Subscribe: IT-Sideways: Tech Blog Malaysia
Added By: Feedage Forager Feedage Grade A rated
Language: English
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: IT-Sideways: Tech Blog Malaysia

IT-Sideways - technology social media

Independent ICT content provider - get informed, get liberated, get free More than 5 million businesses, all over the world, actively advertise on Facebook.

Updated: 2017-05-26T02:13:28.291+08:00


Grab Announced as Official Ride Hailing Partner for 29th SEA Games and 9th ASEAN Para Games


May 23, 2017 - Petaling Jaya -

Today, the region’s largest ride hailing and multiservice platform, Grab sealed its role as the gold sponsor with the title Official Ride Hailing Partner for the upcoming 29th SEA Games and 9th ASEAN Para Games, also known as Kuala Lumpur 2017 (KL2017).

This sponsorship marks a significant milestone for Grab, who will be celebrating their fifth anniversary, as it is the first time a ride hailing service is sponsoring the largest gathering of SEA’s top athletes.

Representing Grab at the announcement and the exchange of the Memorandum of Understanding of the sponsorship was Sean Goh, Country Head of Grab Malaysia, while the Ministry of Youth and Sports was represented by its Secretary General, YBhg. Dato’ Lokman Hakim Bin Ali.

(From left) YB Brig. Gen. Khairy Jamaluddin, Minister of Youth and Sports; Anthony Tan, Group CEO of Grab, YBhg. Dato’ Seri Zolkples Embong, Chief Executive Officer of MASOC  and Sean Goh, Country Head of Grab Malaysia

Present to observe the exchange were YB Brig. Gen. Khairy Jamaluddin, Minister of Youth and Sports; Anthony Tan, Group CEO of Grab; Y.B. Datuk M. Saravanan, Deputy Minister of Youth and Sports; YBhg. Dato’ Seri Zolkples Embong, Chief Executive Officer of MASOC and Mr. Ng Keng Chuan, Deputy President of the Malaysia Paralympic Council.

“As a Malaysian homegrown company, we are beyond ecstatic to be part of this event. Firstly, our participation affirms our commitment to ensure all athletes, fellow tourists and supporters have access to safe, convenient and comfortable rides. Secondly, we want to help create an eco-friendly sporting event by reducing traffic congestion to and around the venues, thus reducing carbon emissions,” Goh.

In addition, Grab’s expansion to 12 major cities and towns such as Langkawi and Nilai, coupled with their latest features such as GrabShare (on-demand car-pooling service), GrabChat (in-app chat system) and GrabPay (cashless payment option), will provide a seamless travelling experience. Supporters do not have to worry about directions, parking issues, price haggling and especially for tourist, communicating with their drivers.

YB Brig. Gen. Khairy Jamaluddin who is also the chairman of the Malaysia Organising Committee for KL2017 (MASOC) welcomes Grab’s involvement and sees the company as an ideal partner for KL2017.

“Indeed, the partnership with Grab is apt as KL2017 aims to be a truly Green Games and promote environmental awareness and sustainability practices among the public and sports fans alike. I encourage everyone to use public transportation during the Games to help reduce carbon emission,” said YB. Brig. Gen. Khairy.

This is the sixth time Malaysia has the honour of hosting the SEA Games and the third time for the ASEAN Para Games. This is also a double celebration for our young nation as the 29th SEA Games which takes place from August 19 to 30, 2017 and the 9th ASEAN Para Games from September 17 to 23, 2017 coincide with the nation’s 60th year of independence. A total of 405 events in 38 sports will be contested in this year’s games by athletes from the 11 Southeast Asia countries.

Is your Network Protected against Botnets?


By Sumit Bansal Having been in the threat marketplace for several years, botnets are still successful today as it provides a powerful cloud computing network for hackers to spread malware and spam. Like any other malware, botnets are introduced to the computer network through email attachments, websites and USB sticks. As the user accesses these files or compromised websites, malware from the botnets begin to spread and exploit vulnerabilities on the system. Sumit Bansal, Director for ASEAN and Korea, SophosIn a recent research on global spam by SophosLabs, it was found that the global volume of spam dropped by more than half just before Christmas and continued to stay at around the same level, believed to be due to the notorious Necurs botnet going quiet. However, an old-school type of scam was seen to have resurfaced just last month with huge success. Known as pump-and-dump, the scam inflated the stock price of Incapta, a media holding company, encouraging the public to buy into the scam, thus pumping up the stock further.How does a stock scam work? Hackers pick a cheap stock, concoct a believable story to talk it up, such as claiming the company is undergoing an acquisition. The hackers then buy the stocks to increase its stocks price and email unsuspecting victims encouraging them to buy shares in that company. The unsuspecting victims are influenced by the dramatic rise in the company’s stock price and are enticed into buying the shares, falling prey to stock fraud. The impact of botnets Botnets can have a devastating impact on organisations, particularly if the objective is to steal sensitive information. If the botnet is not after company data, it could be using the organisation’s devices and network resources to cause harm to another organization; likely a partner company by spreading malware to their network too. Once the botnet has a foothold in your organisation, it will typically call home to the hacker’s command and control (C&C) server to register its success and request further instructions. It may be told to lie low and wait, attempt to move laterally on the network to infect other devices, or participate in an attack. This attempt to call-home presents an ideal opportunity to detect infected systems on your network that are part of a botnet, but it requires the right technology to be effective. Unfortunately, other than the call home communications, a bot on your network may be extremely difficult to detect. In most cases, the infected device will continue to operate normally or perhaps experience a slow-down in performance that could be easily dismissed or attributed to other factors. And this why a next-generation firewall is the first line of defense against botnets. Best practices in protecting against botnets Advanced Threat Protection (ATP): ATP can identify botnets already operating on your network. Ensure your firewall has malicious traffic detection, botnet detection, and command and control (C&C) call-home traffic detection. The firewall should use a multi-layered approach to identify call-home traffic and immediately identify not only the infected host, but the user and process. Ideally, it should also block or isolate the infected system until it can be investigated. Intrusion prevention system (IPS): IPS can detect hackers attempting to breach your network resources. Ensure your firewall has a next-gen IPS that’s capable of identifying advanced attack patterns on your network traffic to detect hacking attempts and malware moving laterally across your network segments. Also consider blocking entire Geo IP ranges for regions of the world you don’t do business with to further reduce your surface area of attack. Sandboxing: Sandboxing can easily catch the latest evasive malware before it gets onto your computers. Ensure your firewall offers advanced sandboxing that can identify suspicious web or email files and detonate them in a safe sandbox environment to determine their behaviour before allowing them into your network. Web and email protection:[...]

