Subscribe: IT-Sideways: Tech Blog Malaysia
http://brandonteohno1-it.blogspot.com/atom.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
attacks  business  cloud  data  digital  jan  kaspersky  malaysia  new  personal  protection  technology  time  year     
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: IT-Sideways: Tech Blog Malaysia

IT-Sideways - technology social media



Independent ICT content provider - get informed, get liberated, get free Happy Chinese New Year 2018 !!! 恭喜发财 !!!



Updated: 2018-02-20T10:44:37.741+08:00

 



Bestow the Gift of Productivity this Chinese New Year

2018-02-13T10:29:20.122+08:00

By Robin Chao, Vice President of Sage Asia Chinese New Year is traditionally a time of joy and good tidings – but it can be a headache for businesses. For many, the holiday season coincides with their peak business period, resulting in the tricky combination of decreased productivity and increased consumer activity, thus bringing added stress. Malaysia's labour productivity clocked an impressive growth of 4.2% in 2017, higher than the yearly average goal of 3.7% under the 11th Malaysia Plan (RMK11) for the period of 2016 – 2020. One of the main thrusts of Malaysia’s Productivity Blueprint is to spearhead the digital drive and to help businesses better tap on innovative technologies. With around 93% of businesses already using the cloud in some form, and worldwide public cloud services revenues expected to grow by 18.5 per cent in 2017 to a total USD260bn, up from USD219.6bn last year, there’s a reason companies should turn to cloud, so let’s look at five benefits that cloud-based technology brings to your business during peak seasons like Chinese New Year. Easy collaboration Cloud technology encourages collaboration, making it easy for people around the globe to connect, communicate and share information. It’s simple to store, view and edit information in one central location, and documents are updated in real time. Everyone’s kept in the loop and colleagues can ‘meet’ virtually, no matter where they are in the world. Better collaboration brings a heap of ang paos to the table, including boosted productivity, improved customer service and engaged, enthusiastic employees. Happy employees It’s not always easy to keep employees focused and productive around the holiday period. For sectors such as retail, food and drink or distribution, Chinese New Year can be an especially busy time of the year. Many businesses may also be tied down with their fiscal year-end in March, leaving them with little time to close the gaps on sales and revenue targets. Cloud-based technology makes it easy for employees to work flexibly, with people able to log on and edit information from anywhere, even on the go. With most cloud services offering mobile apps, it’s simple to work from any device, so everyone can keep up to date, including sales staff, remote workers and those needing a bit more flexibility at this time of the year. Flexible working helps employees to enjoy a better work-life balance, without negatively impacting productivity – especially during this festive season. Gong Xi Fa Chai - Robin ChaoScalability If your business has peak times or different staffing demands, you can really benefit from the flexibility that the cloud offers. It’s easy to scale cloud services up or down, depending on need. This means you can temporarily increase capacity to handle busy periods like Chinese New Year – without having to shell out for hardware or software that wouldn’t be used during quieter seasons. Research shows that unleashing business builders from burdensome admin could unlock over USD 600 billion in lost productivity. This translates to a whopping 120 working days on average, for businesses across the world! Additionally, cloud-based software makes the latest updates immediately available to all users. Getting instant upgrades gives employees new features and functions sooner, making them more productive. Improved data security At busy times, the last thing a business needs is for technology to fail them. Downtime can lead to all kinds of problems, including reduced productivity, lost revenue and reputational issues. A reputable cloud provider will maintain reliable and secure services, giving you peace of mind that all data is secure, safe and recoverable, no matter what happens. It’s easily accessible from anywhere and any device. And if something does go wrong, a cloud host should resolve issues quickly, getting you back up and running in plenty of time for tossing Yu Sheng at a reunion dinner. Cloud can also solve the chaos of documents and data being stored in different formats and on personal [...]



Exabytes Recognizes Malaysia Website Award 2017

2018-02-12T11:17:28.104+08:00

Feb 5, 2018 - The Exabytes Group, the organizer of the prestigious Malaysia Website Awards 2017 (MWA 2017), officially wraps up the Award Presentation Ceremony of the said event at CO3 Social Office, Puchong, Selangor on Saturday, 27 January 2018. The MWA 2017 is the third in the series, seeking to recognize and reward the outstanding performance, talent and effort of the best web developers, web designers and web agencies; and at the same time encourage creativity, sharing and improvement of overall web design quality in the country. Co-organised by EasyParcel, EasyStore and EasyStudio, and sponsored by MYNIC Berhad (diamond sponsor), eGHL (diamond sponsor and photobooth sponsor), Frambie Malaysia (certificate frame sponsor) and CO3 (venue sponsor) among others, the Malaysia Website Awards 2017 features 3 categories, namely Commercial, Personal and E-Commerce. MWA 2017 Official Result: 1.) Site of The Month Awards: Month Category Website Title Website URL Name On Trophy Feb Commercial Web Design Malaysia | E-Commerce Solutions | KEEP DESIGN keepdesign.com.my KEEP DESIGN Personal AriffMac iOS Tips Apps ariffmac.com ARIFF BUKHARI AHMAD BASRI E-Commerce Easy Hotel @ KL Sentral easyhotel.com.my Ahosan Kabir Shaon Mar Commercial Tracking Malaysia tracking.my TECHXC NETWORK Personal Net Geniuse netgeniuse.com Kevin Tan E-Commerce Bicycle Shop foresttrek-cycle-centre.myshopify.com FORESTTREK CYCLE CENTRE E-Commerce GALADO NETWORK galado.com.my Clement & Sherlyn Apr Commercial Malaysia Car Services Directory carkaki.my 3(M) Online Advertising Personal Raihan Jalaludin's Blog raihanjalaludin.blogspot.com RAIHAN HAMIZA BINTI JALALUDIN E-Commerce Senheng Electric senheng.com.my Optima Innovations (M) Sdn Bhd May Commercial Red Panda Group - Digital Marketing Agency redpanda.com.my Mark Javed Personal Celupar Dot Com celupar.com Miclee Brunei E-Commerce Khimyan Curry - a Malaysian born Curry Paste! khimyan.com Global Foodie Network Sdn Bhd Jun Commercial Portal Rumah Lelong Johor lelongbank.com Suhaimi Mohd Said Personal Tomboy Tarts tomboy-tarts.com Bike Bear E-Commerce Baju Baby Shop Online Malaysia | doudou.my doudou.my Dou Dou Trading Jul Commercial Jacarlin Web Solutions jacarlin.com Jacarlin Sdn Bhd Personal SifuWebsite sifuwebsite.com Syafiyullah Yahya E-Commerce T-Shirt Printing Services in Malaysia everytees.com Michael Lim Aug Commercial Seminar Imej 360 | Puan Mary imej360.puanmary.com Ammar Ihsan Nasution Personal Mei Mei Chu meimeichu.com Chu Mei Fong E-Commerce PEACETEE MALAYSIA peacetee.my Dragon Ang Sept Commercial K&A Creatives 2017 Site kacreatives.com Pelican Resources Personal jomtravellagi jomtravellagi.com Ahmad Farid Amran E-Commerce Domino's Pizza Malaysia dominos.com.my Rachel Chen Oct Commercial Keko Group kekogroup.com Inspiren Network Sdn Bhd Personal PublishingState.com PublishingState.com ZULKIFLI MUSA E-Commerce cregostore cregostore.com Crego Sdn Bhd Nov Commercial Karuna Website Design karunasarawak.com Melvin Ong Personal Kaki Jalans - see. experience. share kakijalans.com Khairul Idzwan bin Kamarudzaman E-Commerce DE SOPHEA | Online Fashion desophea.com DE SOPHEA Dec Commercial Diverse Borneo - Scuba Diving in Kota Kinabalu diverse-borneo.com Chin Kwan How Personal EDO.my Your Complete Food, Events and Happenings Guide in Ipoh edo.my Jonath Lee E-Commerce Cheong Fatt Tze Mansion cheongfatttzemansion.com WebMedic2.) Public’s Favourite Website Awards: Category Website Title Webs[...]



