Quantcast
Channel: IT-Sideways - technology social media
Viewing all 1706 articles
Browse latest View live

ICT Happening Updates Week 4 of Sep 2013

$
0
0
The most significant news for Week 2 of Sep 2013 was the announcement of iPhone Series - iPhone 5C and 5S.

For this week / last week, here are / were the biggest news.
  • The Telegraph : BlackBerry agrees to sale for $4.7 bn
  • O'Briens, HTC Malaysia, Moola and 12FLY Join the WeChat Family!
  • HTC Malaysia Celebrates HTC Day!
  • I-PMart Lifestyle Link: The All-in-one Card Link to your modern lifestyle
  • Download, print out and program your own robots by May 2014!
  • The Evernote repackages itself for the Apple Family, with Evernote for iOS7 and Presentation Mode
  • SEEBURGER partners BPM Consulting to penetrate into Singapore, Sri Lanka and India markets.
  • P1 celebrates 5th Anniversary with truly unlimited broadband plans.
  • BlackBerry introduces the New BlackBerry Z30 Smartphone with 5” Display and BlackBerry 10.2 OS.
  • Brocade revises New Brocade VCS Fabric and launches New Brocade Vyatta 5600 vRouter
  • Online retail giant kalahari.com speeds up market expansion with hybris.
  • Kamcord announces beta solution for Android
  • Oracle launches In-Memory cost management application for Oracle E-Business Suite.
  • Tata Comm. and PCCW Global bring Voice over IPX and HD voice to mobile operators worldwide.
  • Oracle Eloqua AppCloud now integrated into the Eloqua Topliners Community.


Sep 24, 2013 -The Telegraph : BlackBerry agrees to sale for $4.7 bn

I've READfrom; The Telegraph,no-follow,http://www.telegraph.co.uk/finance/newsbysector/mediatechnologyandtelecoms/electronics/10329331/BlackBerry-provisionally-agrees-to-4.7bn-sale.html; that BlackBerry has agreed to a planned acquisition by Toronto-based Fairfax Financial.

In the article, it mentioned that Fairfax intended to capitalize on Blackberry's stronghold legacy on the enterprise market segment.

Sep 23, 2013 - O'Briens, HTC Malaysia, Moola and 12FLY Join the WeChat Family!

I've been INFORMED by PR Firm that WeChat – the world’s leading innovative mobile social communication application, has announced a new addition among its Official Accounts in Malaysia – O’Briens Irish Sandwich Café. Known for their freshly made-to-order hand-cut sandwiches, the lifestyle chain café offers subscribers an exclusive deal: all WeChat users are now entitled to 30% off O’Briens a la carte items at participating outlets. To enjoy your favourite sandwiches for less, just add WeChat ID: ObriensMalaysia or scan the QR code provided in the WeChat Angel in-app announcement.

Media Contact:

Carol Teoh
T. +603 7494 0292
F. +603 7494 0403
M. +6019 346 5090
E. carol@rootsasia.com

Kuala Lumpur, 21 September 2013 – HTC Malaysia Celebrates HTC Day

I've been INFORMED by PR Firm that HTC Malaysia officially launched HTC Day at the HTC concept kiosk located at The Gardens Mall, to celebrate the milestones achieved and 17 years of pioneering innovation the company has brought through its smartphones. SK Wong, Country Manager of HTC Malaysia, Sirpa Ikola, Senior Marketing Director for HTC South Asia and the HTC Malaysia team were present at the concept store to meet and greet customers. HTC Malaysia also introduced the HTC Switch program as well as a new customer service procedure in support of the Here’s to Change campaign rolled out recently.


A few initiatives were announced: HTC Switch Program,Brand New Customer Service,HTC One X Trade-in Program.

Original reference.

Media contact:

Cherry Ong
HTC Malaysia Sdn Bhd
Email: cherry_ong@htc.com
Office: (03) 6201 6433, ext 113

Kuala Lumpur, 21 September 2013: I-PMart Lifestyle Link: The All-in-one Card Link to your modern lifestyle

I've been INFORMED by PR Firm that i-Pmart Lifestyle Sdn Bhd, a lifestyle promotion and events company and a member of i-Pmart Group of Companies, has launched their i-Pmart Lifestyle Link, an all-in-one lifestyle card that offers Touch ’n Go payment, insurance protection, hospitalization income, discounts, redemptions, and many more benefits.

The i-Pmart Lifestyle Link is not a loyalty card per se, but it is meant to retain customers. It is a Touch n Go card with bundled insurance protection.

Celebrities Kim Low, Josiah Glenn Mizumaki, Gabriella Robinson, and Isaac Ong, together with Mr Mart Tang, Chief Executive Officer of i-Pmart Group of Companies were present to officiate the event.

Recognizing that most consumers today would require to own at least one Touch n Go card - since many don't already have one yet - i-Pmart Lifestyle sees this as an opportunity to bring to consumers - particularly their existing customers - a lifestyle Touch n Go card as a complementary product - Card holders can also enjoy 3rd-piece price immediately and all year-round on all products listed in www.ipmart.com.my.

For as low as only RM11.50 per month or RM138 per year, consumers instantly enjoy up to RM30,000 group personal accident insurance and RM60 hospitalization income per day up to 30 days, RM10 pre-loaded Touch ’n Go credit value, and RM188 worth of welcome gifts, cash vouchers and discount vouchers.

From now until 31 October 2013 get your i-Pmart Lifestyle Link for only RM99 at the following locations or at their website at www.ipmart-lifestyle.com.

Original reference.

Media Contact:

Rita Cruz
Tel: 03-78.800.800
Hp: 012-9207421
Email: ritacruz@pixaruscommunications.com

21 Sep 2013 - Download, print out and program your own robots by May 2014

I've READ from; AllThingsD,no-follow,http://allthingsd.com/20130921/intel-futurist-shows-how-youll-download-and-program-your-own-robot-next-year/; about Intel's futurist Brian David Johnson showcased an open source robot assembled from parts fabricated on a 3-D printer.

The robots can be programmed as easily as setting up a smart-phone. Intel plans to sell it as a hobby-kit for something less than USD 1000 by May 2014.


Sep 20, 2013 - The Evernote repackages itself for the Apple Family, with Evernote for iOS7 and Presentation Mode

I've been INFORMED by PR Firm that Following in the footsteps of the largest redesign in Apple’s iOS history, Evernote has revamped itself in a stylish new package for the Apple family Evernote for iOS 7, as well as the new Presentation Mode feature in Evernote for Mac.

The new home screen is now a clean workspace made just for workaholics on the go. In a glance, you will be able to see your shortcuts, recently visited notes, notebooks, tags, as well as a tab at the bottom of the screen to make a quick note. The tags section is beautifully redesigned to create a gradient of colours, with the more popular tags showing up in a darker shade of green, making it easy to differentiate.

Evernote for iOS 7 makes working on the go easier than before. Share notes easily with the new Airdrop option, which lets you send notes to your colleagues or friends as long as they have Airdrop enabled near you. You also no longer have to wait to sync notes, since your notes will also be synced at all times, even if your app is not active.

That is not the only update the Apple family gets. Evernote for Mac 5.3 comes with a brand new view option – Presentation Mode. This is great for meetings in small groups, as it presents your notes on the big screen in a simple but concise manner.

Media contact lianghwei@preciouscomms.com/ +65 3151 4760.

KUALA LUMPUR/SINGAPORE, 20 September 2013–SEEBURGER Partners BPM Consulting to Penetrate into Singapore, Sri Lanka and India markets

I've been INFORMED by PR Firm that SEEBURGER, a global leading business integration and enterprise class Managed File Transfer (MFT) solutions provider, today announces its strategic alliance with Singapore-based BPM Consulting Pte. Ltd. (‘BPM Consulting’) to offer secured B2B communication and file transfer solutions in Singapore, Sri Lanka and India.

James Hatcher, Regional Director of SEEBURGER Asia Pacific says, “Leveraging Malaysia as the heart of its business operation in Asia, SEEBURGER continues to actively seek synergistic partners to drive our business growth in this region.”

“Partnering with BPM Consulting allows SEEBURGER to tap into their existing SAP-based customer base where SEEBURGER fills the gap and SAP market demand for MFT solutions to secure their B2B communications.”

Original reference.

Media contact:

Judy Wong
Pi PR Consultancy Sdn Bhd
Tel: +603-7724 1710/ +60126224688
judywong@pipr.com.my


Petaling Jaya - Sep 19, 2013 - Keep Playing with No Limits

I've been INFORMED by P1-MarComm that to celebrate its 5th Anniversary, Packet One Networks (Malaysia) Sdn Bhd (P1) invites all Malaysians to keep playing without limits by launching a special unlimited quota promotion for two of its award-winning wireless home broadband plans.

The ForHomeTM 99 and 149 offers a speed up to 1Mbps and 2Mbps with unlimited quota for the affordable prices of just RM99 and RM149 respectively for a limited time only.

P1 CEO, CC Puan said, “The campaign theme ‘Keep Playing. With No Limits’ alludes to all the fun that can be had online when consumers do not have to worry about data limit.” At the same time, Puan said it is an open invitation to all Malaysians to keep playing in life – whether online of offline, which is the P1 rule for making life joyful, interesting and fulfilling.

Original reference.

Media contact:

Alvin Phey, Consumer Marketing
Phone: +603 74508509
Mobile: +6012 3335700
Email: alvin.phey@packet-1.com

K.L - September 19, 2013 - BlackBerry Introduces the New BlackBerry Z30 Smartphone with 5” Display and BlackBerry 10.2 OS

I've been INFORMED by PR firm that BlackBerry® recently launched the all new BlackBerry® Z30 smartphone in Malaysia. Featuring BlackBerry® 10 OS version 10.2, the new all-touch BlackBerry Z30 smartphone is designed to keep you hyper connected, productive and always in control, and lets you share like you’re there and collaborate with ease.

Models, along with Deborah Priya Henry, Mr. Annamalai Muthu, Mr. Adrian Faull, and Mr. Damian Tay with the all new BlackBerry Z30 at the launch.

The BlackBerry Z30 will be available through Celcom on October 5, 2013 and will retail at the price of RM1,998. Celcom will have exclusivity for the first 14 days, after which the BlackBerry Z30 smartphone will also be available from other authorized partners from October 19.

Longer Battery Life – The BlackBerry Z30 smartphone includes a 2880 mAh battery, the largest battery ever built into a BlackBerry smartphone. Combined with the battery enhancements in BlackBerry 10 OS version 10.2, you can get up to 25 hours of mixed use* to keep you moving from dawn ‘til dawn.

Original reference.

Media Contact:

Text100 Malaysia
Jessica Kan / Christyn Anysha
+603-2282 2152
jessica.kan@text100.com.my / christyn.paul@text100.com.my

KUALA LUMPUR - Sep 19, 2013 - Brocade revises New Brocade VCS Fabric and launches New Brocade Vyatta 5600 vRouter

I've been INFORMED by PR firm that new VCS fabric capabilities that provide native multitenancy, storage-aware networking and 100 Gigabit Ethernet (GbE) performance for the most demanding data center environments. Brocade has also unveiled the industry’s most complete, end-to-end blueprint for delivering scalable data center multitenancy, from the server to the WAN.

Brocade® Vyatta® 5600 vRouter is the latest addition to the company’s NFV product portfolio and brings with it an impressive performance boost. As the first virtual router for telco-class networks, the Brocade Vyatta 5600 is up to 40 times faster than competitive virtual routing products.

The latest network-centric x86 servers deliver outstanding packet processing capabilities and are increasingly populated with 10 GbE Network Interface Cards (NICs) to accommodate data traffic growth. The Brocade Vyatta 5600 enables telcos and large service providers to harness this extremely cost-efficient networking power by leveraging software instead of deploying traditional purpose-built hardware.

Original reference 1 and reference 2.

BROCADE MEDIA CONTACT

Brocade APAC Corp Communications
Wendy Lang
Tel: +65 6317 2464
wlang@brocade.com


PR AGENCY CONTACT

David Gibson
Inter.asia communications
m.+(6)012 612 1425
david@inter-asia.biz

Singapore - Sep 19, 2013 - Online Retail Giant kalahari.com Speeds Up Market Expansion With hybris

I've been INFORMED by PR firm that kalahari.com, South Africa’s largest online retailer, has selected the hybris Commerce Suite to power its retail vision forward, strengthen its position as an innovative market leader, and fast-track market growth selling both digital and physical goods via its online stores and marketplaces.

A 2013 survey of online shopping habits by MasterCard Worldwide reveals online retail in South Africa is growing by more than 30 percent annually. As Africa’s leading online retailer of electronics, toys, appliances, games and books, Kalahari.com will leverage the hybris Commerce Suite to respond to growth opportunities and further extend its market share in the fast growing Southern African commerce market.

Providing a true omni-channel experience, the scalability of the hybris Commerce platform will enable kalahari.com to support its rapidly expanding online operations, which include consumer-to-consumer (C2C) and business-to-consumer (B2C) retail, and deliver a feature-rich experience to a growing number of mobile shoppers. This will include selling digital goods such as eBooks, via kalahari.com’s own e-reader device the Gobii, and a large expansion of its online catalog of digital and physical goods. According to a recent survey published by kalahari.com, mobile shopping in South Africa is being fuelled by the uptake of tablet devices, with 70 percent of tablet owners now using their devices to shop online .

Original reference.

Media contact:

Edward Lim
PR Consultant
For hybris
Tel: (65) 6545-5645

San Francisco, Sep 19, 2013 - Kamcord announces beta solution for Android

I've been INFORMED by Kamcord that that they are releasing an android solution that lets game developers embed the same pioneering gameplay recording technology into their Android games.

With more than 140 million downloads across over 20 games on the Apple App Store and Google Play Store, Robert Szeleney, CEO of Djinnworks, expressed great enthusiasm about Djinnworks’Android users finally having the same depth of experience as their iOS users.

In June 2012, Kamcord was the first to release a gameplay recording solution on iOS and today, a little over a year later, they are once again the first to do so for Android. Game developers can sign up for the beta at no-follow,http://kamcord.com/android

Original reference.

Media contact:

Aditya Rathnambr> adi@kamcord.com

Kuala Lumpur, September 18, 2013 – Oracle Launches In-Memory Cost Management Application for Oracle E-Business Suite

I've been INFORMED by PR firm that Oracle today unveils a new suite of Oracle In-Memory Cost Management for the Oracle E-Business Suite to help organizations meet strategic cost management objectives.

Expanding Oracle’s cost management solutions, Oracle In-Memory Cost Management enables organizations to quickly view, analyze and visualize the impact of cost changes. Users now can perform complex what-if simulations on cost data and visualize its impact to inventory valuations and profit margins.

Original reference.

Media contact:

Judy Wong
Pi PR Consultancy Sdn Bhd
+60377241710/+60126224688
judywong@pipr.com.my

Mumbai & Hong Kong – Sep 12th 2013 – Tata Comm. and PCCW Global bring Voice over IPX and HD voice to mobile operators worldwide

I've been INFORMED by PR firm that Tata Communications, a leading provider of A New World of Communications, and PCCW Global, an operating division of HKT, Hong Kong’s premier telecommunications service provider, have signed an agreement to interconnect their IPX (IP-Exchange) communities. This will enable IP communications services such as HD voice and HD video in various global markets. As 4G adoption continues to gather pace, this agreement further expands the global community of interconnected mobile network operators (MNOs) who will be able to capitalise on the latest technology innovations in mobile broadband.

With the deployment of 4G and upgrades of 3G networks, next generation mobile IP communications services such as HD Voice are gaining traction. A recent GSA report noted that the number of mobile operators now providing HD voice service is up 84 per cent in comparison to last year, with 83 mobile networks having launched HD Voice in 61 countries. By tapping into the worldwide networks of Tata Communications and PCCW Global, MNOs in emerging markets will be able to expand their IPX reach and Quality of Service (QoS) while delivering a seamless experience for mobile users of all IP-based communications services.

Original reference.

Media contact:

Joanne Lee
Senior Executive
joanne.lee@hkstrategies.com
D : +65 6390 3315
M : +65 9725 2379
F : +65 6339 2738

KUALA LUMPUR, 13 September 2013 – Oracle Eloqua AppCloud Now Integrated into the Eloqua Topliners Community

I've been INFORMED by PR firm that Oracle today announces the Oracle Eloqua AppCloud is now available via the Eloqua Topliners community for organizations to expand and enrich their sales and marketing efforts.

As the largest community for modern marketers, Topliners currently has nearly 11,000 registered users and has grown by more than 66 percent over the last year. With over 100 applications, the Eloqua AppCloud is a hub for a growing number of marketing applications that help organizations expand and enrich their sales and marketing efforts.

Over 90% of Eloqua customers use at least one app from the Eloqua AppCloud, demonstrating the value that Eloqua’s customers experience by being able to integrate apps directly into their campaigns. These applications provided added functionality and flexibility that is an essential element of modern marketing.

