Google Analytics

Search This Blog

Friday, March 30, 2012

Symantec warns of 'free' goodies on social networks

The next time you receive an offer for a ‘free’ iPad online, remember the old adage "If it sounds too good to be true, it probably is.”

In recent years, Symantec Security Response has observed scammers flocking towards social networking sites as they grow in popularity. Increasingly, brands are recognising the value in leveraging social media to connect with their customers at a personal level. Likewise, scammers are doing the exact same thing but their main motive is to reap financial gains from their victims. Some of the commonly used tactics as follows:

1. Providing links that redirect to affiliate sites

In the days leading up to and after the announcement of the new third-generation iPad, users who tweet about the new tablet are likely to receive targeted Twitter replies from scammers offering the new device for free. Many of these links actually lead to affiliate pages asking for personal information, such as email address and shipping information.

Some scammers have also begun to send users to instructional videos on YouTube which guide the users through a step-by-step process to get their free iPad or iPhone. Scammers then use the video description section to link to the affiliate pages which then duped users into sharing their personal information.

2. Setting up fake promotional user accounts

Unlike the previous examples, where a Twitter user posts about a certain brand and receives a targeted reply with a link, users are now being directed to fake branded Twitter accounts as shown below. If you are a Twitter user and receiving replies from suspicious Twitter accounts promising you something for free, protect yourself and others by reporting the account to Twitter.

Symantec recommends users be cautious when clicking on URLs without expanding them first using previews or plug-ins. Users should also never disclose any confidential personal or financial information unless and until it can be confirmed that any request for such information is legitimate.

Google Maps Turns on Traffic and Transit for Malaysia

Google Malaysia introduced three major enhancements to Google Maps that allow Malaysian commuters to better plan their journeys and to look up real time information: two new layers — Traffic and Transit — and a Bahasa Malaysia interface. All of these are available on the desktop and mobile versions of Google Maps.

First, the Traffic on Google Maps provides data on real time road congestion right on the map. By turning on the Traffic layer on Maps, users can quickly see whether roads are congested or flowing freely based on colour coding — red for choc-a-bloc, yellow for slow moving, and green for smooth flowing. Drivers that are fairly well-versed with the roads can also use the information to plan alternative routes to their destination.

Next, Transit provides information on travel via the Malaysian public transportation system on Google Maps. Now, in areas with available transit data, whenever a user selects directions, say, from A-to-B, there is a third new option in addition to the familiar walking and driving directions. Maps users can view the step-by-step public transportation information which includes bus, LRT, monorail and Komuter travel options. Users can also see where bus stops and train stations are located.

Transit provides a more sustainable option for Malaysians looking to reduce traffic congestion and get around town by using public transportation. Users can also plan ahead by setting their departure time to make sure they get back at a specific time.

Finally, Google Maps is now available in Bahasa Malaysia, giving Malay native speakers better accessibility and the option of interfacing and navigating with Google Maps using the language they are most comfortable with. With 60 per cent of Malaysians using Bahasa Malaysia as their primary language and with over 90 per cent proficiency in the language nationwide, this localisation initiative should make it easier for Malaysians to get the most from Maps.

“Malaysians commute a lot, and these enhancements add a new level of usability to Google Maps for Malaysians, making it easier to look up information, move around the country, and get from point A to B quickly and with minimum hassle and fuss,” said Google Malaysia country manager Sajith Sivanandan. “The new enhancements also go hand in hand with Google’s mission to organise the world's information and make it universally accessible and useful while enhancing, improving and localising our products and services.”

Traffic and Transit for Maps data comes from a variety of sources, including government departments of transportation, private data providers, and users of Google Maps for mobile who contribute anonymous speed information through Google’s traffic crowdsourcing feature.

Launched in 2009, Google Maps has been helping Malaysian users find local geographic information – online maps, topographical information, satellite imagery, driving directions, addresses and businesses listings – on their desktop, tablets and mobile phones.

To plan your journey and and get ahead in your travels, go to

Thursday, March 29, 2012

$300 Billion in Supply Chain Spending to Small Businesses

Fifteen large corporations today announced that thousands of small businesses have a new way to do business with them, giving them access to the $300 billion that these corporations spend annually on goods and services.

Small businesses, which are catalyst for the U.S. economy now have access to the supply chains of these 15 corporations by introducing them to a free Web site called Supplier Connection. This portal is similar to the Universal College Application, where a potential vendor need only fill out simplified forms once to be considered for many types of contracts for goods and services. Through the platform, small businesses can offer their goods and services to many large enterprises with the goal of winning contracts, growing their business and creating jobs. The website was created and is maintained by IBM through a grant of more than $10 million from the IBM International Foundation.

“A recent national study revealed that within two years of winning a contract with a large company, small businesses doubled their workforce. Clearly by streamlining access to large company spending, we can help more small businesses create jobs,” said Stanley S. Litow, IBM Vice President of Corporate Citizenship and President of its Foundation. “By reducing complexity and offering access to spending by a group of large companies, Supplier Connection will help small businesses grow and improve their bottom line. The clear benefit to large companies is the access to the creativity and innovation of small businesses.”

Currently there are nearly 1,000 small businesses registered in the Supplier Connection program with more than 250 large company buyers actively searching for potential suppliers across 20 categories. One small business that has found success using the platform is Bottini Fuel, a provider of heating oil, propane, heating and air conditioning services based in New York’s Hudson Valley. Seeking to expand their commercial sales channel, small business owner Rick Bottini joined Supplier Connection to take advantage of the streamlined application process. Bottini Fuel became a new supplier to IBM’s operations in Poughkeepsie, New York providing fuel and service to power 24 backup power generators used at the 400-acre site where IBM’s mainframes are developed and manufactured.

"Becoming a supplier to a global business like IBM is something most small businesses envision as a daunting task," said Rick Bottini, Owner of Bottini Fuel based in Wappingers Falls, New York. "Using Supplier Connection we were able to establish a relationship with IBM and respond to their request for competitive bids in a timely manner. Having access to a powerful tool like Supplier Connection levels the playing field for a small business while helping save us valuable time and resources."

Small business owner, Kurt Peterson, joined Supplier Connection less than one year ago and recently secured a contract through the Supplier Connection portal. “It is a resource that U.S. small businesses need,” said Peterson, president of Puritan Press, a printing and publishing company based in Hollis, New Hampshire. “With Supplier Connection, Puritan Press can now have increased visibility by the procurement offices of large corporations. Now, with a win through Supplier Connection, we look forward to increasing our revenue, strengthening our long-term business strategy and possibly expanding our employee base to meet business demands.”

Recognizing the possible impact this program could have on job growth among small businesses, Supplier Connection has doubled the number of large businesses in the initiative. New large companies to the consortium include: AMD (NYSE: AMD), Caterpillar (NYSE: CAT), Dell (NASDAQ DELL), Facebook, John Deere (NYSE: DE), JP Morgan/Chase (NYSE: JPM), Kellogg Company (NYSE: K), Office Depot (NYSE: ODP), and Wells Fargo (NYSE: WFC). These companies join founding members of the group: AT&T (NYSE: T), Bank of America (NYSE: BAC), Citigroup (NYSE: C), IBM (NYSE: IBM), Pfizer (NYSE: PFE), and UPS (NYSE: UPS). Currently, the members of Supplier Connection purchase more than $300 billion in goods and services annually through their global supply chains.

The Supplier Connection program is a free program for both small businesses and large businesses. In addition to its one-stop registration capabilities, the portal enables small suppliers to learn from, collaborate with, and partner with each other so that they can become more competitive and successful in a bid with a large company.

About Supplier Connection: Supplier Connection is a cloud-based platform that makes it easy for small business to become recognized as potential suppliers to large companies and for large companies to identify small companies with whom they would do business. To learn more about Supplier Connection, visit

Wednesday, March 28, 2012

Online Advertising Startup Competes More Effectively Using windows Azure

To target its customers’ online advertising efficiently, Netherlands-based startup Crumbtag has adopted Windows Azure, a cloud-based platform that provides the firm with cost-effective processing power and agile scalability.

Crumbtag had a novel idea for Internet ad placement that involved analyzing Web visitor behavior in real time, but this operation required massive data-processing capability. Since tapping into cloud services with the Windows Azure platform, the young company scales processing power and storage on demand, serves the needs of very large customers, and offers more competitive rates for online advertising.

