Google Analytics

Search This Blog

Friday, July 26, 2013

Developers Updates Week 4 of July 2013

In the last updates series (Week 4 of June 2013), the most interesting update was that Oracle launched new Java platform Enterprise Edition 7 (Java EE 7).

For this updates series, the followings had emerged.
  • Registration opens for BlackBerry Jam Asia 2013@Hong Kong, Sep 2013.
  • World’s first cross-border Silicon Valley / Bangalore hackathon unveils ‘The Future of Collaboration’.
  • Oracle introduces the “Make the Future Java Program” for JAVA developers.
  • Google: Startups from many nations join together at Blackbox.
  • Ericsson continues to strengthen in Silicon Valley.
  • Trend Micro launches new intern program, offers Cyber Security scholarships, performance incentives.
  • Oracle: Latest Java Extends Support for Mobile & Cloud.
  • Red Hat advances OpenShift Enterprise with new release.
  • CloudFare uses a combination of PostgreSQL and Kyoto Tycoon to perform almost real-time data replication.
  • PreEmptive Solutions adds exception analysis to Visual Studio 2013.
  • Intel® System Studio extended to Linux* embedded app developers.
  • Microsoft showcases developer opportunity on Windows Azure, Windows devices.
  • Windows 8.1 preview now available.
  • IBM offers big data capabilities for DB2 via BLU Acceleration.
  • In-vehicle infotainment gets boost from new Microsoft exFAT file system deals.
  • AMD explores Heterogeneous System Architecture standard at APU13c

Tuesday, July 23, 2013

ICT Happening Updates Week 4 of July 2013

The most significant news for week 3 of July 2013 was that Bosch Software Innovations introduced software suite in APAC; I found it very up to trend.

For this week / last week, here are / were the biggest news.
  • Brother extends portfolio with innovative mobile and desktop scanners.
  • Silver Peak gives hardware customers free, anytime upgrade to virtual.
  • AMD powers visual computing experiences with Industry Leaders at SIGGRAPH 2013.
  • Cisco announces agreement to acquire Sourcefire.
  • UPM graduate wins big with Lazada’s Giveaway Extravaganza!
  • Fujitsu launches Fujitsu Business Corner In Prangin Mall.
  • Epson announces investment in new production lines for Next-Gen print heads.
  • Oracle unveiled latest multi tenant and cloud nature database 12c in Malaysia.
  • LeBron James comes to WeChat!
  • Gartner recognizes Oracle as the leader in IT Project and Portfolio Management services and applications.
  • Evernote and OfficeSuite integrate to facilitate mobile productivity on Android devices.
  • Oracle accelerates product innovation in China.

Great Eastern Life Partners Symantec To Strengthen Information Protection

KUALA LUMPUR, Malaysia – July 22, 2013 –Great Eastern Life Assurance (Malaysia) Berhad is going beyond the normal scope of financial protection as they announce the partnership with Symantec Corporation to strengthen Great Eastern Life’s information protection with Symantec’s comprehensive suite of solutions, providing the key stakeholders of the organisation a peace of mind knowing that their information is protected.

In strengthening the information protection of its agency networks, Great Eastern Life has recently partnered with Symantec in offering Norton Internet Security to help its agency force enhance security on their endpoint devices. Chin pointed out that this is an important initiative as the agency network is a vital component to the company’s business ecosystem.

For safeguarding customer data and ensuring data integrity, the company has selected Symantec Endpoint Protection (SEP) and has implemented whole disk encryption for its PCs and Notebooks.

Monday, July 22, 2013

Standing atop the elevated floors – reporting the state of data center (Part 1)

On June 13, 2013, Telegraph reported that the Facebook's Lulea data center is averaging a PUE of 1.07 at which time when others only manage an average of 2.0.

PUE stands for ‘Power Usage Efficiency’; it is a standard for the data center industry and is measured as the output of ‘Total Facility Power’ divides by ‘IT Equipment Power’. The ideal PUE score is 1.0 and it implies that every unit of power supply is fully utilized to power IT equipments in the data center; a score of 2.0 means that the powering of IT equipments is two times inefficient.

As the matter of fact, the state of the art data center is located at Lulea, Sweden within the Arctic Circle and is powered by hydro-energy. All technology is based on Open Compute Project designs and this explains the score of 1.07; it is highly efficient in terms of green power consumption.

The unbearable heat…

Green power consumption is the biggest debate of the industry at current time. On June 2013, Google published a blog post about a study, conducted by Berkeley Lab who found that by migrating all U.S. office workers to the cloud could save up to 87 percent of IT energy use—about 23 billion kilowatt-hours of electricity annually, or enough to power the city of Los Angeles for a year.

The savings are associated with shifting people in the workforce to Internet-based applications like email, word processing and customer relationship software.

