Google Analytics

Search This Blog


Monday, September 01, 2014

ICT Happenings Week 5 of Aug 2014

News for Week 4 of Aug 2014.
  • PR - Aug 29, 2014 - Singaren Selects SDN-Ready Brocade Routing Core
  • PR - Aug 28, 2014 - Malaysians Can Now Replace Their Laptops With Microsoft’s Surface Pro 3!
  • PR - Aug 28, 2014 - New technology to ‘future-proof’ Iskandar Malaysia
  • PR - Aug 27, 2014 - MOE Malaysia wins global award for bridging urban-rural digital divide with IT
  • PR - Aug 27, 2014 - Elitecore Announces Pre-Integrated LTE Revenue and Customer Management Platform at USD @500K
  • PR - Aug 27, 2014 - National Instruments Deployed Oracle HCM Cloud for HR Transformation
  • PR - SG - Aug 27, 2014 - VMware, NVIDIA and Google Unveil Future of Graphics-Rich Applications Delivered on Enterprise Cloud Desktops
  • PR - Aug 25, 2014 - AMD Launches Industry's First AMD Power Pack

Friday, August 29, 2014

Microsoft: Hybrid Devices Will Rule

Microsoft recently published an infographic detailing why hybrid device (tablet + laptop) such as the Surface Pro 3 will gain in terms of popularity.

The argument presented was due to the rise of converged lifestyle (work and leisure) adopted by Malaysian and the less preferences for Siloed devices (using multiple devices for different dedicated purposes).

Yes. I personally feel that after years of tablet prominence, where consumers simply would buy additional devices just for the fun of it or for leisure alone, people may opt to just go back to having one mobile device that addresses all needs.

In terms of opportunity, it remains pretty much the same - mobile computing lifestyle will continue to grow and become more malignant towards modern people to compensate busy lifestyles.

Therefore, cloud computing, mobile apps and automation demands will maintain and grow.

Wednesday, August 27, 2014

Universal Robots presents the next generation of lightweight robots

Press release: Malaysia, August 25, 2014

Universal Robots, the Danish manufacturer of flexible industrial robot arms, has announced its third generation of the lightweight robots UR5 and UR10. Special features of the revised robot arms are the true absolute encoders, the eight new adjustable safety rated functions, twice the number of built-in I/O’s and the improved possibilities for connecting equipment to the control boxes.
  1. Integration of True Absolute Encoder to enable faster and easier set up for all applications
  2. Enhanced safety of the robots with eight new safety rated functions certified by TÜV

Introduction to Universal Robots.

Monday, August 25, 2014

Computer Security Updates Week 5 of Aug 2014

Refer to Computer Security Updates Week 2 of Aug 2014, the biggest news was about Russian cyber gang stole 1.2bn usernames and passwords.

For this week / last week, here are / were the biggest news.
  • PR - Aug 29. 2014 - Jay Chou Launches Kaspersky New Security Products
  • PR - Aug 28, 2014 - Kaspersky: NetTraveler Gets a Makeover for 10th Anniversary
  • PR - Aug 28, 2014 - Sophos and Check Point Partner to Protect Corporate Networks from Non-Compliant Mobile Devices
  • PR - Aug 26, 2014 - Kaspersky: Security Concerns Holding Back Usage of Online Payment Services
  • PR - Aug 22, 2014 - Kaspersky announces the release of its newly updated product line for home users
  • PR - Aug 19, 2014 - McAfee Shares Findings From 2014 Technology Adoption Study
  • PR - Aug 18, 2014 -Secure Critical Encryption Keys with Oracle Key Vault
  • PR - Aug 18, 2014 - Barracuda Launches Virtual License Portability

Sunday, August 24, 2014

ICT Happenings Week 4 of Aug 2014

News for Week 3 of Aug 2014, the biggest news was the collaboration between Huawei and TM R&D In Joint Innovation Efforts To Develop Next-Generation Access Technologies.

  • PR - Aug 22, 2014 - TE Connectivity Launches Fiber Solution for Malaysian Data Centers
  • PR - Aug 22, 2014 - Oracle Launches Social Station for Improved Productivity and User Experience
  • PR- Aug 21, 2014 - Microsoft: Blurring Of Work & Life Requires Malaysian Companies To Reimagine IT
  • PR - Aug 21, 2014 - Telefonica and Brocade Establish Benchmarks for NFV Deployment and Performance
  • PR - Aug 20, 2014 - Enjoy 100% More Data with U Mobile
  • PR - Aug 20, 2014 - RS Components reinforces support for electrical installers and maintenance engineers
  • PR - Germany - Aug 20 , 2014 - Axiros: European Telcos Demand Easy Cloud and Managed Services Provisioning
  • PR - Aug 19, 2014 - MDeC driving Malaysian startups through regional linkages
  • PR - Aug 19, 2014 - AMD Expands Gaming Portfolio with New Radeon R7 Series Solid State Drives

Friday, August 22, 2014

Culture ID 17417 (0x4409) is not a supported culture (VB.NET Remoting)

This exception happened to a deployment of client server application (build on .NET Remoting) with the following details:

Server PC:
  • Windows Server Standard Service Pack 2
  • Regional and Language Options: Formats: English (Malaysia)

Client PC:
  • Windows XP 2002 Service Pack 3
  • Regional and Language Options: Formats: English (United States)

Thursday, August 21, 2014

Cyber security: Keeping track of threats to protect the rail network

Based on the contributed article by Ammar Hindi, Managing Director at Sourcefire Asia Pacific (now part of Cisco Systems)

In a nutshell, the article highlights greater anticipation towards the trend of security breaches onto public facilities such as the transportation system.