“Because we are not spending millions on IT infrastructure, we can pass those savings on to customers,” said Crumbtag Founder and CEO Jan Kopmels. “As a small startup, we’ve been able to compete successfully for multinational customers and also demonstrate to them that we use cutting-edge technology.” Kopmels estimates that with the cloud-based Microsoft Corp. solution, Crumbtag has avoided a $10 million (U.S.) outlay for on-premises infrastructure.

Typically, online advertising firms match ads to users’ interests through the use of cookies, which are deposited covertly on a user’s computer during website visits. Cookies help determine the user’s online behavior, such as sites visited, paths to sites visited and shopping cart contents. However, privacy concerns have prompted many countries to outlaw them. From an advertiser’s perspective, cookies have limited value because they cannot be stored centrally for analysis.

Kopmels wanted to capture user behavior and process it in a giant statistical database. This would allow customers to place ads without relying on cookies and also adjust and refine their placements dynamically with every Web page view and click.

With a small but committed team, Kopmels launched Crumbtag in 2009 and spent two years developing technology for the ad-placement application. He came to the discouraging realization that the tiny firm would have to spend millions on datacenter infrastructure to process the prodigious amounts of data involved. “We needed a whole new infrastructure and business model to make Crumbtag viable,” he said.

In December 2010, the company explored several market-leading cloud services. Because they’d developed the ad-placement application using the Microsoft .NET Framework and Microsoft SQL Server 2008 data management software, Crumbtag opted to go with the Microsoft cloud-based solution. “We looked briefly at Amazon cloud solutions but felt they were too immature,” Kopmels said. “Plus, we were a committed user of Microsoft technology.”

It took Crumbtag just six weeks to move the application to Windows Azure — about 20 minutes of which was required to migrate the database to SQL Azure. “For an experienced .NET developer, moving to Windows Azure is a piece of cake,” Kopmels said.

Crumbtag uses Windows Azure Compute to supply on-demand processing power for its application, which processes about 4,000 requests per second and provides a 20-millisecond response time to well-known Dutch companies ranging from small to multinational. Crumbtag also uses Windows Azure Caching to provide high-speed communication between virtual machines.

As it pursues plans to expand across Europe in 2012, Crumbtag is using Windows Azure to scale up quickly to serve its growing customer base. Cloud computing enables the small company to offer a more cost-effective solution that helps it win business against larger, more established players that are saddled with aging on-premises IT setups.

More information on Crumbtag’s move to Windows Azure is available in the Microsoft case study, Microsoft Showcase and Microsoft Customer Spotlight News Center.

Tuesday, March 27, 2012

Adobe Unifies Ad Campaigns across Social, Search, and Display

Adobe Systems Incorporated (Nasdaq:ADBE) announced that technology acquired from Efficient Frontier is now available as part of the Adobe® Digital Marketing Suite, unifying social, search and display campaigns and creating true multi-channel optimization from disparate campaigns. This is a departure from multi-channel campaigns that are often operated with separate budgets, distinct data sets and unique workflows. The struggle to unify campaigns has often left digital marketers, who will collectively spend almost $100 billion globally this year on digital marketing and advertising*, in the dark as they allocate their digital ad budgets to deliver the best return.

“Adobe helps marketers deliver a high return on their ad spend investments by linking accurate attribution and forecasting capabilities to optimization across search, display and social,” said David Karnstedt, vice president and general manager, Advertising Solutions, Digital Marketing Business, Adobe. “Now marketers can replace what were traditionally ‘gut’ decisions with smarter, more accurate actions based on real data.”

Technology acquired from Efficient Frontier brings the following benefits to digital marketers and advertisers:
  • Unified View of Multi-Channel Campaigns – Customers can see which channels and campaigns are impacting key business metrics, such as conversion and revenue
  • Full Complement of Channels for a Multi-Channel Strategy – Adobe now offers campaign management and optimization for LinkedIn Ads, complementing campaign support for search, display and Facebook, with support for additional advertising channels and inventory sources on the way
  • Flexible Attribution Models – Move from an over-reliance on “last-click” attribution to more flexible models that can provide a more accurate view into what channel, or combination of channels, is responsible for results
  • Seamless Workflow from Insight to Action – Automates optimization to purchase more of what is working

Former Efficient Frontier technology is available to new and existing Adobe digital marketing customers and will expand with additional functionality as well as integrations with other products within the Digital Marketing Suite.

Monday, March 26, 2012

A Peek into the Future of Smart Technology

Your mobile phone is now a versatile, multi-purpose device. Using the latest smart technology, your smartphone can serve as an office access card, can be used to pay for meals and even as an airplane boarding pass at selected airports. Such innovations and applications are some of the many highlights you can expect at this year’s Cards & Payments Asia 2012, the region’s largest and most-established smart technologies exhibition.

The 17th edition of Cards & Payments Asia 2012 and its seven co-located events will open in Singapore from 25 – 27 April 2012 at Suntec Singapore International Convention & Exhibition Centre, Level 4, Halls 401 – 403. This three-day mega event will showcase highly anticipated new technologies in payments, Near Field Communication (NFC), digital identification, RFID and retail together with the entire spectrum of smart technology initiatives.

NFC & Digital Identification Make Daily Activities More Convenient

HID Global, one of the 200 international exhibitors at this event, which clients include the Kuala Lumpur International Airport, will be displaying its iCLASS® SIO-enabled (iCLASS SE™) reader and credential platform. This new access control platform extends physical access control beyond traditional smart cards to enable digital credentials to be embedded in smartphones for identity authentication. Such enhanced technology can also accommodate the constantly evolving security levels via simple firmware updates.

“With the innovations for mobile access and increasing deployment of NFC devices, our daily lives will be brought to a whole new level of convenience,” said Mr. Lee Wei Jin, Director of Sales, ASEAN, Identity & Access Management, HID Global. “We are proud to be part of Cards & Payments Asia 2012 to showcase the implementations of exciting innovative applications for NFC-enabled phones that will transform the way we work and play.”

Global NFC application revenue is expected to reach $10.6 billion (RM26.5 billion) in 2012 , according to a report by business intelligence company, Visiongain. Such rapid growth in NFC will change the business landscape of many sectors, such as retail and transportation.

Mobile Transactions Made Easier

M2CASH, a Diamond Sponsor and exhibitor will be rolling out its cutting-edge money transfer system at Cards & Payments Asia 2012. Built with Virtual Card Technology, users can adopt this system flexibly even without a bank account or an ATM card. Electronic ID verification of both the sender and receiver can be done in just 7 seconds and M2CASH is the only system globally able to perform this integral security check. This system will be available on the web as well as mobile platforms such as iOS, ANDROID, Windows Mobile and Blackberry to enable 60-second transactions on-the-go.

“I believe this innovation will benefit the global money transfer market significantly when it is launched at Cards & Payments Asia 2012. Our fully encrypted and 100% insured transfers will put the minds of many people at ease if they adopt our system, said Mr. Rick Whaite, Director of Global Brand and Marketing, M2CASH. “We are now at the age where the virtual of the past generation becomes the reality of the present.”

Every year, over 200 million people are engaged in money transfers of about $400 billion (RM1 trillion) globally. This new technology invented will shift this paradigm of money transfer from the old-fashioned, slow and costly paper-based methods to instantaneous, virtual and secure money transfers. This fully encrypted and revolutionary system will make global money transfers much easier than before.
Richard Ireland, Chief Executive of Terrapinn Asia Pacific said, “Cards & Payments Asia 2012 is the converging platform for the governments, retail, telecommunications and banking industries through smart technology innovations. The technologies showcased will revolutionise lifestyles in every aspect, such as security and identification, and will also drive service, growth and business opportunities for many organisations across Asia. This is an event for all stakeholders to attend if they want to stay ahead of the competition.”

Cards & Payments Asia 2012 will also be hosting the inaugural Smart Card Awards Asia, which recognises industry leaders for setting great standards of excellence. The winners will be announced at its Awards Dinner at Marina Mandarin Hotel on 25 April 2012.

Technologists and Technicians Bill 2012

Refer to Enterprise It News.

No big deal yet.

This bill proposes registration of technologies and technicians based on qualification as a way of recognition for quality control.

In many ways, it aspires to establish professionalism in the ICT industry similar to those of conventional engineers, doctors, lawyers and etc.

The ICT 'profession' is not a conventional profession due to the fact that it is still pretty much a younger 'profession' which least best practices for practitioner to uphold.