What’s more staggering is the fact that 33 units of energy consumed at the point of use require 100 units of primary energy (the coal required to supply that energy unit).

Saturday, July 20, 2013

Computer Security Updates Week 3 of July 2013

Refer to Computer Security Updates Week 2 of July 2013; the biggest news was that according to ESET Blog, the Lloyds Survey found that cyber threats are now the third biggest worry for CEOs.

For this week / last week, here are / were the biggest news.
  • Symantec: Google Glass still vulnerable to WiFi hijacking despite QR Photobombing Patch.
  • The high cost of a security breach: averages $649,000.
  • Sophos: US retains spamming crown, Belarus inches toward the top spot.
  • ESET Blog: “Black swan” warning as cybercrime hits half of world stock exchanges.
  • Hitachi Sunway Information Systems (HSIS) partners with e-Lock.
  • Oracle issues 89 security fixes.
  • HP helps enterprises use big data to protect critical information, mitigate risk.
  • VADS teams with Barracuda Networks to provide Managed WAF.
  • Reuters: Microsoft asks U.S. to let it disclose security requests.
  • Trend Micro: File infector EXPIRO hits US, steals FTP credentials.
  • Oracle: IT Security still not protecting the right assets despite increased spending.

Friday, July 19, 2013

ICT Happening Updates Week 3 of July 2013

The most significant news for week 2 of July 2013 was MIMOS and Africa City of Technology, Sudan sealed partnership with A MOA.

For this week / last week, here are / were the biggest news.
  • Evernote releases new features - annotation, short-cut and announcement.
  • Zalora launches Android shopping app.
  • Bosch Software Innovations introduces software suite in APAC.
  • Iskandar to host Global APOS Summit for the first time - 21–24 October 2013.
  • ASOS to launch new E-Commerce Business in China with hybris.
  • Apple unveils Logic Pro X.
  • Oracle Exalytics X3-4 powers real-time analytical Insights.
  • Microsoft settles 3,265 software piracy cases in US and abroad.
  • SAS No. 4 among best workplaces in Europe.

Wednesday, July 17, 2013

VADS teams with Barracuda Networks to provide Managed WAF

KUALA LUMPUR, Malaysia, 16 July 2013 – Barracuda Networks Inc., today announces that it is partnering with leading Malaysian managed IT and business process outsourcing (BPO) service provider VADS Berhad (VADS), to offer the VADS Managed Web Application Firewall (MWAF) for small to large businesses as protection against cyber threats.

Ahmad Azhar Yahya, the Chief Executive Officer of VADS said, “MWAF is an essential addition to VADS’ managed security services portfolio as data protection has never been so important with more attacks coming in from web applications such as DDoS attacks, SQL injection, cross-site scripting, cookie tampering and directory traversal attacks. The MWAF firewall is positioned in the customer’s internet gateway with 24x7 surveillance monitoring and is managed by VADS’ Security Operations Centre (SOC).

Customers will be able to choose between three packages; MWAF Starter (1 web application), MWAF Standard (3 web applications) and MWAF Premium (5 web applications) that can be deployed both on-premise and cloud-based. ). All three packages are offered on a three-year contract basis. MWAF helps customers meet the compliance mandate of PCI DSS and ISO27001.

Muslim Pro: Faithfully By Your Side

Kuala Lumpur- Jul 17, 2013 – In today's fast-changing world in which many people lead a more hectic lifestyle, it would be very handy for smartphone users to have an application that allows them to stay committed to their belief despite their busy work schedule. Muslim Pro is a comprehensive Islamic mobile application providing accurate prayer times based on the user’s location, worldwide Qibla directions, an integration with popular location based application Foursquare to find Halal restaurants or Mosques and a convenient way to read and learn the Quran. It is available for iOS and Android as well as on the web for prayer times and Qibla directions.

To date, the Muslim Pro mobile app has been downloaded over 5 million times, especially from Muslim countries with high and growing smartphone penetration such as Saudi Arabia, the United Emirates, Indonesia, Malaysia, Turkey and Morocco as well as countries with large Muslim communities such as France, the United Kingdom, the United States or Singapore.

Monday, July 15, 2013

Cybercrime Exposed: Cybercrime-as-a-Service

by Raj Samani (VP and chief technology officer for McAfee, EMEA)

While we have seen a surge of cybercrime attacks in the past few months, McAfee has new details on why we are seeing a huge rise in the number of for-hire or “as-a-service” attacks.

In the paper Cybercrime Exposed by Raj Samani, Vice President and CTO of McAfee EMEA, McAfee exposes the shift that has placed cybercrime in the hands of everyday people.

Today’s cybercriminal doesn’t need to be extremely tech-savvy or even require technical equipment to carry out an attack. There is a new underground marketplace that is selling cybercrime as-a-service, and making any type of online attack available for the masses.

