Google Analytics

Search This Blog

Thursday, February 28, 2013

Malaysia’s Outsourcing Sector to Surpass RM7 Billion by 2015

KUALA LUMPUR, 26 February 2013 – Outsourcing Malaysia (OM) - an initiative under PIKOM, today shares its latest projection of the local outsourcing sector to grow to a RM7.1 billion industry 2015 from the current revenue of RM5 billion in 2012.

According to David Wong, Chairman of Outsourcing Malaysia (OM), “This represents a CAGR of 12.6%. The 2015 projection of the local outsourcing industry is optimistically achievable based on the current track record and initiatives planned. OM has put into place a comprehensive three year plan that encompasses six key strategic thrusts that will shape the initiatives.” says Wong.

David Wong Outsourcing Malaysia Chairman,Mr David Wong, Chairman of Outsourcing Malaysia

Wong added “With support from MDeC and PEMANDU, OM is confident that our initiatives will be a significant boost to escalate the outsourcing industry’s growth towards the 2015 market revenue and talent pool growth projections.”

Wednesday, February 27, 2013

Tata Communications Feb 2013 Updates

According to Wikipedia, Tata Communications Ltd is an Indian global telecommunications company located in Mumbai. It owns a submarine cable network, a Tier-1 IP network, and also rents data center and colocation space. It operates India's largest data center in Pune.

Having these information in mind, it helps us to understand where Tata was coming from and where they are moving into.

To the lowest level, they are leasing infrastructures to facilitate telecommunication and IP networking.

In order to understand how far outreach they have conquered, let's first look into what are their existing products and solutions. To facilitate this analysis, we take information directly from their corporate web site. We do not intend to analysis things from a financial perspective.

Building IT Resiliency with Data Protection and Disaster Recovery Solutions

By Darrell Riddle, Senior Director of Product Marketing at FalconStor Software

In this contributed article, Darrell explains what IT Resiliency is and why it is important for business continuity.

It is now an essential fact: A company cannot operate unless its IT services are running and its data is accessible. Reliable, continuous access to data, applications and IT services are the new cornerstones of every business. When IT is down, employees lose access to email and other essential applications and become unproductive. Customer enquiries are ignored, and the business slows to a standstill. However, when managers look at their data centers from the perspective of services – collections of applications, systems, servers and data – they can implement data protection and disaster recovery (DR) solutions that result in effective planning for IT resiliency.

IT resiliency is the ability of a data center to return and recover from an issue or disaster, whether it comes from a natural event, a malicious act or human error. The planning difficulty stems from expanding data center complexity with hybrid physical and virtual environments, cloud-based applications and network connectivity. Data center managers must create effective policies to protect IT services and associated data, while ensuring that these services are continuously available and, if interrupted, are quickly restored. Essentially, this is an insurance plan for the data center. The policy ensures that the data center continues to operate. Every minute an employee does not have access to vital applications and IT services is time not spent on essential business operations. In fact, if asked, most company leaders would say they could only afford a maximum of four hours of downtime at any one instance.

Sourcefire Introduces Dedicated Advanced Malware Protection Appliance in Malaysia

Kuala Lumpur, 26 February 2013 - Sourcefire, Inc., a leader in intelligent cybersecurity solutions, today launches its dedicated Advanced Malware Protection (AMP) appliance in Malaysia which allows users to defend against sophisticated network malwares from the point of entry, through propagation, to post-infection remediation.

Expanding on Sourcefire’s AMP offering portfolio, this new dedicated appliance is built on the industry-leading FirePOWER™ platform and provides increased deployment flexibility for organizations needing immediate protection against advanced malware.

Ivan Wen, the Country Manager of Sourcefire Malaysia shares that enterprises’ networks are constantly evolving and expanding to accommodate business needs. And, attackers are taking advantage of any gaps to permeate a network and accomplish their mission.

Interactive dashboards provide real-time analysis of your organization's malware threats, affected hosts and users, and identifies the applications and protocols being used to deliver malware.

“Given today’s threat landscape, advanced malware detection and protection discussions should extend beyond blocking/prevention and highlight security intelligence, analytics, incident detection/response and lessons learned,” according to Jon Oltsik, Senior Principal Analyst, Enterprise Strategy Group. “Organizations need to shift from tools that are mere gateways to an enterprise network security approach for better protection against a broader range of threats and vulnerabilities over time.”