Symantec ISTR 22 : Alarming Increase in Politically Motivated Targeted Attacks


May 5, 2017: Cyber criminals revealed new levels of ambition in 2016 – a year marked by extraordinary attacks, including multi-million dollar virtual bank heists and overt attempts to disrupt the U.S. electoral process by state-sponsored groups, according to Symantec’s Internet Security Threat Report (ISTR), Volume 22, released today. “New sophistication and innovation are the nature of the threat landscape, but this year Symantec has identified seismic shifts in motivation and focus,” said David Rajoo, Director, Systems Engineering, Malaysia. “The world saw specific nation states double down on political manipulation and straight sabotage. Meanwhile, cyber criminals caused unprecedented levels of disruption by focusing their exploits on relatively simple IT tools and cloud services.” Symantec’s ISTR provides a comprehensive view of the threat landscape, including insights into global threat activity, cyber criminal trends and motivations for attackers. Key highlights include: Subversion and Sabotage Attacks Emerge at the Forefront Cyber criminals are executing politically devastating attacks in a move to undermine a new class of targets. Cyber-attacks against the U.S. Democratic Party and the subsequent leak of stolen information reflect a trend toward criminals employing highly-publicized, overt campaigns designed to destabilize and disrupt targeted organizations and countries. While cyber-attacks involving sabotage have traditionally been quite rare, the perceived success of several campaigns – including the U.S. election and Shamoon – point to a growing trend to criminals attempting to influence politics and sow discord in other countries. Nation States Chase the Big Scores A new breed of attackers revealed major financial ambitions, which may be an exercise to help fund other covert and subversive activities. Today, the largest heists are carried out virtually, with billions of dollars stolen by cyber criminals. While some of these attacks are the work of organized criminal gangs, for the first time nation states appear to be involved as well. Symantec uncovered evidence linking North Korea to attacks on banks in Bangladesh, Vietnam, Ecuador and Poland. “This was an incredibly audacious hack as well as the first time we observed strong indications of nation state involvement in financial cybercrime,” said David Rajoo, Director, Systems Engineering, Malaysia. “While their sights were set even higher, the attackers stole at least US$94 million.” Attackers Weaponize Commonly Used Software; Email Becomes the Weapon of Choice In 2016, Symantec saw cyber criminals use PowerShell, a common scripting language installed on PCs, and Microsoft Office files as weapons. While system administrators may use these common IT tools for daily management tasks, cyber criminals increasingly used this combination for their campaigns as it leaves a lighter footprint and offers the ability to hide in plain sight. Due to the widespread use of PowerShell by attackers, 95 percent of PowerShell files seen by Symantec in the wild were malicious. The use of email as an infection point also rose, becoming a weapon of choice for cyber criminals and a dangerous threat to users. Symantec found one in 131 emails contained a malicious link or attachment – the highest rate in five years. Further, Business Email Compromise (BEC) scams, which rely on little more than carefully composed spear-phishing emails – scammed more than three billion dollars from businesses over the last three years, targeting over 400 businesses every day. Caving in to Digital Extortion: Americans Most Likely to Pay Ransom Demands Ransomware continued to escalate as a global problem and a lucrative business for criminals. Symantec identified over 100 new malware families released into the wild, more than triple the amount seen previously, and a 36 percent increase in ransomware attacks worldwide. However, the United States is firmly in the crosshairs of attackers as the number-one targeted cou[...]

Microlink Launches IoT Solutions for Flood Mitigation, Energy Management and Plantations


May 15, 2017 -Microlink Solutions Berhad (‘Microlink’), a local ICT solutions provider, today shares that it is launching three new Internet of Things (IoT) applications that can address some of the recurring issues affecting the operations of Malaysia’s Flood & Natural Disaster Mitigation, Energy Management and Plantations sectors. Simply known as the Smart Environmental Management System, Smart Energy Management System and Smart Plantation System respectively; Group CEO of Microlink, Chia Yong Wei hopes that the introduction of these three IoT solutions will benefit industries that have been underserved by the IoT players so far. The Smart Environmental Management System On average, Malaysia receives 2500 mm rainfall per year, with levels varying significantly during the monsoon season. Floods are one of the most devastating natural disasters in Malaysia, resulting in loss of lives and homes as well as incurring costly damage in flood prone areas. In January, an estimated 15,000 Malaysians, mostly in Sabah and Perak were evacuated as flood waters rose to dangerous levels. Most recently in March, roads in Kuala Lumpur were submerged following intense rainfall. Chia explains that Microlink’s Smart Environmental Management System is an IoT solution that collects, analyses and transmits critical information on rainfall, water levels, humidity and so on to enable better flood prevention and mitigation measures. “This solution will enable authorities to better analyse risk areas and predict potential disasters based on existing data to provide an early warning system. In the event of a flood, the system will be able to transmit relevant information on affected areas with images overlaid onto maps in real time,” he elaborates. The Smart Energy Management System Meanwhile, the country’s electricity demand per Capita (kWh/person) rose from 4,074 in Year 2013 to 4,194 in Year 2014. While consumption continues to rise, unfortunately energy costs are also going up on a consistent basis. Chia says, “One of the key priorities of building owners and managers is to reduce energy consumption in order to bring down operational costs. Microlink’s Smart Energy Management System achieves this by capturing and monitoring energy usage from all the devices in a building’s power circuit in real time.” This data is then churned and analysed to allow building managers to make analytics-backed decisions to better manage energy consumption across different sections or buildings. The solution can be deployed via web or mobile app. “Most businesses already have the data, what they need is an IoT solution that can analyse that data to help them make the right decisions to reduce energy consumption and operational costs,” says Chia. The Smart Plantation System Lastly, Microlink’s Smart Plantation System enables farms to operate in a smarter manner by controlling the vital functions that impact overall production quantity and quality of the plantations, such as water usage and irrigation. The system utilises a sensing technology run over an IoT platform that feeds farmers information such as temperature, moisture, conductivity, soil nutritional values – which are critical to break or make a successful harvest season. Microlink has laid out strategic plans within its Enterprise Solutions division on promoting the awareness of the availability for all three of its IoT solutions, and expects to periodically share on its new adoptions and case studies. “Microlink is focused on helping enterprises in different sectors grow by developing tools that help address the gaps in the ICT solutions market – especially in the area of IoT. Our team will continue to design applications that not only solve issues and increase efficiency but that are also cost effective by being subscription-based and available on cloud. This will enable organisations of all sizes to take advantage of flexible cost structures while adding value,” ends Chi[...]

IT News Week 3 May 2017


For IT News Week 2 May 2017. For this week / last week, here are / were the biggest news. PR - May 18, 2017 - Western Digital Expands NAS-Optimized Hard Drive Offerings to 10TB PR - May 17, 2017 - Taipei, Taiwan - COMPUTEX 2017 PQI “Touched by Intelligence” Invigorate All Your Senses PR - May 17, 2017 - Cb Response Defends South Korean Special Prosecutor's Office from Targeted Cyberattacks PR - May 17, 2017 - NEC provides Mandarin Oriental, Kuala Lumpur with UNIVERGE SV9500 Communications server PR - May 17, 2017 - Siemens: TIA Portal V14 engineering framework: increased productivity, reduced time to market PR - May 16, 2017 - Silver Peak Tops 400 Unity EdgeConnect Customer Deployments Worldwide PR - May 16, 2017 - Empowering Businesses with Enterprise-Grade Swan Cloud AccountingPR - May 16, 2017 - Government Joins Finance Sector At the Top of the Cyber Attack List PR - May 16, 2017 - U Mobile launches Unlimited Hero P78 with Unlimited High-Speed Data & Unlimited Calls to All Networks PR - May 16, 2017 - Customer Experience Management Key for Successful Digital Transformation PR - May 15, 2017 - Monster® grows global channel reach with new international collaboration with Brightstar Corp PR - May 11, 2017 - 11street Signs MOU with MABOPA and Initiates ‘Pesta Buku Online’ PR - May 18, 2017 - Western Digital Expands NAS-Optimized Hard Drive Offerings to 10TB Western Digital Corp., a global data storage technology and solutions leader, today announced the expansion of its award-winning WD Red® and WD Red Pro NAS hard drives lineup with the introduction of 10TB capacity models optimized for use in personal, home and small to medium business NAS systems. Western Digital has shipped more than 15 million helium-based high capacity drives into multiple applications, including for NAS systems, to date and is continuing to support customers with higher capacities and outstanding reliability. The WD Red line of NAS hard drives allow customers to scale up or down to meet their changing NAS storage needs. Features and Specifications: WD Red / WD Red Pro 10TB HelioSeal: Bringing Western Digital’s fourth generation, exclusive HelioSeal technology in 10TB capacity to the NAS storage market 3D Active Balance Plus, an enhanced balance control technology that improves overall drive performance and reliability Seamless integration with Western Digital’s My Cloud® Pro Series NAS and My Cloud Expert Series NAS systems designed specifically for the creative community to enable seamless transfer of content between devices in any location, whether users are shooting remotely or editing at home NASware® 3.0, an enhanced version of WD’s original NASware technology, designed to improve reliability and system performance, reduce customer downtime and to simplify the integration process Optimized performance class – 5400 RPM class for SOHO environments, 7200 RPM class for up to 16 bay NAS systems The WD Red and WD Red Pro 10TB drives are finalizing compatibility testing with a number of leading NAS system providers. WD provides a compatibility list of WD Red-qualified products and manufacturers that is available on the WD website at Availability The new WD Red and WD Red Pro 10TB hard drives are available in July at selected retailers and distributors. The WD Red 10TB NAS hard drives feature a three-year limited warranty and a RM2,249 (inclusive of GST) manufacturer's suggested retail price (MSRP) (model #: WD100EFAX). The WD Red Pro 10TB drives feature a five-year limited warranty and a RM2,449 (inclusive of GST) MSRP (model #: WD101KFBX). PR - May 17, 2017 - Taipei, Taiwan - COMPUTEX 2017 PQI “Touched by Intelligence” Invigorate All Your Senses Asia’s largest, world’s second largest Business to Business (B2B) computer technology exhibition, COMPUTEX Taipei 2017 will be held during May 30th ~ June 3rd. A global leader in mobile peripherals, PQI of[...]