IT News Week 2 Feb 2018

2018-02-14T07:36:39.365+08:00

For IT News Week 5 Jan 2018.PR - Feb 9, 2018 - Mergermarket released full year 2017 Technology Media & Telecommunications M&A report PR - Feb 9, 2018 - Kaspersky Lab Launches Advanced Cybersecurity Platform PR - Feb 8, 2018 - Focus Dynamics Group Launches Ministry of Wine E-Commerce Site PR - Feb 8, 2018 - Bosch Announces Collaboration with Yonah to Help Solve Healthcare Challenges in Papua New Guinea PR - Feb 7, 2018 - Retarus introduces Advanced Threat Protection for increased defense against cyber risks PR - Feb 7, 2018 - Dimension Data Adopts Cisco Umbrella in Its Cybersecurity Strategy PR - Feb 7, 2018 - Announcing the new Surface Book 2 for Malaysia PR - Feb 6, 2018 - honor and Gameloft Launch “Modern Combat Versus honor International Series” PR - Feb 5, 2018 - OutSystems Explodes with Record 63% Growth PR - Feb 5, 2018 - Fusionex wins Malaysia Airlines Project for Information Collaboration and Data Management Platform PR - Feb 1, 2018 - Hitachi Vantara Announces Key Executive Promotions PR - Feb 9, 2018 - Mergermarket released full year 2017 Technology Media & Telecommunications M&A report Mergermarket, an Acuris company, has released full year 2017 Technology Media & Telecommunications (TMT) report. Please click into below link to view the full report. Report Highlights Software as a dominant service: Half of all deal activity in TMT was driven by M&A in the Computer Software sub-sector alone, which accounted for 1,739 transactions (worth US$ 128.8bn). The top deal within the sub-sector was China-based SJEC Corporation’s US$ 6.4bn purchase of China based online virus detection and protection firm 360i Technology. The age of Amazon: Amazon snatched up health food supermarket chain Whole Foods in June for US$ 13.5bn, its largest acquisition ever as well as the largest grocery deal in a decade. The firm had also filed for licenses to operate pharmacy benefit management operations in multiple states, demonstrating how eCommerce, technology, and analytics have increasingly grown to be powerful tools capable of reshaping entire trades. 2018 outlook: The structural change across industries as well as society brought on by Technology’s advances will continue to shape the landscape for dealmaking into 2018. While tax reform in the US, which resulted in a sizeable cut to the corporate tax rate from 35% to 21%, is widely anticipated to spur more M&A transactions as companies look to spend some of their newfound tax savings on deals. However, with expected interest rate hikes projected for 2018 this could also put a damper on deal values, further driving them downward though deal count should not be. Global Software Deal CountAmazon.com's AcquisitionPR - Feb 9, 2018 - Kaspersky Lab Launches Advanced Cybersecurity Platform With digital transformation melting protection perimeters, IT security teams in enterprises are having to deal with the fact that complex threats are already within their network, as illustrated by the 52% of enterprises who believe that their organization may already be hacked. To bring visibility back to corporate networks and reduce response times, New Kaspersky Threat Management and Defense brings together and reinforces the capabilities of Kaspersky Anti Targeted Attack, Kaspersky Cybersecurity Services and new Kaspersky EDR within a single platform. Step 1: Discover the most evasive threats with Kaspersky Anti Targeted Attack Step 2: Ensure visibility and simplify response with Kaspersky EDR Step 3: Cover your back with Kaspersky Cybersecurity Services Also available as standalone solutions, Kaspersky Anti Targeted Attack, Kaspersky EDR and Kaspersky Cybersecurity Services perform best as a single Threat Management and Defense platform, allowing for unified administration and automation of the whole threat management cycle. With the support of all three components of the platform, businesses can adopt a strategic approach to detecting complex attacks across the corporate IT infrastructure and successfully gai[...]



Coworking Space DOJO KL Sells SME Insurance to Members

2018-02-11T10:12:49.708+08:00

Virtual office and coworking space Dojo KL has the office in the heart of the financial district of Kuala Lumpur, the capital city of Malaysia - it is located at Menara Amplewest, Jalan P.Ramlee, KL - walking distance from KL Tower.



With amenities which includes hot shower and a zen garden, it is in Dojo's blood to combine a fusion of modern contemporary design with traditional Japanese elements, DOJO’s 7,000 sqftmulti-faceted workplace features functional spaces such as social areas, focus zones, and Etc.

On Feb 9, 2018, I was informed by cofounder Jack Chan that Dojo KL has begun to make available affordable insurance scheme to its members.

For your information, there is no law in Malaysia to mandate employers to provide employees with insurance coverage, never mind the start-up space.

Converting challenge to opportunities, Dojo partners with PolicyStreet to launch the Employee Protection Plans from RM30 a month with an annual coverage of RM12,000.

PolicyStreet’s Wilson Beh, concurs.

“We support Bank Negara Malaysia’s call to increase the national insurance penetration rate to 75% by 2020 from the current 56%. By collaborating with DOJO, we are able to promote a highly affordable Employees Protection Plan to Malaysian SMEs and build a strong awareness on the need of having the right protection. We wholeheartedly believe that we can do more to help Malaysian SMEs to be protected with the right protection and we aim to do that with one employee at a time, one company at a time.”

One such customer is DOJO KL member - Singapore-based AI email marketing startup, Ematic Solutions Pte Ltd. Its Regional Head of Insights Joshua Kong said, “This is an unbelievably good deal for any startup, and we’ve signed up for it to protect our staff. Startup or SME, I highly recommend this service”.

(image)
Wilson and Jack

Other insurance facts shared by Jack Chan:
  • Insurance penetration stands at just 56% of total population in Malaysia
  • Online insurance distribution still accounts for less than 0.1% of business volume
  • By eliminating double-counting, only 35% of adults have some form of cover



Screenshots Dec 2017

2018-02-05T14:57:23.115+08:00

Refer to Screenshots Nov 2017.1.) You can actually access file folders using Firefox2.) Since 22-Dec-2017, you would no longer able to make payment to Syabas via Maybank2uAccording to the information, you need to resort to JomPay.3.) 12.12 Promotions4.) Yahoo email uses machine learning to study the behavior of email deletion habit.5.) Chrome uses one new instance for each tab and the instances will not close until the first window is closed.This explains why contemporary browser such Chrome is CPU and memory intensive and does not go well with old machines with limited CPU and memory resources.[...]



Acronis FREE AI-based Ransomware Protection

2018-02-01T09:02:16.408+08:00

Jan 25, 2018 - SG -

Acronis, a global leader in hybrid cloud data protection and storage, today released Acronis Ransomware Protection, a free, stand-alone version of its unique AI-based Acronis Active Protection technology, which stops ransomware attacks in real-time and helps users to recover data without paying the ransom.

Acronis Ransomware Protection also comes with a cloud backup capability, allowing users to protect important files not only from ransomware, but also from hardware failure, natural disasters and other causes of data loss. Every user receives 5 GB of free Acronis Cloud storage. Easy to install, Acronis Ransomware Protection is essentially a “set it and forget it” protection solution. The lightweight program (only 20MB) requires limited system resources, which means it can run quietly in the background without affecting system performance. Acronis Ransomware Protection is also compatible with all popular backup and anti-virus programs, enabling users to add a robust layer of protection without modifying their existing setup.

Acronis Ransomware Protection provides an additional level of defense that can be used together with other data protection solutions already installed on the device, such as anti-virus and backup software. It monitors system processes in real-time to automatically detect and stop the attacks other solutions can’t. In event of a ransomware attack, Acronis Ransomware Protection blocks the malicious process and notifies the user with a popup. If any files were damaged in the attack, it facilitates the instant recovery of those affected files.



Proven Technology:

The new solution is based on Acronis Active Protection, which numerous independent tests have ranked the most effective and reliable ransomware protection technology on the market. Acronis stops thousands of attacks every month, saving people’s precious family photos, videos, and important documents. There are many ways to test the effectiveness of the free Acronis Ransomware Protection solution, including the ransomware simulator from RanSim.

How to get Acronis Active Protection Anyone looking to download the free version of Acronis Active Protection can visit www.acronis.com and follow the links to the free download. It’s currently available for Windows only.

(image)
Acronis Singapore Training Room



KLab : Skygofree is advanced and Powerful Android surveillance software active since 2014

2018-01-31T14:30:07.778+08:00

Jan 24, 2018 -

Kaspersky Lab researchers have uncovered an advanced mobile implant, active since 2014 and designed for targeted cyber-surveillance, possibly as an ‘offensive security’ product. The implant, named Skygofree includes functionality never seen in the wild before, such as location-based audio recording through infected devices. The spyware is spread through web pages mimicking leading mobile network operators.