By integrating the Eloqua AppCloud with Topliners, Eloqua is able to improve the customer experience and deliver enhanced functionality such as enabling customers to easily share, comment and follow apps and to receive updates on enhancements and new offerings.

Original reference.

According to Wikipedia;Eloqua Corp.,no-follow,http://en.wikipedia.org/wiki/Eloqua; is a marketing automation SaaS company which develops automated marketing and demand generation software and services for business-to-business marketers. The company has been described as a pioneer and industry leader in lead generation services. By Dec 2013, it was acquired by Oracle.

Topliner community can be seen as social media and collaboration app that is now sat on top of the Eloqua AppCloud.

Media contact:

Judy Wong
Pi PR Consultancy Sdn Bhd
+60377241710/+60126224688
judywong@pipr.com.my

UPSI Launches First PSYCHOMETRICS PROFILING for student assessment

$
0
0
Press Release - KUALA LUMPUR, 24 SEPTEMBER 2013

Universiti Pendidikan Sultan Idris (UPSI) in Tanjung Malim, Perak recently launched UPSI Pscychometrics; a project developed in collaboration with MIMOS to be used in educational institutions to better assess students as well as academic staff.

The Psychometrics Cluster at MIMOS is instrumental is promoting and practising psychometrics in Malaysia and has the expertise in the fundamentals and applications of psychometrics theories and techniques as well as psychometric-related technologies for educational as well as psychological testing in Malaysia.

UPSI Psychometrics launched by Datuk Dr Abu Bakar Mohamad Diah, MOSTI Deputy Minister. Looking on is Dr Haniza Yon, Head of MIMOS Psychometrics Cluster.



The modules are:
  • The Aptitude Test for University (AT4U) identifies students’ potential thus enhances their learning based on their ability and can also identify the best candidates for placement purposes into programmes offered by the university.
  • The Proficiency in ICT (ProfIT) measure competencies of individuals in using various ICT applications for placement purposes. It can identify individuals’ strengths and weaknesses in ICT competencies and assists learning institutions in evaluation and benchmarking of their ICT programmes.
  • The Computer-assisted English Language Test (CaELT) serves as a placement test into programmes based on students’ strengths and weaknesses in English language. This will enable scaffolding to weak students and at the same time provide insights into their future English capability.
  • The Ujian Nilai BITARA helps in professional development and selection of academic staff to ensure that academicians’ values are align with institution’s vision and mission.
Original Reference.

Media contact:

Tina Melan
(03) 8995 5246 or 012-340 1108
tina.suryani@mimos.my

Computer Security Updates Week 4 of Sep 2013 and 2013 Q3 Review

$
0
0
Refer to Computer Security Updates Week 2 of Sep 2013; the biggest news was the news reported by Reuters that the U.S tapped into networks of Google, Petrobras, others; first ever case of mobile Trojan spreading via ‘alien’ botnets discovered.

On Week 1 of Sep 2013, New York Times, Twitter hacked by Syrian group; USA Today reported that NSA performed exercise which used supercomputers to crack Web encryption.

On Week 5 of Aug 2013, Yahoo reported that China to probe big IT firms after Snowden leaks.

On Week 3 of Aug 2013, Reuters reported that U.S house of rep rejected bid to curb spy agency data collection.

On week 3 of July 2013, Oracle issued 89 security fixes.

On July 1, 2013, Malaysian .com.my domains were compromised by hacker Tiger-m@te, allegedly Bangladeshi origin

The trends and news which emerged from Q3 2013 for computer security carry themselves a few common themes.
  • Software makers to be made responsible for security bugs - the industry seems to be moving towards this direction and this is bad news for software makers.
  • The NSA, Snowden, PRISM, cyber-espionage related news help people to understand the cyber security landscape better.  
  • and the biggest Internet players were taken to tasks with personal data protection. 
  • DDoS attacks stopped.
  • Based on Q1 2013 and Q2 2013 review, two trends are brought forward to Q3. 1.) Mobile trends such as BYOD serves as catalyst for growth in security vulnerability; 2.) Security companies introduced proactive approach for security solution - with Intelligent security features - Verizon DBIR 2013 confirms that 71% of breaches targeted user devices than servers.
  • Even though enterprise security vendors are banking on proactive approach with enhanced intelligent, however not much APTs recorded - Verizon DBIR 2013 confirms that only 25% of breaches are APTs related while others are opportunistic and 78% graded as less sophisticated.
  • and what was worst is that despite 78% being graded as less sophisticated attacks, 66% took months to be discovered and 69% of those (discovered are) by external parties.
  • Parallel with 2012 and predictions for 2013, zero-day exploits are still popular and Android malwares continue to grow.

Some interesting facts to note:
  • Facebook said no to Putrajaya’s request for details on 197 users.
  • The high cost of a security breach: averages $649,000.
  • Cybercrime costs the global economy between $100 billion and $500 billion annually.
  • Lloyds survey found that cyber threats are now the third biggest worry for CEOs.
  • F-Secure: The most used exploits kits in the world is BLACKHOLE.
  • F-Secure: CVE-2011-3402 is among the most targeted vulnerabilities in the world.
  • F-Secure: Worm: W32/Downadup (also known as Conficker) is the most detected threat in Malaysia.

For this week / last week, here are / were the biggest news.
  • The Bank of Fakes – almost a third of users have received bogus bank emails.
  • Secure Identity Alliance welcomes three new members.
  • Symantec successfully sinkholes significant part of the massive ZeroAccess Botnet
  • AccessData Announces Interoperability with HP ArcSight to Deliver Accelerated Incident Response to Security Threats.
  • CyberArk unveils Master Policy.
  • Verizon: 2013 Data Breach Investigation Reports (DBIR).
  • Kaspersky Lab exposes “Icefog” APT: a new cyber-espionage campaign focusing on supply chain attack.
  • AccessData: Broken cyber security model insufficient against APTs.
  • ECSB strengthens security portfolio through new partnership with Barracuda.
  • American Express Malaysia phishing site is discovered. today@http://www.americanexpress.com.my/ --> please DO NOT visit!
  • Cellebrite presents Mobile Forensics trends for year 2014.
  • F-Secure’s Latest Threat Report: nearly 60% of F-Secure’s top ten detections in the H1 2013 were exploits.
  • Microsoft has published a security advisory on vulnerability in IE.
  • Kaspersky: more than 1/3 malware attacks costs users money.
  • Reuters: Hackers offered cash to crack iPhone's fingerprint security.
  • Symantec: Hidden Lynx, pioneers of 'watering hole', professional for hire.
  • Mcafee: Lily Collins the most dangerous cyber celebrity of 2013, Rain emerges as Asian equivalent.
  • Reuters: Iran unblocks Facebook and Twitter access
  • Kaspersky Lab Brings its Best Security Technologies Together
  • AccessData partners with Contego Solutions to Fortify Digital Forensics Capabilities of Middle East Enterprises.
  • Bouygues Telecom Secures Critical Business Systems with CyberArk Solutions.
  • Reuters: Hacker steals two million Vodafone data.



Oct 2, 2013 - The Bank of Fakes – almost a third of users have received bogus bank emails

According to the Kaspersky Consumer Security Risks survey carried out by B2B International with Kaspersky Lab in Summer 2013, approximately 30% of users have received bogus emails claiming to come from banks. The fraudsters often use fake notifications from banks in order to trick users into handing over account credentials and giving away access to their money.

Although many experienced and cautious users probably recognize most phishing attempts, these attacks often end in success: about 4% of respondents reported that they had lost money to cybercriminals. Statistically, 4% is a relatively small figure, but when so many users are attacked each year, even a small success rate translates into big money.

4% of 1 billion Internet users is a lot of people.

Original reference.

wenjia gan
+603.8075.6000
wenjia.gan@aboutcom.com.my

Oct 1, 2013 - Secure Identity Alliance welcomes three new members

I've been INFORMED by PR firm that The Secure Identity Alliance today welcomes three new members to its ranks, marking an important step in growth of the newly formed organization.
  • HID Global, a leading provider of secure identity solutions, will play a crucial role in establishing the Alliance as the foremost advisor on the security and adoption of eGovernment services around the world.
  • American Banknote Corporation (ABnote) brings its long and global experience in the supply of secure documents, services and systems.
  • Backed by a 150 year heritage, Trüb AG brings a wealth of e-ID and e-Passport experience to the Alliance’s workgroup program.
Led by leading secure eDocuments companies Gemalto, Morpho (Safran), Oberthur Technologies and 3M, the Secure Identity Alliance was established in May 2013 to develop the usage of government-issued eDocuments (identity, health cards, driving licenses and ePassports in particular) for increased security, and to encourage deployment of secure convenient online services strengthening the privacy of the end-users. Already, two workgroups have been launched to tackle the ongoing security, identity and privacy challenges governments face.The ‘Secure Documents’ and ‘Digital Identity’ groups are expected to report back at Cartes in November 2013.

Original reference.

Media contact:

Stéphanie de Labriolle
Marketing & Communication Consultant
Secure Identity Alliance
M: +33 6 85 91 19 94
stephanie.delabriolle@secureidentityalliance.org

Oct 1, 2013 - Symantec Successfully Sinkholes Significant Part of the Massive ZeroAccess Botnet

I've been INFORMED by PR firm that today Symantec announces it has successfully sinkholed a significant part of the ZeroAccess botnet, which has been active since 2011 and is one of the largest known botnets in existence – with upwards of 1.9 million infected computers, generating tens of millions of dollars annually.
  • Symantec has sinkholed more than half a million bots – making a serious dent to the number of bots under the attacker’ control. Symantec is actively working with ISPs and CERTs worldwide to help get infected machines cleaned up.
  • ZeroAccess botnet is sophisticated and resilient – ZeroAccess has a highly technical and sophisticated infrastructure – it uses a peer-to-peer architecture giving the botnet a high degree of redundancy with no central command and control server. It also uses various advanced methods to survive on infected machines.
  • ZeroAccess leverages click-fraud and Bitcoin mining to carry out two revenue generating activities – potentially earning tens of millions of USD per year in the process.

Media contact:

Alvin Kiang
Tel: (+60-3) 2287-8689 ext.226
Mobile: 017-6877001
Fax: (+60-3) 2287-0234
alvin.kiang@edelman.com


LINDON, UT/SINGAPORE – Oct 1, 2013 - AccessData Announces Interoperability with HP ArcSight to Deliver Accelerated Incident Response to Security Threats

I've been INFORMED by PR firm that AccessData announced a new solution that operates with the HP ArcSight platform which is designed to deliver accelerated incident response to security threats.

This new solution allows bi-directional communication between AccessData’s Cyber Intelligence & Response Technology (CIRT) platform with the HP ArcSight Security Information and Event Management (SIEM) platform.

More importantly, it answers the critical need for more streamlined and holistic incident response and faster response times in the face of advanced persistent threats (APTs), sophisticated hacking attacks, and constantly evolving malware.

CIRT extends the functionality of the HP ArcSight SIEM platform by providing three key functions:
  • Delivers holistic rapid response by integrating the critical capabilities required for comprehensive root cause analysis
  • Enables real-time collaboration among all security and response teams
  • Provides automated batch remediation; so, organizations are able to eradicate threats, not just contain them
Original reference.

Media contact:

PRecious Communications for AccessData
Lars Voedisch
+65-91702470
lars@preciouscomms.com


Oct 1, 2013 - CyberArk Unveils Master Policy

I've been INFORMED that CyberArk today announced the availability of Master Policy, a bold new ‘policy engine’ that enables customers to set, manage and monitor privileged account security in a single, simple, native language interface. The once complex process of transforming business policy and procedures into technical settings is now easily manageable and understandable to an organization’s stakeholders, including security operations, risk officers and auditors.

Master Policy is embedded at the core of all of CyberArk’s privileged account security products, providing simplified, unified and unequaled policy management. The release is available in version 8.0 of CyberArk’s privileged account security solution released today and will ship with all new installations of CyberArk’s Privileged Identity Management (PIM) and Privileged Session Management (PSM) suites.

Original reference.

Media contact:

Tony Tan
Siren, Part of Havas Worldwide
Tel: +65 6317-6709
E-mail: tony@siren-communication.com


Sep 29, 2013 - Verizon : 2013 Data Breach Investigation Reports (DBIR)

I've READ from; Verizon,no-follow,http://www.verizonenterprise.com/DBIR/2013/; 2013 Data Breach Investigation Reports (DBIR) and was enlightened by its findings, facts with overlapping high percentages:
  • 37% of breaches - affected financial orgs- expected
  • 92% of breaches - comes from external threats- expected
  • 40% of breaches - incorporated Malware- expected
  • 52% of breaches - used some form of Hacking - expected
  • 76% of breaches - exploited weak or stolen credentials
  • 71% of breaches - driven by financial motives - expected
  • 71% of breaches - targeted user devices - revelation
  • 54% of breaches - compromised servers - expected
  • 75% of breaches - are considered opportunistic attacks - means that only 25% are APTs - revelation
  • 78% of breaches - rated as low difficulty - revelation
  • 69% of breaches - discovered by external parties - revelation
  • 66% of breaches - tooks months to discover - revelation

Sep 26, 2013 -Kaspersky Lab exposes “Icefog” APT: a new cyber-espionage campaign focusing on supply chain attacks

I've been INFORMED by PR Firm that aspersky Lab’s security research team today published a new research paper on the discovery of “Icefog”, a small yet energetic APT group that focuses on targets in South Korea and Japan, hitting the supply chain for Western companies. The operation started in 2011 and has increased in size and scope over the last few years.

Based on the profiles of identified targets, the attackers appear to have an interest in the following sectors: military, shipbuilding and maritime operations, computer and software development, research companies, telecom operators, satellite operators, mass media and television.

During the operation, the attackers use the “Icefog” backdoor set (also known as “Fucobha”). Kaspersky Lab has identified versions of Icefog for both Microsoft Windows and Mac OS X - It is C&C-powered.

This discovery also identified the ‘hit and run’ nature of the Icefog attacks demonstrate a new emerging trend: smaller hit-and-run gangs that go after information with surgical precision.

Original reference.

Media contact:

nabila yahya
+603.8075.6000
nabila.yahya@aboutcom.com.my

Sep 26, 2013 - AccessData: Broken cyber security model insufficient against APTs

I've been INFORMED by PR Firm that according to Vice President of Cyber Security for AccessData, Jason Mical, responses from the organizations surveyed for the recently-released 2013 Verizon Data Breach Investigations Report (DBIR) validate what most refuse to discuss in detail: we are attempting to secure private industry and national assets relying on a broken cyber security model.

According to the DBIR, 66% of the reported breaches took months to discover and 69% of those were actually discovered by a third party.

Mical quoted that traditional cyber security infrastructure is riddled with blind spots because they offers not much visibility option.

Media Contacts:

AccessData
Nicole Reid
+44 (0)20 7010 7802
nreid@accessdata.com


KUALA LUMPUR, Sep 26 2013 – ECSB Strengthens Security Portfolio through New Partnership with Barracuda

I've been INFORMED by PR firm that ECS ICT Berhad today announced that its wholly-owned subsidiary ECS Pericomp Sdn Bhd has been appointed as the authorised distributor in Malaysia for Barracuda Networks Inc., one of the global leaders in security and storage solutions.

Benny Lim the Southeast Asia Director for Barracuda Networks and Foo Sen Chin, Managing Director of ECS ICT Bhd (ECSB) officially mark their partnership announcement with a handshake.

ECSB will be distributing the full range of Barracuda’s suite of security and storage solutions such as WAF, Load Balancer, Message Archiver, web filters, Spam and Virus Firewall for customers in Malaysia.

Original article.

Media contact:

Visithra Manikam
PiPR Consultancy Sdn Bhd
+603-77241719/ +6012-2661679
visithra@pipr.com.my


Sep 24, 2013 - American Express Malaysia phishing site is discovered today@http://www.americanexpress.com.my/

The real American Express Malaysia site is; no-follow,http://www.americanexpress.com/malaysia/homepage.shtml. The phishing site which I discovered through my email is using the URL of http://www.americanexpress.com.my/. --> Please DO NOT visit!!!!

By and large, the registration of .com.my is scrutinized by MyNic.

From emailThe phishing site - please do not visit and login


Malaysia, Sep 24, 2013 - Cellebrite Presents Mobile Forensics trends for year 2014

I've been INFORMED by PR Firm that Cellebrite, who officially commenced their operations in SEA with an office in Singapore in July this year, has announced a list of top trends in mobile forensics that will shape in the next 12 months. The predictions were obtained from a number of prominent experts within law enforcement and industry analysts who are familiar with mobile forensics and the products used available today.

The trends are:
  • Smarter phones mean tougher encryption.
  • Investigators can’t put all their eggs into one mobile operating system.
  • Windows 8 is the wildcard.
  • Mobile devices advance as witnesses.
  • The regulatory and legislative landscape remains uncertain.
  • Mobile malware’s incidence will rise.
  • Data breaches via mobile will rise.
Original reference.

