technology’s ability to meet the growing demand for high performance analog integrated circuits worldwide.



Solutions - Linear Technology Expands In Singapore To Boost Worldwide Production Capacity

Metrics Overload? How to Streamline Marketing Data

From Google Analytics to social media dashboards, too much data can lead to metrics overload.
How can you tell if your customers are happy with your service? How do you know whether your inbound marketing strategy is working? How do you know if your social media marketing is building strong brand awareness or getting lost in the Twittersphere?


Metrics Overload? How to Streamline Marketing Data

Microsoft Azure Security Center & Fortinet: Scaling Security & Securing the Cloud | Fortinet Blog

Microsoft Azure Security Center & Fortinet: Scaling Security & Securing the Cloud | Fortinet Blog

Handmade Business Industry Sees Robust Growth, Based on Etsy Results

Etsy announced strong full year 2015 results, a reflection of the overall robustness of the handmade business industry.
Etsy reported 21.3 percent growth in merchandise sales year over year for 2015 and 35.4 percent revenue growth.


Handmade Business Industry Sees Robust Growth, Based on Etsy Results

Dell and EMC Receive US Federal Trade Commission Clearance for Proposed Merger | Dell

Dell Inc. and EMC Corp. (NYSE: EMC) today announced the expiration of the waiting period under the Hart-Scott-Rodino Antitrust Improvements Act of 1976, as amended, in connection with the companies’ proposed combination. The expiration of the waiting period occurred at 11:59 p.m. EST on Feb. 22, satisfying one of the conditions to the closing of the proposed transaction. The transaction remains subject to approval by EMC’s shareholders, regulatory clearance in certain other jurisdictions and other customary closing conditions. 



Dell and EMC Receive US Federal Trade Commission Clearance for Proposed Merger | Dell

New MailChimp Feature Gives Better Idea How Emails Look to Clients

The email marketing service provider MailChimp has just recently unveiled a new feature, MailChimp Inbox Preview, which enables its users to preview its emails before they are sent out. MailChimp Inbox Preview is an upgraded version to its predecessor, Inbox Inspector.
Inbox Inspector helped marketing campaigns by offering previews to the users. However, live HTML versions were still rendered differently by different email clients. The Inbox Preview does away with this shortcoming by returning the preview exactly as it would look online in more than 40 clients. Not only this, Inbox Preview also recognizes which client is popular among subscribers. This will help enterprises to revise their designs accordingly.


New MailChimp Feature Gives Better Idea How Emails Look to Clients

Privacy and security ‘war’ must come to an end

Cybersecurity experts are joining forces with government officials to try and “end the war between privacy and security”.
The Digital Equilibrium Project, as it’s known, aims to “foster a new, productive dialogue on balancing security and privacy in the connected world”.


Privacy and security ‘war’ must come to an end

Wednesday, February 24, 2016

Internal Segmentation Firewalls—Securing the Inner Network | Fortinet Blog

Our threat landscape is constantly evolving. As known vectors are exposed and neutralized, new methods emerge to take their places. And the current wave of advanced threats are getting increasingly better at slipping past perimeter security to reach the unprotected internal network. While edge firewalls do an excellent job of protecting the network border, they can’t help after a breach occurs.
It might be malicious code that sits dormant for months before launching an opportunistic attack on critical infrastructure. Or it could be a hack that quietly exfiltrates sensitive data and intellectual property. Once something reaches the network interior, there’s traditionally been very little in place to spot their presence or activities—let alone stop them. This is why some of the recent breaches you may have heard of went undetected over extended periods of time, with damages snowballing into the millions of dollars.


Internal Segmentation Firewalls—Securing the Inner Network | Fortinet Blog

Sprint Network #1 in Las Vegas | Sprint Newsroom

Sprint Network #1 in Las Vegas | Sprint Newsroom

Sprint Recognized for its Outstanding Contribution Furthering the Development of TD-LTE | Sprint Newsroom

Sprint Receives GTI Market Development Award at Mobile World Congress



Sprint Recognized for its Outstanding Contribution Furthering the Development of TD-LTE | Sprint Newsroom

Sprint and Techstars Announce Ten Startups Entering the 2016 Sprint Mobile Accelerator | Sprint Newsroom

Third annual program in Kansas City runs February 22 through May 24



Sprint and Techstars Announce Ten Startups Entering the 2016 Sprint Mobile Accelerator | Sprint Newsroom

