Google Analytics

Search This Blog

Sunday, December 30, 2012

US President Obama Recognizes LASIK Eye Surgey Scientists

Not many of us actually know that IBM research was part of the team who founded the LASIK (Laser-Assisted in Situ Keratomileusis) that we know today. Their remarkable journey took them 14 years from initial experiment until FDA approval in 1995.

President Obama recognized a team of three IBM scientists -- James J. Wynne, Rangaswamy Srinivasan and Samuel Blum -- with the National Medal of Technology and Innovation, the country's most prestigious award given to leading innovators for technological achievement. With more than a combined 100 years of service at IBM Research, they are receiving this award for designing, developing, and implementing laser technology that improves people’s health, including LASIK eye surgery.

President Obama will personally bestow the award to the IBMers at a special White House ceremony at a later date. IBM has earned the National Medal of Technology and Innovation on nine other occasions.

Saturday, December 29, 2012

Listviewitem Inserted But Missing

This is applicable to development using Microsoft Visual Studio 2008 SP1; .NET framework 3.5.

The issue is that some ListViewItem(s) were successfully inserted, but yet seemed to have gone missing.

Further check revealed that it was due to the presence of double instances of the ListView control with the same name, resulted in some ListViewItem(s) inserted to the other duplicated ListView; instead of the one showing on screen.

In this scenario, it happened when the Form, which was the parent to the ListView control, was disposed and a new instance was created. The disposal wasn't quite successful, resulted in presence of the double instances of the ListView control with the same name.

The Form was also a MDI child to another parent Form.

Friday, December 28, 2012

Oracle Java surpasses Adobe Reader as the most frequently exploited software

According to the recently published Kaspersky Security Bulletin 2012, Oracle Java was the most frequently exploited software by cybercriminals during the year, with Adobe Reader and Adobe Flash Player ranking in the second and third places, respectively.

Exploiting vulnerabilities is one of the primary methods used by cybercriminals to install malware on victims’ computers. Cybercriminals exploit applications or software that have un-patched security vulnerabilities, which exist because either the individual or business have failed to patch their vulnerable applications with the latest security updates from vendors.

Exploit packs – or malicious programs that try to infect a computer utilizing various vulnerabilities in popular software – are the main tool behind web-based attacks.

Infosecurity World Exhibition & Conference ( 20 – 21 March 2013, KL)

JSPS Group will be organising the Infosecurity World Exhibition & Conference on 20-21 Mar 2013 at Putra World Trade Centre, KL.

Three other events will also be jointly organized during that time;

It will be a great marketing affair to be participated by over 1000+ buyers and 400+ exhibitors from myriad industries of private and public sectors.

The events are opened for public at free of charge; registration required.

Check out the web sites for details and registration.

Thursday, December 27, 2012

Malaysia’s Tropical Rainforest Gets Fujitsu Restoration Support

Fujitsu, Asia’s leading ICT solutions and services provider, today shares on its 10th “Fujitsu Tropical Rainforest Regeneration Project” (‘FTRR Project’) to restore the lush of tropical rainforests in Borneo.

Launched in 2002, the FTRR project is a voluntary activity which to revitalize 150 hectares of Fujitsu’s Malaysia Eco-Forest Park located at Kinarut, Sabah on the Borneo Island, with the assistance of Sabah Forestry Development Authority (‘SAFODA’) and the Japan International Forestry Promotion and Corporation Center (‘JIFC’).

Malaysian forests have been decimated by slash-burn agriculture, commercial deforestation and palm-oil plantations, therefore restoring the forest has become an urgent concern.

(L-R) Fujitsu Malaysia (FMS) & Fujitsu Component (Malaysia) Sdn Bhd.(FCM),Samri Bin Anin (FCM),Michele Lum (FMS),Zuliyana binti Zakaria (FMS),Mariah Suleiman (FCM),Noor Azah Mohd Ali (FCM),Said Dasuki (FCM),Saravana Kumar A/L Paramasivam (FMS),R.Jeeva Raman A/L K.Raman (FMS)

Michele Lum, Marketing Director of Fujitsu Malaysia says, “SAFODA has been trying to recover the original forest with the support of JIFC for the development of tree-planting technologies and the training of technicians.”