Given the nature of the industry which are defined by continuous advancing technologies, existing technologists and technicians find it hard to establish equilibrium between knowledge from school and real life practical scenario. In most cases, such 'professionals' are subjected to relearning of skills all the time.

For instance, a doctor is the master of the human body because the human body 1 century ago is almost similar to the human body today. Even though there are still many rooms for exploration, a professionalism can be established based on the human body.

A computer engineer is however not able to enjoy such luck because a computer 10 years ago compares a big difference with a computer today. A software engineer who is skilled in certain programming languages may find the language becoming obsolete in the coming years.

This proposal hasn't yet to identify a clear syllabus for the proposed technologists and technicians.

My guess is that it will not be that easy.

Based on the proposal established for now, it seems likely that recognition will go down the path of recognizing graduates from selected educational institution.

Personally, I feel that this bill is good for those people with good educations who wish to maintain a longer term career with the ICT industry. It will be not so good news for hobbyists 'professionals', thus creating a bigger entry barriers those who which to enter the industry.

As an overall, this proposal has a noble intention.

Besides the ICT industry, other industry such as insurance industry is also seeing such development, however up to now, there is no clear direction yet.

For more details, refer to

Saturday, March 24, 2012

Motorola ATRIX™ 2 with EA Games For Malaysia

Down time just got way more fun with the brand new Motorola ATRIX™ 2 with EA Games from Motorola Mobility. Offering the ultimate boredom-blitzing gaming experience, Motorola ATRIX 2 serves up a dizzy mix of action, fantasy and adventure straight from your phone thanks to a package of ten EA games available absolutely free*.

Enjoy those games on an Android™-powered smartphone that delivers blazingly fast connectivity and packs a 1GHz dual-core processor for faster browsing and video. A stunning 4.3 inch qHD screen offers the perfect stage for photos and videos, advanced 3D graphics and smooth, crystal-clear game play.

A total of ten EA titles will be available for Motorola ATRIX 2 including Need for Speed™ Hot Pursuit, Need for Speed™ Shift, Dead Space™, EA SPORTS™ FIFA 10, THE GAME OF LIFE, MONOPOLY, The Sims™ 3, Tetris®, Worms™ and Bejeweled® 2. Along with everything else this powerful smartphone offers, you may never be bored again. But if you still want more, you can browse thousands of games and apps on Android Market™ and store them on 4GB of on-board memory or up to 32GB of optional MicroSD card storage.

“We are thrilled to introduce the Motorola ATRIX 2 in Malaysia. It is a powerful, feature-packed smartphone that is ever-ready for business or entertainment at an attractive price point,” said Robert van Tilburg, senior regional sales director, Motorola Mobility, South Asia. “Together with our launch partners, EA Games, the Motorola ATRIX 2 will offer gaming enthusiasts in Malaysia a powerful companion to banish boredom for good. With dual-core power, advanced HD graphics, and a stunning qHD screen to boot, racking up high scores, watching movies or web surfing will be an enhanced experience.”

With Motorola ATRIX 2 your entertainment is large and in charge. Use the 1080p HDMI output to bombard your senses with your videos, games and apps on your home HDTV for all those times when even a generous phone screen isn’t enough. Command the gaming, browsing and media action on your TV by simply connecting an optional HDMI cable.

"We're excited for customers of the Motorola ATRIX 2, who will be in for a treat when they turn on their device and gain instant access to some of our most popular titles, including Need for Speed Hot Pursuit, The Sims 3 or Tetris," said Henry Yeh, Director OEM Asia, EA Mobile™. "We couldn't be more pleased to work with Motorola Mobility on this integration - the games look and play beautifully."

Still thinking it over? Here’s why else you want the Motorola ATRIX 2:

Access All Areas

Access all your personal content from anywhere with Motorola’s included MotoCast app. Stream music, pictures and video files straight from your home computer’s hard drive. You can even open access your work documents…if you must. MotoCast ensures you have all your important files to hand 24/7, wherever you are.

Digital Backstage Pass

With a fully connected music player, Motorola ATRIX 2 gives you the power to play whatever you're craving. With super-quick downloads and a high-resolution screen, the Motorola ATRIX 2 also gives you front row seats to your favourite videos and web pages. Whether it's a hot new remix, a TV clip you can't miss, or that bonus level you're going to beat any day now (promise), you'll experience entertainment at its best.

The Big Stage

With Motorola’s unique Webtop application, connect your Motorola ATRIX 2 to the Motorola® HD Dock with HDMI cable* to instantly launch a full version of the Firefox browser on any size HD monitor or TV. Browse the web on full-size televisions or monitors using the optional wireless keyboard and mouse.* Read web pages faster, scan folders easier and view images in their full, uncondensed glory.

Additional features include an 8-megapixel camera to take pictures crisp enough for a poster, full 1080p HD video capture and GoogleTalk™ to make sure you always stay connected. A 1735 mAh battery means your game will be finished way before your handset is.

Motorola ATRIX 2 with EA Games will be available at selected retailers across Malaysia for a recommended retail price of RM1,399.

Form Factor Touch Screen
Software Android 2.3 (Gingerbread)
Dimensions 66 x 126 x 10.4 (mm)
Display 4.3-inch qHD
Weight 147g
Processor Dual-core 1GHz
Battery 1735 mAh
Talk and Standby Time Up to 8.5 hours of talk time and 15.9 days in standby
Bands/Modes UMTS 850/9001900/2100

GSM 850/900/1800/1900,

HSDPA 21.1Mbps, HSUPA 5.76Mbps
Wi-Fi 802.11 b/g/n
Bluetooth® Version 2.1+EDR

Stereo Bluetooth
Connectivity 3.5mm headset jack, Micro USB 2.0 HDMI

3G Mobile HotSpot capabilities – Allows customers to connect up to five other Wi-Fi-enabled devices and laptops
Messaging/Web/Apps MMS, SMS, Email (Corporate Sync, GMail, POP3/IMAP embedded, Push Email) IM (Google Talk™), WebKit w/ Flash
Cameras 8MP auto focus with LED flash, VGA Front Camera
Audio Codec AAC, AAC+, AAC+ Enhanced, AMR NB, AMR WB, MIDI, MP3, WAV, WMA v10, WMA v9
Video Capture/Playback/Streaming 1080p, H.263, H.264, MPEG4
Storage & Memory 1GB RAM, 4GB on board, microSD slot with support for up to 32GB, 2GB microSD card in box
Location Services aGPS (assisted), eCompass
Pre-loaded Applications Access to Google Maps™ with Navigation, Google Talk™ and Web browsing; Quick Office Editor, Quick Notes
Sensors eCompass, Accelerometer, Light and Proximity Sensor

Solarwinds Adds Dell Compellent To Heterogeneous Storage Management Solution

SolarWinds® Inc. (NYSE: SWI), a leading provider of powerful and affordable IT management software today announced the release of its latest, award-winning SolarWinds Storage Manager, Powered by Profiler. Now with support for Dell Compellent, SolarWinds Storage Manager is the most complete monitoring tool for Dell arrays and an easy-to-use solution for implementing a multi-vendor storage strategy.

  • SolarWinds Storage Manager gives users unmatched visibility into shared storage that is not available through other vendors’ solutions, including the management tools included with most storage arrays and the servers, switches, hosts and VM’s they are connected to.
  • SolarWinds continues to reinforce its investment in storage management by extending its heterogeneous support and end-to-end monitoring to Dell Compellent storage arrays.
  • In addition to adding Dell Compellent support, the latest release of SolarWinds Storage Manager enables users to launch the Target View for block storage (Fibre Channel or iSCSI LUN) or file storage (NFS) shares, identifying contention on both the virtualization and storage sides; easily diagnose issues and help resolve them with more performance metrics for HP EVA, IBM SVC and IBM DS 6/8K storage arrays; alert on more performance metrics on arrays; and see storage and performance trends with configurable charting.
  • SolarWinds Storage Manager was recently named the Storage Management Tools “Bronze” winner for the 2011 Products of the Year presented by the editors of TechTarget’s Storage Media Group, and has been nominated for the “Bench Tested Product of the Year,” Network Computing Awards (UK).