WannaCry Commentaries - Part 1


1.) Acronis Nikolay Grebennikov,VP of Engineering “People, and businesses hear ‘ransomware’ and think such an attack can’t happen to them. The fact is that it can, and in fact, just today – Telefonica was hit by a very aggressive version of the Wcry ransomware. 47 percent of businesses were under ransomware attacks last year and that’s growing. Just look at Telefonica for the latest proof. The real question businesses, hospitals and telcos should be asking themselves is how can I protect myself from a ransomware attack that is seemingly inevitable. The answer – a reliable backup solution that includes active protection against ransomware attacks. Acronis Backup 12 Advanced and Acronis Active Protection can prevent damage from such ransomware and this solution is available for businesses today.” “47% of businesses were under ransomware attacks last year. As witnessed by Telefonica and recent bank attacks in Spain and the UK, the threat is growing. Shutting down computers is one short-term solution but won’t help. Only an integrated solution, combining of backup (passive) and proactive security (active) technologies, working together in one product, provides data recovery in any situation. With such sophisticated ransomware, you can’t have limitations on size of the files, number of files.” “Thankfully for companies, that solution exists today with Acronis Active Protection, which actually detected this virus and is able to stop it. Back up procedures is must have business continuity management in companies who want to be protected.” 2.) Commvault Matthew Johnston, Area Vice President, ASEAN & Korea, Commvault Based on our experiences working with companies around the world, we've developed a list of best practices to protect and recover from ransomware attacks. Develop a program that covers all your data needs. You must identify where your critical data is stored, determine your workflows and systems used to handle data, assess data risks, apply security controls, and plan for evolving threats. If it is not protected, it cannot be recovered. Use proven data protection technologies. You need solutions that detect and notify of potential attacks, leverage external CERT groups, identify and prevent infection, maintain a 'GOLD' image of systems and configurations, maintain a comprehensive backup strategy and provide a means to monitor effectiveness. Employ Backup and Data Recovery (DR) processes. Don’t rely solely on snapshots or replica backup. Your backup process data could just as easily be encrypted and corrupted if it is not stored in a secure way where a ransomware attack. If your process or vendors don’t offer ransomware protection that addresses the proper way to store your data, then your backup plan is at major risk! Educate employees on the dangers of ransomware and how to secure endpoints. Ransomware invasions often originate through endpoints, such as desktop computers, laptops, smart phones, tablets or fringe computing resources. Educating your staff is key. The security off an organization is only as strong as your weakest link. Train your staff on all data recovery and security best practices to get endpoint data protected within your Information Security Program. The strength of an organization lies in your weakest link, with most breaches arising from simple human error. Assess and update any business applicationsMost organizations suffer from key business applications that run on older, sometimes unsupported and unpatchable operating systems, which lack the necessary security updates to stop the spread of potential attacks. To combat this, businesses must invest in a data platform that covers core enterprise, private and public cloud environments and extends to endpoint protection. One that can store immutable, up-to-date copies of all these environments to ensure the ability to recover rapidly - should di[...]

CoreLogic Deploys Commvault to Drive Digital Transformation - Case Study


Researchers have predicted that the amount of data generated by businesses will double every two years and increase by a factor of ten by 2020. With the volume of data exploding across businesses and industries, and customers demanding more than ever before, business leaders are now forced to focus their efforts on embracing data-driven insights to make strategic decisions as well as deploying advanced technology to store and manage this growing volume of data.

With this, backing up data, a critical aspect of any data management strategy, has now become a daunting task, especially for businesses who still uses legacy systems as part of their backup strategies. With companies having to backup petabytes of customer data, traditional duplication methods will risk threatening the operations, security, and revenue of a company should critical failures and outages occur. The solution? The migration to a cloud storage infrastructure elevates the stress of data management and can address the increasing complexity and demands of businesses’ backup requirements.

We have seen CoreLogic, a property data provider in Australia, migrate forty years’ worth of databases onto the cloud and implement Commvault’s platform as a service to support its disaster recover strategy. With the migration, they managed to:
  • Cut 92 per cent of data from daily backups with Commvault’s Deduplication Engine;
  • Seamlessly shift workloads across offices, cloud providers, geographies, and even hypervisor and virtualization platforms on demand;
  • Enhance visibility of data storage and ability to reliably recover quickly and completely;
  • Improve cost savings;
  • Retire tape systems by 2018, and;
  • Reduce innovation cycle time to provide customers with superior experiences.
Check out the case study.

No need to cry - Run Windows Updates Now !!!


As of today, here are the things everybody needs to know about WannaCry ransomware: Microsoft had issued a security patch on 14 Mar 2017 - refer to IBM X-Force, Securelist, MicrosoftInfection mostly detected in Russia - refer to SecurelistIn plain English, the first thing you need to do in the morning is to run Windows updates before opening your emails - this is because this Trojan-based malware exploits one of the vulnerabilities in Windows. According to IBM X-Force, it affected mostly Windows XP, Windows 8 and Windows Server 2003; according to Symantec, it targets data server because it will attempt to shutdown MS SQL Server services and email exchange services whilst encrypting all physical files.I totally agree with Symantec on best practices to protect against ransomware : New ransomware variants appear on a regular basis. Always keep your security software up to date to protect yourself against them. Keep your operating system and other software updated. Software updates will frequently include patches for newly discovered security vulnerabilities that could be exploited by ransomware attackers. Email is one of the main infection methods. Be wary of unexpected emails especially if they contain links and/or attachments. Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content. Unless you are absolutely sure that this is a genuine email from a trusted source, do not enable macros and instead immediately delete the email. Backing up important data is the single most effective way of combating ransomware infection. Attackers have leverage over their victims by encrypting valuable files and leaving them inaccessible. If the victim has backup copies, they can restore their files once the infection has been cleaned up. However organizations should ensure that back-ups are appropriately protected or stored off-line so that attackers can’t delete them. Using cloud services could help mitigate ransomware infection, since many retain previous versions of files, allowing you to “roll back” to the unencrypted form. My advise to you :Run windows updates the first thing in the morning before opening emails. Backup all important files to an external hard disk. Do not open email attachments from unknown source. To those using pirated Windows where windows updates is not functioning, refrain from connecting to the Internet or the office network. Switch to gmail or yahoo email which offers built-in security protection - i.e gmail disallowed exe file to be sent over as attachment. [...]

Backup Files to SD Card in Android Phone


Imagine you have a scenario where the phone is having limited storage space.... If you are a heavy WhatsApp user like most people do, try to 'Clear chat' of your frequently used WhatsApp group.This doesn't clear the photos and videos downloaded to your gallery, this act only clear up the data in the internal database which you can't see. For your information, as of now, there is no way to configure WhatsApp to directly save data to external storage - WhatsApp will store data to the internal storage directly. If that (Clear chat) doesn't help a lot, the next thing you should do is to transfer all photos and videos from your Gallery to a backup device. One way is to get an SD card to serve as the external storage and insert into your phone. The next thing you need is to install a file manager app from Google play - in this case study, 'ES File Explorer File Manager' app is being used for showcase.Take note that you need make sure that the internal storage has ample space to install such apps - if you had only 10 MB in your internal storage, you will need to manually delete the photos and videos and try to install such apps thereafter.After you have installed the app, run the app, select Internal Storage.It will show you all folders in the Internal storage,  select 'WhatsApp'.Select 'Media'Select 'WhatsApp Video'It will show you all videos files downloaded from your whatsapp's chats; select the video which you want to back upFrom the pop-up menu, select 'Move to…'.Select SD CardSelect a folder in the SD card and click 'Paste' - You may want to create a new folder in the SD Card.P/S: The app is not as straight-forward, you need to get yourself familiarized via trial and error. [...]