Fujitsu's Human-Centric Intelligent Society preaches an utopia where human live life to the fullest and to co-exist with the nature supplemented by technologies.

More details.

Tuesday, December 25, 2012

Paypal Support Even on Christmas Day - Superb

I ran into some difficulties with Paypal fund transfer.

I send them email and indicated my mobile phone number.

To my surprise, they call me back with a Malaysian KL-based number within 30 minutes on Christmas Day!


Monday, December 24, 2012

2012 A Year In Review

Before that, let's look at what had been predicted for 2012 in 2011 and how they fared.

Generally, most of the prediction happened without big bang. For instance, APTs, yes there were some APTs, madwares and prominent security threats. We have concluded that the following security threats are most menacing.
  • Koobface - Koobface gang earned millions of dollars every year by compromising computers until Jan 2012 in which they were busted by authorities.
  • OSX.FalshBack.K - affected 700,000 computers all running under Mac OS X in the first half of 2012. aka Trojan-Downloader.OSX.Flashfake.ab [Kaspersky]
  • Trojan.OSX.FakeCo.a - accounted for 52% of OS X malware infection for second half of 2012 - this malicious program masquerades as a video codec installation file.
  • Flamer - APT - the most complex malware threat since Stuxnet and Duqu
  • Android.Opfake - Android malware; variant of FakeInst SMS Trojan which accounted for 60% of total Android malware infection.
  • SMSZombie - Android malware - infected more than 500,000 devices in China.
  • Gauss - APT
  • Shnakule - malnet (malware network)
  • Gozi Prinimalka - APT

Big data, sure. Things happened in certain ways but we haven't yet quite see any realistic implementation.

Cloud and virtualization were the heroes of 2011 and they are responsible to spur all sort of new product offerings in 2012. Mobility was pretty much confined to launches of new mobile devices and platforms and apps.

Hence, as what had been predicted, 2012 was about cloud, virtualization, big data, mobile and security.

Now,let's look at the details.

Jan 2012

No one would ever expect that the free world; USA would go all lengths to shutdown a leisure-based content sharing site albeit all legality involved about intellectual property - U.S. government shut down content sharing website. Others include:

Friday, December 21, 2012

Big Data for Banking by SAP

By Michel Borst,VP, Financial Services Industry, SAP

1. What are you going to offer in BIG DATA in 2013? What are the product and services roadmap that you have prepared for this theme?

Big Data was one of the top priorities of CIOs in the past few years. In 2013, Big Data makes its move into the list of the CEO. With the innovative technology to handle Big Data becoming mainstream and more affordable, companies have put the necessary infrastructure in place. The race is now on to make best use of the data to deliver value.

Thursday, December 20, 2012

Computer Security Updates Week 4 of Dec 2012

Refer to 'Computer Security Updates Week 2 of Dec 2012'

The standing for the important threats identified for 2012, some of which are APTs (Advanced Persistent Threats) remains. These threats are:
  • Koobface
  • OSX.FalshBack.K
  • Flamer
  • Android.Opfake
  • Gauss
  • MiniFlame
  • Malnet
  • Gozi Prinimalka
Check out Malaysia technology news.

Dec 21, 2012 - Businesses Embracing Encryption to Protect Their Most Sensitive Data

Almost half of companies worldwide have started using encryption technology to protect critical data. At the same time, companies are facing difficulties in implementing encryption systems and require comprehensive security solutions that are both effective and simple to use.