Media Contact:

Bevan Chen
T +65 6338 1006
F +65 6336 9567
bevan.chen@priorityconsultants.com

Sep 24, 2013 - F-Secure’s Latest Threat Report: nearly 60% of F-Secure’s top ten detections in the H1 2013 were exploits.

I've been INFORMED by PR Firm that according to F-Secure’s new Threat Report H1 2013, being published today, nearly 60% of F-Secure’s top ten detections in the first half of 2013 were exploits.

Hence, exploits, particularly Java-based zero-day exploits characterized first half of 2013.

358 new families and variants of Android malware were discovered by F-Secure Labs in H1, nearly doubling the total number the Labs has ever discovered to 793. Symbian followed with 16 new families and variants. No new families or variants were discovered other mobile platforms - hence, Android malware leads the pack.

For instance, the Stels Android trojan has mutated over 1,300 times since its discovery in Nov 2012. As quoted from the report, it is a trojan that can turn an infected device into a bot that becomes part of a larget botnet, and it can act as a banking trojan that steals mobile Transaction Authentication Numbers or the so-called TAC code.

According to the full report, the APT landscape hasn't changed much since 2012, politically motivated and targets the English speaking world as majority.

F-Secure's latest threat report has done a good job. It summarizes the following additional facts pertaining to threats landscape from Jan 2013 to Sep 2013.

  • The most used exploits kits in the world is BLACKHOLE.
  • CVE-2011-3402 is among the most targeted vulnerabilities in the world.
  • Worm: W32/Downadup (also known as Conficker) is the most detected threat in Malaysia.

Another interesting take from the report is about the emergence of new virtual currency - crypto currency - also known as Bitcoin has attracted attention of the cyber-security world; for both vendors and hackers.

As quoted from the report, Bitcoin is not linked to any existing currency; therefore, tis value is purely based on how much people believe it is worth.

The first batch of Bitcoin malware successfully manipulated the system by rewarding malware authors with coins, such process is known as mining.

By late of June 2013, DIY Bitcoin mining tool were made available in an undergound market: Ufasoft Bitcoin miner.

Original reference and full report.

Media contact:

Winx Loo
Tel : 603 7710 3288
Fax : 603 7710 3289
Mobile : 6012 913 2460
winx.gocomm@gmail.com

Sep 23, 2013 - Microsoft has published a Security Advisory on Vulnerability in IE

I've READ from; Palo Alto,no-follow,http://researchcenter.paloaltonetworks.com/2013/09/coverage-information-for-microsoft-security-advisory-2887505-internet-explorer-0-day-vulnerability/; that Microsoft has published a Security Advisory on Vulnerability in IE which could allow remote code execution.

CVE-2013-3893,no-follow,https://technet.microsoft.com/en-us/security/advisory/2887505

The severity of this vulnerability is rated: critical.

Sep 19, 2013 - Kaspersky : more than 1/3 malware attacks costs users money

I've been INFORMED by PR Firm that Mmalware attacks mean financial losses for about 36% of users – with many people forced to pay to restore damaged devices to working order. This figure emerged from the summer 2013 global survey conducted by B2B International and Kaspersky Lab.

17% of respondents said that these costs involved paying for third party expertise to restore the victim’s device to working order. About 10% had to pay to recover lost data, while 9% had to replace damaged components and 5% needed an entirely new device.

Original reference.

Media contact:

nabila yahya
+603.8075.6000
nabila.yahya@aboutcom.com.my

Sep 19, 2013 - Reuters: Hackers offered cash to crack iPhone's fingerprint security

I've READ from; Reuters,no-follow,http://www.reuters.com/article/2013/09/19/us-iphone-hackers-idUSBRE98I10I20130919; that a micro venture capital firm and a group of security researchers had offerred $13,000 plus other incentives to attract hackers to break the fingerprint security.

The news reported that Apple should welcome this move as a fault-tolerance test towards the product.

SANTA CLARA /SG - Sep 17, 2013 - Mcafee: Lily Collins the most dangerous cyber celebrity of 2013, Rain emerges as Asian equivalent

I've been INFORMED by PR Firm that English-born TV and movie actress Lily Collins, star of the current motion picture The Mortal Instruments: City of Bones, has replaced Emma Watson as McAfee’s 2013 Most Dangerous Cyber Celebrity.

For Asia, online searches on South Korean celebrity Rain are found to be most risky and Kylie Minogue topping the list as Australia’s Most Dangerious Celebrity.

With the report now in its seventh year, McAfee researched pop culture celebrities to find out who are the riskiest on the web and result in bad links, including viruses, malware, and sites laden with malicious software designed to steal passwords and personal information. Lily is joined at the top by pop music star Avril Lavigne and Oscar-winner Sandra Bullock, who came in as numbers two and three, respectively. Jon Hamm is the only “mad” man to crack the global top ten.

Original reference.

Media contact:

Lars Voedisch
PRecious Communications for McAfee
+65 - 91702470
lars@preciouscomms.com


Sep 17, 2013 - Symantec: Hidden Lynx, pioneers of 'watering hole', professional for hire

I've READ from; Symantec, no-follow,http://www.symantec.com/connect/blogs/hidden-lynx-professional-hackers-hire; who discovered that the professional Hidden Lynx group are found to have utilized both Moudoor and Naid trojan.

Most notably noted for the VOHO campaign was ultimately targeting US defense contractors whose systems were protected by Bit9’s trust-based protection software. And later, targeted Bit9's core and successfully breached it.

Bit9 issued a; counter-claimed,no-follow,https://blog.bit9.com/2013/09/20/a-few-thoughts-about-a-symantec-report/; that the report by Symantec is biased and inaccurate. Bit9 reported that the victims pointed out by Symantec are the wrong people - they are not those from critical infrastructure companies nor defense contractors.

Sep 16, 2013 - Reuters: Iran unblocks Facebook and Twitter access

I've READ from; Reuters, no-follow, http://www.reuters.com/article/2013/09/17/net-us-facebook-twitter-unblocked-idUSBRE98G02720130917; that for the first time since 2009, Facebook and Twitter became accessible to Iranian for the first time since 2009.

Sep 13, 2013 -Kaspersky Lab Brings its Best Security Technologies Together

I've been INFORMED that Kaspersky Lab announces the global availability of Kaspersky Internet Security – Multi-Device, a new security product that provides premium protection for the world’s most commonly-used devices.

Now, instead of purchasing several products to protect a portfolio of smart devices, Kaspersky Internet Security – Multi-Device gives users a way to secure their Internet activity across multiple computers and mobile devices, all through a single purchase.

Original reference.

Media contact:

nabila yahya
+603.8075.6000
nabila.yahya@aboutcom.com.my

DUBAI, United Arab Emirates / Singapore - Sep 12, 2013 - AccessData Partners with Contego Solutions to Fortify Digital Forensics Capabilities of Middle East Enterprises

I've been INFORMED by PR Firm that AccessData, through distribution partner ARM, has signed a partnership agreement in the Middle East with Contego Solutions, an Incident Response and Digital Forensics specialist firm.

The partnership will enable Contego Solutions to incorporate AccessData’s market leading technology, including its Cyber Intelligence & Response Technology (CIRT), Forensic Toolkit® (FTK®), AD Lab and Mobile Phone Examiner Plus™ (MPE+™) solutions, in the design and deployment of digital forensics laboratories of regional enterprises.

Contego Solutions will offer AccessData's entire products portfolio including the standalone FTK and MPE+ for small to medium size labs and ‘AcessData Lab’ for large labs handling massive data sets, utilizing a distributed workforce, or looking to collaborate with attorneys, HR personnel or other non-forensic parties.

Original reference.

Media contact:

Melody Espanol
Office +65-3151-4760
Phone +65-9754-9744
melody@preciouscomms.com


Singapore - Sep 12, 2013 - Bouygues Telecom Secures Critical Business Systems with CyberArk Solutions

I've been INFORMED by PR Firm that CyberArk has been selected by Bouygues Telecom – one of the largest communications service providers in France – to protect the company’s critical assets and customer data through the management of its privileged credentials.

The implementation of CyberArk’s Privileged Identity Management (PIM) and Privileged Session Management (PSM) suites have replaced two pre-existing custom-built systems – including a repository in which internal privileged passwords were previously stored.

Original reference.

Media contact:

Tony Tan or Pradnyesh Kothare
Siren, Part of Havas Worldwide
Tel: +65 6317-6709
E-mail: tony@siren-communication.com
pradnyesh.kothare@havaswwsiren.com

Sep 12, 2013 - Reuters: Hacker steals two million Vodafone data

I've READ from; Reuters,no-follow,http://www.reuters.com/article/2013/09/12/us-vodafone-germany-idUSBRE98B0MI20130912; that a hacker has stolen the database of two million Vodafone Germany customers.

Nevertheless, it was reported that no passwords have been obtained in the process.

ICT Happening Updates Week 1 of Oct 2013

$
0
0
The most significant news for Week 4 of Sep 2013 was the The Telegraph reported that BlackBerry agreed to sale for $4.7 bn.

For this week / last week, here are / were the biggest news.
  • Pizza Hut Singapore deploys predictive consumer behavioural intelligence.
  • Brocade and EMC Work Together to enable Software-Defined Storage for EMC Fibre Channel SAN Install Base.
  • AMD Selects Sapphire as Exclusive Global Distribution Partner for AMD Firepro.
  • First-Ever YouTube music awards@3-Nov-2013 !!
  • Arkadin becomes an official provider of Tata Comm.’ jamvee™ video service.
  • WD new MyBook line offers up to 4TB of Storage and auto backup with Dropbox.
  • Evernote Conference 3 (EC3) took place in San Francisco
  • Oracle advanced its vision of the “Future of Work” during Oracle OpenWorld 2013.
  • SG Govt to spur VC initiatives.
  • Tata Comm. trials next generation video distribution with Formula 1.
  • Cisco delivers network convergence system to power "Internet of Everything"
  • IBM announces US $17 Million investment in new cloud datacenter
  • Adobe delivers standardized audience metrics for digital publishing industry.



Oct 3, 2013 - Pizza Hut Singapore Deploys predictive consumer behavioural intelligence

I've been INFORMED by PR firm that Capillary Technologies, a leading provider of cloud software solutions that help businesses to engage intelligently with customers through mobile, social and in-store channels, today announced that its Multi-Channel Intelligent Customer Engagement™ solutions are helping Pizza Hut Singapore improve profitability and increase store sales. Pizza Hut is the world's largest pizza chain with over 12,500 restaurants across 91 countries. In Singapore, the brand serves over 1.1 million households defined by unique tastes, behaviours and consumption habits.
  • 200 per cent jump in average campaign hit rates across customer segments
  • 38 per cent improvement in Pizza Hut’s customer retention rate
  • 9 per cent increase in customer visit/purchase frequency in just seven months
  • Up to 6 per cent extra sales generated every month since the programme was started

Original reference.

Media contact:

Tony Tan / Pradnyesh Kothare
Havas Worldwide Siren for Capillary Technologies
+65 6317-6709
tony@siren-communication.com
pradnyesh.kothare@havaswwsiren.com


Oct 2, 2013 - Brocade and EMC Work Together to Enable Software-Defined Storage for EMC Fibre Channel SAN Install Base

I've been INFORMED by PR firm that Brocade today announced that the company’s storage area networking (SAN) management technology is now available for more than 50,000 joint EMC and Brocade customers to immediately realize the virtualization benefits of the EMC® ViPR™ Software-Defined Storage Platform within highly virtualized cloud environments.

EMC ViPR is the world’s first software-defined storage platform that is designed to provide the ability to manage both storage infrastructure (called the Control Plane) and the data stored within that infrastructure (called the Data Plane). It masks the complexity behind configuring and managing storage infrastructure, providing single point-and-click management for complex, heterogeneous storage functions.

Original reference.

Media contact:

Brocade APAC Corp Communications
Wendy Lang
Tel: +65 6317 2464
wlang@brocade.com


Oct 1, 2013 - AMD Selects Sapphire as Exclusive Global Distribution Partner for AMD Firepro

I've been INFORMED by PR firm that AMD today announced SAPPHIRE Technology as its exclusive global distribution partner for AMD FirePro™ professional graphics. An international supplier and leading manufacturer of innovative technologies, SAPPHIRE has successfully collaborated with AMD for more than a decade, managing AMD products in various markets and acting as an AMD FirePro professional graphics channel partner in Asia.

Original reference.

Media contact:

Suzanne Ngiow
AMD Malaysia
Email: Suzanne.Ngiow@amd.com


Oct 1, 2013 - First-Ever YouTube music awards@3-Nov-2013 !!

I've been INFORMED by PR firm that On Sunday, November 3rd, YouTube will host the first-ever YouTube Music Awards, a celebration of music honoring the artists and songs that YouTube fans have turned into global hits over the past year. Unlike traditional award shows, this event will present performances by Eminem, Lady Gaga and Arcade Fire alongside other top artists and some of YouTube’s biggest stars including Lindsey Stirling and CDZA.

The YouTube Music Awards will also feature musical events from Seoul, Moscow, London and Brazil, culminating in a live awards celebration at Pier 36 in New York City.

From Eminem breaking records with "Love the Way You Lie" to Arcade Fire’s innovative “Here Comes the Night Time” variety special and Lady Gaga reinventing the music video, established artists are connecting with hundreds of millions of people on YouTube who now define what the world is listening to. To celebrate this global music community, the YouTube Music Awards will be powered by the fans themselves.

Original reference.

Rene Leow
Emerald Communications
Mobile: +6017 - 883 0848
Email: reneleow@gmail.com


Sydney & Mumbai – Oct 1, 2013 - Arkadin becomes an official provider of Tata Communications’ jamvee™ video service

I've been INFORMED by PR firm that Tata Communications today announces an agreement with Arkadin, one of the world’s largest and fastest growing collaboration service providers. Arkadin becomes an official APAC provider of Tata Communications’ recently launched jamvee™ conferencing - an on-demand unified communication service which enables, for the first time, anyone, anywhere*, to instantly access a business video meeting on ANY device – be it desktop, laptop, tablet, smartphone, Telepresence or video conferencing rooms.

Connecting via video across multiple devices and platforms has never been easier. Delivered through the world’s only fibre optic cable ring around the globe, jamvee™ is a global video conferencing tool for enterprises that makes video conferencing - both within and between companies - as easy as making an audio conferencing call.

Anthony Bartolo, Senior Vice president, Unified Communications & Collaboration, Tata Communications says, “Our mission is to create the world’s richest open video ecosystem. The partnership with Arkadin enforces this strategy which will enable true unified communication for enterprises operating in today’s mobile, always-on and global environment. Using jamvee™ is as easy as making an audio conferencing call and together with Arkadin’s expertise in delivering collaboration services with dedicated local-language teams, we will enable more businesses to experience the benefit that true video collaboration brings.”

Original reference.

Media contact:

Divya Anand
Tata Communications
+91 8976 068777
divya,anand@tatacommunications.com

Oct 1, 2013 - WD New MyBook line offers up to 4TB of Storage and auto backup with Dropbox

I've been INFORMED by PR Firm that High resolution images, full HD videos and folders of documents – a typical collection of content found in an Average Joe’s peripheral storage device, and the need for greater storage capacity and secure back-up system are on the rise. With that in mind, WD, a Western Digital company, has redesigned its range of My Book offerings, with storage up to 4TB and data protection features, enabling users to store their favourite content and be assured that they are well-protected.

The new drives’ data protection features are perfect for backing up content collections. WD SmartWare™ Pro automatic back-up software with Dropbox™ integration offers cloud backup capabilities, and the WD Edition of Acronis® True Image™ enables users to execute a full system backup and securely delete digital files and programs.

Original reference.

Media contact:

Ethan Wong
T. +603 7494 0292
F. +603 7494 0403
M. +6016 904 4240
E. ethan.wong@rootsasia.com

Sep 30, 2013 - Evernote Conference 3 (EC3) took place in San Francisco

I've been INFORMED by PR Firm that during the conference, Evernote introduced of Evernote Market, and Evernote Business 2.0 plus key partnership announcements including collaboration with Salesforce.

The Evernote Market consists of apps from partners; Evernote Business enhances work place productivity through Knowledge Discovery Tools in Evernote Business 2.0.

Media contact:

Md Suhaile
Office: +65 3151 4760
Mobile: +65 9229 2771
Email: suhaile@preciouscomms.com


Sep 30, 2013 - Oracle Advanced its Vision of the “Future of Work” During Oracle OpenWorld 2013

I've been INFORMED by PR Firm that Oracle Corporation kicked off its annual conference, Oracle OpenWorld 2013, in San Francisco, US with tens of thousands of participants from across the country and around the world gathered for an intense five days of learning and networking sessions from 22 -26 September 2013.

During Oracle OpenWorld 2013, Oracle has showcased its Human Capital Management (HCM) vision and roadmap, investments in existing and newly acquired solutions, and how Oracle has addressed key trends in HCM including social, mobile, big data and cloud.

Mar HurdNew UI Team Talent with Predictive Analysis


New updates to Oracle HCM Cloud and Oracle Talent Management Cloud, which is now available in the Oracle Cloud as part of Release 7, will help organizations to attract, retain and reward talent in alignment with the business.