Monday, February 25, 2013

Cards & Payments Asia 2013 Expo to Tap on Growth of Mobile and Contactless Technology

Singapore, Feb 25 2013 – The rise of mobile, contactless technology, tighter regulations and emerging payment platforms are driving a revolution. Compounding this change is the increased competition from new entrants such as retailers, telecommunications and non-banks into the payments landscape. The need to be prepared for the future by investing in innovative technology and developing processes to serve the next generation of consumers has never been greater.

Bringing together the whole payments ecosystem in Asia, the 18th Cards & Payments Asia is a comprehensive platform that will present insights on how consumers can leverage innovative platforms and keep pace with the latest digital security, smart technologies and payment trends. 2013 will see a total of 8 shows in 1 expo floor encapsulating end-to-end products, services and solutions for banks, telecommunications and mobile network operators, enterprises, government agencies, ticket and transport operators, travel and hospitality, financial institutions and retail and F&B companies to drive and grow service and profitability for these businesses.

Key highlights at the event will include:
  • 4 dedicated seminar theatres with over 70 free case study educational seminars on the latest industry development and hoDear Brandon Teoh,Dear Brandon Teoh,w to leverage on them to propel business growth
  • A Future Village Zone that will showcase the latest and most futuristic product innovations including ‘First in Asia’ and worldwide launches
  • An NFC-in-Action Zone that will demo top NFC product innovations and NFC-enabled handsets
  • Diverse country pavilions from Singapore, China, France and Korea that will bring you exhibitors from the region

Saturday, February 23, 2013

Epson Celebrates 20th Anniversary of Micro Piezo Technology

Kuala Lumpur, Malaysia, 20 February 2012 – 20 years ago, Epson embarked on a course that would differentiate it from other printer makers, and give the company unique competing advantages today. In March 1993, Epson introduced the very first printer to bear its proprietary “Micro Piezo” inkjet technology that had been developed over the first three years of the 90s.

Micro Piezo is a high performance inkjet printing technology that uses piezoelectric materials which bend precisely when charged with varying electric currents to propel precise amounts of ink out of the print head. Today, Epson is the only major printer company in the world that uses piezoelectric print heads in its entire inkjet printer range – from the smallest personal photo printer, to the largest industrial press system.

To celebrate the 20th anniversary of the technology, Epson has launched a range of its latest ink tank system printers with unique benefits that have been made possible by the technology and demonstrate how far it has developed and scaled.

Koichi Endo, Managing Director of Epson Southeast Asia and one of the engineers who developed Epson’s Micro Piezo print head technology, with Epson’s largest and smallest inkjet printers

Koichi Endo, the managing director of Epson Southeast Asia, and one of the engineers who developed the technology remarks: “Epson has waited 20 years for our Micro Piezo technology to mature. Today, its superior reliability, energy efficiency, and high ink compatibility is giving Epson unique advantages and growth opportunities in the fields of business document printing, industrial printing and our ability to create special products like our ink tank system printers for emerging markets.”

Friday, February 22, 2013

Computer Security Updates Week 4 of Feb 2013

Refer to 'Computer Security Updates Week 3 of Feb 2013'; in which the biggest news was about claims of the security of Facebook and Twitter having been compromised. Apart of that, there was no report on potential APT or high-profile threats yet.
  • Symantec and G&D partner to develop protected security applications for smartphones and tablets
  • Oxford University blocks Google Docs because of phishing attacks.. for 2.5 hours.
  • Facebook blocks access to after reports site is infected.
  • Google says it is winning the war against Gmail account hijackers.
  • Kaspersky advises on how to avoid 'Honey Traps' when seeking your soul mate online.
  • Malaysia's Information Department website was hacked and a false resignation of Prime Minister message was posted. The incident didn't cause much excitement though comparing to the 'Sungai Puchong' incident.
  • Adobe releases another patch to fix zero-day vulnerability affecting its Adobe Reader and Acrobat XI (11.0.1) products.
  • Oracle releases updated Feb 2013 critical patch update for Java SE which fixes the the “Lucky Thirteen” vulnerability in SSL/TLS (CVE-2013-0169).
  • McAfee releases the McAfee Threats Report: Fourth Quarter 2012. It is agreeable to what we have observed so far. 
  • Britain and India expected to setup cybercrime joint taskforce.