Key Numbers
  • Survey conducted by B2B International and Kaspersky Lab in July 2012 polled 3300 senior IT professionals from 22 countries
  • 44% of companies have implemented encryption technology to protect critical corporate data
  • 36% of IT specialists use full disk encryption (FDE)
  • 32% of IT specialists use data encryption on external devices

Wednesday, December 19, 2012

Oracle Business Intelligence Applications Deliver Significant ROI According to a Study

A recent commissioned Total Economic Impact (TEI) study conducted by Forrester Consulting on behalf of Oracle found that Oracle Business Intelligence (BI) Applications can deliver significant ROI by providing complete, real-time, and enterprise wide insight for all users, enabling fact-based actions and intelligent interaction.

The study found that companies experienced the following benefits:
  • Significant ROI2 – experienced a three-year risk adjusted return on investment of 97 percent with a 20-month payback period;
  • Lower procurement spend3 – realized five percent lower procurement costs in the first year and increased to seven percent in the second year;
  • Accounts payable savings4 – achieved savings of more than $1 million per year by the third year;
  • Lower inventory working capital5 – experienced 15 percent reduction in inventory for the affected product categories over three years;
  • Increased gross sales and prices – increased gross sales by 0.4 percent in affected parts of the organization6 and increased average sales price by 0.3 percent7 over three years;
  • IT and business labor savings – achieved efficiencies in both the IT and business sides of the organization;

More details.

Tuesday, December 18, 2012

hybris Announces the Only Commerce Solution Specifically Designed for Telcos

hybris, the top-rated provider of omni-channel commerce software, has announced the industry's only commerce solution specifically designed to help carriers sell more phones, plans and value-added services on the web and in the store.

The new hybris Telco Accelerator comes bundled with the industry acclaimed hybris Commerce Suite and includes capabilities aimed at helping carriers launch fully functional wireless phone commerce experiences that drive higher average revenue per user in as little as three to four months.

hybris Telco Accelerator includes the rich set of B2B and B2C commerce functionality rated by both major IT analyst firms as "leader" and among the top 2 or 3 general-purpose commerce platforms in the world — and now tailored for telcos.

More details.

Sunday, December 16, 2012

ICT Happening Updates Week 3 of Dec 2012

Dec 15, 2012 - Google search now gets 2.5 million copyright removal requests a week

Google receives over 2.5 million a week for request to remove URLs which copyright owners claim to have infringed their intellectual properties.

Apparently Google publishes such reports known as the transparency report.

More details.

Friday, December 14, 2012

5 online business tools for entrepreneurs

By Carlo Pandian

The internet has been around for the best part of 25 years, and once you've waded through all the advertising, the pictures of cute cats and the other 'fluff' that clutters up the World Wide Web, there are actually some very useful business tools online that true entrepreneurs can utilise.

From online accounting to advertising and linking your business to social media, online business tools are a crucial part of any 21st Century business operation. So here are five of the best online tools that could make your business more successful, more efficient and better organised.

Thursday, December 13, 2012

Fujitsu Touch Tablet: Water-Resistant and Hugely Stylish!

It is a tablet.

Fujitsu PC Asia Pacific launched in Malaysia their Made-in-Japan STYLISTIC QH582 with the new Windows 8 operating system. QH582 is touted as the world’s slimmest water-resistant and dust-resistant touch tablet, known for being a performance-focused device for personal and business use. It also boasts a long battery lifespan and lightweight chassis for greater mobility and usability.

The STYLISTIC QH582 is powered by the latest Intel Atom processor Z2760 that is designed to work flawlessly with the new Windows 8 operating system and applications to provide an optimised touch and tablet experience with low energy consumption and better power management.

With an extensive battery lifespan of 10 hours and 30 mins, users can now run applications, access the web and perform file downloads without the need to bring along a charger.

More details.

Wednesday, December 12, 2012

Live Traffic on Google Maps Now Available in Ipoh, Melaka and Penang

As part of Google's ongoing efforts to provide Malaysians with the most comprehensive, accurate and easy-to-use maps, Google launched Traffic and Transit for Google Maps in Malaysia just earlier this year. Today, we are happy to announce that the Traffic layer will now be available in Ipoh, Melaka and Penang and we hope this will make Google Maps even more useful for Malaysian users — especially for those with long daily commutes in these three new areas.