One of the key features is the ability to perform Streamlined Succession Planning: By connecting the talent review dashboard with succession plans and talent pools, HR benefits from a more holistic and robust view into talent.

Original reference.

Media contact:

Judy Wong
Pi PR Consultancy Sdn Bhd
+60377241710/+60126224688
judywong@pipr.com.my

e27 - Sep 26, 2013 - SG Govt to spur VC initiatives

I've READ from; e27,no-follow,http://e27.co/2013/09/26/singapore-to-coinvest-an-additional-s50m-with-vcs-to-spur-funding-landscape/; that the SG Govt will pump in S$50 million for venture capitalist activities, a strategy in hope that more other venture capitalist firms will follow suit; the fund will be managed by disbursed through the National Research Foundation’s (NRF) Early Stage Venture Funding Scheme.

According to the report, industry players see this move as a big money move, both implying that start-ups must be aware of the high valuation stake and that investors must be willing to put in a bigger sum.

The reason for the high valuation stake for all parties is due to the option which allows investor to buy back the shares from NRF at a fixed interest rates of 5% - in other words, this is a great deal for all parties and that the SG govt will absorb a considerable amount of risks involved - high demand rises up valuation.

In another development; e27,no-follow,http://e27.co/2013/09/27/tradehero-raises-us10m-from-kpcb-china-and-ipv-capital/; announced that MyHero Limited, a Singapore-based parent company behind mobile app TradeHero today announced its US$10 million Series A round with KPCB China and IPV Capital.

The question to ask now is that will SG going to contemplate becoming the Silicon Valley of ASIA ? It will have to meet a few challenges which include high costs of living and brain drain of the best talents to U.S.

And how can this trend benefits the start-ups from Malaysia ?

Sep 26, 2013 - Tata Comm. trials next generation video distribution with Formula 1

Tata Communications, a leading provider of A New World of Communications, has successfully showcased the next generation of capability for video distribution by relaying content from the 2013 FORMULA 1 SINGTEL SINGAPORE GRAND PRIX directly to Formula One Management’s Biggin Hill headquarters in the UK. The live video feed was sent using Tata Communications’ Video Connect service on its wholly-owned fibre network in what was Tata Communications’ first live video contribution demonstration for Formula One Management and a group of leading broadcasters.

The capability demonstration included the supply of JPEG 2000 quality video live from the race circuit as well as multiple programme feeds – all made possible due to the use of its fibre network and media management services.


Mehul Kapadia, Managing Director F1 Business, Tata Communications says, “When Tata Communications signed the deal to become the Official Connectivity Provider of Formula 1® last year we knew we were starting an exciting journey with the sport. This video capability demonstration was an important milestone as it allowed us to showcase our capabilities in the delivery of content of the highest quality video feeds over fibre, and give a glimpse into the potential future of sports broadcasting.”

Original reference.

Media contact:

Shruti Soni
Hill+Knowlton Strategies
+65 6390 3345
shruti.soni@hkstrategies.com

Sep 24, 2013 - Cisco Delivers Network Convergence System to Power "Internet of Everything"

I've READ from ; Cisco,no-follow,http://newsroom.cisco.com/release/1268183/Cisco-Delivers-Network-Convergence-System-to-Power-Internet-of-Everything; that they have introduced the Cisco® Network Convergence System (NCS), a network fabric family designed to serve as the foundation of a massively scalable, smarter and more adaptable Internet.

The system's programmability and virtualization capabilities enable service providers to accelerate the transition to software defined networking (SDN) and network function virtualization (NFV).


Sep 23, 2013 - IBM Announces US $17 Million Investment in New Cloud Datacenter

I've READ from; IBM,no-follow,http://www-03.ibm.com/press/us/en/pressrelease/42043.wss; that they announced it will invest US$ 17 million in a new data center located in Bogotá. The new center will provide Colombian companies with cloud computing and Big Data services, which will enable organizations to transform their business to meet the growing demands of the local and international markets and to offer flexible, high quality and personalized services for their customers. The new facility expands the US$8 million investment IBM made in Colombia when the company opened a datacenter in 2011.

Check out more articles on data centers.

Sep 16, 2013 - Adobe Delivers Standardized Audience Metrics for Digital Publishing Industry

I've READ from; Adobe,no-follow,http://www.adobe.com/aboutadobe/pressroom/pressreleases/201309/091613AdobeDeliversStandardizedAudienceMetrics.html; that today they announced new industry-standard audience metrics are available through Adobe® Digital Publishing Suite (DPS).

Through analytics included with DPS, Adobe now enables publishers to measure the total number of tablet readers per issue, total number of sessions per issue, average amount of time spent per reader per issue, and average number of sessions per reader per issue, pioneering a clear method to measure and report audience readership across digital magazine editions.

The Bolt-on Challenge: Closing Security Gaps Through an Integrated Security Architecture

$
0
0
By Ivan Wen, Country Manager Sourcefire Malaysia

As our IT environments have expanded to include networks, endpoints, mobile devices and virtual assets so have our security tools. Most organizations have ended up with a set of disparate technologies across these control points that were never designed to work together. The result: breaches happen. It’s a fact of life. As our protection methods improve and security effectiveness levels reach new heights, the bad guys are digging deeper and using advanced techniques and new attack vectors to circumvent existing protection methods. The integration done to date, if any, is typically one way – the visibility and analysis isn’t automatically correlated and translated into action so that we can contain and stop damage and prevent future attacks. And the data gathered is usually a snapshot in time, not continuously updated to monitor activity as it unfolds.

Ivan Wen, Country Manager, Sourcefire Malaysia

To complement integrated visibility and analysis we need integrated and automated controls and intelligence. And we can’t just focus on point in time data; we must remain continuously vigilant to combat today’s more sophisticated attack techniques. What happens in the case of malware that disguises itself as safe to evade detection and exhibits malicious behavior later? Or when indicators of compromise are imperceptible on their own and only point to an attack when distinct data points are correlated – such as an endpoint trying to access a database that it wouldn’t normally, while a system on the network attempts to communicate back to a known bad (blacklisted) IP address? Integration must address the full attack continuum, not just before an attack but also during and after, so that we can adapt our defenses and take action to protect our assets.

What’s needed is a tightly integrated enterprise security architecture. A 2012 survey by market research firm Enterprise Strategy Group found that 44% of enterprise security professionals believe that over the next 24 months their organizations are likely to design and build a more integrated enterprise security architecture to improve security controls with central policy management, monitoring and distributed policy enforcement.



An enterprise security architecture can provide continuous security – before, during, and after an attack. With security infrastructure based on the concept of awareness and using a foundation of visibility, we can aggregate data and events across the extended network. This evolves security from an exercise at a point in time to one of continual analysis and decision-making. With this real-time insight we can employ intelligent automation to enforce security policies across control points without manual intervention, even after a breach has occurred.

After an attack we need to mitigate the impact and prevent future similar attacks. With an infrastructure that can continuously gather and analyze data to create security intelligence we can, through automation, identify and correlate indicators of compromise, detect malware that is sophisticated enough to alter its behavior to avoid detection and then remediate. Compromises that would have gone undetected for weeks or months can be identified, scoped, contained and cleaned up rapidly. We can also move forward with more effective security by automatically updating protections and implementing integrated rules on the perimeter security gateway, within security appliances protecting internal networks, on endpoints and on mobile devices to detect and block the same attack.

As we look to the future, we know that our IT environments will continue to expand, spawning new attack vectors we have yet to imagine. An integrated security architecture provides a dynamic foundation so that security measures can remain continually effective and relevant in a changing world.

Attackers don’t discriminate. They’ll use every weapon at their disposal to accomplish their mission. As defenders we need to as well. With a powerful enterprise security architecture based on awareness and continuous capabilities we can close security gaps across the ever-extending network – before, during and after an attack.

Translate Your World Announces Voice Translation Software for Business

$
0
0
By Sue Reager, President

Translate Your World, developers of linguistic and mobile marketing technologies, announced today the release of its TYWI-Live (“tie-wee”), an online voice translation software for serious business use that turns conferences, business meetings, and webinars into a multi-language experience.

As people speak, their words are automatically translated into 78 languages at the same time. Attendees can choose to read the speech translation as subtitles or hear a translated synthesized voice, similar to Apple’s Siri. In addition to automated voice translation, TYWI-Live also enables online human simultaneous interpretation via the Web by interpreters located anywhere in the world.

TYWI-Live speech translation is compatible with desktop, laptop, tablet and smartphone and can be used in conjunction with most major presentation software including WebEx, GoToMeeting, Skype, Adobe Acrobat, Blackboard, and others.



With TYWI-Live speech translation:
  • Conferences stream live in dozens of languages
  • Teachers are able to teach around the world
  • Business meetings and webinars can be across-language
  • Trade show pitches display in several languages
  • Manufacturers present their products worldwide
  • Corporations train global employees
  • Hotels and airports can speak to travelers in their language
  • Captioning for the deaf is automatic
  • Announcers and sportscasters stream translated voice and subtitles
  • Reporters have a new tool for global interviews

The women at the helm of Translate Your World, CEO Andrea Busse, an industry expert in mobile technology development, and president Sue Reager, who speaks 10 languages and develops linguistic software, created the software suite to encourage companies and entrepreneurs to expand their business globally.

Says Sue Reager, “In the past the expression ‘global event’ has been used to mean ‘English only inviting other countries’ or French only, or German only. That approach included only 8% of the world’s population. With TYWI-Live, 78% of the world’s population can be reached, thus another potential 2.5 billion potential customers, listeners, attendees, and participants.”

BURSA MALAYSIA adopted Oracle RightNow CRM Cloud Service

$
0
0
Press release - Kuala Lumpur, 03 October 2013

Bursa Malaysia (previously known as Kuala Lumpur Stock Exchange, KLSE has implemented Oracle RightNow Cloud Service to improve its customer care and services as to record, track and escalate all inquiries and complaints. The deployment has helped Bursa Malaysia significantly reduced a large volume of basic inquiries, improved response time by 80%, slashed customer complaints by more than 70%, and cut staff costs by 40%.

Jimmy Cheah, Managing Director, Oracle Malaysia

Jimmy Cheah, managing director of Oracle Corporation Malaysia said, “Malaysian organizations need to move beyond their existing technology infrastructure and simplify it. Bursa Malaysia is leveraging cloud technologies to save costs, implement business solutions faster and importantly, serve its customers better. Bursa Malaysia is exemplifying the way forward for the financial services industry and Oracle is proud to be its technology partner."

Oracle RightNow is an enterprise CRM solution.

Original reference.

Media Contact:

Judy Wong
Pi PR Consultancy Sdn Bhd
+60377241710/+60126224688
judywong@pipr.com.my

T-SQL - 'Group By' Vs 'Distinct'

$
0
0
Just sharing, no big deal!

'Distinct' is the same as 'Group By'.

'Distinct' may achieve the same result as 'Group By' depending on the data.

1.) T-SQL_1:

SELECT cUserID,max(cDate),max(cDeviceID),max(cUsername) FROM Trans_Table
Group by cUserID
Order by cUserID


2.) T-SQL_2:

SELECT distinct(cUserID),max(cDate),max(cDeviceID),max(cUsername) FROM Trans_Table
Group by cUserID
Order by cUserID


T-SQL_1 and T-SQL_2 return the same result



3.) T-SQL_3:

SELECT distinct(cUserID),max(cDate),max(cDeviceID),max(cUsername) FROM Trans_Table
Group by cUserID,cDate
Order by cUserID


This is a valid t-sql, except that it actually will break the distinct selection of cUserID.

4.) T-SQL_4:

SELECT distinct(cUserID),cDate,cDeviceID,cUsername FROM Trans_Table
Order by cUserID


5.) T-SQL_5:

SELECT distinct(cUserID),min(cDate),min(cDeviceID),min(cUsername) FROM Trans_Table
Group by cUserID
Order by cUserID


T-SQL_4 and T-SQL_5 return same result.

T-SQL_4 and T-SQL_5 may return same result or may not depending on the data of cDate,cDeviceID,cUsername.

6.) T-SQL_6:

SELECT distinct(cUserID),min(cDate),min(cDeviceID),min(cUsername) FROM Trans_Table
Order by cUserID


This returns error message: Column 'TBL_Raw_Trans_201302.cUserID' is invalid in the select list because it is not contained in either an aggregate function or the GROUP BY clause.

It can only work if you change it to become T-SQL_5.

In other words, 'Group By' actually means 'Distinct'.

'Distinct' may achieve the same result as 'Group By' depending on the data.

'Distinct' will result in nested results for non-distinct selection (column).

In other words, 'Distinct' only performs 'Group By' for the column which is selected for 'Distinct'.

Case Study:

T-SQL_7_1 - Full table selection:

SELECT cUserID,cDate,cDeviceID,cUsername 
FROM Trans_Table
order by cUserID



T-SQL_7_2:

SELECT distinct(cUserID),cDate,cDeviceID,cUsername 
FROM Trans_Table
order by cUserID





In this scenario, T-SQL_7_1 returns the same result as T-SQL_7_2

T-SQL_7_3:

SELECT distinct(cUserID),min(cDate),min(cDeviceID),min(cUsername) 
FROM Trans_Table
Group by cUserID
Order by cUserID





T-SQL_7_4:

SELECT cUserID,min(cDate),min(cDeviceID),min(cUsername) 
FROM Trans_Table
Group by cUserID
Order by cUserID





T-SQL_7_3 is the same as T-SQL_7_4 - these two queries will always yield the same result irregardless of the data.

T-SQL_7_5:

SELECT distinct(cUserID),max(cDate),max(cDeviceID),max(cUsername) 
FROM Trans_Table
Group by cUserID
Order by cUserID


T-SQL_7_6:

SELECT cUserID,max(cDate),max(cDeviceID),max(cUsername) 
FROM Trans_Table
Group by cUserID
Order by cUserID


T-SQL_7_5 is the same as T-SQL_7_6 - these two queries will always yield the same result irregardless of the data.

In retrospect, the official usage of 'Distinct' defined by Microsoft is that it is meant to return a one-column table

that contains the distinct values from the specified column.

http://technet.microsoft.com/en-us/library/ee634943.aspx

Hence, how is distinct really useful in a multiple column selection scenario ?

It can be used to identify differences in columns' data.

Using the following query, we can identify that cUserID has 3 different associated data with respect to cDate.

SELECT distinct(cUserID),cDate,cDeviceID,cUsername 
FROM Trans_Table
order by cUserID

and with the following query, cUserID has 2 different associated data with respect to cDeviceID.

SELECT distinct(cUserID),cDeviceID,cUsername 
FROM Trans_Table
order by cUserID


In other words, if you really want to return a table with multi column selection, use 'Group By' instead of 'Distinct'.

Monitor data plan usage and check balance - Maxis

$
0
0
Dial *136*9#

Select '1 Check Status'.

Developers Updates Week 3 of Oct 2013

$
0
0
In the last updates series (Week 4 of July 2013), the most interesting update was Red Hat advanced OpenShift Enterprise with new release.

For this updates series, the followings had emerged.
  • CodeRage 8 – The online Delphi Developer Conference, October 15-17
  • Google announces HTML-5 web designing software.
  • HP provides open SDN SDK HP SDN App Store.
  • Google cloud developer challenge;November 21st: First round submissions due.
  • Valeo innovation challenge - for automotive innovation; phase 1:11-Sep-2013 to 14-Feb-2013.
  • AT&T Malaysia Hackathon.
  • Rockford Lhotka : .NET has an extended future.
  • AMD: World’s first real-time facial capture technology for the unity development platform.
  • Intel releases C++ compiler for Android.
  • IBM narrows Big Data skills gap by partnering with more than 1,000 global universities.
  • AMD's Never Settle Forever program
  • MySQL Workbench 6.0 increases productivity with new design and enhancements.
  • Code Project - A Coder Interview With DNN's David Rodriguez.
  • Dell announced new release of Toad for Oracle and redesigned Toad World community.



Oct 14, 2013 - CodeRage 8 – The online Delphi Developer Conference, October 15-17

I've READ from email that this totally free, totally technical, online conference brings you top industry speakers and technologists presenting on a wide variety of topics, all geared toward maximizing your software app development productivity.
  • Learn everything you need to know about Android and iOS mobile development
  • Boost your development skills with tips, tricks and processes for software development and management
  • Gain knowledge about optimizing use of Delphi and RAD Studio as you create great app
Oct 1, 2013 - Google announces HTML-5 Web Designing Software

I've READ from; Google,no-follow,https://www.google.com/webdesigner/; that the software tool, which works similarly to the likes of Adobe Dreaweaver, promises output to be compatible with desktop, tablet or mobile – without compatibility issues.

One cool feature is Full 3D authoring environment which allows creation of 3D contents based on CSS3.