Check out more on security and weekly updates.

AIMS Adopts Piller’s Green UPS

KUALA LUMPUR, 22 February, 2013 – AIMS Group the country’s premier carrier-neutral data centre, today announced that it is the first data centre in the country to invest and adopt the Dynamic Rotary Uninterruptible Power Supply (‘DRUPS’) by Piller Power Systems a German-based company.

Piller DRUPS is the world’s leading ‘DRUPS’ supplier brand that is widely being used in large-scale data centres across various developed economies such as Australia, Korea, Europe and USA.

Today, DRUPS technology for UPS is already widely used in the semi-conductor industry and wafer fabrication factories, since it uses less power and is more efficient.

Being a battery-less UPS, ‘DRUPS’ is a fully green and environmentally friendly Uninterruptible Power Supply (UPS) system that leverages on the stored kinetic energy of a spinning flywheel instead of the battery bank used by conventional UPS systems.

According to AIMS Group CEO, Chiew Kok Hin, this is the first time that the data centre is investing in this technology by Piller DRUPS. “We expect that DRUPS technology will give our customers better uptime, reliability and availability.”

Affordable Visual Analytics for All

Kuala Lumpur, Feb 21 2013
Queenie Wong, Practice Lead, Information Management, SAS,
Damian Lim, Senior Consultant, Information Management, Sales Support, SAS,
Michael Hawkins, Consultant, Customer Intelligence, SAS,

SAS is the pioneer of Analytics, a segment of computer science which analyses large amount of data in order to derive intelligence. Better known as Business Analytics, it was used to be called Business Intelligence. During the early days, the hoo-ha was having the ability to perform data aggregation from various sources into a single location – a process known as data warehousing; these data will subsequently be combined into 3 dimensional perspectives known as cubes which will serve the basis of analysing large amount of information from multi-angle perspectives and hence giving rise to intelligence.

Analytics today aspires to not only deriving intelligent reports, it also wants to expand users’ ability to analyse and discover more intelligence such as trends, patterns and etc.
(L-R:) Queenie Wong, Damian Lim, SAS Malaysia

To accomplish that, Analytics needs to upgrade itself from just having the ability to collect, integrate and process vast amount of data and to be able to produce 3 dimensional intelligent reports for users, it must also caters flexibility and visibility for users in the process of how information are being analysed by the solution. In other words, granted that the whole process of Analytics starts with 1.) data collection, follows by 2.) analysing and processing, and finally 3.) reporting; the advent of Analytics aspires to give end-users more visibility and control over the 2nd process, which is ‘analysing and processing’. This concept forms the essence of SAS Visual Analytics.

Thursday, February 21, 2013

Global Survey: Malaysia Leading Globally in Dynamic Shift of Mobility

Kuala Lumpur – February 20, 2013 – Avanade, a global business technology solutions and managed services provider, released results from a global survey of nearly 600 C-level executives and IT decision-makers in 19 countries. Research findings in Malaysia reveal that more than seven in ten companies (72 per cent) reported the majority of their employees now use personal computing devices in the workplace. The findings demonstrate that the widespread use of consumer technologies in the enterprise is having an immense influence on traditional ways of doing business and the results companies can achieve.

Conventionally, technology use at work has been largely dictated by business requirements. Executives authorised technology purchases based on corporate needs and objectives. Increasingly so, this dynamic has shifted from enterprise-driven to employee-driven technologies, especially in the area of mobile devices and consumer technologies.

Tuesday, February 19, 2013

Reference Startup Form (VB.Net)

This applies to Microsoft .NET framework.

To reference startup form of a windows form application, there are 3 simple methods.

Assuming the startup form is called Form1.vb

Method 1:

Dim objFrmMain as Form1

objFrmMain = My.Application.ApplicationContext.MainForm
This will only work when the form is loaded, it returns nothing under non-GUI context such timer's interval event.

It returns nothing before the form instance is fully loaded, i.e during 'New' context.