AVT-PR-Avnet Government Solutions Expands its GSA Schedule to Include

Avnet helps partners capitalize on converged infrastructure and cloud opportunities in the U.S. public sector



AVT-PR-Avnet Government Solutions Expands its GSA Schedule to Include

AVT-PR-Avnet Appoints Bob Bowen to Lead Global Trade Compliance

Phoenix – Avnet, Inc. (NYSE:AVT), a leading global technology distributor, today announced that Bob Bowen has joined the company as vice president of global trade compliance. In this role, Bowen will oversee Avnet’s global trade compliance program, which ensures that customers and suppliers remain compliant with the evolving laws and regulations in countries around the world. Bowen reports to Mike Buseman, chief global logistics and operations officer.



AVT-PR-Avnet Appoints Bob Bowen to Lead Global Trade Compliance

Google Play porn clicker 'is a truly large-scale campaign'

We Live Security sat down with ESET’s Lukáš Štefanko to discuss the porn clicker family and other mobile malware.
Lukas, are you sure that those malicious apps you discovered really belong to the largest malware campaign Android users have ever faced at Google Play?


Google Play porn clicker 'is a truly large-scale campaign'

Porn clicker trojans keep flooding Google Play

ESET researchers have found 343 malicious porn clicker trojans, which ESET detects asAndroid/Clicker, on Google Play over the last seven months – and their numbers keep rising. In one of the largest malware campaigns on the Google Play Store yet, criminals continue to upload further variants of these malicious apps to the official app store for the Android mobile platform.
“There have been many malware campaigns on Google Play, but none of the others have lasted so long or achieved such huge numbers of successful infiltrations,” explains Lukáš Štefanko, a malware researcher at ESET, who specializes in Android malware.


Porn clicker trojans keep flooding Google Play

Porn clicker trojans at Google Play: An analysis

Malicious porn clickers are mostly fake versions of popular games with very similar names and icons to legitimate applications. For instance, there were more than 30 bogus Subway Surfers and more than 60 fake GTA applications.
These apps have nothing in common with the official Subway Surfers or GTA games. The trojans were mostly devoid of any legitimate functionality and took advantage of having been given similar names to those of popular applications.


Porn clicker trojans at Google Play: An analysis

Mellanox Partners with Nutanix to Deliver Effortless Enterprise Infrastructure (NASDAQ:MLNX)

Integration with Unique Ethernet Switch Makes the Network Invisible Too, Achieves "Nutanix Ready for Networking" Validation



Mellanox Partners with Nutanix to Deliver Effortless Enterprise Infrastructure (NASDAQ:MLNX)

Spotlight: ezCater Connects Businesses With Caterers, Restaurants

When you host a business meeting or event, you may find yourself in a situation where you need to provide food for attendees.
That’s exactly the situation in which ezCater aims to help. The company focuses its efforts specifically on business customers. Read more about ezCater’s offerings in this week’s Small Business Spotlight.


Spotlight: ezCater Connects Businesses With Caterers, Restaurants

Facebook's adds 'love,' 'haha,' 'wow,' 'sad' and 'angry' to its 'like' button - Feb. 24, 2016

Now you can do a whole lot more than "like" a Facebook post. "Love," "Haha," "Wow," "Sad," and "Angry" are five new Facebook buttons that people can click when responding to a post.



Anyone who uses Facebook can now choose from these "Reactions" on top of liking, commenting or sharing something.



Facebook's adds 'love,' 'haha,' 'wow,' 'sad' and 'angry' to its 'like' button - Feb. 24, 2016

How Can You Prevent People from Using Your Wireless Network

Do you suspect your neighbor to use your wireless network? The reasons behind can be slow internet connection or that the devices keep disconnecting from the router. People connected to the wireless router may also access the shared folders on the network and thus, data theft is a threat here. Luckily enough, there are various ways to detect unknown connections to the network as well as stop them of getting connected.



How Can You Prevent People from Using Your Wireless Network

Keys to Getting Your Content Featured by Google

Have you ever been searching for something on Google and seen “featured articles” that relate to your search? Although featured articles were first introduced in August 2013, it feels like a much newer feature to most businesses. These featured articles highlight long-form content for topics (usually generic in nature) that a user might be trying to research. Click Seed notes that according to a Google Webmaster blog on featured articles, “users often turn to Google to answer a quick question, but research suggests that up to 10 percent of users’ daily information needs involve learning about a broad topic.”