Thursday, March 22, 2012

Emerging markets For Growth and Best Practice

Tata Communications, a leading provider of The New World of Communications, revealed the findings of a unique research study into emerging markets and their impact on the global economy. The report, conducted by independent research company Vanson Bourne, surveyed 1,600 business leaders from ten global emerging and developed markets, and reveals that 84% of companies in emerging markets have looked to other emerging markets for growth lessons and best practice, highlighting the growing influence of developing markets in the global economy.

Emerging market survey respondents (those from China, India, South Africa and the Middle East) were asked which markets they felt offers most opportunity for rapid growth. China led the pack at 51%, India at 46% and Brazil at 26%. Russia, more usually associated alongside these markets, was listed in 8th place with just 11% of emerging market business leaders feeling it offered rapid business growth.

87% of business leaders from both developed and emerging markets (China, India, South Africa, France, Germany, Hong Kong, Singapore, the Middle East, the USA and the UK) are actively engaging in emerging markets, despite 56% acknowledging that they associate emerging markets with political instability. 55% of Singaporean respondents, 45% of Middle Eastern and 40% of South African businesses have already set up operations in emerging markets, the only markets in the survey to have a higher figure with an established presence than those considering such a move (e.g. India, China).

51% of all respondents stated that their organisation is looking at expanding into China, with 39% selecting India and 33 % Brazil. 62% of US companies are looking to China for growth while the UK is set to be the biggest investor in Poland with 19% of UK respondents selecting that market.

The opportunities

The main driver for moving to emerging markets is the potential to capitalise on growth opportunities with 63% of business leaders surveyed selecting this as a reason. In line with the focus on growth, competitive activity is also a factor for moving into emerging markets. The survey reveals that on average, respondents who are looking into, or are already operating in emerging markets; expect to increase investment in emerging markets by 36% over the next year.

Vinod Kumar, MD and CEO, Tata Communications, says, “For companies to capitalise on that potential we need to see greater levels of investment in the infrastructure that is essential to support it. That will inevitably require more focus on developing talent and innovative thinking in markets that can have less educational investment in those areas. It is clear that businesses are prioritising communications and digital infrastructure as a critical part of their operations. The ability to manage those communications and to ensure reliability and security requires a level of global, and in particular, emerging market experience.”

The challenges

There are significant challenges ahead of those looking to operate in emerging markets. When asked to select their single most critical challenge for organisations moving to an emerging market respondents were almost evenly split with 18% citing government regulation, 16% established competition, 14% finding skilled staff and 11% communications and digital infrastructure.

57% of those surveyed stated that political instability would prevent them entering an emerging market. Lack of a reliable communications infrastructure is also a blocking factor for over one-third of those surveyed and was the fourth most selected item in the survey.


Talent was identified as a critical challenge by 37% of all those surveyed, with 44% of emerging market respondents stating that availability of talent is a reason they would call a market progressive. However, the kind of talent valued varies market to market with 78% of Indian respondents citing software development skills and 69% rating communications technology experience as key factors, which 52% of Middle East based respondents focus on business management and 63% of Chinese business leaders look for general education levels as an indicator.


Respondents were also asked what one factor they felt was most crucial to successfully running a global organisation. Having reliable communications amongst all branches/territories and a flexible business strategy emerged as the most important with 28% of respondents selecting them. Reliable communications is the most important factor according to business leaders in the USA, Germany and Hong Kong.

Communications infrastructure is the fourth most selected critical challenge for companies looking to move to emerging markets and four in ten people also stated that a lack of a reliable communications infrastructure would prevent them entering a market. This emphasises the importance of telecommunications in an increasingly connected world and demonstrates that reliable communications continue to be seen as a must-have part of any market that wishes to compete internationally.

As part of the survey, Tata Communications also asked respondents what characteristics they felt most important in a telecommunications supplier. 54% selected reliability and 34% security, with a third also choosing experience across multiple markets (both emerging and developed) as essential.

Vinod Kumar, concludes, “There is a varied approach to developing and maintaining communications infrastructures depending on the individual characteristics of the market in question. Reliability and security are must-haves. For a telecommunications supplier to add real value they need to have the experience of working in different environments, across multiple geographies and possess the innovation that a global mindset can bring to bear.”

Wednesday, March 21, 2012

Symantec Survey Reveals Significant Adoption of Enterprise Mobile Apps

Symantec Corp. (Nasdaq: SYMC) announced the Malaysia findings of its 2012 State of Mobility Survey, which revealed a global tipping point in mobility adoption. The survey highlighted an uptake in mobile applications across organisations in Malaysia with 67 percent of enterprises at least discussing deploying custom mobile applications and 26 percent currently implementing or have already implemented custom mobile applications.

Despite this adoption, almost half (44 percent) of survey respondents in Malaysia mentioned that mobility is somewhat to extremely challenging and a further 43 percent of survey respondents identified mobile devices as one of their top three IT risks. Yet in the face of these challenges, IT is striking a balance between mobile benefits and risks by transforming its approach to mobility to deliver improved business agility, increased productivity and workforce effectiveness.

The State of Mobility Survey reveals the challenges organisations are grappling with in accommodating the mobility tipping point and also identifies and quantifies mobility-associated risks as perceived by IT decision makers. In this survey, more than 6,000 organisations from 43 countries, including Malaysia, bring to light the change in the usage of mobile devices and mobile applications.

Mobile Devices Now Critical Business Tools

The significant adoption of mobile applications demonstrates remarkable confidence, by organisations, in the ability for mobility to deliver value. This confidence is further supported by a rare alignment between expectations and reality. Generally, the gains expected from new technologies far exceed the reality upon implementation.

Mobile Initiatives Significantly Impacting IT Resources

As with the adoption of any new technology, mobility is challenging IT organisations. Almost half (44 percent) of respondents in Malaysia mentioned that mobility is somewhat to extremely challenging, while 63 percent noted that reducing the cost and complexity is one of their top business objectives.

Mobility Risks Impacting Organisations

Approximately 51 percent of respondents from Malaysia indicate maintaining a high level of security is a top business objective for mobility and 43 percent identified mobile devices as one of the top three IT risks, making it the leading risk cited by IT.


Organisations that choose to embrace mobility, without compromising on security, are most likely to improve business processes and achieve productivity gains. To this end, organisations should consider developing a mobile strategy that defines the organisation’s mobile culture and aligns with their security risk tolerance.
The following are some key recommendations to improve the effectiveness of mobile initiatives from Symantec:

  • Enable broadly: Mobility offers tremendous opportunities for organisations of all sizes. Explore how you can take advantage of mobility and develop a phased approach to build an ecosystem that supports your plan. To get the most from mobile advances, plan for line-of-business mobile applications that have mainstream use. Employees will use mobile devices for business one way or another – make it on your terms.
  • Think strategically: Build a realistic assessment of the ultimate scale of your mobile business plan and its impact on your infrastructure. Think beyond email. Explore all of the mobile opportunities that can be introduced and understand the risks and threats that need to be mitigated. As you plan, take a cross-functional approach to securing sensitive data no matter where it might end up.
  • Manage efficiently: Mobile devices are legitimate endpoints that require the same attention given to traditional PCs. Many of the processes, policies, education and technologies that are leveraged for desktops and laptops are also applicable to mobile platforms. So the management of mobile devices should be integrated into the overall IT management framework and administered in the same way – ideally using compatible solutions and unified policies. This creates operational efficiencies and lowers the total cost of ownership.
  • Enforce Appropriately: As more employees connect their personal devices to the corporate network, organisations need to modify their acceptable usage policies to accommodate both corporate-owned and personally-owned devices. Management and security levers will need to differ based on ownership of the device and the associated controls that the organisation requires. Employees will continue to add devices to the corporate network to make their jobs more efficient and enjoyable so organisations must plan for this legally, operationally and culturally.
  • Secure comprehensively: Look beyond basic password, wipe and application blocking policies. Focus on the information and where it is viewed, transmitted and stored. Integrating with existing data loss prevention, encryption and authentication policies will ensure consistent corporate and regulatory compliance.

Bosch extends Product Range For Video Portfolio

Bosch Security Systems introduces its first wave of products for small- to medium-sized security applications. The new offering is a complete range of cameras including indoor and outdoor mini domes, integrated infrared domes and bullet cameras, plus new discrete lipstick-sized cameras, IP cameras and domes. It also includes DVRs (Digital Video Recorders) and small monitors. The wide range of security cameras delivers perfect 24/7 surveillance. The DVRs ensure stored video is fit for purpose each and every time. The cost-to-performance ratio of new Bosch products is tailored to small- to medium-sized applications such as retail shops and schools.