Monday, February 18, 2013

Computer Security Updates Week 3 of Feb 2013

Refer to 'Computer Security Updates Week 1 of Feb 2013'; in which the biggest news was Chinese hackers break into the New York Times. Also, trends of U.S authorities raising the awareness on cyber-security threats heightens up.
  • Symantec report finds email malware rate in January 2013 at the lowest since 2009.
  • Cyber-Ark announces record growth in 2012.
  • Reuters reported that Facebook claims being hacked and user data compromised.
  • Kaspersky Endpoint Security 8 wins prestigious Best Protection 2012 and Best Repair 2012 awards from AV-Test.
  • ESET security team discovers Win32/DoS.OutFlare, a c&c-powered malware designed to challenge CloudFlare anti-DoS service.
  • Sophos extends UTM to the enterprise.
  • Kaspersky research found over 7000 attempts to infect gamers on daily basis.
  • Sophos advances Mobile Device Management for Android environments.
  • Reuters reported that hackers may have gained access to passwords and other information for as many as 250,000 user accounts on Twitter.

Check out more on security and weekly updates.

A New Face for

Kuala Lumpur, Malaysia, Feb 15, 2013 - A New Face for announced that its website has been updated and refreshed in a renewal of the layout and content following the regional changes. The customer can still browse and find the information an dproducts that were previously available, but would be represented in a new revitalized layout. In addition, more information about is now available.

Based on a Standord University's study from 2004, the web design is a ey determinant to building online trust with consumers that is why decided to reinvent its layout. Furthermore, E-commerce players believed that the layout is one of the predominant factors of customers' satisfaction. Consequently, Lazada's new design has for purpose to be more user-friendly and promise to be an all-new experience for the customers.

The new organization of the webpage is clearer, uses brighter colors and gives better explanation on the products. By managing the space differently, is hoping to increase the customers' comprehension.

Wednesday, February 13, 2013

ICT Happening Updates Week 2 of Feb 2013

The most significant news for week 1 of Feb 2013 was launching of BlackBerry 10 platform by RIM.

Now, in case you missed them, the most important happenings for last week were:
  • WeChat launches walkie-talkie feature. 
  • Tata Communications upgraded service offerings to provide MVO with mobile broadband enablement.
  • MyIX announces peering with Amazon, Facebook and Microsoft.
  • Silver Peak delivers Multi-Gigabit Virtual WAN Acceleration on Windows Server Hyper-V.
  • Cebu Pacific launches “Search for the Juan Blogger” Contest.
  • SEEBURGER signs strategic partner Datamation in Malaysia.
  • Sunlight Unicablink launches first GPS enabled taxi in Malaysia and Taxi Booking App.
  • hybris Global Partner Summit attracts over 800 global attendees.
  • Adobe launches transformative creative cloud offering in Malaysia.

Friday, February 08, 2013

Playing unfair: cybercriminals set their sights on gamers

According to data from KSN*, Kaspersky Lab experts recorded 7,000 attempts to infect gamers around the world every day in 2012. These attacks are launched in an attempt to gain access to personal user data, such as passwords to online games and online banking systems. Where games are concerned, malicious users attempt to steal avatars and in-game items to subsequently sell these virtual goods for real money. In the case of online banking, cybercriminals aim to steal money directly from real bank accounts.

As Kaspersky Lab experts discovered, in order to do this, malicious users send an average of 10 emails with malicious links and attachments to gamers every day, in addition to making roughly 500 attempts to infect gamers via browser-based attacks. What’s more, the company’s “collection” of malicious programs targeting online games is increasing at a rate of 5,000 new programs a day.

Kaspersky research found over 7000 attempts to infect gamers on daily basis

One of malicious users’ most favored tactics in the world of online games is, of course, social engineering — phishing in particular. For example, cybercriminals invoke the names of well-known gaming worlds and desperately try to lure gamers to their fake websites in order to harvest passwords from registered gaming accounts. In 2012, Kaspersky Lab experts recorded 15 million attempted visits to phishing websites designed to look like the pages of one of the largest developers of online games. As it turns out, there were up to 50,000 attempted redirects to phishing sites each day. Fortunately, all of these trusting users were saved by the professional anti-phishing system built into Kaspersky Internet Security, which promptly detected the threat.