Sunway Innovation Labs to Propel Technopreneurship


May 5, 2017 - Bandar Sunway -Tan Sri Mohd Irwan Serigar Abdullah, Secretary General of Ministry of Finance and Chairman of Malaysian Global Innovation and Creativity Centre (MaGIC), launched the Sunway Innovation Labs (Sunway iLabs) yesterday at Menara Sunway, Sunway City,with Tan Sri Dr Jeffrey Cheah AO, Founder and Chairman of Sunway Group, and Chancellor of Sunway University. Tan Sri Mohd Irwan Serigar Abdullah, Secretary General of Ministry of Finance and Chairman of Malaysian Global Innovation and Creativity Centre (MaGIC) officiating the launch of the Sunway Innovation Labs. Looking on are Tan Sri Jeffrey Cheah AO, Dr Elizabeth Lee, Matt van Leeuwen, Dr Lee Weng Keng, Professor Graeme Wilkinson and Evan Cheah.Sunway iLabs will function as a start-up incubator as well as runaccelerator programmes,act as a micro ecosystem in encouraging development of the start-up ecosystem within the country.The unique not-for-profit smart partnership concept will see Sunway University, Sunway Group, and Sunway Ventures working together in a triple helix innovation model, which combines the strengths of stakeholders across academia, industry and government within a collaborative space. Their aim is to foster entrepreneurship and stimulate market-driven innovations enabling entrepreneurs to scale their business faster. At the Sunway iLabs, students from Sunway University will be able to apply their talent and technical expertise to growth-hack Sunway Group’s 12 business units. Sunway Ventures, the venture arm of Sunway Group which was set-up last year to drive the organisation’s future growth will fund viable startups that are synergistic to Sunway’s businesses. Sunway iLabs will also sync with the wider start-up ecosystem in Malaysia and abroad through collaborations and strategic partnerships to enable entrepreneurs to scale their business. Sunway iLabs has already established links with government bodies such as the Malaysian government agency responsible for overseeing MSC Malaysia implementation, MDeC; Agensi Inovasi Malaysia (AIM)-owned national technology commercialisation platform in collaboration with SME Corporation Malaysia, Platcom Ventures; Malaysian Global Innovation and Creativity Centre (MaGIC), Cradle Fund Sdn Bhd (Cradle) and its official trade association and governing body for Angel Investors and Angel Clubs in Malaysia, Malaysian Angel Business Network. In addition, Sunway iLabs has also partnered ride-hailing giant, Grab, and Silicon Valley-based entrepreneur camp designers, Young Outliers. “The fact that Sunway's iLabs is set-up as a non-profit entity demonstrates Sunway's generosity and commitment to the national interest, particularly our drive towards being a top 20 country as outlined in the TN50. MaGIC is pleased to have Sunway iLabs as a partner," commented Tan Sri Mohd Irwan Serigar Abdullah. Tan Sri Dr Jeffrey Cheah AO said that Sunway Group had created Sunway Ventures as its corporate venture capital arm to invest and drive Sunway’s competitiveness in the digital space for the decades ahead. “iLabs marks the first joint initiative undertaken by Sunway Ventures and Sunway University. It will drive Sunway’s growth for the decades ahead and identify sunrise industries for us to invest in. It is a novel project that is aligned with the Government's stated goal of making Malaysia the start-up hub of the region. This non-for-profit iLabs will bring together the collective talents, financial muscle and deep experience of Sunway University, Sunway Group, and Sunway Ventures in to a single collaborative space to foster entrepreneurship and stimulate market-driven innovations,” said Tan Sri Jeffrey Cheah. The launch also saw three Memorandums of Understanding (MoUs) exchanges. Grab Malaysia was represented by its Country Head,[...]

IT News Week 2 May 2017


For IT News Week 1 May 2017. For this week / last week, here are / were the biggest news. PR - May 11, 2017 - Astro launches “NJOI Now” to offer free video streaming service PR - May 10, 2017 - Former SAS-Boss becomes new Webtrekk CEO PR - May 9, 2017 - OutSystems Named a Leader in Gartner’s 2017 Magic Quadrant for Enterprise High-Productivity Application Platform as a Service PR - May 8, 2017 - Fusionex Wins Technology Partner Award from Amazon Web Services PR - May 4, 2017 - Siemens enhances presence in Myanmar with strong partnership in the ports PR - May 3, 2017 - BP Healthcare’s Doctor2U partners with Microsoft for its Digital Transformation journey PR - May 3, 2017 - Registration is Open for the First Global Leadership Programme PR - May 2, 2017 - Taipei, Taiwan - CyberMedia and TAITRA Announces Partners for CyberMods 24hrs Mergermarket - Apr 26, 2017 - Asia's EMU M&A rocketed 323% YoY in Q1 2017 PR - May 11, 2017 - Astro launches “NJOI Now” to offer free video streaming service Astro Malaysia Holdings Berhad (Astro) today launched a new video streaming service, NJOI Now, available on mobile and online to provide Malaysians free access to on demand entertainment including box sets, live sports and breaking news. NJOI Now is designed to meet the digital lifestyles of consumers today, offering complete flexibility with no fuss. NJOI Now is the only mobile app in Malaysia to provide free on demand content, box sets and signature titles from Astro Prima, Astro Maya HD, Astro Oasis, Astro AEC, Astro Vaanavil; the best of live local sports on Astro Arena; latest news on Astro Awani as well as exam tutorials on Astro Tutor TV. Just download and start watching the best of local and international content on the mobile and online. (L-R): Syamel; Sufi; Hafiz; Hazama; Datuk Seri Dr. Salleh Said Keruak, Communications and Multimedia Minister; Aznil Hj. Nawawi; Dato’ Rohana Rozhan, Group Chief Executive Officer of Astro; Jasper; Azlin Arshad, Chief Operating Officer, NJOI; Ara; HanifFor individuals who want to access a wider variety of premium content, NJOI Now offers prepaid options for instant access to additional channels and titles, including Astro WARNA, Astro RIA, Astro Wah Lai Toi, Hua Hee Dai, latest movies on Astro First and Astro Best, and many more from the on demand section. At the same time, users can enjoy personalized shopping experience on Go Shop channels and catch-up on missed episodes of their favourite shows, or watch a selection of on demand movies for free. NJOI Now is available to all Malaysians, and is supported on multiple devices, currently with up to two devices, per signed in user. Download the NJOI Now app from the Google Play Store or Apple Store on the tablet or smartphone or livestream via PR - May 10, 2017 - Former SAS-Boss becomes new Webtrekk CEO Webtrekk, a customer intelligence provider headquartered in Berlin, announced that Wolf Lichtenstein, longtime head of SAS Germany and current partner at McKinsey, will become CEO starting on 1 June 2017. Lichtenstein takes over for Webtrekk founder Christian Sauer, who will remain on the board and focus on global business development. Lichtenstein’s primary focus as Webtrekk CEO will be expanding the company’s presence in the international customer intelligence market.Wolf LichtensteinLichtenstein started working at the analytics software giant SAS in 2005, most recently acting as Managing Director SAS Germany and CEO DACH, where he was responsible for SAS’s customer intelligence initiative. Under his leadership, SAS continually set new records for revenues and profits. Last year he became a partner at McKinsey in the field of analytics. “I can’t wait to dive into my new role as CEO at Webtrekk,” Lichtenstei[...]