All products can be purchased directly from the local distributor. Now, there is no need to compromise. Even with a limited budget, people get the same Bosch quality usually specified in critical security projects.

“These new security products embody a new direction for Bosch,” said Gert van Iperen, President of Bosch Security Systems. “We offer our customers a product range fitting to the requirements of small-to medium-sized applications.”

Everything, from the physical design to the intuitive interfaces of the offering, has been designed with ease of installation and reliability in mind.

Installers can set up the products very quickly, while end-users will find operation very straightforward.

Sunday, March 18, 2012

Survey Shows cloud Adoption is on the rise among SMBs

Results from a survey conducted by Dell Cloud Business Applications and Techaisle show adoption of cloud business applications is on the rise among small and medium businesses (SMBs). The SMB Cloud Application Trends Survey measured the benefits and challenges faced in migrating applications to the cloud and found IT decision makers have critical roles in the success of cloud application decisions and implementations, and in choosing the right IT vendor.

As SMBs assess which cloud applications make the most sense for their businesses, the survey reveals deployment services and application integration are critical for success. As such, the survey in December 2011 of more than 400 U.S.-based companies with employee bases ranging from 50 to 999 found that up to 69 percent of SMBs indicate preference to purchase cloud applications from a single trusted vendor.

“This new research echoes what our customers are asking for,” said Paulette Altmaier, vice president and general manager of Dell Cloud Business Applications. “Customers are looking for a trusted IT partner who has evaluated the right cloud applications for their businesses and who can accelerate their time to value with turnkey services”

Key findings include:

  • Cloud application adoption will continue to rise in 2012: SMBs that currently use cloud applications plan to add an average of three new cloud business applications in 2012.
  • CRM is a gateway to broader adoption of cloud applications: CRM has the highest penetration of any cloud application at up to 55 percent, an increase of up to 34 percent from 2010.
  • Managing multiple vendors is a pain point for SMBs: Up to fifty percent of respondents noted significant challenges in keeping track of different SLA’s, while up to 48 percent complained that explaining their business to each vendor was tedious and time consuming.
  • SMBs desire flexibility in integration: SMBs have high integration process expectations with up to 74 percent of respondents using in-house IT staff to integrate new cloud applications with on-premise technology and up to 61percent are writing software code to integrate applications. Up to sixty-three percent of respondents would like the option to modify the integration based on business process changes.
  • Efficiency and productivity continue to be top benefits of applications integration: On average, SMBs state they have experienced up to 38 percent improvement in operational efficiency due to reduced manual processes and up to 39 percent improvement in employee productivity due to automation of tasks and information.

Overall, SMBs state that the key benefits of adopting cloud applications include a low total cost of ownership (TCO), fast deployment time, simplified access from a browser, single sign-on, and automated feature and functionality upgrades. Dell Cloud Business Applications (DCBA) can fulfill many of the needs identified in the survey, delivering a family of trusted, integrated cloud applications and services that enable new business processes and deliver rapid time to value.

Saturday, March 17, 2012

Yahoo! Small Business Launches Advisor

Yahoo! Small Business announced the launch of Yahoo! Small Business Advisor, the newest online destination for personalized entrepreneurial news, advice, and tools. In addition to these features, Yahoo! Small Business Advisor launches with exclusive, personal small-business tips from world-renowned chef Ming Tsai with additional posts from various celebrity entrepreneurs to follow.

Yahoo! Small Business Advisor will include original articles and videos from Yahoo!'s own Small Business experts, while top-tier partners including Entrepreneur, Inc. and Reuters contribute best-in-class small-business news.

Yahoo! Small Business Advisor showcases some of Yahoo!'s patented technologies and new features, including:

  • Yahoo!'s Content Optimization Relevance Engine (C.O.R.E.) — also used by Yahoo! editorial programmers as a guide in Yahoo! homepage programming, which enables Advisor to learn what is interesting to users and surface those types of articles for easy navigation and content discovery
  • Yahoo! Social Bar highlights the business news a user's personal social network is reading and talking about
  • Yahoo!'s Livestand iPad app provides "anytime, anywhere" access to Advisor content, which includes small-business articles, videos, blogs, and Twitter feeds
  • Yahoo! Answers allows users to tap the wisdom of the community to answer pressing small-business questions

Released in beta in late 2011, Yahoo! Small Business Advisor aggregates the best of Yahoo! original articles plus content from leading business publishers, while leveraging Yahoo! technology to deliver personalized information to both aspiring and established business owners. Testifying to audience enthusiasm, the site reached 4 million page views just three months into beta.

How Hackers Work On Microsoft Vulnerabilities

Refer to 'Malaysia Technology News'

It goes that whenever Microsoft detected vulnerabilities, it will proceed to create security patches. However, just one day before the patches are to be released as Windows updates to for its products, such information is to be released for partners (Microsoft Active Protections Program partners) for them to patch up their own security products so that there will be no misunderstanding between security products and Microsoft products when the updates are in forced.

For instance, a vulnerability is detected by Microsoft internal security team on day 1. A patch is created and released out to end users on day 2. Hackers receive such information and proceed to create a threat based on the confirmed vulnerability. Hence for those PC which did not install the updates, it will be vulnerable to attacks. To make things worst, if security partners' products also didn't have enough time to deliver essential updates, the threat will not have been detected on day 2.

What this means that Microsoft own security team is core defense for its products. Partners' products may come handy to serve as safety net.

Nevertheless, having said that, it is also possible that partners are the ones who will identify the vulnerabilities before Microsoft find it by itself.

The lesson that we learned here is that hackers rely on insider's information in order to gain insight into potential vulnerabilities and often times, it is information communication leakage which give rise to such possibilities.

Friday, March 16, 2012

Cloud Computing to Create Millions of Jobs

Microsoft Corp. today published commissioned research from analyst firm IDC indicating that cloud computing will create nearly 14 million new jobs globally by 2015. IDC’s research predicts revenues from cloud innovation could reach $1.1 trillion per year by 2015, which, combined with cloud efficiencies, will drive significant organizational reinvestment and job growth.

“For most organizations, cloud computing should be a no-brainer, given its ability to increase IT innovation and flexibility, lower capital costs, and help generate revenues that are multiples of spending,” said John F. Gantz, chief research officer and senior vice president at IDC. “A common misperception is cloud computing is a job eliminator, but in truth it will be a job creator — a major one. And job growth will occur across continents and throughout organizations of all sizes because emerging markets, small cities and small businesses have the same access to cloud benefits as large enterprises or developed nations.”

The report also indicates specific industries will generate job growth at different rates, and that public cloud investments will drive faster job growth than private cloud investments. The report also notes governments can influence the number of jobs created by cloud computing within individual countries. More information, including the full report, is available at

Microsoft is delivering a set of solutions to drive the cloud’s growing future. The company offers full public and private cloud solutions for consumers and organizations of all sizes. These enable customers to reap the benefits of cloud computing — from connecting and sharing for consumers, to lowering costs and realizing new technical or strategic opportunities for organizations. More information on Microsoft cloud solutions is available at

Oracle Outperforms NetApp in Midrange Systems on SPECsfs2008 NFS Benchmark

Oracle announced its Sun ZFS Storage 7320 appliance beat the NetApp FAS3270 on the SPECsfs2008_nfs benchmark with 32 percent higher throughput and 9 percent faster Overall Response Time (ORT).

The Sun ZFS Storage 7320 appliance delivered 134,140 SPEC SFS2008_nfs ops/sec at an Overall Response Time of 1.51 milliseconds(1) for file serving in a mixed workload environment.

The Sun ZFS Storage Appliance configuration used less than half the rack space and is less than one-fifth the list price of the NetApp FAS3270 test configuration(2).

Oracle’s Sun ZFS Storage Appliances are the only NAS products engineered together with Oracle Applications, Oracle Fusion Middleware, Oracle Virtual Desktop Infrastructure software and Oracle Database 11g, as well as the Oracle Exadata Database Machine and Oracle’s SPARC SuperCluster T4-4.

Additionally, with Hybrid Columnar Compression support for Oracle’s Sun ZFS Storage Appliances, customers using Oracle’s NAS systems to manage the lifecycle of data using in-database archiving for OLTP databases and data warehouses are able to increase storage efficiency by 10x to 50x for most datasets, and reduce capital and operating expenses.

