Android TV gives Intel a new shot at the market after previous failures
Google and Intel will "work together to bring this platform and experience to market," Intel said in a statement. An Intel spokeswoman said more details about the partnership will be shared at a later date. It is likely that Intel will supply chips for TVs, set-top boxes and devices like Chromecast, analysts said. The goal is to put as many Intel chips as possible in more consumer electronics, which is a hot market right now. "You've got to be in consumer electronics, that's where everything is going on," said Jim McGregor, principal analyst at Tirias Research. The partnership is perhaps the best way for Intel to attack the TV market following previous failures, analysts said.
Dell Focuses On Security
With products such as CE, Dell hopes to bring enterprise-class security resources to small and midsized businesses. Pitched as turnkey products that take the complexity out of BYOD programs and other device and data-management challenges, Dell's Data Protection lineup exemplifies the company's ongoing effort to redefine itself as not only a PC and server manufacturer, but also a leading enterprise software player. Dell also announced Dell Data Protection Hardware Crypto Accelerator (HCA). Available on select Dell Latitude, Optiplex, and Precision PCs, HCA supports self-encrypting drives that make encryption keys inaccessible if a device is tampered with.
Using Big Data to Tackle Supply-Chain Demands
BriefingsDirect had an opportunity to learn first-hand how big data and analysis help its Global 500 clients identify the most pressing analysis from huge data volumes we interviewed Ernie Martinez, Business Information Management Head at the Capgemini Financial Services Global Business Unit in London. The discussion, at the HP Discover conference in Barcelona, is moderated by me, Dana Gardner, Principal Analyst at Interarbor Solutions. Here are some excerpts:
Take control of the Command Prompt with PromptPal
For the life of me, I couldn't recall the name of the tool. However, after a bit of searching on the web, I was able to find it. Called PromptPal from Technology Lighthouse, I immediately downloaded the tool. After reacquainting myself with it, I soon discovered that the newest version of PromptPal provides all sorts of new features that really make it a nice addition to Windows 7/8.1 when working from the Command Prompt. Knowing that there are a lot of command-line junkies out there, I decided to write an introduction to some of my favorite features in PromptPal.
The Practical Science of Data Center Capacity Planning
Through it all, you need to apply the practical science of capacity planning to really create a powerful data center model. Key emerging industry trends toward Data Center Infrastructure Management (DCIM) and Software Defined Data Centers (SDDC) demonstrate a continuing need to look at the key balance between IT and communications and facilities management. Capacity planning brings together all the key resource and output factors that constitute a data center’s reason for commission and its means of fulfilling that. As critical resources become more expensive or scarce, being able to plan for future capacity requirements becomes more critical.
How to develop a consumer cloud services strategy
That's not to suggest you should give up your management and monitoring strategies, but you need to go beyond the traditional enterprise systems to know what your workers are doing. There are no easy answers here, and coming up with an honest appraisal of the situation might depend, at least in part, on the relationship between IT and the rest of your organization. You might need to outsource the discovery process in order remove IT from the picture. If nothing else works, ask your employees directly what services they're using.
Ford to use wearables to improve health and safety in cars
"If we can tell a little bit more about your state at any particular time, we can tune the vehicle -- [and] the information coming to you -- to your current conditions," said Buczkowski. "If you're very tired, if you appear very distracted, maybe we hold off on that phone call and send a [text] message: 'call you back later'." Stromolo speculated that this could help people with health challenges or chronic illnesses to be safer drivers. "Most people go through most of their driving lives without ever being in a serious auto accident," he said, "but they may have a chronic illness that they have every day. And so the question is can we deal with the needs people have on a daily basis and not on this rare occasion when [an accident] happens."
'Luuuk' banking malware may have stolen $682K in a week
The fraud campaign was nicknamed "Luuuk" by Kaspersky after that name appeared in a file path of the server's administrator control panel. It appears the server managed the theft of funds from victims' accounts, automatically transferring the money to the accounts of "mules," or people who agree to receive the funds for a cut and transfer the bulk of the funds onward. Server logs indicated that as much as $682,000 may have been transferred in a single week, wrote Kaspersky's Global Research and Analysis Team. The data indicated around 190 victims. Analysts also saw on the server descriptions of fraudulent transfers and the IBAN (international bank account number) numbers for victims and money mules.
Banks Beef Up Data-Gathering in Bid to Personalize Service
Banks are gathering data in many different ways. Some are building data-gathering capabilities into their technology upgrades. Others are starting to track customers' location by their mobile phones, and such data could come in handy in pitching products — auto loans for customers who may be car shopping, for example. And some banks are simply asking more questions. Comerica Bank rolled out last year an online questionnaire tool that, based on their answers, will advise web visitors which accounts best suit their needs. Dollar Bank is using data analytics technology from IBM so that its call center agents could have better visibility into when and where consumers were running into issues in online banking, said Pamela Dancisin
CISO Rising: New Roles and Responsibilities
The entire executive team, including the board of directors, must assume a new management and governance role at the intersection of technology, business and risk— and they must be equipped to own such risks. The CISO must provide the support to fulfill this new mandate, bridging the gap between operations and IT to keep critical business systems, data and other assets secure. To succeed in this role, CISOs must have deep knowledge not only of IT, but of the entire enterprise, forging strong relationships with the company’s customers, top management and external suppliers. They also must be granted greater authority, direct reporting lines to the C-suite, and regular interaction with the board as it steps up its oversight and involvement in defending and responding to cyber-attacks.