Twitter Incorporates Built-In Image Filters

By Avtar Ram Singh

It’s no secret that Twitter and Instagram haven’t been getting along too well in recent weeks. Following the announcement by Instagram that their image cards would now no longer show up on Twitter, users would have to go to the Instagram website to check out previews and large scale images of the all photographs on Instagram. Most analysts do believe that this is part of Facebook’s campaign to step up their competition against Twitter, even though the two are vastly different in what they offer to their users. The new built-in image filters that have been incorporated by Twitter therefore, are the result of a direct hit back by the social networking firm. Their image filters have been released for their Android application and offers eight filters that include vignette, black and white, warm, cool, vintage, cinematic and a few others.

Sunday, December 09, 2012

Computer Security Updates Week 2 of Dec 2012

Refer to 'Computer Security Updates Week 4 of Nov 2012'.

By now we have identified most important threats for 2012, some of which are APTs (Advanced Persistent Threats). These threats are:
  • Koobface
  • OSX.FalshBack.K
  • Flamer
  • Android.Opfake
  • Gauss
  • MiniFlame
  • Malnet
  • Gozi Prinimalka

Saturday, December 08, 2012

AMD Paves Ease-of-Programming Path to Heterogeneous System Architecture

AMD announced availability of the AMD APP SDK 2.8 and the AMD CodeXL unified tool suite to provide developers the tools and resources needed to accelerate applications with AMD accelerated processing units (APUs) and graphics processing units (GPUs). The APP SDK 2.8 and CodeXL tool suite provides access to code samples, white papers, libraries, and tools to leverage the processing power of heterogeneous compute with OpenCL™, C++, DirectCompute and more.

In short, now you can do more with programming on platforms which are powered by AMD microprocessor.

Parallel programming, a technique for programming optimisation and acceleration, was made popular to the general programming community by NVIDIA through its GPU platform. Refer to Malaysia Technology News for some details.

Thursday, December 06, 2012

EZLogin Empowers B2B Transaction

EZLogin is a cloud-based IAMaaS (Identity and Access Management as a Service) platform; SaaS (Software-as-a-service) for Single Sign On for Identity and access management for other SaaS applications.

It offers a single platform for both consumers and vendors of SaaS solution to co-exist – allowing business to business transaction.

For instance, a vendor of SaaS CRM solution registered as a vendor to EZLogin to achieve two benefits:
  1. To benefit from its single sign on (SSO) technology
  2. A marketplace with users

More than 1-in-5 households on Fibre; Fibre broadband gaining traction rapidly

OpenNet’s subscriber base has grown to 250,000 in November 2012, a 150% increase from the 100,000 subscribers recorded at the start of the year. To meet the temporary increase in demand from the SITEX 2012 show, OpenNet added more than 4400 seasonal installation slots.

In Singapore, a Fibre Index Survey commissioned by OpenNet shows an uptrend in user satisfaction with fibre broadband connectivity. This bodes well for the take-up of fibre as more than 1-in-5 households are now using fibre connections for internet access, IPTV and other bandwidth-intensive applications. The survey also highlights a considerable increase in the number of broadband users accessing the Internet to download, upload and store digital content. The survey was carried out by Acorn Marketing & Research Consultants.

Wednesday, December 05, 2012

SAP to Power the Customer Experience Transformation

The SAP® 360 Customer solution is a SaaS CRM cum analytics cum social media solutions.

It is powered by the SAP HANA® platform, the solution will harness the power of in-memory computing, cloud, enterprise mobility and collaboration to allow organizations to revolutionize the way they engage with their customers beyond traditional customer relationship management (CRM).