In effect, the as-a-service underground marketplace is industrializing and enabling cybercrime for the masses.

Computer Security Updates Week 2 of July 2013

Refer to Computer Security Updates Week 5 of June 2013; the biggest news was the announcement by U.S NSA that 54 plots had been foiled thanks to eavesdropping activities by the security agency.

Also, on July 1, 2013, Malaysian domains were compromised by hacker Tiger-m@te, allegedly Bangladeshi origin whose team members consist of hacker aliases: kinG oF coNTrol:Barbaros-DZ:FORTYS3V3N:aBu.HaliL501:W7sH.SyRiA:h311 c0d3:m1I05:j0:l0c@lh0st:Ne0-h4ck3r - supposedly social-politically motivated. Malaysian authority performed formal investigation on the incident but so far, nothing was announced yet.

For this week / last week, here are / were the biggest news.
  • ESET Blog - Lloyds Survey: Cyber Threats are now the third biggest worry for CEOs.
  • CloudFlare: Staying on top of TLS attacks.
  • Sophos Mobile Control newest release supports Windows Phone 8
  • Trend Micro Deep Security 9: Protection for Virtual and Cloud Data Centres in APAC.
  • Versatile Threats: Dangers Posed to any Device.
  • Symantec: Android Vulnerability Allows App Hijacking.
  • Reuters: Hackers in four-year effort to steal South Korea military secrets.
  • Trend Micro Blog: Ubisoft reported compromised attempts

Saturday, July 13, 2013

ICT Happening Updates Week 2 of July 2013

The most significant news for week 1 of July 2013 was Oracle launched multi tenant and cloud nature database 12c.

For this week / last week, here are / were the biggest news.
  • Oracle launches 3rd Gen Enterprise Manager 12c to extend Cloud Computing leadership.
  • HP announces Winners of Ultra Ink Advantage “EGG-Citing Promotion”.
  • Vinod Kumar named CEO of the Year Asia Communications Awards.
  • Brother introduces new monochrome laser series For SOHO and SMB.
  • Maplin to sell first 3D printer for use in the home.
  • PIKOM and CommTechAsia Jointly Organize the Country’s Largest ICT Event.
  • Brocade takes top honor in Networking Category at Computerworld Hong Kong Awards 2013.
  • Cooliris expands internationally with partnerships with Evernote, China’s Tencent and Russia’s Yandex.
  • MIMOS and Africa City of Technology, Sudan Seals Partnership with A MOA.
  • Tata Comm. launches world’s first cloud-based broadcast-quality video transcoding and delivery service.
  • HTC Desire 600 Dual SIM Boosts the Acclaimed Desire Series.

Friday, July 12, 2013

EMC Elevates Data Protection Strategy With Sweeping Array of New Products

In today’s dynamic business environment, data is a key differentiator when it comes to long and short term decision making and business efficiencies. Despite this, more than half (52%) of businesses surveyed across Asia Pacific and Japan only review backup and recovery plans after a disaster strike. By this time, businesses have already lost 484GB of data, experienced 2 business days of downtime and lost an average of 32,000 man hours in the year.

The sheer growth of data, combined with evolving data protection technology have resulted in organizations falling into the chaos of an “accidental architecture”.

Stressing on the need for a robust protection storage architecture and a single, consolidated platform for effective data management, EMC launched a full range of capabilities that deliver 4x performance, 10x scalability with enhanced Data Protection Suite and deeper storage and virtualization integration.

Thursday, July 11, 2013

Tata Communications launches Jamvee

London & Mumbai – July 9th 2013 – Tata Communications today unveils jamvee ̶ a multi-device compatible, on-demand video conferencing service, delivered through the company’s fibre optic cable ring around the world.

Unlike existing over-the-top solutions that rely on the Internet to connect users with their video bridges, jamvee is built on Tata Communications’ Tier 1 network, ensuring maximum reach globally and reliability, and crisp, hassle-free video meetings.

Bringing together laptops, tablets, smartphones and telepresence suites, the cloud-based jamvee service makes video conferencing as easy as audio conferencing for today’s mobile, international workforce, both within and across organisations.

Tuesday, July 02, 2013

ICT Happening Updates Week 1 of July 2013

The most significant news for week 5 of June 2013 was nothing.

For this week / last week, here are / were the biggest news.
  • Oracle offers next level of Database-to-Storage performance to support new launched Oracle Database 12c.
  • Malaysia as vital R&D Hub for Exact’s cloud portfolio.
  • Daramalan College deploys Brocade Ethernet Fabric technology to deliver a more robust student experience.
  • WeChat exceeds 70 million registered user accounts milestone.
  • Oracle launches multi tenant and cloud nature database 12c.
  • Peter Tyroller takes over responsibility for Bosch in Asia Pacific.
  • Silver Peak offers Cloud Acceleration via SaaS.
  • Award-Winning New Pal Online Arrives in Malaysia.
  • IBM harnesses power of Big Data to improve Dutch flood control and water management systems.
  • Intel CMS simplifies digital advertising across multiple retail devices.