Skygofree is a sophisticated, multi-stage spyware that gives attackers full remote control of an infected device. It has undergone continuous development since the first version was created at the end of 2014 and it now includes the ability to eavesdrop on surrounding conversations and noise when an infected device enters a specified location – a feature that has not previously been seen in the wild. Other advanced, unseen features include using Accessibility Services to steal WhatsApp messages and the ability to connect an infected device to Wi-Fi networks controlled by the attackers.

The implant carries multiple exploits for root access and is also capable of taking pictures and videos, seizing call records, SMS, geolocation, calendar events and business-related information stored in the device’s memory. A special feature enables it to circumvent a battery-saving technique implemented by a top device vendor: the implant adds itself to the list of ‘protected apps’ so that it is not switched off automatically when the screen is off.



SalesCandy the Winner of HLB LaunchPad

2018-01-31T08:04:56.707+08:00

Jan 30, 2018 :Hong Leong Bank Berhad (HLB) has announced SalesCandy, an action-based Customer Relationship Management (CRM) platform, as the winning team for its recently concluded inaugural HLB LaunchPad programme. HLB LaunchPad is a 3-month mentorship programme developed to nurture tech savvy start-ups in reinventing the financial services industry. It is Malaysia’s first public-private partnership between HLB, Cradle and Malaysian Business Angel Network (MBAN). The programme specifically focuses on transforming the bank in three areas: Simplifying Banking Today, Digitising Customer Journeys & Experience; and Re-Imagining Banking for Tomorrow. SalesCandy was among the five finalists at the finals, known as ‘Demo Day’, pitching a system that automatically updates lead status with actions taken by the salespeople. Domenic Fuda, Group Managing Director and Chief Executive Officer of HLB (middle) together with the five startups, their mentors and panel of judges.“We are impressed by the fact that the top management of HLB was highly involved in our development. Our product was tested within HLB’s systems, which benefitted us tremendously in terms of validating our business model. It is truly a unique opportunity,” said Stanley Chee, Chief Executive Officer of SalesCandy. Overwhelming applications were received for the programme, and of the 18 shortlisted start-ups, only five made it to the finals – SalesCandy, Kakitangan.com, PropSocial, CapitalBay and Blinkware Technology. A key proposition of the programme is the hands-on engagement and mentorship provided by HLB’s Senior Management. This opportunity afforded the finalists first-hand exposure to the knowledge, experience, and expertise of key people driving product, business, and infrastructure development. “The success of the programme is a testament to our belief that working with start-ups is the way forward. They have taught us to be more agile, nimble and adaptive to the current market needs. We look forward to seeing a thriving community of start-ups working with us in the future,” said Domenic Fuda, Group Managing Director and Chief Executive Officer of HLB. Dr Sivapalan Vivekarajah, the President of MBAN also complimented HLB on its commitment in nurturing start-ups. “Hong Leong Bank is one-of-a-kind in its sincere and ongoing commitment to engage and grow these start-ups to their full potential,” he said. “HLB Launchpad continues to prove Hong Leong Bank’s commitment in creating a vibrant entrepreneurial community together with Cradle and MBAN. The programme illustrates the effectiveness of our collaboration in bringing value-add to start-up communities and also in helping them to grow to the next level,” said Nazrin Hassan, Group Chief Executive Officer of Cradle. While the inaugural programme has successfully concluded for 2017, the start-ups journey has just started. Selected start-ups have started discussions with HLB to implement their pilot projects, while some have initiated talks with Cradle for equity funding as well as funding from its CIP300 grant programme.[...]



IT News Week 5 Jan 2018

2018-02-01T10:48:07.193+08:00

For IT News Week 2 Jan 2018. PR - Jan 30, 2018 - MediaMath’s training arm upskills over 4,000 APAC marketers with programmatic know-how PR - Jan 29, 2018 - OPPO Announces Partnership with Qualcomm in the 5G Pioneer Initiative PR - Jan 29, 2018 - Malaysia to be the First Global Market to Receive the Crush Red honor View10 PR - Jan 29, 2018 - AccuWeather to Provide Essential Weather Content Worldwide for Entertainment Media Player App, VuLiv PR - Jan 29, 2018 - LinkedIn : Job Seekers in Malaysia Prioritizing Experience over Personal Strengths PR - Jan 27, 2018 - Microsoft introduces new privacy tools ahead of Data Privacy Day PR - Jan 26, 2018 - Honor View 10 Receives Face Unlock and Industry-Wide Recognition at CES 2018 PR - Jan 25, 2018 - SG - Digital Realty Adds Colt Connectivity to Data Centers PR - Jan 23, 2018 - Air Liquide continues its digital transformation with the opening of a new remote operation center in SEA PR - Jan 23, 2018 - SG - Commvault Powers New HPE GreenLake Backup Solution to Bring Enterprise-Class Data Protection and Reliability to Customers PR - Jan 16, 2018 - Huawei Appoints Baker Zhou as Chief Executive Officer for Malaysia PR - Jan 15, 2018 - DingTalk is the new definition of secured communication and collaborations for Malaysian SMEs PR - Jan 11, 2018 - Barracuda Acquires PhishLine PR - Jan 11, 2018 - Tableau Launches Hyper – New Data Engine Technology Delivering Unprecedented Analytical Performance PR - Jan 30, 2018 - MediaMath’s training arm upskills over 4,000 APAC marketers with programmatic know-how MediaMath, the leading independent programmatic company for marketers, today announced that it has provided programmatic training for over 4,000 marketers in Asia Pacific (APAC). Working through its education arm, the New Marketing Institute (NMI), MediaMath conducts a combination of monthly courses open to the public and customised classes designed specifically for APAC clients. To date, more than 190 APAC-unique sessions and certification programs have been conducted since NMI’s APAC launch in April 2016. In line with the growth of the ever-evolving digital marketing industry, the Singapore government recently announced the need for professional upskilling in developing areas such as programmatic. This comes at a time where marketing professionals across APAC are showing a keen interest in adopting programmatic practices into their digital marketing mix. With regional concerns around the complexities of programmatic technology and the need for upskilling in such areas2, MediaMath aims to bridge the knowledge gap and help marketers in the region execute more efficient and successful marketing campaigns. Working closely with its partners, MediaMath recently organised a Programmatic 101 training for Dentsu Aegis Network. Together with Dentsu Aegis Network’s programmatic agency, Amnet, MediaMath trained over 220 attendees that participated in-person or remotely from Hong Kong and Southeast Asia. PR - Jan 29, 2018 - OPPO Announces Partnership with Qualcomm in the 5G Pioneer Initiative On 25th of January, at the 2018 Qualcomm Technology Day in China, OPPO, one of the most popular international smartphone brands, announced partnership with Qualcomm Technologies in the “5G Pioneer Initiative” to explore ways toward mobile technology innovations in the 5G era. Through the “5G Pioneer Initiative”, Qualcomm Technologies will support OPPO to create brand new 5G mobile phone experiences for users around the world by providing comprehensive solutions such as the radiofrequency front-end field. OPPO has been adhering to the core needs of users to innovate, and continuously prepare for 5G products and other advanced technologies. On January 16, 2018, IMT-2020 (5G) Promotion Group, the key promotion organization established by three official ministries in China, released[...]



What is 3rd Gen Earbuds ???