Keys to Getting Your Content Featured by Google

What is the Dark Web?

So exactly what is the Dark Web? The submerged part of the iceberg, the scary part of the Internet — these are just some depictions of the so-called “Dark Web.”
Here’s an exploration what’s behind this part of the Web’s infamous reputation.


What is the Dark Web?

Tuesday, February 23, 2016

Visage Unveils New Version of Design Tool for Content Marketers

Getting ahead in small businesses these days requires an online presence AND creativity. Visage, a business devoted to assisting small businesses with visual content, addresses both. Visage has announced an update of its design tool for content marketers called Visage 3.0, officially released Feb. 23, 2016.
Emerging from Column Five Media, a full service visual content company, in 2013, Visage was created to give the small business owner the freedom to create his or her own designs regardless of graphic design skills.


Visage Unveils New Version of Design Tool for Content Marketers

Turn Your Smartphone or Tablet Into a Laptop with NexDoc

Small is beautiful, especially when your business operates on a tight budget or when you need to be constantly on the move.
Nex Computer’s new 14-inch monitor with a built-in battery and Bluetooth keyboard transforms smartphones, tablets, mini PCs and more into a laptop addressing small businesses’ need for smaller and smarter innovation.


Turn Your Smartphone or Tablet Into a Laptop with NexDoc

Haystacks and Needles: IoT Security through "Pico"-Segmentation | Fortinet Blog

Over the past year or so we’ve heard lots about segmentation and micro-segmentation as new ways to build effective cyber defences in enterprise networks and data centres… but is it enough? Can we delve even deeper? I believe there may be a third leg to the segmentation stool: pico-segmentation.



Haystacks and Needles: IoT Security through "Pico"-Segmentation | Fortinet Blog

Dell Enters Embedded PC Market with New Embedded Box PCs | Dell

Dell today announced the launch of its first purpose-built industrial PC (IPC) products, Embedded Box PC 3000 Series and 5000 Series, aimed at taking the embedded PC market mainstream. Available this summer, the products are fanless, ruggedized and built to provide customers fast time to market. With a long history of rugged engineering innovation and extensive experience in OEM Solutions, the products expand Dell’s Internet of Things (IoT) portfolio. Dell will bring the benefits of short lead times, enterprise-class lifecycle, stability, service and support to customers who may be underserved by current embedded solutions.



Dell Enters Embedded PC Market with New Embedded Box PCs | Dell

Grandex :: Deploying Digital Media and Ecommerce on Rackspace Hybrid Cloud

AVT-PR-Avnet Showcases Latest in Healthcare IT Solutions and Services

Avnet and its partner ecosystem in the U.S. and Canada demonstrate how they are helping drive the future of healthcare delive



AVT-PR-Avnet Showcases Latest in Healthcare IT Solutions and Services

The industrialization of cybercrime may be upon us

We are slowly seeing the “industrialization” of cybercrime according to an expert.
Dr. Adrian Nish, head of cyber threat intelligence at BAE, said that cybercriminals are becoming more “professionalized”, the Telegraph reported.


The industrialization of cybercrime may be upon us

AVT-PR-New Issue of Supply Chain Navigator from Avnet Puts Spotlight

PHOENIX – For decades, sustainability advocates have been lobbying to convince the corporate world that doing what’s right for the environment and society is good business. But, until recently, the bottom line benefits of corporate social responsibility (CSR) remained unclear. The Winter 2016 issue of Supply Chain Navigator released today by Avnet, Inc. (NYSE: AVT), a leading global technology distributor, examines the growing recognition that not only is it possible to do well while doing good, but that supply chain leadership is essential to realizing the strategic advantages of social, environmental and economic sustainability.



AVT-PR-New Issue of Supply Chain Navigator from Avnet Puts Spotlight

Android porn clicker on Google Play: Appendix

Android porn clicker on Google Play: Appendix

Transforming Businesses with Cognitive APIs: Facilitated Innovative Busi...