In a recent NAS quality survey, Oracle’s Sun ZFS Storage Appliances earned the highest overall scores for both enterprise and midrange NAS, besting the competition in initial product quality, features, reliability and technical support.

Thursday, March 15, 2012

Think you're safe? Dropbox or Facebook links could be spam too

Do you use Dropbox and Facebook? Then you will want to watch out for this! Symantec Security Response has observed that spammers are abusing Dropbox, a popular cloud-based, file-hosting and synchronization tool to spread spam.

Dropbox accounts have a public folder where files can be placed and made publicly available. This function is useful to spammers as it effectively turns Dropbox into a free hosting site. In this example below, spammers have created several Dropbox accounts, uploading an image (such as the below) and a simple .html file and then using the image to link to a pharmaceutical site.

During a 48-hour period, Symantec saw over 1,200 unique Dropbox URLs being used in spam. Since Dropbox is a widely-used service (with smartphone applications) people might view Dropbox URLs as more trustworthy and therefore more likely to open them.

Apart from spammers, Dropbox is also being abused by malware authors. Symantec Security Response has observed a Brazilian Portuguese malware message claiming to contain photos and asking if they can be put onto a popular social networking site. The links in the email point to a Trojan hosted on Dropbox.

Facebook is another popular platform that cyber criminals are targeting – in February 2012, Symantec has observed a phishing site recommending a fake application that allegedly removes the “Timeline” profile for Facebook users. The phishing site, hosted by a free web hosting site, displays a Facebook Timeline promotion video from YouTube, with the claim “Remove Timeline Now”.

According to this phishing site, users will have their “Timeline” removed from their Facebook profile and get back their old profile page—only after they enter their login credentials. Phishers also added that it was protected by an antivirus product with the logo of the antivirus brand placed below the login form to make the fake application look more authentic. If users fell victim to the phishing site by entering their login credentials, phishers would have successfully stolen their information for identity theft purposes.

These abuses are a good reminder that any site which makes user-supplied content publicly available must continue to be vigilant about dealing with abuse.

Tuesday, March 13, 2012

iPad 3 To Boost Traffic, Stressing Networks and BYOD Policies Alike

As Apple prepares to further redefine personal and business computing with the introduction of the iPad 3, Brocade (NASDAQ: BRCD) today revealed the results of a survey of 120 IT decision-makers, many of whom expect iPad 3 and other mobile devices to directly impact their campus LANs. Survey result highlights include:

  • BYOD or Not, Here They Come: Almost 40 percent of respondents indicated that employees use mobile devices to access their campus LANs regardless of an official Bring-Your-Own-Device (BYOD) policy.
  • iPad 3's Immediate Impact: More than 30 percent of decision-makers expect traffic on their networks to increase as a direct result of the iPad 3.
  • Long-term Investing for Mobility: 65 percent of survey respondents said they have invested in campus LANs since 2009 to address tablet and smartphone usage.
  • Multivendor Strategy Rules: 60 percent of the respondents said their organization relies on networking solutions from multiple vendors to achieve their goals.

“Regardless of whether companies have official BYOD policies, mobile device proliferation signifies the potential for a dramatic rise in campus LAN traffic in the years to come,” said Brocade Malaysia Country Manager Sean Ong.

”To continue to prepare for this and other IT advancements that will impact the performance of campus LANs, Brocade last week unveiled its vision for The Effortless Network™,” he said.

“This vision is based on the new Brocade® HyperEdge™ technology, which is designed to deliver new levels of automation and simplification of the campus LAN lifecycle -- with significant cost savings and investment protection. Brocade also introduced two additions to the Brocade ICX™ switch family to support the company's advancements in campus LAN technology,” he added.

Brocade's survey of 120 IT decision-makers was conducted from Tuesday, Feb. 28, 2012 through Monday, March 5, 2012 via Zoomerang.

Friday, March 09, 2012

Extend Wi-Fi Coverage Using NETGEAR Extender

NETGEAR®, Inc. (NASDAQGM: NTGR), a global networking company, unveils its Universal Dual Band Wi-Fi Range Extender (WN2500RP) that enables consumers to extend their Wi-Fi coverage for any home office or home network.

The dramatic increase in connected devices at home has created a need for better Wi-Fi coverage. With the NETGEAR Wi-Fi Range Extender, users can use their current wireless equipment and improve Wi-Fi coverage while enhancing overall network quality, range and performance throughout their home.

The Wi-Fi extender also increases connectivity amongst mobile connected devices such as smartphones, iPads®, tablets and laptops, as well as connected entertainment devices like smart TVs, gaming consoles, streaming players and more.

According to Mr. Soo Kean Thai, Regional Director ASEAN NETGEAR, the most frustrating thing in today’s fast paced world is slow Wi-Fi speeds or lack of connectivity.

“Sometimes having a single router providing Wi-Fi for one’s home or home office is not always feasible; as the need to run cables throughout the home or office is messing and ugly. NETGEAR solves this in the form of Universal Dual Band Wi-Fi Range Extender.”

No More Wi-Fi ‘Dead’ Spots

As the name implies, it’s a dual band Wi-Fi device designed to extend the range of the existing wireless network. The Wi-Fi extender supports all the current wireless standards (802.11 a/b/g/n), and dual band support helps to avoid interference on existing Wi-Fi channels while also extending the range of both the 2.4 GHz and 5 GHz Wi-Fi signals simultaneously, making it compatible with virtually any wireless network at home.

Included is FastLane Technology for range extenders, enables consumers to maximize bandwidth for HD video streaming and online gaming. In addition, the NETGEAR Wi-Fi Range Extender supports up to four wired to Wi-Fi connections, turning devices such as Blu-ray® players, gaming consoles, DVRs and smart TVs into devices with Wi-Fi connectivity.

Easy to Install and Set Up

A simple push of a button will configure the NETGEAR extender automatically, without any need for CDs or cables

Stream On

The NETGEAR Wi-Fi Range Extender is an ideal accessory to consumers’ existing equipment, as it enables users to surf the Internet, stream movies without constant buffering no matter where they are — in the upstairs bedroom, outside on the deck or in the garage.

Pricing and Availability

The NETGEAR Universal Dual Band Wi-Fi Range Extender (WN2500RP) starts at an affordable price of RM 242 only and is available at major retail stores and online worldwide.

Thursday, March 08, 2012

Google Science Fair 2012

In case you didn’t already know, Google is looking for young, budding Malaysian scientists!

So if you’re one looking to leave a mark, Google has the right platform for you to shine, impress your peers and celebrate your scientific talent!

The second annual Google Science Fair, launched earlier this year, is an international competition which encourages students between the ages of 13 to 18 to be curious, ask
questions, and perform science experiments to answer those questions.

Google, in partnership with the European Organization for Nuclear Research or CERN, National Geographic, LEGO, and Scientific American invite Malaysian students to post their science projects online so that they may compete for prizes, scholarships and once-in-a-lifetime experiences.

Open since January 2012, this international competition also has a special “Science in Action” prize by Scientific American which will be awarded to a project that addresses a social, environmental, ethical, health or welfare issue to make a practical difference to the lives of a group or community, for example: 16-year old Harine Ravichandran‘s 2011 entry to eliminate power outages in rural India.

Project submissions can be in: English, German, Italian, Spanish, French, Hebrew, Polish, Japanese, Russian, Dutch, Korean, or Chinese (Hong Kong or Taiwan).

90 regional winners will be selected from around the world. From this pool, 15 global finalists will be flown to Google headquarters in Mountain View, California to present their projects in front of a panel of esteemed judges. From these finalists, the judges will select a winner in each age category (13-14, 15-16, 17-18), as well as a grand-prize winner. Winners receive once-in-a-lifetime prizes such as:
  • Internships with Google and our partners LEGO, CERN, Scientific American, and National Geographic
  • US$50,000 Google Scholarship
  • A unique experience with one of our partners (e.g. 2011 - 10 day trip to the Galapagos Islands with National Geographic Expeditions)
  • A trip to Google HQ in Mountain View, CA with the opportunity to present your project in front of science luminaries

Hurry! All entries must be submitted by 1 April 2012. Get up and running by visiting to learn more, access resources and apply.

SolarWinds Enhances Server & Application Monitor

SolarWinds® (NYSE: SWI), a leading provider of powerful and affordable IT management software, announced today the release of Server & Application Monitor v. 5.0 (SAM), formerly known as Application Performance Monitor (APM). The latest version of the product introduces several exciting features including a server hardware health monitor, the Real-Time Process Explorer, and support for IPv6.