Sep 30, 2013 - HP provides open SDN SDK HP SDN App Store

I've READ from;HP,no-follow,http://www8.hp.com/us/en/hp-news/press-release.html?id=1495044&pageTitle=HP-Open-Ecosystem-Breaks-Down-Barriers-to-Software-defined-Networking-#.UltRHidU10N; that HP today unveiled the industry’s first enterprise-class software-defined networking (SDN) open ecosystem with the HP SDN Developer Kit (SDK) and the HP SDN App Store, creating new business opportunities for partners, and providing a simple way for customers to purchase and deploy network services.

The HP SDN Developer Kit provides HP AllianceOne partners, as well as independent software developers, access to the tools necessary to develop, simulate and validate enterprise-grade SDN applications to sell on the HP SDN App Store

Sep 23, 2013 - Google Cloud Developer Challenge

I've been INFORMED by PR firm that the Google Cloud Developer Challenge encourages developers in Malaysia to create and submit a locally­-relevant application in one of two categories: 1) Enterprise, small business, education, and not for profit, or 2) Social, personal productivity, games and fun.

Get more details on http://www.google.com/events/gcdc2013/.

Key dates:
  • September 4th: Competition opens
  • November 21st: First round submissions due
  • December 5th: Semi-Finalists announced
  • January 5th: Updated Semi-Final Apps re-submitted
  • January 28th: Winners announced

Elizabeth Clark
Crimson
https://plus.google.com/114257635705152314382


Sep 11, 2013 - Valeo innovation challenge - for automotive innovation

I've been INFORMED by marcomm that Valeo is organizing an innovation challenge targeting engineering and technical students around the globe for the search of an innovative automotive equipment project; The 20 projects selected for the prototyping phase and will receive initial funding.

Valeo is an independent industrial Group fully focused on the design, production and sale of components, integrated systems and modules for the automotive industry, mainly for CO2 emissions reduction

Check out details at https://valeoinnovationchallenge.valeo.com/.

Sep 10, 2013 - AT&T Malaysia Hackathon

I've been INFORMED by PR firm that AT&T and the Malaysian Communications and Multimedia Commission (MCMC) recently organized the Malaysia Developers’ Day 2013.

The Malaysia Developers’ Day 2013, first in Asia-pacific for AT&T, was held at the Westin Hotel Kuala Lumpur on 7 September 2013 till 8 September 2013. This competition was an intensive 24-hour experience that delivers the tools, knowledge and expert support where participants need to form teams, generate ideas and efficiently build powerful apps within a very tight timeframe. Out of more than 200 creative individuals, comprising of developers, designers, students, marketing specialists and entrepreneurs who participated and competed against one another. Team Pillow came in first to bag the top prize money of USD 10,000.

AT & T Hackathon Participants

Amanda Yap
O:+603-2094-0760
F:+603-2094-4760
amanda.yap@fleishman.com


Rockford Lhotka - Oct 7, 2013 - .NET has an extended future

I've READ from;Rockford Lhotka,no-follow,http://www.lhotka.net/weblog/DoesNETHaveAFuture.aspx; the author opined that currently the market share for server side enterprise development platform splits between .NET and Java. Hence, it would be silly to think that these two development platform will run out of steam any time soon, even though it seems like Java has budged down to the weights of zero-day vulnerabilities while Microsoft's future on PC and operating system business seems to have gone into the Roulette wheel - the idea of realizing enterprise-level Javascript within the near future is really quite ludicrous per se.

Good for you .NET and Java developers, my guess is that if are able to keep up, you will have another 10 more years of extended career.

Aug 28, 2013 - AMD: World’s First Real-time Facial Capture Technology for the Unity Development Platform

I've READ from; AMD, no-follow,http://www.amd.com/us/press-releases/Pages/first-facial-capture-2013aug28.aspx; that AMD today announced its collaboration with Mixamo on the launch of Face Plus, an advanced real-time motion capture and 3D facial animation technology for the Unity game engine (v4.3).

Mixamo's Face Plus plug-in for Unity is designed to enable developers to capture their facial expressions through standard webcams and transfer them in real time onto a 3D character using technology powered by AMD A-Series APUs and GPUs1. This real-time capture and animation capability is made possible by offloading Mixamo’s innovative and complex algorithms from the CPU onto AMD’s industry-leading GPU technology.

Aug 27, 2013 - Intel Releases C++ Compiler for Android

I've READ from; Intel,no-follow,http://newsroom.intel.com/community/intel_newsroom/blog/2013/08/27/chip-shot-intel-releases-c-compiler-for-android; that today Intel released the Intel® C++ Compiler for Android* OS. Developers can use the compiler on Linux*-based systems to create apps for Android devices based on Intel processors, including the Intel® Atom™ processor. The Intel compiler is compatible with GNU C++ and developer tools in the Android Native Development Kit (NDK). App developers are encouraged to join the Intel compiler community. For a limited time, the compiler is available now as a free download.

Aug 14, 2013 - IBM Narrows Big Data Skills Gap By Partnering With More Than 1,000 Global Universities


I've READ from; IBM,no-follow,http://www-03.ibm.com/press/us/en/pressrelease/41733.wss; that IBM today announced that it has added nine new academic collaborations to its more than 1,000 partnerships with universities across the globe, focusing on Big Data and analytics.

These collaborations span a variety of majors - including business, marketing, mathematics and health services -- providing schools with access to IBM Big Data and analytics software, curriculum materials, case study projects, and IBM data scientists who visit classes as guest lecturers.

KL — 14 August, 2013 — AMD's Never Settle Forever Program

Press release; AMD announced the arrival of “Never Settle Forever,” the third edition of the award-winning “Never Settle” franchise of game bundles. The bundle underscores AMD’s serious commitment to the Unified Gaming Strategy and its broader philosophy of choice and openness.

Basically, how it works was, purchase a qualifying AMD Radeon™ HD 7000 Series GPUs, it will come with in-box coupon which entitles purchasing on a qualifying games at discounted price.

Original reference.

Suzanne Ngiow
AMD Malaysia
Email: Suzanne.Ngiow@amd.com

Aug 12, 2013 - MySQL Workbench 6.0 Increases Productivity with New Design and Enhancements

I've READ from; Oracle,no-follow,http://www.oracle.com/us/corporate/press/1988894?rssid=rss_ocom_pr; To help developers and administrators better manage these dynamic data environments, Oracle has released MySQL Workbench 6.0 with a redesigned user interface and new features that allow users to simplify MySQL database development, design and administration.

MySQL Workbench Community Edition is available free of charge under the GPL.

New features include Cascaded DELETE statement generator: automatically performs the tedious task of creating DELETE statements for deleting a row referenced by foreign keys.

Jul 17, 2013 - Code Project - A Coder Interview With DNN's David Rodriguez

DotNetNuke (DNN) has been a familiar term for me as a developer because it was during those days before the likes of Joomla and etc became de facto which we were experimenting with open source content management system particularly on Windows platform - open source project on Microsoft platform was usually rare even until today; the reason is Microsoft platform has often been regarded as enterprise and not-for-free.

Hence, years ago, DNN wasn't that great but it was known because demands were high.

From this article which I've READ from; code project,no-follow,http://www.codeproject.com/Articles/622382/A-Coder-Interview-With-DNNs-David-Rodriguez; I've learned that DNN has improved and is on Windows Azure now.

In a nutshell, DNN now offers some cool open source projects and products such as:

June 20, 2013 - Dell Announced New Release of Toad for Oracle and Redesigned Toad World community

I've READ from; Dell,no-follow,http://www.quest.com/news-release/dell-software-enables-connected-intelligence-with-new-release-o-062013-825170.aspx; that Dell Software now gives developers and DBAs a seamless connection to the Toad World user community with the release of Toad™ for Oracle® 12.0.

New features include Forum Window which provides access to the Toad World and Multi-schema compare.

Computer Security Updates Week 3 of Oct 2013

$
0
0
Refer to Computer Security Updates Week 4 of Sep 2013; the biggest news was the announcement that Symantec successfully 'sinkhole' the massive ZeroAccess Botnet.

For this week / last week, here are / were the biggest news.
  • 56% of users value the data stored on computer much more than device itself.
  • Another Hong Leong Bank phishing site discovered.
  • Kaspersky Internet Security 2014 successfully neutralised 100% threats during tests
  • ESET Blog: Governments hit by “shortage” of experts
  • Symantec: Phishers use Malware in fake Facebook app.
  • Prolexic protects OnCourse Systems' SaaS Applications against DDoS Attacks.
  • IDC: Barracuda as Content Security Appliance and Virtual Appliance Volume Leader
  • Reuters: Mobile security software maker Lookout raises $55 million
  • Cisco completes Acquisition of Sourcefire.
  • The Telegraph: GCHQ leaks have 'gifted' terrorists ability to attack 'at will', warns spy chief
  • Kaspersky provides updates for Android and iOS versions of Kaspersky Security for Mobile.
  • Trend Micro: Microsoft releases 8 security advisories.
  • Reuters: Microsoft awards hacking expert
  • Kaspersky prevails in legal fight against technology Patent Troll.
  • USA Today: Adobe loses 2.9 mil customer records, source code
  • McAfee delivers unprecedented situational awareness with enhanced SIEM Solution.
  • 2013 Norton Report: Cost per Cybercrime Victim Up 50%.
  • McAfee announces Find, Freeze and Fix Advanced Threat Defense Solution.
  • USA Today: Iran's cyberwar commander assassinated



Oct 16, 2013 - 56% of users value the data stored on computer much more than device itself

I've been INFORMED by PR firm that most computer users regard the data they have on their machines as more important than the computer itself. In a summer 2013 survey carried out by B2B International and Kaspersky Lab, 56% regarded their photos and documents are more precious than even expensive hardware. However, in the event of a malware attack, more than 50% of users found they were unable to recover all of their data.

Unfortunately, people often lose valuable information: according to our survey, one in five of malicious attacks ended with the loss of personal data. 61% of those users who were attacked were unable to recover all their data. For cybercriminals, personal data is a tradable commodity: they may steal valuable data and use it in further fraudulent schemes, for example, to manipulate the user’s online finances or to block his access to critical information and demand a ransom to get back online. The widespread use of mobile devices has aggravated the situation: each new personal smartphone or tablet gives the fraudsters an additional angle for attack.

Original reference.

wenjia gan
+603.8075.6000
wenjia.gan@aboutcom.com.my

Oct 16, 2013 - Another Hong Leong Bank phishing site discovered



A malicious email faking as Hong Leong Bank requesting users to logon to Hong Leong Bank web site for security information updates. The link leads to a phishing site@no-follow,http://informatica.biblioteca.umsa.bo/vistas/contador/best.php --> Do not click on it.

The genuine Hong Leong Bank Internet Banking web site is found@no-follow,http://www.hlb.com.my/eb/ebmain.jsp

Email message link to phishing siteHong Leong Bank Phishing Site

Oct 14, 2013 - Kaspersky Internet Security 2014 successfully neutralised 100% threats during tests

I've been INFORMED by PR firm that Kaspersky Lab’s flagship product for home users, Kaspersky Internet Security 2014, blocked 100% of Internet attacks during the independent Whole Product Dynamic Real-World Protection Test carried out by respected research laboratory AV-Comparatives.

During testing Kaspersky Internet Security 2014 successfully neutralised 100% of the threats it encountered. It was a result only two other products from the more than 20 leading protection solutions could match.

Original reference.

wenjia gan
+603.8075.6000
wenjia.gan@aboutcom.com.my


Oct 14, 2013 - ESET Blog: Governments hit by “shortage” of experts

I've READ from; ESET Blog,no-follow,http://www.welivesecurity.com/2013/10/14/cyber-warriors-your-country-needs-you-governments-hit-by-shortage-of-trained-defenders; that governments are facing shortage of cyber experts who are capable enough to tackle the issues with cyber security.

This opinion is largely based on the Joint Cyber Reserve program by U.S and U.K, which serves as catalyst for such trend.

According to the report, the program is recruiting 4,000 staff.

Oct 11, 2013 - Symantec: Phishers Use Malware in Fake Facebook App

I've been INFORMED by PR firm that phishers frequently introduce bogus applications to add new flavor into their phishing baits. Symantec has observed a scam where phishers were trying to steal login credentials, but their means of data theft wasn’t with the phishing bait alone. Their ploy also used malware for harvesting users’ confidential information. The phishing site spoofed the login page of Facebook and was hosted on a free web hosting site.

The phishing site boasted that the application would enable users to view a list of people who visited their profile page. The site offered two options to activate the fake app. If users fell victim to the phishing site by entering their login credentials, the phishers would have successfully stolen their information for identity theft purposes.

Original reference.

Alvin Kiang Tel: (+60-3) 2287-8689 ext.226
Mobile: 017-6877001
Fax: (+60-3) 2287-0234
alvin.kiang@edelman.com

Oct 10, 2013 - Prolexic Protects OnCourse Systems for Education and its SaaS Applications against DDoS Attacks

I've been INFORMED by Prolexic, the global leader in Distributed Denial of Service (DDoS) protection services, announced today that OnCourse Systems for Education (https://oncoursesystems.com), a provider of software-as-a-service (SaaS) K-12 applications, has selected its PLXproxy DDoS mitigation service. OnCourse applications are used by schools and school districts in 40 U.S. states, and its website has tens of thousands of visitors daily.

OnCourse engaged Prolexic after three denial of service attacks earlier this year. UDP floods hit the company’s website at 8 a.m. on weekdays just as the school day was getting underway for OnCourse’s school district customers. Approximately four hours of downtime resulted from each attack, affecting the availability of attendance tracking, grading, student information, discipline tracking, and other SaaS applications.

After two DDoS mitigation service providers failed to prevent and stop these attacks, the company engaged Prolexic’s emergency DDoS mitigation service. The cyber attackers abandoned their efforts as soon as they detected OnCourse was routing traffic through Prolexic’s 1.5 Tbps cloud-based DDoS mitigation platform. OnCourse has not come under a DDoS attack since becoming a Prolexic client.

Original reference.

Michael E. Donner
SVP, Chief Marketing Officer
media@prolexic.com
+1 (954) 620 6017

Oct 10, 2013 - IDC: Barracuda as Content Security Appliance and Virtual Appliance Volume Leader

I've been INFORMED that Barracuda has been named the content security appliance and virtual appliance volume leader as reported by IDC in its Worldwide Quarterly Security Appliance Tracker, Q2, September 2013.

According to the report, Barracuda leads the market in content security appliance and virtual appliance units with a 14 percent market share. This marks the 11th consecutive quarter that Barracuda has maintained market leadership in the content security appliance and virtual appliance markets by volume according to the IDC Tracker.

Original reference.

Visithra
012-2661679
visithra@pipr.com.my


Oct 10, 2013 - Reuters: Mobile security software maker Lookout raises $55 million

I've READ from; Reuters,no-follow,http://www.reuters.com/article/2013/10/10/us-lookout-funding-idUSBRE99911Q20131010; that Lookout raised $55 million from Deutsche Telekom AG.

Other investors include Qualcomm Inc's venture capital arm, Greylock Partners and Mithril Capital Management.

Current investors are Accel Partners, Andreessen Horowitz, Index Ventures, and Khosla Ventures.

Its mobile security software functions as what we expect it to do; malware protection,block malicious web sites,monitor data breach,remote wipe data ability, phishing protection and data backup.

One of the reason Lookout seems to have received more attentions than competitors is, according to my opinion, that they seems more focus on mobile security and seems to be straight to the point.

Oct 8, 2013 - Cisco Completes Acquisition of Sourcefire

I've been INFORMED by PR firm that Cisco today announced it has completed the acquisition of Sourcefire, a leader in intelligent cybersecurity solutions.

Cisco and Sourcefire customers will benefit from Cisco’s commitment to drive forward both the ASA and FirePOWER™ platforms.

Under the terms of the agreement, Cisco is paying $76 per share in cash in exchange for each share of Sourcefire and assuming outstanding equity awards for an aggregate purchase price of approximately $2.7 billion, including retention-based incentives.

Original reference.

Catherine Chan
Tel: +603 7724 1710
catherinechan@pipr.com.my


Oct 8, 2013 - The Telegraph: GCHQ leaks have 'gifted' terrorists ability to attack 'at will', warns spy chief

I've READ from; The Telegraph,no-follow,http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10365026/GCHQ-leaks-have-gifted-terrorists-ability-to-attack-at-will-warns-spy-chief.html; that according to U.K's MI5, Edward Snowden leaks could have created more collateral damages than help.

According to the report, Andrew Parker, the director of the security service commented that the leaks from Snowden exposed fanatics with knowledge of intelligence to counter spy agencies.

Oct 8, 2013 - Kaspersky Provides Updates for Android and iOS versions of Kaspersky Security for Mobile

I've been INFORMED by PR firm that Kaspersky Lab announces the release of its updated versions of Kaspersky Security for Mobile on Android and iOS platforms. This is the latest version of its application to protect and manage corporate mobile devices. Client applications are now available in Google Play and Apple App Store. The updated versions offer enhanced performance and include several useful new functions, such as notifications when employees enter roaming, automatic Wi-Fi profiles for Android, etc.