2018-01-30T09:01:40.093+08:00

Jan 12, 2018:Jabra is unveiling the Elite 65t and Elite Active 65t, the company’s third generation of true wireless earbuds, built for a consistently stable wireless connection and up to 15 hours of battery life (with cradle). In launching the Elite 65t and Elite Active 65t, Jabra has reinvented a set of true wireless earbuds, incorporating its knowledge about usage, comfort and design from the first true wireless innovation. The new earbuds have a distinct focus on the voice experience, delivering superior audio quality for calls and music without wires. The products come in two versions: one for daily on-the-go use and an ‘Active’ version, made for training and sport. Building on the success of the Jabra Elite Sport – the best-selling, most technically advanced true wireless sports earbuds* – the new earbuds are engineered to deliver an even better voice and music experience as well as incorporating new design and colour choices. The new earbuds expand the true wireless line-up at Jabra to three products and are part of the family of Elite products announced and on show at CES: Jabra Elite 65t for those who want superior sound and connectivity from truly wireless earbuds for everyday use – with rock solid connectivity and high battery life of total 15 hrs (2 years warranty). Jabra Elite Active 65t for those who want the same superior sound and connectivity as Elite 65t, with the added features, durability and fit of a sports product – IP56 certification, special coating for better grip and accelerometer for tracking (2 years warranty). Jabra Elite Sport – the existing product for ultimate training and biometric enhancement features and even higher durability (IP67) and 3 year warranty against sweat. Jabra Elite 65t Engineered for superior sound, the Elite 65t brings together unique technological features to deliver best-in-class quality for voice and music. It is built to ensure a stable wireless connection and to deliver the best call and command (voice) quality. Jabra Elite 65tThe innovative four microphone solution combined with an optimised acoustic chamber enables advanced noise suppression and voice enhancement for every type of environment. The earbuds also allows music to be personalised using a music equaliser accessed from the Jabra Sound+ companion application. The Jabra Elite 65t combines a lightweight design for long-term comfort with up to 15 hours of battery life with the cradle and five hours of listening time in one charge making the earbuds the perfect everyday solution. Elite 65t will be available in lead colour Black/Gunmetal and also in Black/Copper and Light/Neutral versions. The Jabra Elite Active 65t is aimed at those who want the features of the Elite 65t, but whose priority is being able to use the earbuds in an active environment. The earbuds are fully enhanced for sports use with a more secure fit, through special coating, integrated accelerometer for tracking features in the Jabra app and IP56 sweat, water and dust certification. Jabra Elite Active 65tThe Elite Active 65t has five hours of listening time on one charge and two-year warranty against sweat and dust. Elite Active 65t will be available in Navy/Copper colour. “Our third generation earbuds are testament to our industry-leading engineering capabilities, stemming from our GN Group heritage, for both daily on-the-go and sports use. “This is a whole new range of superior sound products, based on our vast knowledge and customer feedback from earlier true wireless generations,” said René Svendsen-Tune, CEO at Jabra. “The Jabra Elite 65t has unique microphone positioning that ensures the best voice and music interactions on the market, as well as signature sound, voice capabilities and interaction support. It is already a category leader, winning the[...]



Kaspersky Security Bulletin Q4 2017 October - December Malaysia

2018-01-29T10:04:46.209+08:00

Jan 26, 2018 - The report supplements the global Kaspersky Security Bulletin and supplements global statistics and threats overview with local data for specific country. Both reports are based on data obtained and processed using the Kaspersky Security Network (KSN). KSN integrates cloud-based technologies into personal and corporate products and is one of Kaspersky Lab¶s most important technologies. KSN assists Kaspersky Lab's experts to swiftly detect new malware in real time when no corresponding signature or heuristic detection exists. KSN helps to identify sources of malware proliferation on the Internet and blocks user access to them. Due to KSN's very rapid response to new threats we are able to block new programs from launching on users' computers within seconds after of them being detected, and without having to update the antivirus database first. The statistics in this report (except for spam) are based on completely anonymous data obtained from Kaspersky Lab products installed on users' computers in Malaysia and was acquired with the full consent of the users involved. Web threats Attacks via browsers are the primary method for spreading malicious programs. The following methods were used most often by cybercriminals to penetrate systems: Exploiting vulnerabilities in browsers and their plugins (drive-by download). Infection in this type of attack takes place when visiting an infected website, without any intervention from the user and without their knowledge. And this is the number one method utilized by cybercriminals, the one used in the majority of attacks. Protection against such attacks requires an Internet Security class solution capable of detecting threats as they are being downloaded from the Internet and the timely installation of all the latest updates for the browser and its plugins. Another key technology, developed by Kaspersky Lab, is Automatic Exploit Prevention, designed specifically to fight complex web threats, exploiting newly discovered vulnerabilities in software. Social engineering. These attacks require user participation, with the user having to download the malicious file to their computer. This happens when the cybercriminal tricks the victim into believing they are downloading a legitimate program. Protection against such attacks requires a web antivirus solution capable of detecting threats as they are being downloaded from the Internet. In the period October-December 2017 Kaspersky Lab products detected 5,095,170 Internetborne malware incidents on the computers of KSN participants in Malaysia. Overall, 27.3% of users were attacked by web-borne threats during this period. This places Malaysia in the 35th place worldwide when it comes to the dangers associated with surfing the web. Place Country Percent of users 1 algeria 42.0% 2 belarus 41.4% 3 greece 38.0% 4 russian federation 37.5% 5 albania 36.2%Local threats The use of local infection statistics for user computers is an extremely important indicator. Worms and file viruses account for the majority of such incidents. This data shows how frequently users are attacked by malware spread via removable USB drives, CDs and DVDs, and other “offline” methods. Protection against such attacks not only requires an antivirus solution capable of treating infected objects but also a firewall, anti-rootkit functionality and control over removable devices. In the period October-December 2017 Kaspersky Lab products detected 19,741,334 local malware incidents on the computers of KSN participants in Malaysia. Overall, 51.8% of users in this country were attacked by local threats during this period. This puts Malaysia in the 80 place worldwide. Place Country Percent of users 1 algeria 74.1% [...]



ETH Mining Laptop for Windows Platform ??? Asus-L-FX5034339

2018-01-31T09:45:40.942+08:00

The Asus-L-FX5034339 is able to work as ETH mining laptop. The key specifications which are necessary to support cryptocurrency mining:Intel processor I7-7700Nvidia GeForce GTX 1050VRAM (Video Ram): 4GB --> This is a must.Dual fan cooling system - Hyper Cool Dual-Copper Cooling SystemFX503 employs a pair of copper heat pipes and a dual-fan system to cool the processor and graphics card independently. This ensures system stability even during intense gaming sessions without throttling. The additional Fan Overboost function maximizes cooling efficiency, ensuring that FX503 has the stability required for all tasks.NVIDIA GeForce GTX 1050VRAM : 4GBHyper Cool Dual-Copper Cooling SystemThe ETH mining is done using Claymore's Dual Ethereum software for Windows platform.The Video RAM of 4 GB is required as minimum requirement for Claymore's Mining softwareLow CPU and memory utilization Within short period earned 2 sharesThe laptop (Asus-L-FX5034339) is running on Windows 10 ProWith these specifications, the mining was running at around 12 MHz/s.Nonetheless, I have noticed that it drained the battery really fast - two hours battery gone in 1 hour.Start mining ETH now !!! Visit https://ethermine.org/ or check out the following video to get started for beginner. allow="autoplay; encrypted-media" allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/IMG98V6DPoU" width="560"> The laptop cost me around RM 5,000 including the license for Windows 10 Pro 64-bit and 6% GST.Make sure you get a good laptop cooling pad to complement the cooling system.The latest ETH price published by Coinbase is around USD 1,046.01[...]



AIMS 2017 Review and 2018 Outlook

2018-01-16T21:56:51.279+08:00

Dec 29, 2017 -The AIMS Group, Southeast Asia’s leading carrier-neutral data services provider, today shares its review of 2017 and outlook for 2018. AIMS Group Chief Executive Officer, Chiew Kok Hin says, “This year has seen some interesting developments for the data centre industry. In 2016, the 'Inter-Data Centre (DC) Network’ initiative was launched by the Malaysia Digital Economy Corporation (MDEC) to bring down connectivity cost for data centres. This initiative sparked a widespread competition amongst telecommunication players to bring down the cost of connectivity. “The nearly 300 percent decrease in cost has made us more competitive with Singapore. Further to that, we are seeing more international organisations treating Singapore and Malaysia as twin cities in their plans to connect the region to the world,” adds Chiew. AIMS in 2017 “Our strategies and investments in 2017 have ensured that we will continue to report double digit revenue growth for 2017, above expected industry growth,” shares Chiew. “AIMS is always committed to providing our customers with the best and most reliable service and our sustained growth and expansion demonstrates their trust in us. Our strong expertise and foresight has allowed us to stay at the forefront both locally and regionally, rising above industry norms. In anticipation of demand, we will be adding an additional 18,000 sqft of space for the Klang Valley as we are now at more than 85% percent capacity in our existing space,” he added. Chiew Kok Hin, CEO, Aims GroupIn 2017, AIMS was the only Malaysian data centre listed on the Cloudscene* Top 10 Asia data centre list; coming in at 7th place for the 3rd quarter of 2017. *Cloudscene is the world’s largest directory of co-location data centers, cloud service providers and network fabrics. The top players in each region were selected from a pool of more than 5,300 global service providers listed on Cloudscene. AIMS was also named the 2017 Frost & Sullivan “Malaysia Data Centre Services Provider of the Year.” Challenges in 2018 “The price of electricity continues to be a huge issue for the industry as it makes up 40 percent of our operations cost. In addition, customers are becoming more environmentally conscious and we had the foresight to start investing heavily in green technology to meet this need. One of the most notable investment is innovatively applying Dynamic Rotary Uninterruptible Power Supply (‘DRUPS’), which is widely used in the manufacturing industry, in data centres to reduce environmental harm,” shares Chiew “Our customers appreciate AIMS’ environmental policies and this helps to maintain their trust in us as a civic-minded data centre partner,” explains Chiew. “However not all data centres will be able or willing to invest in DRUPS due to its higher capital cost, so we hope the government will look into some incentives to encourage industry players to adopt green initiatives while considering the revisitation of electricity tariff,” adds Chiew. Prospects of 2018 “Cashless transactions will be a game changer for how businesses operate in Malaysia in 2018. Both Alipay and WeChat Pay are set to officially enter Malaysia and transform the mobile payment industry here,” he explained. “A cashless society is the way to move forward and in order to stay ahead of the game, small business owners (SME), retailers and e-commerce players, need to get their websites and physical stores ready to address this new change or risk being left out,” Chiew adds. Currently, some businesses have started offering Alipay options to Chinese tourists visiting Malaysia as the bulk of the tourists are used to making cashless transactions. Signs stating ‘Al[...]