Three traps to avoid on the path to digital transformation


By Ben Pring, Co-Director, Centre for the Future of Work, Cognizant, and Co-Author of “What to Do When Machines Do Everything: How to Get Ahead in a World of AI, Algorithms, Bots, and Big Data” (Wiley, February 2017) Ben Pring, Co-Director, CognizantWithin the next ten years, disruptive technologies such as mobile internet, cloud technology, 3D printing, and advanced robotics are expected to result in 30% GDP growth in Southeast Asia alone. There is no doubt that across industries, these emerging technologies are the biggest disruptors today. However, many organisations undergoing digital transformation are crumbling under their own weight. Business leaders are struggling to set a digital strategy, shift organisational structures, and remove the barriers that are keeping them from maximising the potential impact of new digital technologies. One of the key determinants of digital transformation is the right business model. In this context, the business model is the process architecture, and the supporting organisational model used to run the business. The truth is, many organisations follow business models that are too slow, too expensive or too cumbersome to achieve these very goals as they were built long before the digital age. Complexity hinders the process of digital transformation. To make the most of their digital initiatives, organisations need to implement new business models and new ways of working. Too often, organisations take the easy way out by “doing digital” instead of “being digital.” They mistake the superficial usage of digital technology as digital transformation. Initiatives such as putting a mobile front-end on an existing enterprise application tend to be used by business leaders as examples of successful digital transformation. This jamming of fourth-generation technology into third-generation business models is quick, cheap and low risk. However, it doesn’t bring any real added value to the business. To truly be digital, businesses must rethink, rearchitect and rebuild their supporting business models. To truly gain results, the supporting business models should be thoroughly digital, with process flows and supporting organisational structures based on digital principles. In this journey to being digital, there are three traps that companies must avoid at all costs. Trap 1: The FANG Trap ― I want to be the next unicorn Some enterprises try to mimic technology unicorns such as Facebook, Amazon, Netflix and Google. However, in most cases, not only does this approach not work, but it also turns out to be highly counterproductive. Different companies have different starting points, face different business challenges, and eventually have different goals and success metrics in their digital transformation journey. Traditional companies often need to go from being industrial firms to following a digital/industrial hybrid business model. That’s a different challenge from what it takes to build the likes of Airbnb that’s a digital middleman or a social media platform such as Facebook or Twitter. Trap 2: The “Boil-the-Ocean” Trap ― I want it all, and I want it now This trap can often be the most difficult to avoid. Many highly ambitious management teams decide to go “all in” on digital. They communicate their plans to employees, and confidently declare their intentions inside the company and out. However, a year or two down the line, people start asking basic questions: “How is the digital plan going? How has it changed core metrics, such as sales or profits? How many customers are now on the platform?” Such questions usually induce highly uncomfortable, staring-at-shoes body language. Although well-intentioned and in many cases, very well-resour[...]

Energy Efficiency Resources



On September 29, 2015, the Western Area Power Administration (an agency within the US Department of Energy that markets wholesale electricity) announced that it was closing offered a wide variety of tools, from online cost calculators to a calendar of energy-related events and a database of energy-related jobs.

While most of the site's resources were aimed at energy professionals in other agencies, towns and electric cooperatives, many consumers used the tools as well. Since Energy Experts' tools are no longer available, this page will point you to a wide variety of other websites that can provide similar tools and information for both consumer and professional use.

Energy professionals can find everything from cost calculators for HVAC equipment, to information on improving the efficiency of metal buildings, Energy-related jobs and events.

Customer Experience - The Uncomfortable Truth


Apr 27, 2017 :Organisations around the world are failing to implement effective digital strategies. As a result their customer experience (CX) solutions are becoming disjointed, and digital is not displacing traditional phone interactions at the speed that their customers are demanding. That’s according to new research published today by Dimension Data in the 20th anniversary edition of its Global Customer Experience Benchmarking Report. This year, 1,351 organisations across 80 countries in Asia Pacific, Australia, the Americas, Middle East & Africa, and Europe contributed to the research. 237 out of the polled organisations were from Asia Pacific. Less than 14% of Asia Pacific organisations polled said that they had an optimised strategy for digital business in place, while over 44% of Asia Pacific organisations reported they don’t have a plan at all, or are at best, in the process of developing one. The top factor driving digital transformation is improving CX, followed by customer demands for digital. In Asia Pacific, over 88% of organisations report an uplift in revenue as a result of improved CX, while 85% report cost savings. Yet, just 40% have appointed a board level executive who is responsible for customer experiences, and organisational disconnects mean digital solution functionality is not meeting customer requirements. Instead, high performing companies that have committed to the opportunity created by the digital revolution are outpacing established market leaders. The research shows top quartile organisations are performing up to ten times better than their counterparts. Joe Manuele, Dimension Data’s Group Executive, CX and Collaboration, said: “The world has formed a digital skin and business, service, technology and commercial models have changed forever. However, organisations are strategically challenged to keep pace with customer behaviour.” Manuele adds that the absence of a connected digital strategy means that even when digital solutions are available, the customer is frequently not even aware of their existence. “The digital dilemma is deepening, and organisations need to choose a path between digital crisis or redemption.” Meanwhile, emerging CX robotics is also creating a new reality. Virtual assistant (chat bots) was voted the top channel growth focus for 2017, and IoT deployments are set to double. It demands a new approach. Harold Thng, Director – Customer Experience, Dimension Data Asia Pacific, says, “Pioneers of the digital age have reimagined business models and processes that have changed customer behavior, and the choices organisations make with their CX and digital strategies will define the future success of their organisation.” Other interesting highlights in the 2017 Global CX Benchmarking Report for Asia Pacific are: CX was voted by 83% of participants as a competitive differentiator, and is the number one most important strategic indicator of performance. In Asia Pacific, 76% of research participants forecast increases in assisted-service volumes; 76% expect a rise in fully automated digital contacts; and 69% anticipate overall interactions to grow. Customers have a choice of nine channels with which to engage with organisations - now the norm in organisations. This number will rise to 14 by 2018. Connected customer journeys via omnichannel (integrated) solutions is the top technology trend for 2017. Omnichannel solutions, alongside customer analytics, was listed as the top factors to reshape CX capability in the next five years. Sheila McGee-Smith of McGee-Smith Analytics, L.L.C said: “The annual release of the Dimension Data Global CX Benchmarking Report is a highly-ant[...]

Screenshots Apr 2017


Refer to Screenshots Mar 2017.

1.) At Evernote, it is not an easy task to manage conflicts arising from synchronization.

Don't take it for granted, do appreciate the efforts of this freemium app.

2.) McAfee suddenly decided that is unsafe.

This is probably due to lapse in the machine learning capability.

3.) Firefox upcoming NEW features ...