Each day, hundred thousands of passengers travel along Malaysia’s railways with the multiple public transport operators responsible for the tracks, signals, overhead wires, tunnels, bridges, level crossings and most stations. Technology is used across its network for everything from delivering power, signalling operations, and freight data, to maintenance, ticketing and passenger information.

Advances in IT technology on the railways for communication and control, but increasingly integrated and interconnected security operations, meant gaps had opened up on the network with the potential for hackers to cause “serious physical disruption and violation.

Therefore, as the facilities become more dependent on integrated IT technology, the risks become greater.

Cisco recommends that public transport organisations need comprehensive, continuous, visibility of their complex, dynamic, IT environments to understand how they use technology and what needs to be protected – only then can they tighten up the weaknesses in their defences and minimise the risk of compromise. Inevitably though, some attacks will get through, so organisations should look to solutions that enable them to quickly detect, understand and control an attack, ultimately minimising or avoiding any serious damage.

Sunday, August 17, 2014

ICT Happenings Week 3 of Aug 2014

News for Week 2 of Aug 2014, the biggest news was the announcement that WD Expanded NAS Storage Offerings with 6 TB, 5-Platter Hard Drive.

For this week / last week, here are / were the biggest news.
  • PR - Aug 15, 2014 - WFT EducationⓇ launches Cloud Workshops and Seminars in Educational Institutions across India
  • PR - Aug 15, 2014 - PAX will be held at the Melbourne Convention and Exhibition Centre (MCEC) from the 31 October – 2 November 2014.
  • PR - Aug 15, 2014 - Kaspersky & Mensa launch Global Think Test
  • PR - Aug 15, 2014 - Rackcorp Selects Brocade Ethernet Fabric As Strategic Foundation for Data Center Network
  • PR - Aug 15, 2014 - WD's My Book Duo Offers Superior Performance and Data Protection
  • PR - Aug 14, 2014 - AMD Unleashes World's Most Powerful Server GPU for HPC
  • PR - Aug 13, 2014 - Gartner: PBS Software Positioned in Magic Quadrant for Structured Data Archiving and Application Retirement
  • Ovum - Aug 13, 2014 - Ovum forecasts global OC market to grow 8% in 2014
  • PR - Aug 12, 2014 - Oracle Sees Increase in Demands for Marketing Analytics in ASEAN
  • PR - Aug 12, 2014 - Huawei Collaborates With TM R&D In Joint Innovation Efforts To Develop Next-Generation Access Technologies
  • PR - Aug 12, 2014 - Affiliate Junction to Drive Retail Revenue Growth At Least Tenfold for over 9,000 Businesses

Monday, August 11, 2014

Dealing with Sales Call Harassment

Yes, it is without a doubt, sales call has always been annoying and to certain extend qualified for harassment.

For example, your trusted bank's insurance tele-sales department call you up to sell you insurance that you don't need and they want to close the sales on the spot by attempting to read the 10 pages terms and condition to you through the phone.

As a bank, they knew that you are not entitled to claim for personal accident's death benefits if your death does not result from accident, yet they pressed on and on.
Whoscall main screen showing unknown caller IDs

In my humblest opinion, this is not consulting nor personal financial servicing, this is purely hard-selling and bullying.

I recently found an Android app which helps to deal with such headache: whoscall, a mobile app which identifies unknown callers and provides features for blacklisting blocking.

It works side by side with your Android's phone book, call history - it reads your call history and categorizes calls, sms/mms into 4 categories: blocked, unknown, known contact and favorite.

By leveraging on the unknown category, one would be able to figure out the identity of the uninvited caller or sms/mms originator based on information contributed by community.

The best feature which I favor is the phone number search feature which allows input of phone number as search query, something which my existing Android version 4.4.4 hasn't yet cater. The search will output information of the number, be it a number of your known contact or unknown contact, alongside other contributed information from the community associated with the caller ID.

Friday, August 08, 2014

Computer Security Updates Week 2 of Aug 2014

Refer to Computer Security Updates Week 3 of July 2014.

For this week / last week, here are / were the biggest news.
  • Kaspersky - Aug 8, 2014 - The Epic Snake: Unraveling the mysteries of the Turla cyber-espionage campaign
  • CyberArk - Aug 7 , 2014 -Russian cyber gang steals 1.2bn usernames and passwords
  • Symantec - Aug 6, 2014 -Russian Hack – The Death of Passwords?
  • PR - Malaysia - Jul 31, 2014 - API Gateway from CA Technologies Receives Common Criteria Certification
  • PR - Malaysia - Jul 31, 2014 - Protecting Critical Data in the Financial Sector
  • PR - Malaysia - Jul 31, 2014 - Koler ‘police’ mobile ransomware now targets PCs as well as Android, features exploit Kit
  • PR - SG - Jul 29, 2014 - Global Survey: NSA, Retail Breaches Influenced Corporate Security Strategies the Most
  • PR - Malaysia - Jul 25, 2014 - Barracuda Backup Achieves VMware Ready™ Status