Western Digital Unveils Portable SSD for Drone Enthusiasts

2018-01-16T10:49:08.668+08:00

Jan 9, 2018: 

At today’s Consumer Electronics Show 2018 (CES 2018) in Las Vegas, Western Digital (NASDAQ: WDC) unveiled new and breakthrough consumer solutions that address today’s personal content explosion, including voice-activated media streaming via popular Smart Home devices, the world’s smallest 1TB USB flash drive and a portfolio of ultra-mobile, high-performance, wireless and high-capacity flash storage products. Sold under the SanDisk® and WD® brands, these offerings ensure that personal experiences and memories can thrive for years to come.

Smartphones, drones, action cameras and virtual reality (VR) goggles are capturing and creating rich content that users want to access and share with friends and followers alike. Innovations in multi-lens cameras, 8K video, 5G wireless, VR, augmented reality (AR) and video streaming are enabling more immersive experiences. As a result, consumers are looking for easier ways to capture, preserve, access and share their personal content as it becomes richer and more robust.

(image)
ScanDisk Extreme Portable SSD

“Our lives are increasingly connected to and enriched by pictures, videos, music and ideas,” said Dinesh Bahal, vice president of product management, Client Solutions, Western Digital. “From the parent filming a school recital on their smartphone to the drone enthusiast or pro photographer, our range of consumer solutions are designed to help everyone preserve, access and share their digital world.”

For avid photographers and drone enthusiasts who require durable and high-performance media capture solutions, Western Digital is releasing two portable SSDs. The My Passport Wireless SSD, which features one-touch card copy to enable editing and sharing of content out in the field, as well as a new capability to directly access the device within third-party mobile creative apps, like FiLMiC Pro and LumaFusion. While the new, superfast SanDisk Extreme® Portable SSD is perfect for saving and editing hi-res photos and videos on-the-go.



Value Investing Summit 2018 (27th-28th January)

2018-01-15T11:26:16.930+08:00

Organised by 8VIC, a subsidiary of ASX-listed 8I Holdings (the “Group”) and the largest value investing education services provider in Singapore and Malaysia, Value Investing Summit (“VIS”), is a two-day annual conference (27th-28th January 2018) featuring some of the best investing minds in Asia and around the world, where industry experts and investors alike meet to share ideas, discuss investment strategies and support one another to navigate the investing scenes internationally. Now in its 7th year, VIS started with a humble audience of just 500 back in 2012 to the over 1,500-strong crowd today, where past and upcoming heavyweight speakers include Prof Dr Hermann Simon , Mr Vishal Khandelwal, Mr Kee Koon Boon, Mr Zhou Guiyin 周贵银先生. VIS is committed to promoting financial literacy to the general masses, especially on Value Investing, which represents one of the most well-known stock-choosing methods that focus on companies with strong fundamentals which are trading below their inherent value.The second Inter-Varsity Stock Research Challenge, which seeks to promote the study of Value Investing among full-time undergraduates from Singapore and Malaysia and allow students to advance their analytical skills and earn exposure and recognition in the community of value investors, will also be held on the 2nd day of VIS. The winning team of the challenge will also earn prize money of S$4,000 and a shield plaque engraved with their institution’s name. Prof. Dr. Hermann Simon Management Thought LeaderBest Selling AuthorHonorary Chairman and Founder of Global Consultancy Simon-Kucher & PartnersProf. Dr. Hermann Simon is a German business leader and author. Simon co-founded Simon-Kucher & Partners in 1985 and served as CEO of the company from 195 to 2009, and then as its chairman since. Simon is an expert in strategy, marketing and pricing, and has published 35+ books in 26 languages, including some worldwide bestsellers publications. Find more about Prof Dr Hermann Simon.Topics:1) Hidden Champions – The Vanguard of Gobalia: Success Strategies of Unknown World Market Leaders 2) Role Models for leadership in the 21st Century Mr Kee Koon BoonChief Investment Officer and CEOHidden Champions Capital Management Pte LtdKoon Boon is the CIO and CEO of Hidden Champions Capital Management, which manages the Hidden Champions Fund, where he is responsible for the sustainable growth and outperformance of listed Asian equity investments. Koon Boon is an internationally featured investor rooted in the principles of value investing for over a decade as a fun manage and analyst in the Asian capital markets who start his career at a boutique hedge fund in Singapore and, later, at Korea’s largest mutual fund company. Find more about Koon Boon. Topics:1) Why low-profile Hidden Champions are indispensable invisible heroes in our daily lives2) Is 2018 a year of unravelling?3) How hidden champions possess the ability to thrive in stormy timesMr Zhou GuiyinGeneral Manager and Chief TrainerShanghai Rongdao Culture Communication Co. Ltd (an 8IH China subsidiary)My Zhou Guiyin serves as Head of Shanghai Programme at 8I Holdings Limited and is responsible for the training and promotion of Value Investing Education within China. Mr Zhou served as a commentator and research specialist fo numerous finance programmes and channels including CCTV.Topics:1) How the inherent business wisdom from the Chinese traditional culture has an increasingly important role in guiding one’s investment behaviour as the Chinese capital market begins moving towards investing rationally2) How the combination of Sinology (国学) and value investing creates a different per[...]



IBM Inventors Receive Record 9,043 Patents in 2017

2018-01-15T07:30:36.755+08:00

Jan 9, 2018 - ARMONK, N.Y. -IBM inventors received a record 9,043 patents in 2017, marking the company’s 25th consecutive year of U.S. patent leadership and crossing the 100,000-patent milestone. The new patents were granted to a diverse group of more than 8,500 IBM researchers, engineers, scientists and designers in 47 different U.S. states and 47 countries. “For the past 25 years, IBM’s patent leadership has changed the way the world works with advancements critical to the modern era of computing,” said Ginni Rometty, IBM chairman, president and CEO. “Today, nearly half of our patents are pioneering advancements in AI, cloud computing, cybersecurity, blockchain and quantum computing – and all are aimed at helping our clients create smarter businesses.” As more and more enterprises conduct business on the cloud, IBM inventors received in 2017 more than 1,900 cloud patents, including a patent for a system that uses unstructured data about world or local events to forecast cloud resource needs. The system can monitor data sources – including news feeds, network statistics, weather reports and social networks – to identify where and how cloud resources should be allocated to meet demand. Another set of innovations helps solve one of artificial intelligence’s current limits: lack of personalization, which can hinder how AI communicates with people. Among the industry-leading 1,400 AI patents IBM inventors were granted in 2017 is a patent for a system that can help AI analyze and mirror a user’s speech patterns to improve communication between AI and humans. IBM inventors also received 1,200 cybersecurity patents, including one for technology that enables AI systems to turn the table on hackers by baiting them into email exchanges and websites that expend their resources and frustrate their attacks. It could substantially reduce the security risks associated with “phishing” emails and other attacks. IBM inventors also patented significant inventions in emerging areas like quantum computing, including a new way for improving a quantum computer's ability to acquire and retain information – otherwise known as “signal readout fidelity.” This can lead to efficiency in the components necessary to build a quantum computing system. Other patented innovations from IBM inventors in 2017 include: A machine learning system designed to shift control between an autonomous vehicle and a human driver as needed, such as in an emergency. A method that leverages blockchain technology to reduce the number of steps involved in settling transactions between multiple business parties, even those that are not trusted and might otherwise require a third-party clearinghouse to execute. A technique that automatically elevates the security protection of a mobile device when it determines that device is located far from its owner and is likely under someone else’s control. This year’s milestone builds on more than 105,000 U.S. patents granted to IBM from 1993 to 2017. IBM inventors have received patents for suchtransformative ideas as secure credit card transactions, guiding the visually-impaired using RFID, the world’s fastest supercomputers and earthquake detectors.IBM HQ, Armonk, New York[...]