Thursday, February 07, 2013

SEEBURGER Signs Strategic Partner Datamation in Malaysia

SEEBURGER, the global business integration and enterprise class Managed File Transfer (MFT) solutions provider, announces a strategic partnership with Datamation (M) Sdn Bhd (‘Datamation’) to deploy the SEEBURGER MFT SeeFX private Cloud-based file exchange solutions in Malaysia.

With more than 29 years of presence in Malaysia, Datamation is one of the leading business solution providers with regional operations in Singapore, Hong Kong and Australia. Datamation’s clients include Ministry of Education of Malaysia and Singapore, Department of Statistics of Malaysia and Singapore, AKPK (Agency of Bank Negara Malaysia), Sime Darby Medical Centres, Sunway Group, Jambatan Kedua Sdn Bhd (wholly owned by Ministry of Finance Malaysia), Star Publications, TH Properties and Construction Industry Development Board Malaysia etc.

Wednesday, February 06, 2013

Sunlight Unicablink Launches First GPS Enabled Taxi in Malaysia and Taxi Booking App

Sunlight Unicablink, which is part of the Sunlight Taxi group of companies, announced the official launch of the first Global Positioning System (GPS) enabled taxi dispatching system in Malaysia as well as the Unicablink taxi booking app.

The integrated GPS enabled taxi dispatching system will take job orders received from the call centre and automatically assign them without human intervention, to the nearest available taxis in the area. Taxi drivers can respond by placing their bid for the order as well as locate their prospective passengers through the GPS system. This results in faster response time from the point of order to passenger pick-up as well as better customer service.

Tuesday, February 05, 2013

Sophos Advances Mobile Device Management for Android Environments

Sophos announced the latest version of its award-winning mobile device management (MDM) solution, Sophos Mobile Control 3.0, which is offered both on-premise and as-a-service. This version includes support for Samsung SAFE™ devices, granting tighter control over how devices are used and making BYOD (bring your own device) policies easier to define and enforce. It also provides integration with Sophos Mobile Security 2.0, which protects Android smartphones and tablets from malicious apps. .

Bringing Android into the Organization

According to Gartner’s “Market Share: Mobile Phones by Region and Country, 3Q12[ii]” report, Android's smartphone sales to end users by operating systems jumped to 72.4 percent in Q3 2012. But as more Android owners have begun using their personal devices for work purposes, many organizations have had to adapt due to the lack of security controls on these devices and because Androids are vulnerable to and targeted by malware.

The newest version of Sophos Mobile Control integrates with Sophos Mobile Security, providing enhanced security for Androids. With Sophos Mobile Control, organizations can feel comfortable about embracing Android—all apps and external media are scanned for malware, any findings are centrally reported, and mitigation actions are automatically initiated as defined in the companies’ compliance settings.

Evernote Releases Updates for Hello and Penultimate

Hello 2.0 and Penultimate are both available from appstore for free.

Hello 2.0

Evernote®, the company that is helping the world remember everything, today announced the launch of Evernote Hello 2.0 (for iPhone and iPod Touch) which helps people remember the people they met in a fun, intuitive and seamless way. Since its first launch in December 2011, Evernote Hello has completely redesigned the way we remember people we met.

Departing from the colloquial address book that is only capable of helping you remember people alphabetically, Evernote Hello remembers the context in which you met these people – how did you meet them, where did you meet them and what did you talk about. Evernote Hello 2.0 is even better now, with a host of new features for a dramatically improved experience.

Monday, February 04, 2013

Oracle’s SPARC T4 Servers Power Mission-Critical Workloads in Over 3,000 Enterprises

Oracle, the Global leading ICT provider, announced its SPARC T4 servers featuring Oracle Solaris power mission-critical workloads in over 3,000 enterprises worldwide, nearly 4x the number announced one year ago.

Oracle’s SPARC T4 servers have been adopted globally across all major industries, including Financial Services, Telecommunications, Public Sector and Retail, delivering double-digit revenue growth in Q2FY13.

Some of the customers in APAC include Reliance Metro, Tata Sky, National Health Security Office (TH), Seicomart Company, Ltd.