Bill Gates Backs FBI On iPhone Hack Order | Tech Bet | CNBC

BMC Discovery Empowers IT to Be Lean, Secure and More Agile While Delivering a 470 Percent Return on Investment

"Start anywhere" application mapping empowers IT organizations to understand how their responsibilities impact the business



RSS Content - BMC Software

Mellanox Technologies Completes Acquisition of EZchip (NASDAQ:MLNX)

SUNNYVALE, Calif. & YOKNEAM, Israel--(BUSINESS WIRE)-- Mellanox® Technologies, Ltd. (NASDAQ: MLNX), a leading supplier of end-to-end interconnect solutions for servers and storage systems, today announced that it completed the acquisition of EZchip (NASDAQ: EZCH; TASE: EZCH), a leader in high-performance processing solutions for carrier and data center networks, at a total purchase price of approximately $811 million (approximately $606 million net of cash).



Mellanox Technologies Completes Acquisition of EZchip (NASDAQ:MLNX)

Solutions - 18­Bit, 8­Channel Multiplexed SAR ADC with Independently  Configurable Input Ranges

Solutions - 18­Bit, 8­Channel Multiplexed SAR ADC with Independently  Configurable Input Ranges

UN aviation agency bans lithium-ion batteries as cargo on passenger flights — RT News

Lithium-ion batteries can no longer be transported as cargo on planes, the UN aviation agency has ruled, alleging a serious safety risk. The rechargeable phone and laptop batteries have been ruled a fire hazard, and the decision will stand until new packaging standards are agreed.



UN aviation agency bans lithium-ion batteries as cargo on passenger flights — RT News

Do You Really Need a New Website?

You would think that, as a Web developer and content marketer, the last question to ask a potential client is whether they really need a new website. And yet, that’s one of the most productive questions to ask.
Far from talking clients out of working with you, it frequently helps solidify their thinking, which in turn makes your job much easier. It’s always easier to succeed if you’ve defined what success looks like before you begin.


Do You Really Need a New Website?

Digital childhoods: How different nations bring up their kids

Most parents think carefully about when to give their children their first set of house keys, or let them go out to play with no adult supervision. Yet in our digitalized world, the same caution should be exercised in the virtual world, such as on social networks or when giving children their first smart gadgets.
ESET has looked deeper into what parents in the United States, Germany, the United Kingdom and Russia regard as the appropriate age for digital activities.


Digital childhoods: How different nations bring up their kids

4 internet-savvy countries agree: Kids go digital too early

Nowadays, the internet and technology have become so important for business, travel and many other everyday tasks that they practically surround us all the time. This is true for the younger generation as well, including even the smallest children, but online surveys by ESET show that a majority of parents in Russia, the United Kingdom, Germany and the United States are not at all happy about this.



4 internet-savvy countries agree: Kids go digital too early

Annual Threat Report details the cybercrime trends that shaped 2015 and identifies top emerging secu | Dell

Dell today announced the results of the Dell Security Annual Threat Report detailing the cybercrime trends that shaped 2015 and identifying top emerging security risks for 2016. The report, based on data collected throughout 2015 from the Dell SonicWALL Global Response Intelligence Defense (GRID) network with daily feeds from more than one million firewalls and tens of millions of connected endpoints, Dell SonicWALL network traffic and other industry sources, equips organizations with practical, evidenced-based advice so they can effectively prepare for and prevent attacks.



Annual Threat Report details the cybercrime trends that shaped 2015 and identifies top emerging secu | Dell

Monday, February 22, 2016

AVT-PR Jeff Bawol and Gavin Miller of Avnet Recognized as 2016 CRN Channel Chiefs

Executives honored for their roles in accelerating growth in the Americas for Avnet and its channel partners



AVT-PR Jeff Bawol and Gavin Miller of Avnet Recognized as 2016 CRN Channel Chiefs

LG’s Latest Budget-Priced Smartphone Includes Nano Coated Tip Stylus Pen

LG will be introducing the latest version of its flagship smartphone at the upcoming Mobile World Congress conference this week. At the event, the South Korean company will show off the new LG5, but fans of stylus devices will be more interested in the 5.7-inch phablet LG Stylus 2.
Currently there is one phone that dominates the stylus segment on mobile, the Samsung Galaxy Note. But other players are introducing their own versions, including LG and Huawei.


LG’s Latest Budget-Priced Smartphone Includes Nano Coated Tip Stylus Pen

Instagram Makes It Easier to Have Multiple Accounts

Recently, Instagram announced a new feature which has been included in its mobile app. You can now have multiple accounts on Instagram and switch easily between them from within the Instagram mobile app without having to sign out.
This will no doubt come as a delight to Instagram’s huge user base, especially business users. These users in particular have had need to manage multiple accounts on Instagram for some time.