Meltdown & Spectre Best Practice from Carbon Black

2018-01-14T10:36:06.797+08:00

Jan 9, 2018:

Meltdown and Spectre chips made recent headlines as researchers have found critical vulnerabilities that affect billions of computers and smartphones worldwide. Organizations have now gone into panic mode and are furiously working to mitigate cybersecurity risks that might emerge from these vulnerabilities. Tech firms are also operating in overdrive to deploy security patches as they are in a race against hackers who will exploit the vulnerability to steal data. 

Refer to this blog post by Carbon Black outlining how organizations can minimize attack surface during such critical events through the following steps –
  • Get as many systems as possible into high enforcement
  • Patch known vulnerabilities with available fixes from your operating system and hardware vendors
  • Prevent untrusted code from running on systems
Carbon Black advises organizations to utilize their Endpoint Detection and Response (EDR) functions, if available, to monitor for attack activity as this function pays special attention to browser related threats, alerts regarding credential theft, and suspicious network connections.




Wacom Malaysia Celebrates Creativity

2018-01-13T17:31:08.005+08:00

Jan 8, 2018 :Wacom Malaysia, the subsidiary of Wacom – the leading manufacturer of pen tablets, interactive pen displays and intuitive interface devices is celebrating creativity with the announcement of the winners of its ‘Beyond Imagination - Dare.Live.Create’ social media contest on Wacom Malaysia Facebook. Eugene Low's ArtworkNor Syamimi's ArtworkThe social media contest was opened to the public from 1st November until 28th November 2017. About 53 artworks were received according to four categories; Illustration Traditional, Illustration Digital, Comic Traditional and Comic Digital. All artwork submissions were reviewed and shortlisted by a panel of judges renowned in the creative industry namely Christopher Lye, Country Manager of Wacom Malaysia, Daphne Tan, Marketing Manager of Southeast Asia, Wacom and Jarold Sng, Design Lecturer from The One Academy. 10 shortlisted artworks were then open for public view and voting from 1st December until 21st December 2017. (L to R) : Eugene Low, winner of Illustration Digital category; Christopher Lye, Country Manager of Wacom Malaysia; Nor Syamimi, winner of Illustration Traditional category during the prize giving ceremonyStunning artworks were given the thumbs up from the esteemed judges. Eugene Low, 23, an art student from Kuala Lumpur took home one unit of Wacom Intuos Pro Medium worth RM1,608.00 for winning the Illustration Traditional category. His shortlisted artwork was inspired by his personal childhood experience and challenges faced to pursue his passion in arts. The artwork was drawn by using Wacom Intuos Manga and has managed to get 450 Likes and 64 Shares in the span of only three weeks. Visit eugenelow.artstation.com to see more of his artworks. Claiming the prize for Illustration Digital category was Nor Syamimi, 19, from Selangor who took home one unit of Wacom Intuos Pro Medium. Her gorgeous artwork managed to wow netizens with 425 Likes and 147 Shares. Syamimi is a self-taught artist who likes to create her own anime characters in her artwork and has a dream of publishing her own art catalogue. More of her original artworks can be found via Instagram, @nmimi03. In the comic categories, two participants, Wong Sze Min and Yasmin Anis managed to steal the judges’ heart with their stunning artworks, each bagging Wacom Intuos Comic worth RM488 home. As an organization that celebrates creativity, advocates uniqueness and promote paperless process, Wacom through Wacom Malaysia is proud to have this first social media contest in Malaysia in search of Malaysia’s creative talents. Christopher Lye, Country Manager of Wacom Malaysia said, “We are grateful and pleased to see many young talents and artists out there channelling their talents and creativity through our ‘Beyond Imagination - Dare. Live. Create’ social media contest.” “As one of the leading names in the creative industry, Wacom loves what creativity brings to the world. It makes us human, adding richness to our lives, bringing ideas, imagination and beauty.” [...]



IT News Week 2 Jan 2018

2018-01-14T10:57:08.572+08:00

For IT News Week 1 Jan 2018.PR - Jan 10, 2018 - Microsoft Announces the new Surface Laptop for MalaysiaPR - Jan 10, 2018 - McAfee Moves Beyond Traditional Antivirus to Protect Customers’ Identity, Connected Homes and Wi-Fi ConnectionsPR - Jan 10, 2018 - OPPO ranked No.1 in Asian Smartphone marketPR - Jan 10, 2018 - KaHa Introduces Next-Gen Smart Wearable OS & Features Powered by AI & Machine Learning at CESPR - Jan 10, 2018 - Going on the Offensive – Managing Your Most Strategic Asset: DataPR - Jan 10, 2018 - Olike Malaysia Trade-in programme offers up to 18% on new USB Data CablePR - Jan 9, 2018 - Lenovo’s CES 2018 Lineup Makes Reality BetterPR - Jan 9, 2018 - Introducing AccuWeather Go on Garmin Automotive PlatformPR - Jan 9, 2018 - HID Introduces Latest Direct-to-Card™ Printer/Encoder PR - Jan 9, 2018 - Kaspersky Lab Asia Pacific Appoints Naina Parhar as Head of Channel Sales PR - Jan 8, 2018 - McAfee Completes Skyhigh Networks Acquisition, Establishing the Company as a Device-to-Cloud Cybersecurity Leader PR - Jan 7, 2018 - ECOVACS ROBOTICS’ WINBOT X Named CES Innovation Award Honoree PR - Jan 10, 2018 - Announcing the new Surface Laptop for MalaysiaMicrosoft today announced that the Surface Laptop will be available for pre-orders in Malaysia from local Surface authorized retailers which include top retailers* and official Microsoft store. Starting from RM 4499 and will officially launch in the market on 7 February, 2018Surface laptop FrontSurface laptop BackSurface Laptop is the perfect balance of portability, performance and elegance, and is more than just a traditional laptop. Powered by Windows 10 S, Surface Laptop is engineered to start fast and stay fast with a 7th generation Intel® Core™ processor and up to 14.5 hours of battery life to last through the day. At just 1.25 kilograms and less than 14.5mm thin, the Surface Laptop fits nicely into your favorite bag, and is lightweight for users to bring around.PR - Jan 10, 2018 - McAfee Moves Beyond Traditional Antivirus to Protect Customers’ Identity, Connected Homes and Wi-Fi ConnectionsAt CES, McAfee announced the availability of McAfee Identity Theft Protection, to help consumers protect their personally identifiable information from identity theft and fraud. McAfee Identity Theft Protection makes protecting consumers’ identities simple, with always-on identity monitoring, 24/7 dedicated agent support and varying levels of identity theft insurance.In addition, McAfee continues to form key partnerships with leaders in consumer electronics and grow its product offerings to deliver security for the connected home, family safety, mobile security and privacy. Notable new partnerships and offerings include:D-Link and McAfee: Today, consumers are moving beyond using just laptops and smartphones to introduce connected lightbulbs, TVs, cameras, vacuum cleaners, doorbells, and more into their homes. The new D-Link AC2600 Wi-Fi Router Powered by McAfee provides consumers with a comprehensive solution that automatically increases security for devices on the home network.McAfee – The One Stop Security Shop: Since manufacturers are rushing to connect almost everything to the internet from devices, toys, appliances to cars, it only makes sense that security also evolves to deliver protection across every point of connection. With the addition of McAfee Identity Theft Protection, McAfee Secure Home Platform, McAfee Safe Family and McAfee Safe Connect, users can have peace of mind in an ever-changing digital world fuelled by volume, speed and complexity.ASUS and McAfee[...]