ICT Happening Updates Week 1 of Feb 2013

In case you missed them, the most important happenings for last week were:
  • WeChat surpasses 300 m user accounts globally in just 2 years.
  • Netflix CEO fights for the right to post company milestones on Facebook.
  • RIM launches BlackBerry 10 platform.
  • Yahoo's Mayer recognizes for honeymoon success.
  • Microsoft Releases Office 365 Home Premium.
More on weekly updates.

Sunday, February 03, 2013

WeChat Promises to Remain Free for All Mobile Platform

The leading mobile messaging application developed by Tencent - WECHAT today reiterated that the application will remain free of charge in response to the recent comments which have gained traction amongst mobile users – WhatsApp is monetizing its application from its subscription and renewal fee. As part of the commitment to its users, WeChat has promised to remain free forever from implementing charges on its users.

WeChat would like to invite users to join its fast-growing global community of over 300 million user accounts in experiencing a robust mobile messaging platform that is free from subscription, while continuing to provide the best in mobile experience for its users with its free plug-ins across all major mobile platforms including iOS, Android, BlackBerry, Symbian and Windows Phone. For WhatsApp iPhone users, they will need to folk out one-time charge when they first download the application; whereas for all other platforms, WhatsApp is free to download and try for the first year, after which a fee of $0.99 USD will be charged for an additional year of service.

Saturday, February 02, 2013

SAP and HOPE worldwide Malaysia Announce Program to Improve Opportunities for Underprivileged Youth

SAP Malaysia and HOPE worldwide Malaysia (HOPE), the local chapter of international non-profit organization HOPE worldwide, today jointly announced an education and digital literacy initiative to help underprivileged youths in Malaysia acquire basic educational qualifications, forming the foundation for continued higher learning and creating opportunities for better career options. This initiative extends SAP’s relationship with HOPE to a third country in the Asia Pacific Japan region, where both entities have collaborated on similar education initiatives in India and Indonesia.

Children from low-income families face enormous pressure to leave school and join the workforce prematurely to reduce economic burden on the family. Owing to low educational qualifications, options open these youths are mostly confined to low-paying jobs with little or no career progression paths, thus trapping them in a vicious poverty cycle.

Beneficiary GroupKaty LEE, Executive Director,HOPE worldwide, Malaysia

To help this population group break out of the poverty cycle, SAP will invest close to a total of RM120,000 this year in HOPE Malaysia’s ongoing supplementary education program to provide beneficiaries aged 8 to 18 with free or heavily subsidized after-school tuition and intensive coaching to enable beneficiaries to successfully complete PMR and SPM exams.

Friday, February 01, 2013

Computer Security Updates Week 1 of Feb 2013

Refer to 'Computer Security Updates Week 4 of Jan 2013'.

Looking at Jan 2013 so far, no new important and deadly threat had been identified by security experts yet. Most of issues linger around threats from 2012 such as Java security issue and Red October. Another significant news was the US authorities charge three people over 'Gozi' APT which was identified in 2012.

So, I guess the year is still young. The bad guys are still doing strategy. However, looking at the current vibe, security happenings are steaming up.

This week updates in a nutshell:
  • IBM announces breakthrough with combination of security intelligence and Big Data
  • Symantec discovers Trojan.Smoaler in faked FedEx emails.
  • Federal Commercial Crimes Investigations Department (CCID) reports that Malaysians lost over RM90 mil since 2010 to Cyberscams - not gullible but victimized.
  • Chinese hackers break into the New York Times, steal every employee's password - analysts claims politically motivated. 
  • ESET found Win32/Jabberbot.A malware to be a less sophisticated threat. 
  • Symantec observes spike in Ransomware.
  • CA Technologies extends identity management security for SAP environment through collaboration with Greenlight Technologies Enterprise Integration Suite (EIS).
  • The U.S. government's Computer Emergency Readiness Team advises consumers to disable UPnP which is vulnerable to hacker access.
  • U.S authorities reported to exert pressure on Stuxnet informants (to the press).
  • Yokogawa partners McAfee to enhance security of Industrial Control Systems.
  • HP launches security software suit to help enterprises to manage security threats via holistic standpoint.
  • U.S - Anonymous Hijacks Federal Website Over Aaron Swartz Suicide
  • U.S - "cyber 9/11" could happen "imminently"

Check out more on security and weekly updates.