Instagram Makes It Easier to Have Multiple Accounts

Introducing Galaxy Forever, Only from Sprint; Gives Customers Annual Upgrade to Samsung Flagship Galaxy Smartphones | Sprint Newsroom

Get one Samsung Galaxy S7 and Samsung Galaxy S7 edge, get one for half price;
Available March 11; Pre-order begins Feb. 23 at sprint.com/gs7



Introducing Galaxy Forever, Only from Sprint; Gives Customers Annual Upgrade to Samsung Flagship Galaxy Smartphones | Sprint Newsroom

New PayPal Commerce Lets You Stick Buy Buttons Almost Anywhere

PayPal has unveiled the new PayPal Commerce, a shopping platform that enables merchants and partners to embed “Buy” buttons into blogs, social feeds, emails, apps and ads through a set of APIs.
Shortly after splitting from eBay in 2015, the newly independent PayPal acquired commerce startup Modest — a company that basically made it possible for merchants to integrate ecommerce into their emails and apps. The merged companies spent six months in what Harper Reed, Modest’s co-founder, describes as “fun and focused” product development.


New PayPal Commerce Lets You Stick Buy Buttons Almost Anywhere

DOJ's Apple Hack Court Order 'Unprecedented': Expert | CNBC

Facebook's Plans For Social Virtual Reality | Tech Bet | CNBC

How to Print from Your Android Phone

Mobile technology has eliminated some of the need for printing hard copies of business documents and images. But you don’t have to do away with printing completely. In fact, there are plenty of apps and methods out there that allow you to print directly from your mobile device.
If you use an Android phone or tablet, you can use the methods below to print from your Android phone any documents or images that you have on your mobile device.


How to Print from Your Android Phone

Mellanox Technologies, Ltd Partnering with Hewlett Packard Enterprise to Boost NFV and Telco Network Performance (NASDAQ:MLNX)

Record-setting 33 Mpps DPDK Packet Rate Achieved with ConnectX®-4 Lx 25Gb/s Ethernet NIC



Mellanox Technologies, Ltd Partnering with Hewlett Packard Enterprise to Boost NFV and Telco Network Performance (NASDAQ:MLNX)

What is Facebook Livestreaming?

Facebook Live was launched in August of 2015 with a clever campaign that made the platform available only to celebrities. This of course gave the app a lot of attention as Meerkat and Twitter’s Periscope were gaining traction. And by December of the same year, Facebook decided it was time to let more people in on the fun.
However, there is a big but! The Facebook Livestreaming app is only available to a limited group of iPhone owners.  Although Facebook still hasn’t announced the availability of a Live app for Android based devices, you can use the Facebook Mentions app to stream live video if you don’t happen to own an iPhone.


What is Facebook Livestreaming?

Linux Mint site hacked, users unwittingly download backdoored operating system

I hope you weren’t one of the hundreds of people who downloaded a compromised version of the Linux Mint operating system on Saturday.
Because if you were, it’s possible that you’re not just running one of the more user-friendly flavours of Linux on your computer but also playing host to a Linux ELF trojan called Tsunami, that can be used to steal files from your system and launch distributed denial-of-service (DDoS) attacks.


Linux Mint site hacked, users unwittingly download backdoored operating system

The security review: The state of security in companies in the EMEA region

Welcome to this week’s security review, which includes a detailed report from ESET on the state of information security in companies in the EMEA region, helpful advice on support scams and the rise of Android ransomware.



The security review: The state of security in companies in the EMEA region

Using Technology to Improve Your Email Sales

Email is a great marketing tool. A study by the global information services company Experian found that companies generate more than $44 in email sales revenue for each dollar of email marketing expense. That’s a massive return.
There’s just one problem. Customers are getting inundated with sales emails, and fewer of them are clicking through. In the first quarter of 2014, the average email click through rate was 4.3 percent, down from nearly 7.5 percent in the third quarter of 2006, the Epsilon Email Trends and Benchmark Report shows.