Legal Impact of Data Protection and Management in the Digital Age


Apr 17, 2017: CommunicAsia2017 Summit speaker, Steve Tan, Partner, Deputy Head – Technology, Media & Telecommunications, Rajah & Tann LLP, shares the legal aspects of adopting new technology and ensuring compliance with data protection regulations. With increasing access to mobile devices and the internet, the amount of data created annually worldwide is predicted to soar to 180 zettabytes (180 trillion gigabytes) in 2025, with approximately 80 billion devices connected to the Internet.Steve Tan, Partner, Deputy Head,Technology, Media & Telco, Rajah & Tann LLPAs organisations look towards data to track consumer patterns and guide business direction, they should also be mindful of the legal regulations that govern the protection of data and the possibility of a data breach. In the past year, we have seen some of the largest data breaches in history with millions of accounts compromised and the release of personal data such as addresses and telephone numbers for sale on the black market. Such high-profile data breaches have been increasing in size and prevalence in recent years, with cyber criminals (and even state actors) taking keen interest in obtaining sensitive corporate and personal information. Besides such hacking attacks, a data breach can also arise from employee mischief or neglect, an inadvertent leak, lack of or failure in security measures, just to name a few. Regardless of the cause, the threat of data breaches is imminent and can have severe repercussions for organisations, especially if they are found guilty of failing to take sufficient measures to secure their data. Singapore's data protection law has one of the highest fines in Asia with each breach subject to a potential fine of S$1 million. Similarly, breaching Europe’s new General Data Protection Regulation can result in a fine of the larger of either 20 million Euro or 4 per cent of the organisation’s global annual turnover. Beyond financial penalties, a data breach can cause irreversible damage to a company’s reputation as well as potentially significant damages payable in civil liability to third parties, not to mention possible personal criminal liability for senior management. Ensuring compliance in an evolving landscape Organisations should be well aware of the prevailing legal regulations that govern ever growing popular technology solutions such as cloud storage, collection, analysis, and offshore storage of customer data. Here are a few tips for organisations to ensure that they comply with the legal regulations where they operate in. 1. Have a clear understanding of how personal data is used and managed in your organisation. Some questions that business leaders need to ask include what personal data has been collected, who has access to this data, whether the purposes of processing of such personal data are lawful, where and how it is kept and secured, and how long such personal data is kept on file. In some instances, data storage and protection is managed on behalf of an organisation by an outsourced service provider. Organisations need to ensure that they understand the level of protection to the data provided by the outsourced service provider and ascertain whether regulations, including sector-specific ones, permit offshoring or cross-border data sharing. In some countries, there appears to be a growing trend of data localisation which means organisations are not permitted to transfer any such data overseas. Data protection regulations in ASEAN countries are also set to develop in future in light of commitments arising from the formation of the ASEAN Economic Community (AE[...]

IT News Week 1 May 2017


For IT News Week 5 Apr 2017. For this week / last week, here are / were the biggest news. PR - May 4, 2017 - Cb Protection 8.0 : Automate Lockdown of Data Center Servers PR - May 4, 2017 - New Kaspersky Endpoint Security for Business Delivers Enhanced Data Protection and Manageability across All Platforms PR - May 4, 2017 - Standard Chartered and announce 3-year strategic partnership PR - May 4, 2017 - Curtin University Advances Smart Campus Vision with Hitachi IoT Solution PR - May 3, 2017 - Commercial Radio Malaysia Announces Its 2017 Leadership PR - May 2, 2017 - AIMS Reports 24% Growth in 2016 - The Best Year Ever Yet !! PR - Apr 29, 2017 - 3M and 11street Host Charity Badminton Clinic to Launch PR - Apr 28, 2017 - Taipei, Taiwan - BIOSTAR Introduces the Perfect Storage Upgrade Choice with New G330 Series SSD PR - May 4, 2017 - Cb Protection 8.0 : Automate Lockdown of Data Center Servers Carbon Black today announced the release of Cb Protection 8.0, the only application control solution on the market to automate lockdown of data center servers. Cb Protection, deployed on 4 million computers worldwide, empowers security teams to lockdown servers and prevent all unauthorized change, achieve continuous compliance and simplify server administration. It is the only security solution to earn 100% protection efficacy in NSS Labs’ Advanced Endpoint Protection test and features: “Rapid Configs”: The highest form of server protection that is quicker and more effective than ever before. These out-of-the-box and cloud-delivered protection rules simplify configuration of application control policies and optimize protection against attacks targeting servers. Enhanced PowerShell and Script Protection: With the increase in fileless attacks leveraging frameworks such as PowerShell, administrators will now have continuous access to the benefits of command-line tools while also being protected against attacks attempting to exploit them. Unified Management, Rapid Rendering and API Improvements: Unified Management allows organizations to keep “local” data “local” to meet compliance requirements, while rapid rendering dynamically displays content to users when it’s available, dramatically improving UI response times. Role-Based Access Control: These controls provide better visibility to mitigate insider threats by limiting access to specific, trusted users. PR - May 4, 2017 - New Kaspersky Endpoint Security for Business Delivers Enhanced Data Protection and Manageability across All Platforms Kaspersky Lab has released an innovative version of Kaspersky Endpoint Security for Business, the company’s flagship solution for corporate security from the constantly evolving cyberthreat landscape. While continuing to provide reliable protection for customers, with the most award-winning solution in the industry, the new edition comes with multiple manageability enhancements, increased flexibility of data protection, and the centralized management of more platforms, applications and devices. As a part of its enterprise-focused functionality, the new Kaspersky Endpoint Security for Business can be used as a sensor for Kaspersky Anti-Targeted Attack platform. Once installed, the sensor component can collect and deliver data to the platform, providing more visibility into corporate systems. The Changes audit functionality in Kaspersky Endpoint Security for Business allows IT security teams to track changes in policies and tasks, and compare revisions to identify any differences instantly. This significantly improves control over changes in the security settings[...]

Huawei Releases C-C4ISR Collaborative Public Safety Solutions at Global Safe City Summit 2017


Apr 28, 2017 - Dubai, The United Arab Emirates : Huawei hosted its Global Safe City Summit 2017 themed "Leading New ICT, The Road to Collaborative Public Safety" in Dubai from April 26-27. More than 350 government customers, industry experts, and partners participated in the summit to share their experience and opinions, and promote digital transformation of the public safety industry. During the summit, Huawei introduced the C-C4ISR Collaborative Public Safety Solutions, which will drive digital transformation of the global public safety industry. Together with world-leading public safety partners such as YITU, SenseTime, Zenith, iOmniscient, and GSAFETY, Huawei also released the first all-cloud and matrix intelligence Video Cloud Solution and Crisis and Disaster Management Solution. The solutions are designed to address diverse safety threats and protect citizens in cities across the world. With increasing global urbanization, cities are expanding and becoming less safe. Governments are increasingly focused on developing safe cities and aim to reshape urban public safety systems through innovative ICT. However, traditional siloed public safety systems typically lack information sharing capabilities and are major barriers to effective collaboration between different government agencies, which is essential for prevention of and response to emergency situations. C-C4ISR Collaborative Public Safety Solutions will be the core of public safety systems Commenting on public safety, Fan Siyong, President of Public Sector of Huawei Enterprise Business Group, said: "As cities embrace digital transformation, new safety threats are emerging that need to be addressed by the public safety industry. We need to keep pace with social and technological developments and shift from a traditional city safety construction model to one of collaborative public safety. By building cross-region and cross-agency collaborative public safety systems that connect governments and citizens, we can help cities better prevent, detect, handle, and recover from various threats. The ‘collaborative’ method of C-C4ISR will be fundamental to digital transformation of the public safety industry. Using new ICT such as Internet of Things (IoT), Big Data, mobile broadband, and Software-Defined Networking (SDN), as well as cloud-pipe-device synergy, the solution will drive efficient collaboration among governmental agencies as well as between governmental agencies and citizens." The Collaborative-C4ISR or C-C4ISR includes C-Command & Control, C-Communication, C-Cloud, cross-agent C-Intelligence based on Big Data, service-oriented C-Surveillance, and C-Reconnaissance leveraging numerous access technologies of various types of devices, such as IoT and drones. "Collaborative" is the core feature of the C-C4ISR, enabling crucial visualization and convergence to maximize public safety. During the summit, Hong-Eng Koh, Global Chief Public Safety Expert of Huawei Enterprise Business Group, stated: "In today’s digital world, platforms and ecosystems are accelerating digital transformation of cities and changing the way people connect and communicate, such as using Facebook, Uber, and WeChat. In this new era, crimes and other threats are rapidly developing and public safety agencies need advanced technology that enables inter-agency collaboration to handle emerging threats and challenges. Huawei’s C-C4ISR platform and partner ecosystem are helping agencies to develop a collaborative public safety method that can help them maintain control over fast-changing situations." Hong-En[...]