Kaspersky Security for Mobile is available both as part of Kaspersky Endpoint Security for Business for enterprise, and as a standalone solution which can be integrated into the corporate network regardless of other protection products.

Original reference.

wenjia gan
+603.8075.6000
wenjia.gan@aboutcom.com.my

Oct 8, 2013 - Trend Micro: Microsoft Releases 8 Security Advisories

I've READ from; Trend Micro,no-follow,http://about-threats.trendmicro.com/us/vulnerability/5941/October%202013%20%20Microsoft%20Releases%208%20Security%20Advisories; that Microsoft Releases 8 Security Advisories.

These security updates cover vulnerabilities found in IE, .NET Framework, Windows Kernel-Mode Drivers,Windows Common Control Library,Microsoft SharePoint Server,Microsoft Excel,Microsoft Word, Silverlight - 4 of which are labelled as critical.

Oct 8, 2013 - Reuters: Microsoft awards hacking expert

I've READ from; Reuters,no-follow,http://www.reuters.com/article/2013/10/08/net-us-microsoft-cybersecurity-idUSBRE9970YK20131008; Microsoft awarded a hacking expert of approximately $200k for discoveries of security loopholes in Windows and IE 11.

According to the report, the expert is referred to as James Forshaw, who heads vulnerability research at London-based security consulting firm Context Information Security.

Oct 4, 2013 - Kaspersky Lab Prevails in Legal Fight Against Technology Patent Troll

I've been INFORMED by PR firm that Kaspersky Lab is pleased to announce that it has emerged victorious from a lawsuit initiated by Lodsys, a company located in Texas that operates as a Patent Assertion Entity, more commonly known as a Non practicing entity or “Patent Troll,” known for initiating patent infringement lawsuits against a variety of companies. Kaspersky Lab, along with 54 other companies including Atari, Symantec and Estee Lauder were originally named in Lodsys’ lawsuit. Of the 55 total companies named as defendants in the lawsuit, only Kaspersky Lab refused to settle out of court with Lodsys, and instead demanded the case be brought to trial. On September 30, seven days before the trial was to commence, Lodsys withdrew its claims rather than facing the verdict of the court, and its lawsuit was dismissed with prejudice. Kaspersky Lab paid no money to Lodsys, and did not agree to any settlement terms.

Original reference.

wenjia gan
+603.8075.6000
wenjia.gan@aboutcom.com.my

Oct 4, 2013 - USA Today - Adobe loses 2.9 mil customer records, source code

I've READ from; USA Today, no-follow,http://www.usatoday.com/story/cybertruth/2013/10/03/adobe-loses-29-mil-customer-records-source-code/2919229/; that Adobe admitted in a statement that hackers gained unauthorized access to 2.9 million customer accounts and stole part of the source code that underlies its products.

Email informing users about password reset and hack incident
According to the report, customers' information were encrypted.

On Oct 11, 2013, Adobe sent out emails to users that they have reset all passwords and requested users to reset new passwords.



Oct 3, 2013 - McAfee Delivers Unprecedented Situational Awareness with Enhanced SIEM Solution

I've been INFORMED by PR firm that Today, McAfee announced the industry’s first “endpoint aware” security information event management (SIEM) solution that adds real time system state information to enhance situational awareness and streamline incident response.

This innovative solution brings together big security data management capabilities of McAfee Enterprise Security Manager (ESM) with deep endpoint insight of McAfee Real Time. SIEM event data is combined with the proactive ability to immediately query, collect and analyze extensive endpoint context, including running processes, files, as well as system and security configuration.

The ability to gather this important contextual data, previously unavailable to SIEM, allows security analysts to immediately determine the root cause of attacks, identify systems subject to the same compromise, and gain actionable intelligence for precise remediation – all in real time and from a single console.

Original reference.

Debbie Beins
Office: +65 3151 4760
Mobile: +65 9180 7924
Email: debbie@preciouscomms.com

Oct 3, 2013 - 2013 Norton Report: Cost per Cybercrime Victim Up 50%

I've been INFORMED by PR firm that Symantec today released the global findings of the 2013 Norton Report, which shows that while the number of online adults globally who have experienced cybercrime has decreased (from 46 per cent in 2012 to 41 per cent in 2013), the average cost per victim has risen by 50 per cent (from US$197 in 2012 to US$298 in 2013). The total global cost of cybercrime in 2013 has reached US$113 billion.

Additional findings:

  • 49% of consumers globally are using their personal mobile device for both work and play
  • 50% of consumers do not use basic precautions such as passwords, security or back up files for their mobiles
  • 26% of smartphone users have mobile security software with advanced protection

Original reference; 2013 Norton Report.

Alvin Kiang Tel: (+60-3) 2287-8689 ext.226
Mobile: 017-6877001
Fax: (+60-3) 2287-0234
alvin.kiang@edelman.com

Oct 3, 2013 - McAfee Announces Find, Freeze and Fix Advanced Threat Defense Solution

I've been INFORMED by PR firm that today, McAfee announced an end-to-end solution to help organizations combat the increasing challenges of advanced malware: McAfee Advanced Threat Defense.

The new McAfee Advanced Threat Defense follows a Find, Freeze and Fix process, going beyond just identifying threats (find) by freezing threats with McAfee network solutions, and the ability to initiate a fix with McAfee Real Time Advanced for ePO (e-Policy Orchestrator).

McAfee is the first company to Find, Freeze and Fix advanced threats via an end-to-end solution:
  • Find: Innovative analysis technologies work together quickly and accurately to detect today’s sophisticated threats across multiple protocols.
  • Freeze: Integration with McAfee network solutions freezes the threat from infecting additional devices.
  • Fix: McAfee Real Time Advanced for ePO identifies the device(s) that require remediation and streamlines the response, enabling automated investigation across all endpoints resulting in cost-effective remediation.

Original reference.

Debbie Beins
Office: +65 3151 4760
Mobile: +65 9180 7924
Email: debbie@preciouscomms.com

Oct 2, 2013 - USA Today: Iran's cyberwar commander assassinated

I've READ from; USA Today,no-follow,http://www.usatoday.com/story/news/nation/2013/10/02/iran-cyber-war-commander-shot-dead/2912045/; that Mojtaba Ahmadi,the chief of Iran's cyberwar program has been killed.

According to the report, he was killed by close-range shots.

Symantec’s Top Tips and Best Practices for Consumers on Information Protection:

$
0
0
Endorsed by Symantec:

1.) Defend Your Data

A comprehensive security suite provides a strong defense against online threats. Norton 360 Multi-Device offers protection for PCs, smartphones and tablets, in a single solution

2.) Think of Mobile Devices as Mini-Computers

Mobile is the fastest-growing target for cybercriminals. Make sure your mobile device requires a password, and take precautions to ensure you device is protected against theft, loss and cybercrime

3.) Be Cautious in the Cloud

While cloud storage solutions make it easy to save and share files, they also open other avenues for attack. Be careful about who has access to your files, and use a solution with built-in security if possible

4.) Save Sensitive Transactions for Secure Connections

Free or unsecured Wi-Fi networks can make it easy for thieves to eavesdrop on your activity. Avoid doing any sensitive transactions like banking or shopping while connected to these networks, or use a personal VPN client



5.) After You Connect, Double Check 

Check credit card and bank statements regularly for fraudulent transactions, and report any suspicious activity to your provider and/or law enforcement

6.) Have a strong password

Create complex passwords which include a combination of upper and lowercase letters, numbers and symbols, and change your passwords regularly. Consider using a free password manager like Norton Identity Safe, to eliminate the hassle of remembering multiple passwords while keeping your personal information secure

7.) Protect Your Social Network 

Don’t blindly click on links within your social network and avoid clicking on any dubious content you may see with sensational, attractive titles. Norton Safe Web for Facebook application is a free tool that uses site rating technology to scan people’s Facebook news feeds for malicious web links

ICT Happening Updates Week 3 of Oct 2013

$
0
0
The most significant news for Week 1 of Oct 2013 was Cisco delivered network convergence system to power "Internet of Everything".

For this week / last week, here are / were the biggest news.
  • New compact PoE switch from Brocade targets federal market.
  • Silver Peak releases software updates: Virtual Acceleration Open Architecture (VXOA) 6.2
  • WD introduces new Ultra-Compact Network Storage.
  • ASUS announces Next-Generation Fonepad 7
  • IBM: Dynamically Managing Network Bandwidth in a Cloud
  • OpenNet: Affected fibre cables at Bukit Panjang Exchange restored
  • HP expands Z Workstation Portfolio, unveils world’s first workstation ultrabook
  • NS BlueScope hosts inaugural green archictecture gathering amongst VIETNAM architects
  • Hitachi Sunway makes the first Hitachi Storage Sale in SEA
  • hybris names as a B2B commerce leader by global independent research firm
  • AMD unleashes R9 series graphics cards with AMD Radeon R9 270X and AMD Radeon R9 280X
  • FalconStor® CDP and FalconStor® NSS 7.5 solutions now available and shipping
  • European IT Services Leader Saves Costs by Optimizing Global Network with Silver Peak
  • Oracle introduces new x86 servers
  • 10.10 mystery deal by Groupon Malaysia.
  • Philips launches ideas competition campaign “Innovation That Matters to You” in Malaysia
  • Bosch launches new DIVAR IP recorder family with integrated Dynamic Transcoding Technology.
  • Tata Comm. launches mobile messaging exchange service.



Oct 17, 2013 - New Compact PoE Switch from Brocade Targets Federal Market

I've been INFORMED by PR firm that Brocade has announced an addition to the company's campus networking portfolio with the Brocade® ICX® 6450-C Switch, which delivers enterprise-class features in a compact form, and supports the simplification and automation provided by the Brocade HyperEdge™ Architecture.

The Brocade ICX 6450-C further expands the company's comprehensive core-to-edge switch portfolio, a key factor in the recent announcement with Aruba to deliver secure integrated wired and wireless mobility solutions for enterprise and public sector customers based on open standards and Software-Defined Networking (SDN) principles.

List pricing of the Brocade ICX 6450-C Switch is $1595 with the first customer shipment on October 11, 2013 and general availability on October 31, 2013. Brocade networking solutions are available direct, through Brocade channel partners and via Brocade Network Subscription.

Original reference.

Wendy Lang
Tel: +65 6317 2464
wlang@brocade.com

Oct 17, 2013 - Silver Peak releases software updates: Virtual Acceleration Open Architecture (VXOA) 6.2

I've been INFORMED that Silver Peak, today released its Virtual Acceleration Open Architecture (VXOA) 6.2, which adds a new deployment wizard and storage-specific reporting to its Velocity Replication Acceleration (VRX) software products. The enhancements help storage managers more quickly and easily deploy Silver Peak replication acceleration software to meet recovery point objectives (RPOs) when moving data for disaster recovery.

Silver Peak VRX software products offer the flexibility of running on any common hypervisor. The software improves replication throughput by an average of 20x. The Silver Peak VRX software products are available for free 30-day, fully-supported trials on Silver Peak’s software marketplace.

Original reference.

Tony Tan
Client Services Director
Tel +65 6317 6709 / Mob +65 9048 6981
Tony Tan

Kuala Lumpur – 17 October 2013 –WD Introduces New Ultra-Compact Network Storage Plus Servers

I've been INFORMED by PR firm that managing a business is a great challenge for small and medium enterprise (SME) owners as there are various aspects of business to attend to. A robust storage solution for data and information will certainly lighten the weight, so that more efforts can be invested in developing the business. Always at the forefront of storage solutions, WD has expanded its small- and medium-sized (SMB) storage solution portfolio with the new WD Sentinel™ DS5100 and WD Sentinel DS6100 (S-series) ultra-compact network storage plus servers.



Five models of WD Sentinel S-series appliances are available. Manufacturer’s Suggested Retail Prices (MSRP) start at RM9,999 for the WD Sentinel DS5100 4 TB network storage plus server. The WD Sentinel DS6100 series, on the other hand, is priced from RM13,999 for the 8 TB variant. Both series are distributed by Amble Action Sdn Bhd. WD Guardian™ Services, which offer flexible, affordable and hassle-free technical support, are available for periods of one or more years.

WD Sentinel S-series serves as a NAS (Network Area Storage) solution.

Original reference.

Mimi Wong
Senior Manager, Public Relations
Email : mimi.wong@wdc.com


Oct 16, 2013 - ASUS Announces Next-Generation Fonepad 7

I've been INFORMED by ASUS that today announced the Fonepad 7, an updated version of the 7-inch Android device with full voice telephony for people who want smartphone features with a tablet-size screen. ASUS Fonepad 7 features a new non-slip finish and faster HSPA+ 3G with up to 42Mbit/s download speeds.

Fonepad 7 is powered by an Intel® Atom™ Z2560 processor with Hyper-Threading technology for seamless multi-tasking performance with Android 4.2. The 7-inch display has a crisp 1280 x 800 resolution with IPS (In-Plane Switching) technology for wide viewing angles and excellent daylight visibility, while dual-front speakers with ASUS SonicMaster audio technology ensure high-quality sound.

Original reference.

Steven Wong
Technical PR Marketing
steven_wong@asusmy.com.my
Tel: (03) 2141 6650 / (016) 2108 255


Oct 10, 2013 - IBM: Dynamically Managing Network Bandwidth in a Cloud

I've READ from;IBM,no-follow,http://www-03.ibm.com/press/us/en/pressrelease/42147.wss; that IBM received U.S. Patent #8,352,953 for dynamic allocation of cloud resources based on networking bandwidth requirements and availability.

Oct 10, 2013- OpenNet: Affected fibre cables at Bukit Panjang Exchange restored

I've been INFORMED by PR firm that restoration process at OpenNet’s Bukit Panjang Central Office (CO) is completed ahead of schedule. At this point in time, OpenNet has restored all of the affected cables that were damaged during the fire.

While all cables are repaired, we are still working with our Service Providers to ensure customer connections are functional. We sincerely apologize to all our customers for the inconvenience caused during this incident.

shruti.soni@hkstrategies.com D : +65 6390 3345 M : +65 8571 1069

MALAYSIA, 10th October 2013 —HP Expands Z Workstation Portfolio, Unveils World’s First Workstation Ultrabook

I've been INFORMED by PR firm that HP announced the expansion of its Z portfolio of professional workstation and display products. This includes the introduction of the world’s first workstation Ultrabook™—the HP ZBook 14—and the industry’s first line of workstations to offer Intel’s Thunderbolt technology for high-speed data transfer.

The new portfolio includes three new HP ZBook Mobile Workstations, five new HP Z Displays, and processor and graphic enhancements to the award-winning line of HP Z Desktop Workstations.

Wai Mun Loh and Frankie Chan with  HP ZBook Mobile Workstations

Ideal for professionals in engineering, CAD, architecture, design, animation, film, education, government and healthcare, the HP Z portfolio of products has been engineered, tested and certified for professional applications.

The HP Z series of mobile workstation cum Ultrabook comes in the price range between RM 3,999 to RM 8,000.

Original reference.

Amanda Yap
O +603-2094-0760 | F +603-2094-4760
E amanda.yap@fleishman.com

Oct 10, 2013 - NS BlueScope hosts INAUGuRAL green archictecture gatherinG amongst VIETNAM architects

I've been INFORMED by PR firm that NS BlueScope Malaysia (formerly known as BlueScope Steel (Malaysia) Sdn. Bhd.) together with NS BlueScope Vietnam recently hosted its first green architecture gathering with a group of architects from Vietnam to highlight the development of green architecture and buildings in Malaysia.

Gala Dinner Participants

Since the introduction of Malaysia’s Green Building Index (GBI) in 2009, over 69 million square feet of buildings in Malaysia have been certified as green building and the GBI tool itself has become one of the fastest growing tropical green tools in the world. Following that, the development of green buildings in Malaysia has attracted the attention of our neighbouring countries when a group of well-established and talented architects visited Malaysia just recently.

The gathering attended by notable architects from Vietnam shared knowledge and experience about the practices, processes and materials with which creates truly sustainable environment, highlight the development of green architecture and buildings in Malaysia as well as sustainable building materials that prioritises reductions in energy consumption and wastage.

Original reference.

Cohn & Wolfe XPR
Kiranjeet Kaur / Yvonne Loke
E: kiranjeet.kaur@cohnwolfe.com / yvonne.loke@cohnwolfe.com
T:+603.2035.5455
F:+603.3035.5456

Oct 9, 2013 - Hitachi Sunway Makes The First Hitachi Storage Sale in SEA

I've have been INFORMED that today announce that it has sealed its first significant IT storage sale since its joint venture establishment between Hitachi Systems, Ltd. and Sunway Technology Sdn Bhd earlier this year in April.

The storage consolidation project consists of Hitachi Unified Storage (HUS) 130 storage systems implementation and support services valued at close to RM1 million is made to Sunway Shared Services Sdn Bhd, a subsidiary of Sunway Berhad (“Sunway”). The sale took place after the company underwent its standard procurement selection process that involved three vendor brands of which HSIS participated as a value-add IT distributor.