Global Automotive Supplier to Embrace Industry Disruption Pressure in 2018

2018-01-10T21:27:28.563+08:00

Dec 2017 :While the global automotive supplier industry continued to grow in 2017, disruption caused by four megatrends – Shared Mobility, Autonomous Driving, Digitization and Electrification – has gathered pace, according to the "Global Automotive Supplier Study 2018" by Roland Berger and Lazard. The study projects that supplier CEOs will need to transform their existing business models in order to capture shifting profit pools caused by these megatrends. The study analyzed performance indicators from approximately 650 suppliers around the globe to assess the current state of the industry, as well as trends and challenges. Global growth continues but is slowing In 2017, the global supplier industry is expected to see revenues increase by approximately 3 percent compared to 2016, and maintain profitability levels with an average EBIT margin of approximately 7.3 percent. While volumes have reached record levels, global growth is slowing in some regions, with light vehicle production in North America expected to shrink by 3 percent to 17.4 million units in 2017. For 2018, the study authors expect suppliers to enjoy continued revenue growth, but at a slower pace, while maintaining stable EBIT margins. "The overall fairly positive sentiment is reflected in valuation levels of suppliers that are still trading above their long-term average," said Christof Söndermann, Director at Lazard. "But the four megatrends in the automotive industry are causing disturbance in all supplier domains." Recent developments point towards an acceleration of the disruption caused by four megatrends: New mobility business models (such as ride hailing and car sharing) are poised to disrupt car ownership, personal mobility and goods logistics The timeline for level 4/5 autonomous driving keeps accelerating as necessary economics, regulations and technology fall into place In digitization, artificial intelligence offers almost limitless possibilities, while connectivity-enabled technologies are reaching the point of mainstream application Momentum for electrification is building among regulators and OEMs, and progress on technology is accelerating Based on these trends, disruption in the industry appears inevitable, but the transition period continues to be marked by a high level of uncertainty. Automotive suppliers will need to prepare for five distinct changes that are emerging: slowing growth; accelerated technological change; software as a key differentiator; commoditization of hardware; and pressure on valuations for commoditized suppliers. "Technology shifts require suppliers to substantially invest in old and new technologies in parallel, with benefits from new technology investments being uncertain," said Martin Tonko, President Director at Roland Berger in Indonesia. "Margins and valuation levels in commoditized fields will come under pressure, but at the same time, electrification and digitization offer new monetization options." He added that in Indonesia, automotive suppliers must invest even more than their Southeast Asia counterparts, as they start from a lower technology base and must keep up with external competitors. Profound knowledge of trends required Against this backdrop, the authors from Roland Berger and Lazard have identified a number of elements for suppliers to consider when transforming their business models to capture future growth opportunities. Among these, are factors that affect strategy and portfolio, such as the impact of automotive megatrends, which segments and products will experience continuous g[...]



Over Two Billion Personal Data Records Leaked from High-Tech Companies in 2016

2018-01-09T17:15:34.357+08:00

Dec 22, 2017 -InfoWatch Analytical Center has released a report on data leaks from high-tech companies in 2016, which saw approximately 30% growth in the number of such leaks and more than an eightfold increase in the volume of compromised data. The high-tech companies accounted for almost 75% of all globally compromised data (2.3 billion records), 87% of which were personal data. Number of data leaks and volume of compromised personal data in the high-tech sector Share of high-tech companies in the total volume of data records compromised globally, 2015-2016 “We are witnessing more and more leaks and compromised data in the high-tech companies, where information, including customer data, is usually a key asset, and therefore any leak can have a disastrous impact on business," said Sergey Khayruk, Analyst at InfoWatch Group. “In 2016, personal data of hundreds of millions of users were stolen from popular social media, such as Facebook, Foursquare, GitHub, iCloud, LinkedIn, MySpace, Snapchat, Telegram, Tumblr, and Twitter. Moreover, hackers successfully attacked the largest email services, including Gmail, Hotmail, Yahoo, and Mail.ru, and pilfered customer details from telecom companies, such as Deutsche Telekom, Three UK, Verizon, and others.” Leaks by information type, 2015-2016 In 2016, 31 mega leaks compromised more than 95% of data leaked in the high-tech sector, with 10+ million records leaked in each such case. Attackers compromised much more personal data, while the shares of payment details, trade secrets, and know-how shrank in the total number of leaks. Leaks by attack vector, 2015-2016 (the inner circle shows the volume of compromised records, while the outer one shows incidents) Leaks by attack vector, 2015-2016 (the inner circle shows the volume of compromised records, while the outer one shows incidents) Despite the growing number of leaks caused by external attackers, insider-enabled leaks are no less dangerous for high-tech companies. Thus, even though the high-tech sector suffered 15% more leaks by third parties compared to 2015, the leak damage breakdown by attack vector remained almost the same. Internal leaks by intent In 2016, the high-tech companies saw more malicious leaks and skilled leaks associated with fraud or access abuse. Incidents by type (the high-tech sector occupies the inner circle, while other sectors are shown in the outer circle) “IT market players aggregate huge volumes of user data and thus are eager to use Big Data to analyze structured and unstructured information and other tools, which dramatically evolved in terms of technology and functionality,” noted Sergey Khayruk. “However, the more data is being generated, processed, and stored, the higher the risk of external attacks on corporate resources. At the same time, internal offenders gain more ground, forcing IT companies to use not only effective tools to combat attacks, but also advanced multi-functional DLP systems. Moreover, the soaring number of skilled leaks calls for adding User Behavior Analytics (UBA) to the existing cybersecurity toolbox.”BackgroundThe report is based on the InfoWatch Analytical Center’s own database that aggregates public notifications of data leaks, which hit profit and non-profit (public, municipal) organizations and resulted from malicious or negligent actions by employees or external offenders. The research covers a maximum of 1% of all assumed leaks.The high-tech sector repo[...]



IT News Week 1 Jan 2018

2018-01-09T08:08:01.004+08:00

For IT News Week 4 Dec 2017. PR - Jan 5, 2018 - Kaspersky : Targeted attacks on radar for industrial organizations PR - Jan 4, 2018 - Asus ZenFone 4 Max (ZC520KL) - New Year Promo PR - Jan 4, 2018 - Carbon Black : Ransomware is now estimated to be a $5 billion crime PR - Jan 4, 2017 - Updates from Microsoft A.I Event PR - Jan 4, 2018 - Lenovo Introduces Its Most Complete ThinkPad Portfolio with 2018 Lineup PR - Jan 4, 2018 - Kaspersky Lab’s response on “Kernel-memory-leaking Intel processor design flaw forces Linux, Windows redesign” PR - Jan 4, 2018 - AccuWeather Offers Sneak Peak at Innovative Travel Forecast "AccuWeather Go" at CES 2018 PR - Jan 3, 2018 - McAfee Study Reveals Disparity Between Consumer Cybersecurity Concerns and Behaviors PR - Jan 3, 2018 - Dimension Data Malaysia appoints Dickson Woo as new Head of Sales PR - Jan 2, 2017 - Zurich Malaysia converts its composite insurance business to two separate entities for Life Insurance and General Insurance PR - Dec 29, 2017 - OPPO's new Flagship Store Grand Opening in Shanghai PR - Dec 28, 2017 - OPPO F5 Fattah Amin Special Edition PR - Dec 13, 2017 - New Product! AOMEI Backupper Network Released PR - Jan 5, 2018 - Kaspersky : Targeted attacks on radar for industrial organizations Of the industrial companies that participated in the IT Security Risks Survey, every fourth has faced a variety of cyberattacks. Worryingly, one of the fastest growing types of threat among the multitude targeting industrial organizations in 2017 was targeted attacks. To make factory floors more secure in 2018, it’s critical to eliminate targeted attacks from cybersecurity blind spots, warns Kaspersky Lab. Due to the steady increase in complexity and number of attacks on the industrial market, the consequences of ignoring cybersecurity issues could now be disastrous. 28% of the 962 industrial companies surveyed have faced targeted attacks in the last 12 months. That’s 8 p.p. more than last year, when only 20% of the industrial market experienced targeted attacks. This confirms the predictions of Kaspersky ICS CERT experts about the emergence of specific malware targeting vulnerabilities in industrial automation components in 2018. The fact that the most dangerous incident type has grown by more than a third strongly suggests that cybercriminal groups are paying much closer attention to the industrial sector. PR - Jan 4, 2018 - Asus ZenFone 4 Max (ZC520KL) Sells at RM 699 - New Year Promo ASUS ZenFone 4 Max is a smartphone designed to go the distance and accompany you on all of life’s adventures. Its high capacity 4100mAh battery with advanced power management and dual cameras keeps up with your active lifestyle and is always at the ready to capture extraordinary moments. The phone was first introduced to the market on Oct 17, 2017. Dual rear cameras: - 13MP camera captures crisp portraits and wide-view camera with 120° wide-angle lens fits more friends and scenery in the frame Extreme battery life: - 4100mAh battery provides up to 46 days of 4G standby, and features fast charging, 2X-longer lifespan, and advanced safety technologies Convenient power bank: - Doubles as a power bank with 2X-faster reverse-charging capability for high-speed charging of other devices Operating System : Android N (7.0) PR - Jan 4, 2018 - Carbon Black 2017 Threat Report - Ransomware is now estimated to be a $5 billion crime As we shift to 2018, questions still exist regarding the politics and possibility of a hacked democr[...]