Using Technology to Improve Your Email Sales

4 Tips For Protecting Your Online Reputation

As an entrepreneur, your reputation is everything, isn’t it? If you don’t maintain a positive reputation, your business won’t survive. Prospects won’t be attracted to your brand and you will find it increasingly harder to gain more business.
Managing your reputation is one of the most crucial things you will need to do as a business owner. This is even more crucial when it comes to the Internet. It only takes a few online attacks to cause serious damage to the reputation you have worked so hard to build.


4 Tips For Protecting Your Online Reputation

Link Building Lessons from the Real Estate Industry

Are links doing more harm than good? With the rules for link building constantly changing, it can be hard to know what’s a smart link building strategy and what will land you in hot water with Google.
Last year, Google’s webmaster trends analyst, John Mueller, surprised the SEO world with his pronouncement that link building, once considered essential to SEO, was no longer advisable.


Link Building Lessons from the Real Estate Industry

Analysis of CVE-2016-0059 - Microsoft IE Information Disclosure Vulnerability Discovered by Fortinet | Fortinet Blog

This month Microsoft patched two vulnerabilities which were discovered and reported by me, one is an information disclosure vulnerability in Internet Explorer (IE) (CVE-2016-0059 in MS16-009), the other is a memory corruption vulnerability in Microsoft Office (CVE-2016-0055 in MS16-015). In this blog, we will provide in-depth analysis of CVE-2016-0059. The vulnerability exists because Microsoft Hyperlink Object Library improperly discloses the contents of its memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability, an attacker must convince a user to either click a link in an email message or open an Office file, and then click a link in the file. 
In my original vulnerability report to Microsoft, I marked the vulnerability as Microsoft Office Excel heap overflow vulnerability. Because the vulnerability actually lies in the library hlink.dll (Microsoft Hyperlink Object Library) which is a component in Internet Explorer, Microsoft classifies it as Internet Explorer information disclosure vulnerability. In this blog, I still use Microsoft Office to demonstrate and analyze this vulnerability.   


Analysis of CVE-2016-0059 - Microsoft IE Information Disclosure Vulnerability Discovered by Fortinet | Fortinet Blog

What do you need to know about HTTP/2?







#Rackspace


DEEP DIVE: Enabling the Hybrid Cloud with RackConnect

Friday, February 19, 2016

AVT-PR-Avnet Ranks among FORTUNE Magazine’s “World’s Most Admired...

AVT-PR-Avnet Ranks among FORTUNE Magazine’s “World’s Most Admired...

eBay Changes Strategy, Etsy Opens First Retail Store and More

eBay was once the biggest name in ecommerce. But the online auction site has fallen behind other big names like Amazon. Now, eBay has plans to make a comeback, which involves making some major changes.
And eBay wasn’t the only ecommerce company to make changes this week. Handmade business giant Etsy opened its first physical store in New York City.
These headlines and more are included in this week’s Small Business Trends News and Information Roundup.


eBay Changes Strategy, Etsy Opens First Retail Store and More

Average cost of cybercrime rises by 200% in just five years

Cybercrime is costing the global economy up to $450 billion annually, a new report by Hamilton Place Strategies reveals.
The paper, entitled Cybercrime Costs More Than You Think, opens by stating that: “In an increasingly interconnected world fueled by the expansion of digital technology, cybercrime has become a big business.”


Average cost of cybercrime rises by 200% in just five years

Lam Research Stockholders and KLA-Tencor Stockholders Approve Acquisition of KLA-Tencor by Lam Research (NASDAQ:KLAC)

Lam Research Stockholders and KLA-Tencor Stockholders Approve Acquisition of KLA-Tencor by Lam Research (NASDAQ:KLAC)

Google Accelerated Mobile Pages Speeds Up Mobile Content Delivery

Google is getting ready to roll out an ambitious Google Accelerated Mobile Pages(AMP) project this month to speed up mobile content delivery and create a better user experience.
According to the search giant, Google Accelerated Mobile Pages is an open source initiative designed to give publishers a way to create mobile optimized content once and have it load instantly everywhere on the mobile web.


Google Accelerated Mobile Pages Speeds Up Mobile Content Delivery

The Four “A”s of Account Management

Many suggest that the biggest vulnerabilities in a network environment are its users. If only there were some way to control those unruly users… Oh, but there is! By implementing a combination of different techniques, you can limit the damage that can be done by users (or attackers in users’ guise). I refer to those techniques as the “Four ‘As’ of Account Management”, as a mnemonic device to help me remember those aspects of user account wrangling.
This article is intended as a brief introduction to the various techniques, and how they interact to improve security in your network environment. In future articles, I will go in more depth about those techniques to give you a better idea of their specific applications and importance.