Quote for the day:
"Discovery consists of seeing what everybody has seen and thinking what nobody has thought." -- Albert von Szent-Gyorgy
Google and Intel will "work together to bring this platform and experience to market," Intel said in a statement. An Intel spokeswoman said more details about the partnership will be shared at a later date. It is likely that Intel will supply chips for TVs, set-top boxes and devices like Chromecast, analysts said. The goal is to put as many Intel chips as possible in more consumer electronics, which is a hot market right now. "You've got to be in consumer electronics, that's where everything is going on," said Jim McGregor, principal analyst at Tirias Research. The partnership is perhaps the best way for Intel to attack the TV market following previous failures, analysts said.
Dell Focuses On Security
With products such as CE, Dell hopes to bring enterprise-class security resources to small and midsized businesses. Pitched as turnkey products that take the complexity out of BYOD programs and other device and data-management challenges, Dell's Data Protection lineup exemplifies the company's ongoing effort to redefine itself as not only a PC and server manufacturer, but also a leading enterprise software player. Dell also announced Dell Data Protection Hardware Crypto Accelerator (HCA). Available on select Dell Latitude, Optiplex, and Precision PCs, HCA supports self-encrypting drives that make encryption keys inaccessible if a device is tampered with.
Using Big Data to Tackle Supply-Chain Demands
BriefingsDirect had an opportunity to learn first-hand how big data and analysis help its Global 500 clients identify the most pressing analysis from huge data volumes we interviewed Ernie Martinez, Business Information Management Head at the Capgemini Financial Services Global Business Unit in London. The discussion, at the HP Discover conference in Barcelona, is moderated by me, Dana Gardner, Principal Analyst at Interarbor Solutions. Here are some excerpts:
Take control of the Command Prompt with PromptPal
For the life of me, I couldn't recall the name of the tool. However, after a bit of searching on the web, I was able to find it. Called PromptPal from Technology Lighthouse, I immediately downloaded the tool. After reacquainting myself with it, I soon discovered that the newest version of PromptPal provides all sorts of new features that really make it a nice addition to Windows 7/8.1 when working from the Command Prompt. Knowing that there are a lot of command-line junkies out there, I decided to write an introduction to some of my favorite features in PromptPal.
The Practical Science of Data Center Capacity Planning
Through it all, you need to apply the practical science of capacity planning to really create a powerful data center model. Key emerging industry trends toward Data Center Infrastructure Management (DCIM) and Software Defined Data Centers (SDDC) demonstrate a continuing need to look at the key balance between IT and communications and facilities management. Capacity planning brings together all the key resource and output factors that constitute a data center’s reason for commission and its means of fulfilling that. As critical resources become more expensive or scarce, being able to plan for future capacity requirements becomes more critical.
How to develop a consumer cloud services strategy
That's not to suggest you should give up your management and monitoring strategies, but you need to go beyond the traditional enterprise systems to know what your workers are doing. There are no easy answers here, and coming up with an honest appraisal of the situation might depend, at least in part, on the relationship between IT and the rest of your organization. You might need to outsource the discovery process in order remove IT from the picture. If nothing else works, ask your employees directly what services they're using.
Ford to use wearables to improve health and safety in cars
"If we can tell a little bit more about your state at any particular time, we can tune the vehicle -- [and] the information coming to you -- to your current conditions," said Buczkowski. "If you're very tired, if you appear very distracted, maybe we hold off on that phone call and send a [text] message: 'call you back later'." Stromolo speculated that this could help people with health challenges or chronic illnesses to be safer drivers. "Most people go through most of their driving lives without ever being in a serious auto accident," he said, "but they may have a chronic illness that they have every day. And so the question is can we deal with the needs people have on a daily basis and not on this rare occasion when [an accident] happens."
'Luuuk' banking malware may have stolen $682K in a week
The fraud campaign was nicknamed "Luuuk" by Kaspersky after that name appeared in a file path of the server's administrator control panel. It appears the server managed the theft of funds from victims' accounts, automatically transferring the money to the accounts of "mules," or people who agree to receive the funds for a cut and transfer the bulk of the funds onward. Server logs indicated that as much as $682,000 may have been transferred in a single week, wrote Kaspersky's Global Research and Analysis Team. The data indicated around 190 victims. Analysts also saw on the server descriptions of fraudulent transfers and the IBAN (international bank account number) numbers for victims and money mules.
Banks Beef Up Data-Gathering in Bid to Personalize Service
Banks are gathering data in many different ways. Some are building data-gathering capabilities into their technology upgrades. Others are starting to track customers' location by their mobile phones, and such data could come in handy in pitching products — auto loans for customers who may be car shopping, for example. And some banks are simply asking more questions. Comerica Bank rolled out last year an online questionnaire tool that, based on their answers, will advise web visitors which accounts best suit their needs. Dollar Bank is using data analytics technology from IBM so that its call center agents could have better visibility into when and where consumers were running into issues in online banking, said Pamela Dancisin
CISO Rising: New Roles and Responsibilities
The entire executive team, including the board of directors, must assume a new management and governance role at the intersection of technology, business and risk— and they must be equipped to own such risks. The CISO must provide the support to fulfill this new mandate, bridging the gap between operations and IT to keep critical business systems, data and other assets secure. To succeed in this role, CISOs must have deep knowledge not only of IT, but of the entire enterprise, forging strong relationships with the company’s customers, top management and external suppliers. They also must be granted greater authority, direct reporting lines to the C-suite, and regular interaction with the board as it steps up its oversight and involvement in defending and responding to cyber-attacks.
Quote for the day:
"Discovery consists of seeing what everybody has seen and thinking what nobody has thought." -- Albert von Szent-Gyorgy
No comments:
Post a Comment