Genesis Mining is Not Working ???

2018-01-04T10:09:49.739+08:00

It (Genesis Mining) is actually working, however, the information was slow to update.My account is actually accumulating ETH !!!Started mining contract (Ethash -  Pure Ether Mining) on 15-Nov-2017 with an investment of US $65 for hashpower of 2 MH/s, I have accumulated 0.01534708 ETH which is equivalent to the US $14 based on current price of US $897.40 per ETH.In other words, with this hashpower, I've generated the US $ 14 in 50 days.Therefore, to generate the US $ 1, I would need 3.57 days.Hence, to ROI, I would need 232 days, about 7 months - this plan is considered profitably because the subscription has a contract period of 2 years.Based on existing projection, I would generate ETH worth of US $204 in 2 years time.Genesis Mining offers cloud mining server - all you have to do is to purchase a one-time subscription for your choice of server plan type and it will do the job on your behalf - the listed pricings are a one-time fee and usually 2 years contract.You should try it out too, given the latest trend of cryptocurrency - an upward trend so to speak.The bad news is that Genesis Mining had stopped selling the plan for ETH mining - when I did the subscription on 15-Nov-2017, I wanted to test it out even though by that time, Genesis Mining had stopped selling Bitcoin (BTC) server plan.Nevertheless, 2 years Monero Mining server plan is still available.Monero Mining server plan will do mining for Monero - current price for Monero is still low, about the US $380.Nonetheless, the lowest server plan which Genesis Mining is offering is one with hashpower 1000 H/s for 2 years contract and it costs the US $830 - not cheap.For first time subscriber of Genesis Mining, take note that it is slow to update information, do not panic - just wait for the information to update - right after you have purchased any server plan, you may not see any activity for at least a few days as I have experienced it.You might also want to consider mining ETH using your own server. allow="encrypted-media" allowfullscreen="" frameborder="0" gesture="media" height="315" src="https://www.youtube.com/embed/IMG98V6DPoU" width="560"> P/S: Don't bother hacking my account, this is cryptocurrency - it is encrypted !![...]



5 Tips to Secure Your Digital Content

2017-12-28T08:46:54.836+08:00

Jaheer Abbas, Regional Director SE Asia & ANZ, Limelight NetworksIt’s clear that people today are spending more time online every day. In fact, according to a study by Limelight Networks, nearly half of adult consumers in Southeast Asia are online 16 hours or more each week. As digital grows in importance, however, it’s also becoming an increasingly bigger target for attacks. The impact of a DDoS attack is greater than you’d think. Not only do these attacks diminish website performance, but there is the risk of long-term damage to brand reputation. Furthermore, DDoS attacks can also result in significant costs for a company – the obvious example is lost revenue, but what businesses may not realize is that they’re paying for the ‘bad traffic’ that’s attacking them, which can add up quickly and become very expensive. Therefore, it’s important that businesses have the right technologies and infrastructure in place to protect themselves against DDoS attacks. Specifically, by implementing a layered defence that quickly identifies and mitigates these attacks, brands can protect their websites and reputations, while also ensuring they are only paying for the delivered clean traffic.Jaheer AbbasEven if a business’ website is scalable, it’s crucial to have a back-up plan in place so they can be prepared for unexpected traffic spikes and ensure the website is secure in any situation. At a bare minimum, businesses should utilize a CDN, as it can scale with traffic spikes and allow websites to effectively absorb traffic. And if a business isn’t quite ready for DDoS protection, they should at least look to set up DDoS detection as a first step – this way they can understand issues within their network and work to respond to an attack as quickly as possible. Where to start? Safeguarding digital content often involves multiple techniques and layers of security. However, there are some easy-to-implement ways to protect your content. HTTPS: The most fundamental level of protection is delivering digital content over HTTPS. HTTPS, or HTTP-Secured, refers to the encryption of communication between a single client (typically a device with a web-browser) and the destination, such as a website, through a trusted certificate that verifies ownership of the destination. When a successful HTTPS connection is established, any data that passes over that is encrypted. That way, you can be assured that you’re protected from anyone who might intercept the transmission. User Authentication: Many organizations today also use two-factor authentication to access specific areas of type of content. It requires users to enter a randomly-generated, single use-number each time they log in. This ensures that even if a password is guessed or discovered, the perpetrator would still need to enter the code in order to gain access. Encryption: Today’s websites integrate with third-party services such as Facebook and Twitter, include targeted advertisements, and can even be reshaped based on user history. Some of that data can be “personally-identifiable information” (PII) such as names, addresses, emails, and credit card numbers. These types of data need to be protected and encrypted. Using server-side scripting, for example, you can code part of your web pages to do the encrypting and decrypting on the fly, ensuring that data placed into the database, especially PII, is secured even if a breach does occur. Mas[...]



Accelerating Digital Transformation with the Right Data Strategy

2017-12-27T09:19:51.455+08:00

By Paul Bruton, ‎Business Director - Data Intelligence of Hitachi Vantara The noted futurist and author, Alvin Toffler, famously described technology as the “great growling engine of change.” He was right. And, in today’s fast-paced and increasingly complex business environment, it is growling more loudly than ever!Simply maintaining the status quo is no longer enough. Corporate IT is under immense pressure to deliver file services solutions that go beyond the basic functions legacy network-attached storage (NAS) platforms have to offer.Paul BrutonThis is complicated by a host of variables, including worker mobility. According to Gartner 28% of corporate data already resides exclusively on laptops, smartphones and tablets. The challenge for any organization is gaining control and visibility of these data sets to govern and manage them in line with corporate policy. Add to this Virtual Desktop Infrastructure (VDI) deployments, compliance requirements, metadata-driven policy management, collaboration and affinity for cloud architectures, and you begin to understand the intricacies involved. On top of all that is the increasing threat from cyber-attacks. According to Trend Micro Incorporated, out of the 82 million ransomware threats blocked in the first half of this year, those targeting APAC entities accounted for 36% of all attacks, the highest of all regions. It is no wonder that enterprises need a modernized file services solution capable of meeting today’s challenges and tomorrow’s opportunities. Counting the Cost Creating all this data is an expensive proposition, but it’s nothing compared to the total cost of ownership over time, which puts a tremendous strain on IT teams. The annual costs for traditional backup are becoming untenable. Traditional infrastructure also requires the labor-intensive management of file servers and NAS appliances for things like protection, performance, migrations, capacity planning, which makes it very costly to maintain. According to Veritas, in an average ten petabyte environment, 41% of data is stale - meaning it has not been modified or touched in the past three years – and organizations are spending over US$20 million per year just to manage this data! When you factor in the cost of protecting this data with traditional backup solutions, which in APAC is in the order of US$4,000-8,000 per terabyte, it’s clear that the operational and financial challenges of continuing with these aging technologies will have a significant impact on the organization. The reality is that, unless these challenges are addressed now, they will become the dominant cost category within the total IT financial picture. An example from a real Hitachi Vantara customer Understanding Objects Solving this file serving problem is the catalyst for moving to a modern architecture. Corporate IT needs to be able to deliver file services solutions that push beyond their legacy NAS platforms if they are to deliver on the promises of digital transformation. What’s needed is a “next generation NAS” capable of meeting the business’ needs while reducing complexity and costs. Do achieve this, many organization are leveraging a secure object store, to significantly lower the total cost of ownership of their File Services. The cost saving from object storage comes from its next-generation cloud based architectures – that automate integrity checking [...]