“The purpose of every SolarWinds systems management product is to enable IT professionals to do their jobs faster and with less effort, all at a more affordable price,” Denny LeCompte, vice president of product management at SolarWinds, said. “Every new feature in SAM started as a user request on thwack, our online community, and we have made improvements in the product to meet our customers’ needs.”

The new name more accurately reflects the product’s focus on monitoring server and application health and performance. Server & Application Monitor is a comprehensive server and application management product that enables monitoring of Windows, Unix, and Linux servers. It provides visibility into the performance of critical IT services, the underlying application components, and the operating system and server resources on which they run.

New features in version 5 include:

  • A server hardware health monitor that provides alerts on server fan speed, power supply status, and more hardware health indicators for vendors such as Hewlett-Packard (HP) ProLiant, Dell PowerEdge, IBM X Series, and VMware Hosts
  • The Real-Time Process Explorer, which monitors processes real-time performance statistics like CPU, memory, virtual memory, and disk I/O in real time to diagnose and troubleshoot server performance issues quickly
  • Support for IPv6
  • More than 30 new and updated out-of-the-box server and application monitoring templates
SAM benefits for sysadmins:
  • Comprehensive server and application coverage (email, Active Directory, Java, database, hardware, etc.), which eliminates the need for multiple monitoring products
  • Easy-to-use, customizable dashboards and reports for viewing trends, capacity, and performance
  • Expert Templates that provide best practices information into which statistics should be monitored and why, as well as optimal thresholds
  • Business service views and alerts that can be configured for fast root-cause analysis

“We’re excited about the new hardware monitoring features of SAM 5.0; as soon as we check the box to monitor our hardware, we can extend the notification and alerting to our server desk application and immediately notify staff if a failure takes place,” Jed Krisch, manager of technical services, Carilion Clinic, said. “With Real-Time Process Monitoring, we can see what’s going on with the server over time. If there’s a process using a lot of resources that we aren’t already monitoring, we can start capturing historical data with just a few clicks. This just wasn’t possible with other products we tried.”

SolarWinds SAM is one of five key products in the SolarWinds systems management product portfolio. Together, these products address the troubleshooting, patch management, and performance monitoring needs of the system administrator. This portfolio also includes Synthetic End User Monitor (SeUM) and three new products: Patch Manager, DameWare NT Utilities, and DameWare Mini Remote Control.

Pricing and Availability

Pricing for SolarWinds SAM starts at US$2,495. For more information, visit the SolarWinds website, download a free 30-day evaluation trial, or call +65 593 7600.

Brocade Anticipating The Perfect Storm For Malaysia

The storm is coming, that is how Gina Tan (Brocade's Regional Director for South East Asia) described it.

2011 was the year of cloud computing; it was the year when everybody began to embark full momentum into it, starting with Microsoft with launch of Windows Azure and followed by all major technology vendors around the world. It was the year of the big bang for cloud computing, with birth of all sorts of product offerings.

Brocade braced up to the challenge with the launches of Ethernet Fabric, Cloudplex Architecture and Campus-LAN.

As much as excitement which got many of us in the industry to become heated up and always wanting for more each day, 2011 was the year of marketing for cloud computing. Consumers are still adopting the wait-and-see approach.

Make no mistake that those marketing efforts are not working, it is working. The idea of cloud computing actually got off to a better start from bottom-up rather than top-down. What I mean by this is that consumers acting as individuals actually find cloud computing to have more values and excitement than enterprises themselves. The reason for this cannot be debated from a single angle perspective, chief amongst it is that enterprises are tasked with ever decreasing budget to combat the exploding needs of enterprise IT demands. Hence, enterprises must make it a point to reuse existing investment while attempting to adopt cloud computing whenever possible.

The acceptance of cloud computing by the individual consumers created a wave which has become what is known as consumerization of IT trend. This trend simply defines that individual end users are able to influence enterprise IT road-maps based on the availability of lower cost and greater adoption of common and powerful consumer applications, social media applications and powerful mobile gadgets with enough computing power to perform corporate assignment. What this means is that the enterprise IT industry is going down the road of having a greater merge with consumer IT industry, blurring the line of distinction.

Brocade is all ready for this storm, reassured Gina Tan. The technology is already available since 2011. The Ethernet Fabric (empowered by VCS Technology) presents a solution for cloud ready IP based networking.

The core idea of VCS technology for cloud optimized networks is that the network is now more software oriented than hardware oriented. By all means, this introduces the concept of platforms, intelligence and automated, ubiquitous and scalability which are now coined as Ethernet Fabric. In other words, Ethernet Fabric means Ethernet networking virtualization. It allows conventional 3-tier networking architecture (access, aggregation, core) to be flattened, presenting a lostless and fully meshed network architecture.

The Campus-LAN network not only defines effortless networking. The term 'campus' also represents vast, variety, freedom, fast, scalable and on-demand. It is powered by HyperEdge technology which caters for 1.) single point management and 2.) mix-and-match-stacking.

It is interesting to take note of the mix-and-match-stacking feature in which switch stacks can comprise of different switch models. By conventional approach, a switch stack can only be formed using similar switch model. This will give flexibility and options for consumers to adopt Ethernet Fabric without the need to rip-and-tear existing networking infrastructure.

17% of capex budgets goes into networking with 50% of opex budget goes into maintenance. Ethernet Fabric and Campus-LAN technology will bring about great cost saving for enterprises.

Brocade's global strategy is to focus on the healthcare and educational industries, Malaysia inclusive.

For Malaysia itself, Brocade announced appointment of new country manager, Sean Ong who is previously from Cisco Malaysia. According to Sean Ong, the immediate strategy for Malaysia is to intensify marketing efforts, recruit key partners and focus on education for partners by leveraging on the APN (Alliance Partner Network) program.

The APN provides benefits for partners in ways of 1.) enhanced deal registration rewards, 2.) incentives for purchase of demo units, 3.) joint marketing fund 4.) cooperation in terms of technical support.

In conjunction with that, Brocade also announced the appointment of SpringLab Distribution Sdn Bhd as the APN Distributor for Malaysia. SpringLab was founded almost 4 years ago. According to its Director Desmond Low, SpringLab has all the capability to design, deliver and support Brocade's technology. Under its roof, customers gained to benefits from the followings:

  • Certified engineer
  • Onsite support (for west and east Malaysia)
  • Response time up to 24 hours.
  • Resident support engineer
  • Contact center
  • Reporting tools.

For Malaysia scenario, besides consumerization of IT, the demands for green IT, virtualization and IPv6 adoption bring about the thunder and the wind. Sean Ong and SpringLab are both very optimistic of the road ahead. Brocade from the start, has always been leveraging on the first mover's advantage, presenting its IP-based networking technology as competent alternative for consumers to adopt advanced, cloud ready technology with greater penchant cost saving.

The storm is not just coming, it has arrived and heading towards Malaysian consumers and Brocade has the umbrella. To embrace such challenges, Sean Ong expressed optimism. The key is in marketing, partners and funding.

SAS unveils potent weapon in war on money laundering

Banks can now increase efficiency while improving investigations and SAR quality, brandishing the latest version of SAS Anti-Money Laundering to better manage suspicious financial activity. Enhancements from the leader in business analytics software and services include predictive analytics, an enriched regulatory reporting console, and additional risk-based scoring techniques.

"Enhancing the quality of alerts by applying predictive analytics is a significant process improvement over the typical transaction monitoring approach," said Rodney Nelsestuen, senior research director at CEB TowerGroup. "This helps institutions lower false positives, reduce analyst fatigue, and improve the quality of investigations all of which are increasingly important in the face of tougher regulatory actions and stiffer fines for poor anti-money laundering (AML) monitoring."

SAS Anti-Money Laundering has unique predictive analytics improving alert quality while minimizing false positives, leading to a more effective and meaningful investigation. This helps escalate alerts to investigation more accurately, so investigators can focus on the most egregious risks, while reducing costs associated with model governance.

The updated regulatory reporting console in SAS Anti-Money Laundering supports multiple forms and languages, and interacts with new electronic filing systems being adopted by global financial intelligence units. An improved user interface speeds investigations by displaying all relevant customer information based on user roles, rights and privileges, to display key performance indicators of the most recent trends.