The Four “A”s of Account Management

Apple and 'exceptional access' to crypto protection

Apple is the latest in a host of technology players to be requested to allow exceptional access, that is, access in exceptional cases where it would be deemed to have high value relative to an active investigation. But they are certainly neither the first nor the last.
We recently wrote about ProtonMail’s attempt to curtail government pressure to allow backdoor access to email content, to which they’ve rallied the privacy advocates to force a public vote in Switzerland. They are not alone in the email space either, a host of other providers have been asked to defend similar positions both domestically and abroad.


Apple and 'exceptional access' to crypto protection

7 Ways to Get Great Results with Gmail Ads

Gmail Ads are one of the more intriguing opportunities Google has given advertisers to reach people where they spend a lot of their time online – in their inboxes. I’ve been obsessed with mastering them lately and today I’m going to reveal what I’ve learned.



7 Ways to Get Great Results with Gmail Ads

Halogen Software Joins Dell Boomi Partner Network | Dell

Dell Boomi announces today that it has partnered with Halogen Software (TSX: HGN) to deliver a high-performance application integration platform to reduce implementation times for its cloud-based talent management suite. The Dell Boomi AtomSphere® iPaaS (integration platform as a service) enables Halogen Software to more easily and rapidly connect a customer’s existing employee data in their core HRIS/HRMS system to Halogen TalentSpace, improving the customer experience and making TalentSpace easier to connect to external HR systems.



Halogen Software Joins Dell Boomi Partner Network | Dell

Wednesday, February 17, 2016

How to Use the Twitter Video Message to Generate Massive Engagement

A trending hashtag at one time was #DescribeTwitterIn3Words. That can only be described as an avant garde approach to constructive criticism. Or, at least, that is what I hope.
The general sentiment for what Twitter has been turned into lately is “Scrollin’, Trollin’, Scrollin’”, “marketers ruin everything”, or my favorite, “FIRE HOSE ON.”


How to Use the Twitter Video Message to Generate Massive Engagement

Google CEO stands firm with Apple - Feb. 17, 2016

Apple has another friend in its fight against the FBI.



Google CEO Sundar Pichai has come out in support of Apple (AAPL, Tech30), which is fighting an order to help the FBI break into the iPhone owned by one of the San Barnardino shooters.



Google CEO stands firm with Apple - Feb. 17, 2016

Share.to Builds Networks with Partners, Clients

The ways in which companies build their teams are changing.
No longer are many teams just made up of a specific group of people in a specific office. Instead, more and more companies are working with freelancers, outside contractors or other non-traditional workers.


Share.to Builds Networks with Partners, Clients

Anonymous leaks 18GB worth of data belonging to Turkey’s national police force

The hacktivist group Anonymous has released close to 18GB worth of sensitive data from Turkey’s national police database, according to reports.
The information, which was taken from the Turkish General Directorate of Security (EGM), has purportedly been posted on file sharing sites available for free public download.


Anonymous leaks 18GB worth of data belonging to Turkey’s national police force

A Closer Look at Locky Ransomware | Fortinet Blog

A new ransomware named “Locky” is currently circulating in the wild and making the headlines. There are some good reports regarding Locky ransomware already available over the Internet. This blog intends to focus on some technical areas that (we believe) have not been covered yet, namely, its domain generation algorithm, command and control communication, and file encryption.
For reference, the following is a screenshot of Locky’s Decrypter page (cropped to save space):


A Closer Look at Locky Ransomware | Fortinet Blog

Major vulnerability found in GNU C Library

Security researchers have identified a serious vulnerability in an open-source library of code that is known as GNU C Library (glibc).
Experts believe hundreds of thousands of devices and apps are at risk of a cyberattack as a result of the flaw, which has been present since 2008.


Major vulnerability found in GNU C Library

Garmin Reports Q4 and Fiscal 2015 Results » Garmin News Releases

Garmin Reports Q4 and Fiscal 2015 Results » Garmin News Releases

AVT-PR-Avnet Government Solutions Launches New Cloud-Based Security

Avnet Government Solutions and IBM Unveil Security-as-a-Service Solutions Aimed at Public Sector



AVT-PR-Avnet Government Solutions Launches New Cloud-Based Security