BIOSTAR Debuts World’s First and Only Mini-ITX Motherboard for AMD RYZEN


April 20,2017 - Taipei, Taiwan BIOSTAR is thrilled to announce the latest addition to the growing mini-ITX family of BIOSTAR motherboards with the introduction of the world’s first mini-ITX motherboards for AMD AM4 platform and the first mini-ITX RGB LED-capable motherboards with AMD X370 and AMD B350 chipsets. BIOSTAR is pleased to welcome the new BIOSTAR RACING X370GTN and RACING B350GTN mini-ITX motherboards into the RACING Series family.Both motherboards aim to deliver the best balance of form and function, delivering the full potential that the AMD AM4 platform offers especially with AMD RYZEN CPUs, all in a small package. The BIOSTAR RACING X370GTN and RACING B350GTN comes equipped with BIOSTAR 2nd-gen RACING features like 5050 LED Fun Zone with dual 5050 LED header for DIY customization, the BIOSTAR exclusive VIVID LED DJ with full RGB LED control that lets enthusiasts design their own system lighting with precise control. Together with that, BIOSTAR also adds performance and quality features for maximum system performance and stability. With the multi-threaded performance of AMD RYZEN CPUs, it’s a great choice for content creators and professionals looking for a highly-accessible, high-performance processor to help them in their work and together with BIOSTAR RACING Series AM4 mini-ITX motherboards, it makes it easy to maximize your workspace by building a system with a relatively small footprint that does big things. Perfect for Small-Form Factor Systems The mini-ITX form factor is the perfect for small form factor (SFF) systems and with today’s powerful components, you can make the perfect SFF gaming or workstation with the right parts. BIOSTAR’s RACING X370GTN and RACING B350GTN allows system builders, power users, enthusiasts to create their perfect SFF system without compromising performance. The size of the new mini-ITX motherboards from BIOSTAR allows modders to create mind-bending works and BIOSTAR knows this perfectly well as the new RACING Series motherboards including the new mini-ITX models include supports for RGB lighting for the perfect fusion of performance and style. The BIOSTAR RACING X370GTN will have an MSRP of $129 and the RACING B350GTN has a $109 MSRP. Immersive Gaming Experience with World of Tanks and BIOSTAR RACING Series Indulge in the most realistic armored warfare experience with BIOSTAR and World of Tanks as they bring gamers closer to the actual battlefield with superb performance. Enjoy the BIOSTAR advantage in World of Tanks when you buy a BIOSTAR RACING motherboard, VGA or peripheral where you will receive an exclusive invite codes for premium gift packs for World of Tanks Asia server players. Charge into battle with the BIOSTAR advantage. Both motherboards feature plenty of fast connectivity with four USB3.0 ports, two USB3.1 Gen2 ports with a traditional Type-A and the new reversible Type-C ports available. Legacy PS2 support for older devices and multimedia output including HDMI and DVI as well as SPDIF and 5 audio output ports for multi-channel setups.Specifications ModelRACING X370GTNRACING B350GTNCPU Support AMD A-series APU / Ryzen CPU / NPU for Socket AM4Maximum CPU TDP (Thermal Design Power) : 95WattChipsetAMD X370AMD B350Memory Support Dual Channel DDR4 3200(OC)/ 2933(OC)/ 2667/ 2400/ 2133/ 1866 MHzSupport Non-ECC & ECC Un-buffered DIMM Memory modules2 x DDR4 DIMM Memory SlotMax. Supports up to 32GB Memory* DDR4 2667 for AMD Ryzen CPURyzen - DDR Maximum Frequency Support Table (For better DDR4 compatibility, it is recommended to follow the table b[...]

INTERPOL World 2017 Congress to lead industry dialogue for a unified approach to combat future crime


The ever-evolving global security challenges faced by the law enforcement agencies in the 21st century requires stakeholders from all around the globe to work together to make the world a safer place. The threats are increasingly daring and sophisticated, with security breaches in the beginning of 2017 in cities that were considered the safest in the world.

INTERPOL World 2017, the global exhibition and congress platform, returns to Singapore this year to bring law enforcement agencies, government bodies, academia, security professionals and solution providers together to foster collaborations in addressing future security challenges.

In its second edition, the INTERPOL World Congress will see a brand-new structure, with three dedicated tracks – Cybercrime (4 July), Safe Cities (5 July) and Identity Management (6 July) – featuring over 40 speakers across the public sectors, such as:
  • Arthur Holland Michel, Co-Director, Center for the Study of the Drone, Bard College
  • Cheri McGuire, Chief Information Security Officer (CISO), Standard Chartered
  • Dr Donato Colucci, Senior Regional Immigration and Border Management Specialist, International Organization for Migration (IOM)
  • Jim Pitkow, Chair Technical Task Force, Thorn
  • Michael Hershman, Group CEO, International Centre for Sport Security (ICSS)
  • Nils Andersen-Röed, Operational Specialist / Project Leader Darkweb Team, Dutch National Police
  • Rob Leslie, Chief Executive Officer, Sedicii Innovations Limited (World Economic Forum’s 2015 Technology Pioneer)

IT News Week 5 Apr 2017


For IT News Week 4 Apr 2017. For this week / last week, here are / were the biggest news. PR - Apr 27, 2017 - Western Digital Ships 4th-Gen Helium Hard Drive PR - Apr 27, 2017 - Iskandar Puteri, Johor - Outsourcing Malaysia Launches Southern Office in Iskandar Malaysia PR - Apr 26, 2017 - Mizuho Financial Group Partners with Cognizant to Develop a Distributed Ledger Solution for More Efficient and Secure Trade Finance PR - Apr 26, 2017 - Catch Superstar Lilly Singh Live in Malaysia PR - Apr 25, 2017 - Taipei, Taiwan - BIOSTAR Announces New AMD RADEON RX GPUs PR - Apr 25, 2017 - Kaspersky Lab joins INTERPOL-led cybercrime operation across ASEAN PR - Apr 25, 2017 - Boosting Server Protection with Next-Gen Anti-Ransomware CryptoGuard Technology by Sophos PR - Apr 25, 2017 - LinkedIn reaches 500 million members with growth driven by developing markets in Asia Pacific PR - Apr 24, 2017 - Ruckus Wireless Unveils Experience Management Capabilities with New SmartZone OS Release PR - Apr 24, 2017 - Independent Lab MRG Effitas Confirms Acronis True Image Leads Competition on Ransomware Protection, Performance and Usability PR - Apr 18, 2017 - Goyang, South Korea’s Smart City Enhances Safety with a World Class Safety Surveillance Implementation in Korea PR - Apr 17, 2017 - Malaysians Love Shopping Internationally, says 11streetPR - Apr 27, 2017 - Western Digital Ships 4th-Gen Helium Hard Drive Western Digital Corp. today announced that it has begun shipping its fourth-generation helium-based hard drive with its 12TB HGST-branded Ultrastar® He12 hard drive. The Ultrastar He12 12TB hard drive is the next generation of the company’s award-winning high capacity enterprise-class drive with HelioSeal technology, providing customers with a data storage solution addressing the expansive information management needs and demanding performance requirements of today’s enterprise, cloud and hyperscale workloads. Known for high quality, the enterprise-class Ultrastar He12 HDD features an industry-first eight-disk design, to deliver 12TB capacity using PMR technology in a standard 3.5-inch form factor. It is the world’s highest capacity hard disk drive for active random workloads. Ultrastar He12 Helium HDD HelioSeal: Western Digital’s fourth generation, based on exclusive HelioSeal technology, bringing the highest capacity HDD to market much sooner than competing technologies World’s first 8-disk design, 12TB capacity, available with either 12Gb/s SAS or 6Gb/s SATA interface Data Security: Instant Secure Erase, sanitize and safely redeploy HDDs using the Instant Secure Erase feature SED Features: Help protect end user data with encryption (Self Encrypting Drive) Reliability: Amongst the industry’s highest MTBF rating at 2.5M hours PR - Apr 27, 2017 - Iskandar Puteri, Johor - Outsourcing Malaysia Launches Southern Office in Iskandar Malaysia Outsourcing Malaysia, a chapter of the National ICT Association of Malaysia, launched its southern office in Iskandar Malaysia in tandem with the rapid growth of the GBS (Global Business Services and Shared Services & Outsourcing “SSO”) industry in Iskandar Puteri, Iskandar Malaysia. The office, part of OM’s initiative to establish world-class GBS eco-systems across Malaysia, will facilitate the growth of the local industry while enticing the world to Malaysian shores. The Malaysian Investment Development Authority (MIDA) and i2M Ventures Sdn. Bhd – a wholly owned subsidiary of Khazanah Nasional Berhad are among OM[...]