Original reference.

Hitachi Sunway Information Systems Sdn Bhd
Jasmine Tham
(+60) 12 205 3829
jasminet@hitachi-sunway-is.com

Oct 9, 2013 - hybris names as a B2B commerce leader by global independent research firm

I've been INFORMED by PR firm that hybris has been named as a leading B2B commerce vendor in Forrester Research, Inc.’s latest Wave report on B2B Commerce entitled: “The Forrester Wave™: B2B Commerce Suites, Q4 2013” dated October 7, 2013.

According to the report; “Customers are attracted to hybris for four key reasons: 1) the modern Java-based architecture; 2) the embedded enterprise product content management (PCM) capabilities; 3) the embedded and rapidly maturing order management capabilities; and 4) the flexibility of the “Framework.” …. hybris’ modern, service-orientated architecture makes it easy for developers to extend and customize the solution to cater to unique B2B requirements and process workflows. … hybris also now offers an on-demand model.”

A copy of the report can be downloaded at http://www.hybris.com/en/forrester-wave-q4-2013

Edward Lim
Tel: (65) 6545-5645
edward@ciza.com

Oct 9 , 2013 - AMD Unleashes R9 Series Graphics Cards with AMD Radeon R9 270X and AMD Radeon R9 280X

I've have been INFORMED by PR firm that AMD today launched AMD Radeon™ R9 270X and AMD Radeon™ R9 280X, GPUs engineered from the bottom up to enable a new era of hyper-realistic ultra resolution gaming. AMD Radeon™ R9 Series graphics cards are designed for enthusiast gamers who demand high-performance hardware that shatters the boundaries of realism and performance. Based on AMD’s award-winning Graphics Core Next (GCN) architecture, the AMD Radeon R9 Series graphics cards receive a boost from Mantle, an industry-acclaimed technology developed by AMD to enable today’s top game developers to harness the GCN-powered cores of both PCs and consoles.

AMD Radeon R9 270X and AMD Radeon R9 280X graphics cards will be available on Oct. 11, 2013.

Original reference.

Jaron Chen
T. +603 7494 0292
jaron.chen@rootsasia.com


Oct 8, 2013 - FalconStor® CDP and FalconStor® NSS 7.5 Solutions Now Available and Shipping

I've been INFORMED by PR firm that In line with the company’s aim to provide smarter, more efficient solution to datacenters and storage infrastructures; FalconStor has introduced the new FalconStor® CDP and FalconStor® NSS 7.5 Solutions that offer enhanced features for intelligently moving, storing, and protecting data without burdening production resources. The RecoverTrac tool has more flexibility to automate failover and failback with greater accuracy in any physical, virtual, or hybrid environment; thus increasing efficiency for datacenter and storage management.

Original reference.

Seetha Subramany
FalconStor Software, Inc.
+6012-2293565
seetha.devi@falconstor.com

Oct 7, 2013 - European IT Services Leader Saves Costs by Optimizing Global Network with Silver Peak

I've been INFORMED by PR firm that the leading IT services companies in Europe, Steria requires rapid delivery of data and network services to 80 global locations in 12 countries. As its business grows and data volumes increase, Steria understood that upgrading bandwidth to all of its locations would not cost-effectively address the company’s long term goals and would not overcome the adverse impact of long distance, shared wide area network (WAN) connections.

Silver Peak was selected because of the software-based approach to network optimization that gives Steria flexibility to deploy virtual or physical solutions with equal performance, features and functionality. While Steria deploys Silver Peak physical appliances today, the company is very interested in Silver Peak’s Software-for-Life upgrade program that allows Steria to transition its hardware WAN optimization licenses to software as the company transitions to virtualization.

Original reference.

Tony Tan
Client Services Director
Tel +65 6317 6709 / Mob +65 9048 6981
Tony Tan.

Oct 7, 2013 - Oracle Introduces New x86 Servers

I've been INFORMED by PR firm that Oracle today launches the new x86 servers, based on the latest Intel® Xeon® processors E5-2600 v2 product family, for business organizations.

The Oracle’s new Sun Server X4-2, Sun Server X4-2L and Sun Blade X4-2B systems are now available in the market for a broad range of mission-critical business workloads, such as database, middleware and enterprise business workloads in virtualized environments, as well as high-density, clustered computing in an enterprise cloud environment.

Also, the new servers offer additional customer value, allowing a choice of Oracle Solaris, Oracle Linux and Oracle VM at no extra cost. They also provide complete stack management with Oracle Enterprise Manager 12c Ops Center at no additional cost with Oracle Premier Support services.

Original reference.

Judy Wong
Pi PR Consultancy Sdn Bhd
+60377241710/+60126224688
judywong@pipr.com.my

Oct 7, 2013- 10.10 Mystery Deal by Groupon Malaysia

I've been INFORMED by PR firm that the popular Groupon Goods Midsummer Mystery Deal which originated from United States (US) has now expanded to the shores of Malaysia, courtesy of Groupon Malaysia (MY)! 


Rafiq Razali - Country General Manager of Groupon Malaysia


With over a thousand items up for grabs, Groupon Malaysia subscribers who purchase this deal will be in for a surprise. They will not have a clue of what will be in store for them; until the Mystery Deal is delivered. It would be an adventurous investment for fans of Malaysia’s number one social e-commerce platform.

Starting from the 10th of October 2013 at 10am, random items specially selected for the Groupon Mystery Deal will be sold for only RM10.10. Possible treats for lucky Groupon customers range from digital cameras to household appliances. 


Original reference.

Clara Goh
Head of Marketing Communications
Telephone: +603 7949 0888, Mobile: +6017-5110154
E-mail: clara.goh@groupon.com


Oct 3, 2013 - Philips launches ideas competition campaign “Innovation That Matters to You” in Malaysia

I've been INFORMED by PR firm that Philips Malaysia announced the launch of Innovation that matters to you, the Malaysian leg of its Asia-Pacific campaign aimed at creating healthier homes and safer cities in the country. Underlining Philips’ commitment to develop meaning innovations to help improve the health and well-being of communities across Malaysia, the campaign provides an avenue for Malaysians to contribute innovative and meaningful ideas through the campaign website, http://philips.to/innovationMY on how Malaysians can address these challenges.

Submitted ideas will be collected and sifted through by a panel of judges which includes Philips, Agensi Inovasi Malaysia (AIM) and University Putra Malaysia (UPM). The panel will shortlist six (6) selected ideas for public voting based on practicality and sustainability and the winning idea will be implemented by Philips Malaysia together with the public and stakeholders.

In the next six week leading up to 14 November, Malaysians can log in to www.meaningfulinnovation.asia/Malaysia to share their ideas on how to address issues under the two pre-selected sub-themes – Healthy Homes and Safer Cities.

The judging panel would shortlist ideas that best addresses health and well-being challenges impacting the Malaysian society. Of these ideas, three ideas from each sub-theme will be further shortlisted for public voting from 27 November to 10 December 2013.

Here are the steps to contribute your ideas:

  1. Contribute your idea for healthier homes and safer cities.
  2. Six Ideas will be shortlisted by ‘Innovation That Matters To You’ campaign approved experts.
  3. Take the initiative to share out your favourite idea to garner support.
  4. One winning idea, as voted by you, by Malaysian, will be implemented by Philips.

Original reference.

Denise Ng Seow Feng
O +603-2094-0760 | M +6012-9040801
E seowfeng.ng@fleishman.com

Oct 4, 2013 - Bosch launches new DIVAR IP recorder family with integrated Dynamic Transcoding Technology

I've been INFORMED by PR firm that Bosch has recently launched the new DIVAR IP recorded family with integrated Dynamic Transcoding Technology. Consisting of an all-in-one video management system as well as storage solution, the system perfectly combines a network recorder, storage array, client workstation and integrated software to deliver optimum video surveillance capabilities.

Present market demands necessitate smooth and instant access to high-quality surveillance video. Users have come to expect equal degrees of comfort and performance when being away from the office or control center. With the launch of four new DIVAR IP video recorders, Bosch offers customers different recording solutions. Users can choose to adopt simple yet scalable storage solutions or scalable all-in-one solutions for small to large-sized security systems.

Original reference.

Zairynn Yazmi
Senior Officer, Corporate Communications
Robert Bosch Sdn Bhd
DID: +603 7966 3137, Mobile: +6012 269 7474
Email: zairynn.yazmi@my.bosch.com

Oct 3, 2013 - Tata Comm. Launches Mobile Messaging Exchange service

I've been INFORMED by PR firm that Tata Comm. today launches its Mobile Messaging Exchange service. The exchange will enable Over-the-top (OTT) providers and SMS aggregators to connect to a large community of MNOs globally, while allowing MNOs to monetise the SMS traffic with an added layer of security. This service provides a mutually favourable and profitable solution for all the stakeholders in the value chain.

The new Mobile Messaging Exchange stands to create an effective ecosystem built on efficiency, trust and transparency. It will not only bridge the user communities served by the OTT and SMS aggregators, who want to reach more mobile subscribers, but also MNOs, who want to monetise this traffic. This secure and stable service will help MNOs protect their network and subscribers from spam and fraud resulting from unauthorised A2P SMS.

Original reference.

Joanne Lee
Joanne.Lee@hkstrategies.com

SQL Friendly Database Insert and Update Process

$
0
0
Disclaimer: This article if read without prior experience may end up boring and dry.

T-SQL Insert and Update are part of the Data Manipulation Language (DML).

http://technet.microsoft.com/en-us/library/ff848766.aspx

The biggest bane with T-SQL DML belongs to an issue so common that 100% of programmers will encounter it in the first place - the reason being is that we had expected the T-SQL to be more intelligent friendly, but it didn't.

As the matter of fact, T-SQL is not that friendly and it requires one to follow specific rules.

The biggest bane is to perform DML with string data that consist of single quotes; it will result in exception because under T-SQL, single quote is considered to be a control character or reserved character. Hence, when a string data consists of single quote such as Brandon's PC, it will create confusion.

The best practice solution is to perform what is known as single quote offset.

i.e

Suppose I want to perform INSERT into a table called EmployeeTBL

INSERT INTO EmployeeTBL (Name,Position) VALUEs ('Brandon', 'General Manager')


When single quote is required to be present as part of the data, it will go like this supposedly.

INSERT INTO EmployeeTBL (Name,Position) VALUEs ('Michelle', 'Brandon's PA')


Nevertheless, the above T-SQL statement will generate exception; 'Incorrect syntax near ...'

The solution to perform single quote offset by adding an additional single quote in front of the single quote which belongs to the string data, hence:

INSERT INTO EmployeeTBL (Name,Position) VALUEs ('Michelle', 'Brandon''s PA')


Notice that now Brandon''s PA has two single quotes - this is what we mean by offsetting, it will work well for T-SQL.

Today, I just want to go further to discuss some strategies to deal with this issue on a broader perspective.

Continue reading.

Email Interview with McAfee's Scott Thomas (Sr. Director, Network Threat Response)

$
0
0
We've been invited for an email interview with McAfee's Scott Thomas, Sr. Director, Network Threat Response and hence we asked them five questions:

1.) The latest security landscape is kind of messy - too much information, too many vendors and limited market for the enterprise space and lack of maturity in law enforcement pertaining to cyber-space security.

What is your comment on this?

How can it be better?

2.) The bet on APTs was too high.

Verizon DBIR 2013 reported that 75% of data breaches are opportunistic, meaning that they are not APTs. While big cyber-security companies and other big boys are betting high stakes on holistic enterprise security solution with intelligent, consumer-based products seem to be too competitive.

Do you think that there is a mismatch in the market?

3.) I understood that McAfee - DeepSAFE technology is hot on wheels.

Briefly expiain your top selling products currently and next bet for coming years?

4.) Give me your other comments on our 2013 Q3 review.

5.) Anything interesting for Malaysia and ASEAN?

Check out the full answers.



I've learned a few things from Scott's answers:

1.) The going forward strategy and direction for the cyber security industry is to address problems with holistic solutions, this can be achievable through 3 sub strategies namely:
  • Create interoperable and vendor agnostic solutions that encompass best of breed technologies to address the cyber threat.
  • Leverage on community and partnerships between vendors.
  • Deliver solutions to maximize the value of existing customer investments, reduce time to problem resolution, and lower operational costs

2.) The Security Connected framework enables integration of multiple products, services, and partnerships for centralized, efficient, and effective risk mitigation - it is a good example of the vendor agnostic integration initiative.

McAfee has 3 offerings that support this initiative:
  • McAfee’s Network Threat Response (NTR)
  • McAfee’s Cloud Analysis and Deconstruction Service (CADS)
  • McAfee’s Advanced Threat Defense (ATD)

3.) The holistic approach covers everything; it supports vendor agnostic integration initiative, intelligence, advanced heuristics, visibility and profiling of network traffic based, malware analysis,policy enforcement,quick remediation and automated response, automation and etc.

Kaspersky Lab Expert Analyses APT Icefog

$
0
0
Press release - Petaling Jaya, October 18, 2013

Kaspersky Lab’s security research team recently published a research paper on the discovery of the Icefog cyber-espionage campaign which is described as a small yet energetic Advanced Persistent Threat (APT) group that focuses on hitting the supply chain of Western companies in South Korea and Japan. Sinkhole connection in Malaysia and Singapore were also observed. The operation started in 2011 and has increased in size and scope over the last few years.

“Icefog is different. The ‘hit and run’ nature of the Icefog attacks demonstrate a new emerging trend, of smaller hit-and-run gangs that go after information with surgical precision. The attack usually lasts for a few days or weeks rather than the months or years of more traditional APTs. After obtaining what they were looking for, the Icefog attackers clean up and leave. In the future, we predict the number of small, focused ‘APT-to-hire’ groups to grow, specializing in hit-and-run operations; a kind of ‘cyber mercenary’ team for the modern world,” Mr. Molsner explained; Mr. Michael Molsner, a member of the Global Research & Analysis Team who is based in Japan, and who is part of the team credited with discovering and analyzing the Icefog APT.


The source of attacks were predicted to have been originated from China, South Korea and Japan.



The Key Findings of Icefog Attacks:
Mr. Michael Molsner
  • The attackers rely on spear-phishing and exploits for known vulnerabilities (eg. CVE-2012-0158, CVE-2012-1856, CVE-2013-0422 and CVE-2012-1723).
  • The attackers are hijacking sensitive documents and company plans, e-mail account credentials, and passwords to access various resources inside and outside the victim’s network.
  • During the operation, the attackers are using the “Icefog” backdoor set (also known as “Fucobha”). Kaspersky Lab identified versions of Icefog for both Microsoft Windows and Mac OS X.

In total, Kaspersky Lab observed more than 4,000 unique infected IPs and several hundred victims (a few dozen Windows victims and more than 350 Mac OS X victims).

Original reference.

Faris Zakaria
Tel: 03.8075.6000 Mobile: 017.574.3840
E-mail: faris.zakaria@aboutcom.com.my

ASUS HOTLINE Service Centre number: 03-7724 3495

$
0
0
I've been informed by PR firm that effective from 21st October 2013 onward, the ASUS HOTLINE Service Centre number will change to 03-7724 3495.

The old phone number, 03-2053 5077 will be no longer in service.

Jack Ma Believes in Open and New Age Economy

$
0
0
A little out-dated but still relevant - from Jack Ma, Alibaba.com




1.) Help SMEs to make more money.

2.) Help solve society's problem.

Hired economists and sociologists.

3.) Give competitors opportunities to compete - do not play the monopoly game.

4.) Be transparent.

5.) Global vision, local wing.

Outsourcing Industry to Double in Growth by 2017

$
0
0
Press release - KUALA LUMPUR, 22 October 2013 – Outsourcing Industry to Double in Growth by 2017

Outsourcing Malaysia (OM), an initiative under PIKOM, today shared that the outsourcing industry in Malaysia is set to double in growth by 2017 with a Compound Annual Growth Rate (CAGR) of 15 per cent from its current 2012 revenue of USD1.7 billion.

OM announced its second industry report titled ‘Malaysia’s Global Services Outlook’ in conjunction with the four day international Asia-Pacific Outsourcing Summit (APOS) in Iskandar, Johor. The research findings by leading B2B market researcher Valuenotes, was commissioned by OM to provide the SWOT (Strength, Weakness, Opportunity, Threat) insights of the industry in Malaysia.

Outsourcing Malaysia unveils the 'Malaysia's Global Services Outlook' research in APOS2013



David Wong, Chairman of Outsourcing Malaysia (OM) shares that one of the major insights is the key advantage that Malaysia has, being ranked 12th worldwide by the World Bank for the ‘Ease of Doing Business’ category. This ranking is also the highest amongst all countries that are considered ‘outsourcing countries.’ “A simple illustration of this is that a potential investor can start doing business in Malaysia in a mere 6 days, while it takes an average of 36 days to do the same in other APAC countries,” he explains.