Monday, July 01, 2013 Hacked !!!

Computer Security Updates Week 5 of June 2013 and 2013 Q2 Review

Refer to Computer Security Updates Week 4 of June 2013; two companies announced DDoS solution over past weeks - started by Juniper and then by Barracuda which announced DDoS solution for its Barracuda Firewall.

First of all, let's go back to review what had emerged out of 2013 Q1 review in terms of computer security where DDoS attack of SpamsHaus was the biggest news.

On week 4 of June 2013, Reuters reported that Facebook admitted year-long data breach exposed 6 million users; Reuters reported that Cyber Cover on the rise in U.S market.

On week 3 of June 2013, Juniper announced the-only DDoS solution for data centers. It is based on Junos DDoS Secure which can be deployed as a hardware appliance or as a virtual machine (VM) in private, public, or hybrid cloud environments. It works by continually monitoring and logging all in-and out-bound Web traffic: blacklisting bad traffics.

Reuters reported that Internet big boys deny granting servers access for U.S Government.

On week 5 of May 2013, McAfee introduced Endpoint Security Suites with hardware-assisted capability;Twitter beefed up security with two-factor security system.

On week 4 of May 2013, Bit9 produces a game-changing enterprise security solution: Bit9 Connector;a result of integration between FireEye and Palo Alto with malware alerts and Bit9's next-gen endpoint and server security.

On week 3 of May 2013, Reuters reported one of the biggest ever bank heists cyber crime: a global cyber crime ring stole $45 million from two Middle Eastern banks by hacking into credit card processing firms and withdrawing money from ATMs in 27 countries.

On week 2 of May 2013, Reuters reported Pentagon cleared Samsung, BlackBerry devices to adopt multi-vendor environment; 2013 Verizon Data Breach Investigations Report (DBIR) found that the vast majority of attacks were motivated either by gathering information (espionage – corporate or state sponsored), or stealing money.

On week 5 of Apr 2013, Sophos reported that suspect in the massive Spamhaus DDoS attack arrested in Spain;Reuters reported that LivingSocial cyber attack affects millions of customers.

On week 3 of Apr 2013, Oracle to release 128 security patches, hundreds of products affected;McAfee delivered enterprise class security to the cloud.

On week 2 of Apr 2013, Microsoft Issued 9 fixes covering a total of 14 vulnerabilities;Samsung Galaxy Mobile Devices to deploy Absolute's MDM;Sophos published free AV for Mac via Facebook Markeplace.

On week 1 of Apr 2013, Kaspersky Security Scan detected active infections on computers protected by other vendors.

The trends and news which emerged from Q2 2013 for computer security carry themselves a few common themes.
  • More solutions for DDoS attack emerged. Previously not available because counter-DDoS measures would be most effectively carried out at the network level or data center level; while most security solution vendors are software based. Two networking-based companies Juniper Networks and Barracuda Networks had since announced solutions for DDoS.
  • Many Internet-based services such as Twitter and Evernote beefed up security with multi-factor authentication.
  • The business world is losing its patience over cyber security issues. Experts are calling for software vendors to be held accountable for security loopholes such as zero-day vulnerabilities; cyber cover is seen as a rising trend for the enterprise insurance business in the U.S; and companies like Microsoft is offering rewards to recruit the tools and talents to improve security resiliency of its products.
  • Reuters reported a report originally by Washington Post report that claimed to have information pertaining to the fact where U.S. National Security Agency and the FBI are "tapping directly into the central servers of nine leading U.S. Internet companies" through a secret program known as PRISM.
  • Based on Q1 2013 review, two trends are brought forward to Q2. 1.) Mobile trends such as BYOD serves as catalyst for growth in security vulnerability; 2.) Security companies introduced proactive approach for security solution - with Intelligent security features.
  • Besides proactive approach, security vendors opine that to counter cyber-attacks effectively, collaborative efforts between communities, governments and vendors will yield the upper hand over the bad-guys - it is also costs effective.

For this week / last week, here are / were the biggest news.
  • 80% believe Cyber-Attacks Pose a Greater National Threat than Physical Attacks.
  • U.S' NSA foiled 54 plots, thanks to eavesdropping.
  • BlackBerry announces enterprise security solution for iOS and Android that separates work and personal apps and data.
  • CloudSec 2013 Highlights.
  • Symantec: Facebook Privacy Leak.
  • Symantec: Four Years of DarkSeoul Cyberattacks against South Korea continued.
  • Symantec: FakeAV holds Android devices for ransom.
  • Kaspersky Lab: 37.3 million users experienced phishing attacks in 2012.