Brocade Global Study Reveals More Than Half of IT Teams Will Struggle Due to a Lack of the “Right” Skills


Apr 26, 2017 - Brocade today announced a new Global Digital Transformation Skills Study, which aims to uncover how well-placed global IT leaders consider themselves and their teams to be in terms of meeting current and future business demands. Of the six markets surveyed, Germany was found to be the best prepared to meet its digital transformation goals, closely followed by the U.S., while the UK lagged well behind its counterparts. The research, which surveyed 630 IT leaders in the U.S., UK, France, Germany, Australia, and Singapore, indicates that many organizations are at a tipping point, as new technology demands are set to outstrip the skills supply. Organizations that address this now through additional skills training will be in the strongest position to ensure business growth and competitive advantage. Overall, an encouraging 91 percent of global IT leaders acknowledge that IT departments are currently recognized as very important or critical to innovation and business growth. However, over half (54 percent) predict they will struggle with a lack of IT talent in 12 months. Contributing factors identified from the research include skills shortages, prevalence of outdated skills, lack of commitment to training at the corporate board level, and the rapidly changing technology environment. “Businesses are approaching the peak of IT strategic influence. Now is the moment that IT teams feel they have the strongest opportunity to influence the transformation of their organizations,” said Abdul Aziz Ali, Malaysia Country Manager for Brocade. “However, with a rapidly changing technology landscape and potential impact on international labour markets, it is critical that IT receives the right training to further develop their skills and business relevance.” The research also found that skills planning had to be aligned with other areas of business planning to avoid the risk of a technology skills deficit, where IT teams are expected to deliver the benefits of technologies that they are ill-equipped to implement. Staff shortages and outdated skills are preventing ITDMs from delivering on current business demands Organizations are attempting to move their IT departments away from their traditional roles, but the lack of skills and the time required to learn those skills have held them back. IT decision makers (ITDM) believe this could be a major contributor to their inability to meet business demands, putting organizations at risk of falling behind their competitors and losing customers. Approximately one in four respondents in Australia, France, Germany, Singapore, and the U.S. claim that they cannot deliver on current business demand due to staff shortages. This number rises to 42 percent in the UK. Respondents claim that the lack of access to talent will prevent them from implementing new technologies efficiently, lead to a decrease in employee satisfaction, and result in the loss of market share. The IT skills gap is only likely to get worse and organizations need to act now The political landscape is also a contributing factor in the widening skills gap. As market uncertainty intensifies in the next few years, it is more important than ever for IT departments to remain agile and take advantage of new technologies. Ninety-two percent of those questioned had some level of concern about future hiring of IT staff, while 54 percent were concerned about a lack of skilled talent to choose from. Forty-three percent of glo[...]

Unlocking greater possibilities with Next-Generation Access Control Solutions


By Weijin Lee, Regional Director, Secure Issuance, HID Global, Asia Pacific and Alex Tan, Director of Sales, Physical Access Control System, HID Global, ASEAN The security landscape continues to evolve in new and complex ways. Gone are the days where the term “access control” means a simple lock and key system. Access control, instead, conjures images of sophisticated, integrated systems with multi-layered security across multiple facilities. Organizations today face challenges from the adoption of new technologies, escalating security threats and the need to derive greater value from access control infrastructure, while solving increasingly complex system integration. This is no easy task, further complicated by the expansion of digital lifestyles and creation of a smart ecosystem of wearables. As security remains a critical front-line defence for organizations across industries and company sizes, what protective measures can businesses take today? Here are four key tips that companies should consider when implementing the next generation of access control systems. 1. Enhance your data privacy protection Yesterday’s technology is no longer sufficient for today’s access control and identity management challenges. Businesses need to upgrade their legacy access control system to enhance data privacy security - be it through the on-boarding of a client that requires high levels of security, new legislation being brought in for specific industries, or even new building tenants. The driver remains the same: enhancing and protecting data or building facilities that are currently exposed to risk. Integrated visitor management solutions are key. With improved access control solutions, businesses can track any movements within the organization. Implementing new, more dynamic access control technologies provides many benefits over maintaining older, more static ones. Benefits include improving the distribution and use of temporary credentials, while safeguarding various parts of sites to prevent unauthorized access. 2. Future-proof technology integrated into existing Bring-Your-Own-Devices (BYOD) The concept of BYOD is common in today’s digital workplace. With employees using their own smart devices, businesses should consider integrating secure access control measures into employee smartphones or devices for access, instead of issuing additional key cards or fobs that risk a high chance of loss or theft. A single credential for multiple access devices might be today’s solution. Using Open Supervised Device Protocol (OSDP), this industry standard improves interoperability among access control and security products, supporting multiple applications across physical and logical access. By providing multiple access levels on mobile credentials, it saves the users time and complexity, reducing the risk of theft or loss across several devices. This works just as well with smart technology such as wearables, providing increased flexibility and freedom of choice for security managers and employees today. 3. Enhancing security through multi-layered credential validation IT security breaches has included issues with printer security within the past 12 months, according to IDC. Most of today’s card issuance and licensing systems rely on two-dimensional identity validation. Digital components, including smart card chips or magnetic stripes, give ID card and license issuance systems the crucial third secu[...]

Data: The Heartbeat of Info-Driven Businesses


By Owen Taraniuk, Vice President of Asia Pacific, CommvaultThe human heart beats more than 100,000 times daily and close to 40 million times per year — chalking up three billion heartbeats in a person’s lifetime. Much like the human heart, data is what keeps the digital and customer-led economy pumping.Owen Taraniuk, VP of APAC, CommvaultStudies have shown that companies utilising data-driven insights to make strategic decisions have improved their productivity by up to 33 percent. At the same time, the big data and analytics market has exceeded IDC’s predictions by over 50 percent with the analyst group now expecting to see worldwide revenues reach nearly $187 billion by 2019. The writing is on the wall – businesses need to leverage data to conquer today’s disruptive age and stay ahead of the curve. CEOs know this but the question that is keeping them up at night is: how? Volumes of data: beating through the body’s engine roomIn our digital economy, the volume of data will continue to grow. The pace of growth will also continue to accelerate rapidly. Just like the heartbeat, a steady stream of data flows through businesses, providing the necessary insights for business and decision making. Data pools are just like the chambers in our hearts where data is ‘crunched’ and useful information can be extracted – the same way the heart oxygenates and distributes blood throughout the human body. Data must be analysed by companies to transform it into useful information they can then use to make smart, impactful business decisions. The ability to manage this massive flow of data, as it grows in volume, is pertinent to keep businesses running. Variety of data: extracting life-sustaining information for today’s businessesAccording to IDC, analysts are set to achieve an additional $430 billion in productivity gains over their less analytically oriented peers 2020 – pointing to the tangible results that businesses experience when they embrace data analytics to derive information-led insights. Think of it as data receiving oxygen, much like how blood distributes and carries that life-giving element to the rest of the body. But before data can be put together into insights, it must be extracted from the company’s various departmental data pools. Before reaching other parts of the body, blood vessels must first gather and bring blood to the heart to receive oxygen – much like how a vast variety of information is centralised and passed through the boardroom, having been extracted from. This information is then “oxygenated” and enhanced with relevant insights that allows for better business decisions. The problem is this – enterprise data is not uniform. Today, the variety of enterprise data – its format, how it is stored, where it is stored and how it is accessed – presents a daunting challenge to one and all. The question is how do you make sense of it all? As businesses move towards a hybrid IT infrastructure environment, the management of data becomes more complex. With thousands of apps, users, processes and regulations, the time for businesses to re-think their data strategy is now! Velocity of well-managed data: running through my veinsOnce valuable insights from data are extracted, they can then be pumped to the different parts of the company to improve profitability and operational efficiency. The speed at which these data insights are pumped throu[...]