The research findings also reveal the urgency for Malaysia to move away from playing the numbers game in outsourcing and from the entry-level outsourcing sector. Wong explains, “The largest Malaysian outsourcing company only manages to employ 5,0000 people as compared to over 100,000 employees in some of the larger firms in India and China. This illustrates the average size of outsourcing centers in Malaysia - which limits our capability in taking on volume-driven type of outsourcing project.”

Original reference.

Visithra
012-2661679/ 03-77241719
Pi PR Consultancy Sdn Bhd
visithra@pipr.com.my

ICT Happening Updates Week 4 of Oct 2013

$
0
0
The most significant news for Week 3 of Oct 2013 was IBM received U.S. Patent #8,352,953 for dynamic allocation of cloud resources based on networking bandwidth requirements and availability.

For this week / last week, here are / were the biggest news.
  • Latest enhancements on Oracle Eloqua’s leading marketing automation platform.
  • AMD Radeon R9 290X Graphics Card pioneers a new era in gaming experience.
  • Viber unveils New Blackberry Version With Multiple Feature Enhancements.
  • HP launches LaserJet Enterprise Solutions.
  • SFAM and Mimos Launches Talent Development Programme 2013.
  • Capillary Technologies launches Capillary InStore - personalised shopper recommendations directly on the sales floor.
  • Monster Singapore redefines the way employers search for talent.
  • USA Today: Facebook supported removal of potentially damaging content against total freedom of expression.
  • Fujitsu launches M10 Servers in Malaysia.
  • Apple launches Mac OS 10 Mavericks and iPad Air.
  • Brocade announces End-to-End Gen 5 Fibre Channel SAN Connectivity Support for EMCVMAX
  • Wechat in search for the next campus ambassador in Klang Valley Malaysia.
  • Bosch Software Innovations and Tech Mahindra announce global system integrator partnership.
  • Exabytes eCommerce Conference 2013 to outline Malaysia's Internet Retail Market;3 – 4 December 2013
  • Brocade announces Monitoring and Alerting Policy Suite (MAPS) and Flow Vision for SAN Deployments.
  • Oracle unveils enhanced Data Integration portfolio.
  • Brocade Names Ari Bose as Chief Information Officer.
  • WD® announces Speak Out in Style campaign; starts from 17 Oct 2013 to 28 February 2014.



Press release - Kuala Lumpur, October 25, 2013 – Latest Enhancements on Oracle Eloqua’s Leading Marketing Automation Platform

Oracle Corporation today introduced the new features and enhancements to Oracle Eloqua that will help organizations of all sizes and from across all industries to drive the best customer experiences and deliver high returns on marketing investments across their multi-channel campaigns.

Some of the new features on Oracle Eloqua include:-
  1. Oracle Eloqua AdFocus: Gives marketers a single platform to dynamically create, manage and measure display ads alongside owned and earned media
  2. Oracle Eloqua Profiler: Provides an intuitive and familiar social user interface (UI) that gives sales reps one, detailed view of the prospect
  3. Marketing Resource Management: Creates more secure and controlled access to marketing resources and data
  4. Integrated Sales and Marketing Funnel: Gives the teams a consistent and clear view of pipeline performance

Judy Wong
Pi PR Consultancy Sdn Bhd
+60377241710/+60126224688
judywong@pipr.com.my


Press release - MALAYSIA, Kuala Lumpur — Oct. 24, 2013 — AMD Radeon R9 290X Graphics Card Pioneers a New Era in Gaming Experience

AMD today launched the AMD Radeon™ R9 290X graphics card, introducing the ultimate GPU for a new era in PC gaming. As the top AMD Radeon™ R9 Series graphics card, the AMD Radeon™ R9 290X GPU delivers breathtaking performance while pushing the boundaries of audio and visual realism for gamers who demand the best.

Equipped with the new AMD TrueAudio technology and made for ultra resolution gaming, the AMD Radeon R9 290X GPU creates today’s most immersive PC gaming experience .

Suzanne Ngiow
AMD Malaysia
Suzanne.Ngiow@amd.com


Press release - LONDON – October 24, 2013 - Viber Unveils New Blackberry Version With Multiple Feature Enhancements

Viber unveiled today a new version of its app for BlackBerry with multiple new features and enhancements. The version will be available for download within the next 24 hours.

The new release adds functionality to the Viber BlackBerry app. The release includes:
  • User images in conversations
  • A new seen status to let users know when their messages have been viewed
  • Improved privacy settings
  • Custom location sharing
  • Multiple additional design enhancements and bug fixes
Original reference.

Raphael Dana
+ 65 9666 4781
rdana@galixo.com


Press release - Oct 24, 2013 - HP Launches LaserJet Enterprise Solutions

HP recently launched its LaserJet Enterprise Solutions. HP's LaserJet Enterprise flow MFP M830z, HP LaserJet Enterprise flow MFP M880 and HP JetDirect 2800w were revealed as part of this range. HP's LaserJet Enterprise M800 series is the first enterprise MFP to possess touch-to-print functionality, with NFC (Near Field Communication) and wireless direct printing functions. Additionally HP also expanded its Color LaserJet Enterprise range to include HP LaserJetPro M127fn and HP Color LaserJet MFP M176/M177 series.

HP Color LaserJet MFP M176/M177 series

Kamini Rajendran
O +603-2094-0760 | M +6-016-2466574 | F +603-2094-4760
E Kamini.Rajendran@fleishman.com


Press release - Oct 24, 2013 - SFAM and Mimos Launches Talent Development Programme 2013

The Semiconductor Fabrication Association of Malaysia (SFAM) and MIMOS, together with TalentCorp launched the Talent Development Programme 2013 today, in a move to overcome the severe shortage of skilled semiconductor engineers locally.

The programme launch was graced by YB Datuk Haji Ir. Hj Hamim Samuri, Deputy Minister of International Trade and Industry.

Under this collaboration, MIMOS will provide the facility and technical expertise while SFAM will provide the channels.

MIMOS Wafer Fabrication plant includes facilities for IC Design, Failure Analysis, Testing and Reliability Lab and Advanced Skills Lab. MIMOS will be providing training for a specially-designed programme for SFAM members called SFAM Graduates Upskilling Development (GUD). Not just limited to SFAM members, MIMOS’ Advanced Skills Training Centre is also open to E&E based companies, universities and other training organisations.

Original reference.

Tina Melan
(03) 8995 5246 or 012.340 1108
tina.suryani@mimos.my


Press release - Oct 24, 2013 - Capillary Technologies Launches Capillary InStore™

Capillary Technologies today unveiled Capillary InStore™, the latest module in Capillary’s suite of Intelligent Customer Engagement™ solutions. Capillary InStore captures and analyses data on customer behaviour and shopping preferences through social, email, local and mobile channels and arms sales associates with a host of tools for cross-selling, up-selling and strengthening customer engagement directly on the sales floor. Headquartered in Singapore, Capillary serves clients in 16 countries and is known for its high energy and passion in bringing global best Customer Engagement and Loyalty best practices to enterprises across Asia and surrounding regions.



Tony Tan / Pradnyesh Kothare
Havas Worldwide Siren for Capillary Technologies
+65 6317-6709
tony@siren-communication.com
pradnyesh.kothare@havaswwsiren.com


Press release - Oct 23, 2013 - Monster Singapore Redefines the Way Employers Search for Talent

Monster Singapore, one of the leading online career and recruitment solutions provider and flagship brand of Monster Worldwide in Singapore today announced the launch of ‘Monster mPower Search’, a next generation people search technology that redefines the way employers search for talent. ‘Monster mPower Search’ delivers on Monster’s goal to help job seekers and employers ‘Find Better,’ in this case through a simple, fast and intuitive way for employers to find the talent they need.

‘Monster mPower Search’ has been designed for emerging global trends in the digital space. The user interface is simple and intuitive, utilizing next generation technology and featuring an elegant design making use of a single-scroll interface with icon-based navigation and result presentation to set a new standard in the industry.

Original reference.

Nidhi Verma
Nidhi.verma@monster.com
(91) 9560155115


USA Today - Oct 23, 2013 - Facebook supported removal of potentially damaging content against total freedom of expression

I've read from; USA Today,no-follow,http://www.usatoday.com/story/news/nation/2013/10/22/facebook-violent-video-beheading/3167195/; that it was reported, Facebook decided to remove a potentially damaging content than to side unconditionally with total freedom of expression.

The said content is related to a video of a brutal decapitation of a woman.

I must admit, it was a tough choice. Nonetheless, Facebook lowered the bar ?

Press release - Oct 23, 2013 - Fujitsu Launches M10 Servers in Malaysia

Today, Fujitsu debuts its Fujitsu M10 servers in Malaysia.

The new servers are built-in with 16-core SPARC64 X processor and Fujitsu leading supercomputer technology, tapping on Fujitsu’s 60 years of mainframe development.

According to Michael Warren, Fujitsu's newly appointed President in Malaysia, the new server business is targeted on financial services, telecommunication and public sectors, especially the large scale enterprises, data centre and outsourcing service providers.

Michael Warren and M10

The Fujitsu M10 servers feature breakthrough technologies such as Software on Chip and Liquid Loop Cooling. It provides highly flexible system configurations with physical partitioning as well as built-in, no-cost virtualization technologies via Oracle VM Server for SPARC and Oracle Solaris Zones. Fujitsu M10 servers also support both Oracle Solaris(operating systems) versions 10 and 11; and the Oracle Solaris Guarantee Program allows for binary compatibility with all current and past SPARC servers for investment protection.

Catherine Chan
Tel: +603 7724 1710 / +6012 227 1996
catherinechan@pipr.com.my


Oct 22, 2013 - Apple launches Mac OS 10 Mavericks and iPad Air

Mac OS 10 - Mavericks

  • Power efficiency.
  • Compressed memory - similar to zipping of files.
  • Integrated graphic - smart and dynamic allocation of shared memory between the CPU and GPU.
  • OpenCL - parallel computing power - up to 1.8 x.

iPad Air is the new iPad
  • Retina display
  • 1.0 pound - lightest full size tablet in the world
  • A7 chip
  • 64 bits OS architecture
  • GPU performance is 72 times faster
  • 10 hours battery life

Press release - Oct 22, 2013 - Brocade Announces End-to-End Gen 5 Fibre Channel SAN Connectivity Support for EMCVMAX

Brocade today announced that end-to-end Brocade® Gen 5 Fibre Channel storage area network (SAN) solutions are now supported with the EMC® VMAX® product family: mission critical storage system.

The combined EMC and Brocade Gen 5 Fibre Channel solution enables best-in-class networking and storage to support highly virtualized cloud infrastructures. This solution allows enterprises to deploy a storage infrastructure featuring EMC® Connectrix® 16 Gbps Fibre Channel modular and fixed-port switches and 16 Gbps Fibre Channel-capable VMAX storage arrays. Brocade Gen 5 Fibre Channel SAN switches are sold by EMC under the Connectrix brand.

Brocade APAC Corp Communications
Wendy Lang
Tel: +65 6317 2464
wlang@brocade.com


Press release - Oct 22, 2013 - Wechat in search for the next campus ambassador in Klang Valley Malaysia

WeChat - world’s leading free social mobile messaging application, is once again on the hunt for the next campus ambassador with its ‘WeChat Campus Ambassador Search 2013’! The search will begin on 22nd October 2013 at HELP University, Taylor’s University Lakeside Campus, Multimedia University Cyberjaya Campus and Universiti Tunku Abdul Rahman Petaling Jaya Campus.

Jaron Chen
T. +603 7494 0292
E. jaron.chen@rootsasia.com


Press release - Oct 22, 2013 - Bosch Software Innovations and Tech Mahindra announce global system integrator partnership

Today, Bosch Software Innovations, the software and systems house of the Bosch Group, and Tech Mahindra Ltd., a specialist provider of connected solutions to the connected world and an enabler of future digital enterprises, announced a global strategic business relationship with a primary focus on the global manufacturing and transportation industries.

The partnership aims to develop and deliver scalable software solutions for an interconnected world, also known as the Internet of Things and Services. It will concentrate on accelerating the delivery of software solutions, reducing time-to-market and upfront capital investments for customers. The solution offerings arising from this partnership will address topics such as industrial equipment management, connected services and intermodal transportation.

Bosch Software Innovations
Stefanie Kowallick
Phone +65 6508 4139
Email Stefanie.kowallick@bosch-si.com


Press release - Kuala Lumpur, 21 October 2013 - Exabytes eCommerce Conference 2013 to outline Malaysia's Internet Retail Market

Exabytes Network Sdn Bhd, Malaysia’s largest web hosting provider, will be hosting its “Exabytes eCommerce Conference 2013” for local entrepreneurs and small- and medium-sized businesses (SMBs).

Now in its third year, Exabytes eCommerce Conference 2013 is an annual occasion, which will be held on 3 – 4 December 2013 at Grand Millennium Hotel Kuala Lumpur, with aim to help companies to develop the most effective strategy for business and stay on the cutting edge of online retail market.


Chan Kee Siak and Participants


Chan Kee Siak, the Conference’s Organizing Committee Chairman and CEO of Exabytes shares that the conference organization is in response to Malaysian Communications and Multimedia Commission (MCMC)’s call for more SMBs and entrepreneurs to go online and improve their business via the Internet.

Original reference.

Catherine Chan
Tel: +603 7724 1710 / +6012 227 1996
catherinechan@pipr.com.my


Press release - KL, Malaysia — Oct. 21, 2013 - Brocade Announces Monitoring and Alerting Policy Suite (MAPS) and Flow Vision for SAN deployments

Monitoring and Alerting Policy Suite (MAPS) and Flow Vision, part of the Brocade® Fabric Vision technology, a hardware and software solution that helps IT organizations accelerate new SAN deployments, optimize resources and dramatically reduce operational costs.

Administrators now have new tools and automation that simplify day-to-day SAN management tasks, increase productivity and enable proactive management of SAN infrastructures to help ensure the highest levels of availability and performance.

Brocade Fabric Vision technology, including MAPS and Flow Vision, is available now as an optional license through select Brocade OEM and channel partners, including HP. Fabric Vision technology will be available from other Brocade OEM partners later this year

Brocade APAC Corp Communications
Wendy Lang
Tel: +65 6317 2464
wlang@brocade.com

Press release - Oct 21, 2013 - Oracle Unveils Enhanced Data Integration Portfolio

Oracle today unveils Oracle Data Integrator 12c and Oracle GoldenGate 12c as the latest major updates to its industry-leading data integration portfolio.

The new updates will help customers to cost-effectively manage the ever-growing streams of information under today’s data-driven business environment, and enable them to capitalize on their data to reduce costs and drive business growth.

Core features:
  • Extract, transform, load (ETL) and Business Intelligence/Data Warehousing
  • Real-time replication, data services and federation, big data and business analytics and cloud deployments

Press release - Oct 18, 2013 - Brocade Names Ari Bose as Chief Information Officer

Brocade today announced the appointment of Ari Bose to the position of Chief Information Officer (CIO). Responsible for the strategic transformation of the global Brocade IT organization, Bose will report to Gale England, vice president of Customer Advocacy and Operational Effectiveness.

Ari Bose, CIO, Brocade

With more than 30 years of experience in the high-tech industry, Bose has held a number of CIO positions at networking and other high-tech companies. Most recently at Polycom, he served as senior vice president and CIO, where he led the transformation of the global IT organization. He was also responsible for overseeing the company’s internal global visual communications network. Prior to that, Bose was senior vice president and CIO at UTStarcom, and he has held senior IT positions at companies such as 3Com, Bay Networks and Apple.

Brocade APAC Corp Communications
Wendy Lang
Tel: +65 6317 2464
wlang@brocade.com


Press release - Oct 17, 2013 - WD® announces Speak Out in Style campaign; starts from 17 Oct 2013 to 28 February 2014

WD® in Malaysia today announced the launch of the Speak Out in Style campaign to encourage consumers to voice their thoughts and make good choices for the benefit of the environment.

“The Speak Out in Style campaign follows the success of the WD “Power of Choice” initiative which seeks to provide consumers with the type of drive that complements their unique usage requirements and demands. WD “Power of Choice” storage solutions consist of: WD Blue™ (solid performance and reliability for everyday computing), WD Green™ (cool and quiet), WD Black™ (maximum performance for power computing) and WD Red™ (home and small office NAS). The four-color scheme makes it simple for consumers to choose the drive that best suits their specific storage needs,” said Margaret.

WD Speak Out Ambassador

Starting from today until 28 February 2014, the Speak Out in Style campaign has two main components. The first component consists of two contests, called the ‘Caption Sticker Contest’ and ‘T-Shirt Caption Contest’ respectively. These caption contests require participants to voice their thoughts on how to make the world more environmentally friendly by submitting creative captions to win a wide variety of prizes, including shopping vouchers, wireless speakers and professional cameras. The contests will be hosted on WD Malaysia’s Facebook page at www.facebook.com/WDMalaysia.

Andrea Chuang / Jonathan Tan
Email: Andrea.chuang@cohnwolfe.com / jonathan.tan@cohnwolfe.com
Mobile: +6013 488 8446 / +6012 604 2936
Viewing all 1706 articles
Browse latest View live