SAP 360 Customer will provide unique capabilities to turn insight into action and engage with customers one-to-one — in context and in real time. It will enable organizations to create a superior customer experience while driving operational excellence by empowering the mobile workforce, fostering collaboration, executing transactions faster and providing better response times. The solution is already transforming the way companies engage with customers. Lenovo, a US$29 billion personal technology company and the world’s second-largest PC vendor, has been an early adopter of the SAP HANA platform to support the fast growth of the organization.

A key component of the SAP 360 Customer solution will be the SAP® CRM application powered by SAP HANA. Other products to be included are cloud-based solutions such as the SAP® Customer OnDemand solution, the SAP® Jam social software platform and several mobile solutions.

SAP CRM powered by SAP HANA is also planned for availability as a rapid-deployment solution for new customers and CRM installations, as well as to support existing customer pilots. SAP® Rapid Deployment solutions are designed for customers to go live within 12 weeks or less and offer a complete package of pre-configured software, implementation services, content and end-user enablement for a fixed price and scope.

Brocade Predicts 2013 for the Rise of SDN

Sean Ong, country manager, Brocade predicts the following for 2013.

1.    Software-Defined Networking (SDN) deployments begin -  to reduce CapEx (capital expenditure) and OpEx (operating expenditure) and increase service responsiveness – organisations are looking for technology alternatives that will streamline service creation and foster innovative applications and services.

2.    Death of the “Transaction-Based” user - mobile and fast connectivity will allow users to be always connected to the Internet, killing away to need to save bandwidth in order to reduce costs. 

A “transaction-based user” is an individual that will connect to the Internet to conduct an activity (such as to make a purchase or to stream content), and then log off.

3.    Cloud under the microscope - cloud computing will come under review after having been promoted to elevated celebrity status for the past two years. Organisations will start to audit the benefits of cloud implementation.

4.    Customers bite back on vendor lock-in - Trust is essential when building a network to support mission-critical applications, and enterprises will turn to trusted vendors to deploy flexible and scalable solutions.

5.    Technology will begin to overcome human shortcomings- more advanced automation which will improve quality of life.

More details.

Monday, December 03, 2012

Silver Peak Survey Shows SDN ‘Very Important’ to IT Strategy

What is SDN ?

Results of a study conducted by Silver Peak Systems, the leader in accelerating data over distance, revealed that software defined networking (SDN) has become a key ingredient to information technology (IT) strategy. Results showed that more than half (59 percent) feel SDN is important to their IT strategies and 20 percent consider it “very important.”

The importance of SDN was also reflected in how soon IT managers plan to implement it. One-in-six IT managers intend to implement some form of SDN in less than 12 months, while 40 percent of those surveyed indicated that they would implement it in less than two years.

Sunday, December 02, 2012

Gathering of Photos in a single app using Cooliris

If you have an iPad, most likely you will snap some photos using iPad directly. These photos can be visible from iPad photos application. But what about viewing other photos stored in Facebook, Flickr, Instagram and even Google Picasa,Google + and Google drive, in your iPad as well ?

You can view all of those photos using the Cooliris app for iPad, which allows one to login to these photo social media applications in order to view photos in a single environment. Cooliris is available for all iOS devices and is free.

Using Cooliris, it saves you the trouble of manually download photos stored in different photos social media applications such as Flickr into your iPad for viewing. For amateur users, all they need is to be familiar with one application. As the matter of fact, Cooliris can also works as a photo backup utility, synchronizing all your photos into your iPad serving as the backup media - this works when a photo is clicked on where a copy will be downloaded.

Saturday, December 01, 2012

ICT Happening Updates Week 1 of Dec 2012

Apple’s iPhone 5 gets final approval for China release

Nov 30, 2012 - Apple’s latest iPhone has received final clearance from Chinese regulators, paving the way for a December debut in a highly competitive market where the lack of a new model had severely eroded its share of product sales.

The Telecom Regulatory Authority, under China’s Ministry of Industry and Information Technology, showed two iPhone 5 models on its website that received approval on Thursday. The two are the A1429, a WCDMA model that runs on China Unicom’s network, and the A1442, a CDMA model that runs on China Telecom’s network.

More details.