Banks can harness risk-based scoring during the onboarding process with new features in SAS Anti-Money Laundering. The risk classification process regularly assesses a customer's risk profile in a single data pass, based upon transactional behavior or association with high-risk attributes. That means institutions can monitor high-risk peer groups uniquely. End users can modify or create unlimited scenarios through a point-and-click interface, monitoring more risks and behaviors while bypassing trusted accounts and parties posing no threat.

iPad Without Number ?

The Apple iPad 3 was launched yesterday.

Something weird ? It is not called the iPad Three; it is latest iPad.

I invested a few minutes to think about it and feel that wow, now I can finally buy an 'iGadget' without boiling my blood pressure thinking about when it is going to become expired.

Not too bad. Can buy lar.

The new iPad Wi-Fi models will be available in black or white on Friday, March 16 for a suggested retail price of $499 (US) for the 16GB model, $599 (US) for the 32GB model and $699 (US) for the 64GB model.

Wednesday, March 07, 2012

Infosecurity World Exhibition, KL 2012

Refer to 'Malaysia Technology News'.

Infosecurity World Exhibition & Conference 2012 (ISWec 2012), Asia’s pioneering information security trade show and conference is all set to take place at Putra World Trade Centre (PWTC) from 21 – 22 March, 2012

Some of the key highlights of Infosecurity World Exhibition & Conference 2012 include:-
  • Strong trade focus: connecting business owners with buyers
  • Expanded trade mart and business showcases
  • Extensive Networking Opportunities: business matching sessions encourage quality interactions between buyers and sellers
Among keynote speakers from information security industry for the conference session at InfoSec Asia 2012:
  • Prof. Dr. Mohamed Ridza Wahidin, Associate Scientist, MIMOS Berhad, Malaysia
  • Mike Usher, Director of Information Risk Asia, Prudential Services Asia, Malaysia
  • Philip Victor, Director Centre for Policy & International Cooperation, International Multilateral Partnership Against Cyber Threats (IMPACT)
  • Theo Nassiokas, Head of Information Security & Technology Risk-APAC, Europe & America, ANZ Banking Group Ltd, Singapore
  • Nahil Mahmood, President, Cloud Security Alliance, Pakistan
ISWec 2012 will be divided into three components to distinctively cater visitors’ field of expertise:-
  • Data Storage Showcase 2012 – To feature essential data storage solutions against current trends such as Primary storage data reduction, multi-level cell (MLC) flash, Network File System (NFS) as well as trends of 2012 and its predictions for 2013.
  • Cloud Computing Showcase 2012 – To feature top cloud computing technology providers with latest cloud services, applications and platforms in leveraging the Cloud to maximize performance, minimize cost and improve the scalability of IT infrastructure.
  • Software Development Showcase 2012 – To showcase top innovators and leaders in multiple software development industry areas with latest research, new development, prototyping, modification, reuse and re-engineering software.

Symantec Finds New Wave of Impersonation Cyber Attacks

Symantec Corp. (Nasdaq: SYMC) announced the findings of its February Symantec Intelligence Report, which shows a new wave of cyber-attacks designed to impersonate a well-known business mediation and arbitration service in North America.

Businesses are being targeted with emails purporting to originate from the US Better Business Bureau, socially engineered to suggest that a complaint had been filed against the organization and the details of the complaint could be found in the file attachment, which would lead to a PDF file that contains an embedded executable or a URL that leads to the malware.

“These attacks are reminiscent of similar incidents that were first reported in 2007, when C-level business executives were being targeted with emails that purported to originate from the US Better Business Bureau (BBB). The new wave of attacks bear similar social engineering techniques to the 2007 attacks, although recently the attackers are using considerably more advanced techniques, including server-side polymorphism, making them especially protean in nature,” said Paul Wood, cyber security intelligence manager, Symantec.

“Server-side polymorphism enables the attacker to generate a unique strain of malware for each use, in order to evade detection by traditional anti-virus security software. Scripts such as PHP are commonly used on the attacker’s Web site to generate the malicious code on-the-fly. Like the Greek sea-god, Proteus, the continually transforming nature of these attacks makes them very difficult to recognize and detect using more traditional signature-based defenses,” Wood said.

This month’s report also reveals that cyber criminals tapping into the zeitgeist was particularly noticeable in the week running-up to St. Valentine’s Day, as the volume of spam messages referencing the event rose by as much as three and a half times the daily average for that week. The volume started falling off again after February 14, with a late spike occurring on February 16, when almost 6 times the daily average volume of emails referencing the special day was recorded.

Other Report Highlights:

Spam: In February 2012, the global ratio of spam in email traffic fell by 1.0 percentage points since January 2012, to 68.0 percent (1 in 1.47 emails). This follows the continuing trend of global spam levels diminishing gradually since the latter part of 2011.

Phishing: In February, the global phishing rate increased by 0.01 percentage points, taking the global average rate to one in 358.1 emails (0.28 percent) that comprised some form of phishing attack.

E-mail-borne Threats: The global ratio of email-borne viruses in email traffic was one in 274.0 emails (0.37 percent) in February, an increase of 0.03 percentage points since January 2012. In February, 27.4 percent of email-borne malware contained links to malicious Web sites, 1.6 percentage points lower than January 2012.

Web-based Malware Threats: In February, Symantec Intelligence identified an average of 2,305 Web sites each day harboring malware and other potentially unwanted programs including spyware and adware; an increase of 9.7 percent since January 2012.

Endpoint Threats: The most frequently blocked malware for the last month was WS.Trojan.H. WS.Trojan.H is generic cloud-based heuristic detection for files that posses characteristics of an as yet unclassified threat. Files detected by this heuristic are deemed by Symantec to pose a risk to users and are therefore blocked from accessing the computer.

Intel Takes Gaming Graphics to Next Level with Developer Tools

Intel Corporation introduced Intel® Graphics Performance Analyzers (Intel® GPA) 2012, the latest version of a powerful tool suite to optimize performance of gaming, media and entertainment applications. Expanding upon Intel's mobile momentum, Intel® GPA 2012 will support mobile applications for Ultrabook™ devices and Android*-based smartphones and tablets for the first time.

Previously available only on PC platforms, Intel GPA helps developers improve the experience of game and media applications by accessing powerful tools to analyze and optimize performance on Intel® Core™ and Intel® Atom™ processor-based platforms. The tool suite enables developers to enhance application performance on smartphones, tablets, Ultrabooks and PCs. Developers can also optimize Web content for browsers that support hardware-accelerated rich media, including Microsoft Internet Explorer* 9, Google Chrome* and Mozilla Firefox*.

"Gaming is one of the largest consumer segments for smartphones, but nobody wants a game that drains a smartphone battery," said Craig Hurst, Intel's director of Visual Computing Product Management. "There are few choices for developers who want to optimize apps for power, so Intel GPA 2012 introduces power metrics, ensuring that a game not only has great performance, but also runs longer on Ultrabooks, Android tablets and smartphones."

The Intel GPA tool suite includes:

  • Intel® GPA System Analyzer – Analyzes game performance and identifies potential bottlenecks that slow down performance or affect graphics. This tool allows developers to perform optimization experiments to fine-tune performance without changing application code. New in Intel GPA 2012, Intel GPA System Analyzer now supports a standalone mode that enables real-time analysis of application performance on smartphones, tablets and Ultrabooks, including Android devices. Intel GPA System Analyzer can be used to analyze an application's power usage and how it will affect battery life on mobile devices.
  • Intel® GPA Frame Analyzer – Offers application developers deep frame analysis of individual application elements such as shaders, textures and pixel history. Intel GPA Frame Analyzer shows the visual and performance impact of each individual element in real time without affecting the application source code.
  • Intel® GPA Platform Analyzer – Developers can visualize performance of application tasks and the effect on devices by viewing CPU metrics and graphics workloads. PC application developers can also see how their software would perform in a multi-core environment. Intel GPA Platform Analyzer has been rebuilt from the ground up for the release of Intel GPA 2012 to provide more system behavior information. Additionally, the tool is capable of handling large volumes of data to emulate application performance on an extended run.
  • Intel® GPA Media Analyzer – When used in conjunction with Intel® Media SDK, Media Analyzer enables developers to see how effectively an application uses hardware-accelerated video encode and decode in real-time.
Intel GPA 2012 is available as a free download at Support for Android devices is expected to be publically released this year.