Archive for Marzec, 2012

HP Helps Enterprises Enhance User Experience with New Application Transformation Solutions

By admin, 21 marca, 2012, No Comment

Integration of traditional application solutions with mobile enterprise applications drives user engagement

HP today announced new Application Transformation solutions designed to help enterprises drive an enhanced user experience by integrating mobile-based enterprise applications into the traditional computing environment.

The growing adoption of smartphones and mobile applications is changing the way enterprises create value and drive competitive differentiation. In fact, the economic survival of enterprises now depends on their ability to respond to customer and citisen demands, generated through enterprise applications as well as social applications such as Facebook, Twitter and LinkedIn.

The expanded HP Applications Transformation solutions portfolio enables clients to design, build and manage applications that drive interaction between people and enterprises while optimising traditional application environments to deliver an improved user experience.

“Modern enterprise applications require a different approach to design and testing than traditional applications,” said Clive Brindley, Software Country Manager, South Africa, HP. “HP ensures that enterprise applications provide the highest level of quality, availability and scalability while elevating the user experience to an entirely new level.”

New software products for IT management and social collaboration
The enhanced HP Application Lifecycle Intelligence (ALI) improves collaboration among delivery teams and reduces cycle times by offering real-time visibility and traceability of activities across the application life cycle.

As part of HP’s IT Performance Suite, HP and Perfecto Mobile, a provider of cloud-based testing and automation solutions, have extended HP Unified Functional Testing to offer multifunctional applications by allowing developers to emulate and test the user experience of mobile applications across devices and networks.

Additionally, new software offerings from HP complement the agile development of mobile applications and drive social collaboration:

HP Anywhere increases productivity and facilitates faster decision making by enabling clients to manage IT on the go. New mobile-based applications perform operations such as portfolio request management, defect tracking, service health monitoring and the composition of an Executive Scorecard.

HP Enterprise Collaboration enhances knowledge sharing and accelerates application development through a social collaboration environment that enables real-time, context-based conversations traced back to actions and work items.

New services to design, deploy and manage mobile applications
The HP Application Transformation solutions portfolio of software products is complemented by new services to meet the quality demands of enterprise applications. The HP Mobile Application Services portfolio now includes:

HP Testing for Mobility Services accelerate time to market of mobile applications by reducing test cycles and automating testing across multiple devices with market-leading solutions from HP Software and Perfecto Mobile.

HP Enterprise Mobility Services for SAP® Applications improves employee efficiency by allowing mobile users to obtain data from mission-critical SAP applications. By extending its mobile solutions to the SAP NetWeaver® technology platform and the Sybase® Unwired Platform, HP now offers an end-to-end enterprise mobile solution that enables clients to access key enterprise information.

A fundamental component in the development of an application strategy, the HP Applications Transformation Experience workshop offers enhanced capabilities to exploit new enterprise mobile applications and cloud computing technologies.

HP’s premier client event, HP Discover, takes place June 4-7 in Las Vegas.

Applify yourself – why all industries should embrace the iPad

By admin, 21 marca, 2012, No Comment

By Wesley Lynch, CEO, Snapplify

The growth of tablets continues to surpass all expectations, throwing the PC industry into disarray and turning the heads of everyone from your three year-old to educationists to corporate buyers across the board.

The iPad is so popular that publishers and other content-rich industries are forced to reposition their wares for it or risk failure. A powerful wave of content ‘applification’ has swept over many industries. Are you ready for it?

Revise, revise!
This month, research firm Gartner became an unexpected casualty of the iPad’s assault on the market when it was forced to make a drastic downward revision of its prediction for worldwide PC and laptop growth.

The firm now forecasts that these devices will grow 10.9% to 388 million this year, after an earlier projection of 15%. The revised figures are chiefly due to reduced expectations for laptops and netbooks, which have driven PC sales in the last few years, the firm noted. Increasingly, people are turning to tablets.

Not that simple
The assumption has for some time been that iPads and Android tablets are only used for simple tasks like email and Web browsing. This view is now being challenged by market trends – to the point where even very astute market watchers are caught unawares.

Education
Education has for a while been a firm proponent of tablets. The iPad as teaching medium makes as much sense for textbook publishers as for education departments and families, with apps and content repositories making it an ideal single portal to content and learning.

Entertainment
Entertainment is another no-brainer: thanks to the possibility to embed multimedia such as video in magazines, the tablet experience is ultra-immersive, engaging and interactive. Further enriched by a rich application ecosystem, media convergence and personalisation, tablets are great for watching video, gaming, playing music and more.

Content industries
In addition, industries that depend heavily on content can all benefit from the very immersive tablet experience. From travel and leisure companies to consulting firms and e-commerce store fronts – the list is virtually endless.

Corporate workhorse
But the most serious underestimation of the iPad might be missing its allure for general industry. It is not just a replacement for entry-level laptops and netbooks, and doesn’t only appeal to some industries: The iPad is becoming a corporate workhorse.

Corporate Tablet Demand

Corporate Tablet Demand

 

 

 

 

 

 

 

 

 

 

Everybody wants in
One can be forgiven for missing a trick; the tablet phenomenon is fast-paced and has happened seemingly overnight.

Everybody wants in. Hardware manufacturers, operating system vendors and app developers are all jockeying for position. Publishers, content-rich industries and generic corporates are regrouping for its arrival.

Even banks are getting in on the act, with FNB selling 10 000 devices per month.

With a substantial decrease in the price of the iPad 2 when the iPad3 was launched, things will only get hotter. And at the low end of the market, hardware manufacturers worldwide are devoting resources to making tablets accessible to the masses. The uptake curve will resemble, if not outperform, that of mobile phones.

Phenomenal opportunity
Such a modern-day phenomenon is clearly an opportunity second to none. Content-rich industries (and who isn’t, with the advent of so much digital and social and mobile media today?) stand to benefit the most from app-lifying their content.

DCC delivers lighting fast storage for all your digital content with Verbatim latest Store ‘n’ Save USB 3.0 hard drive

By admin, 21 marca, 2012, No Comment

Backup your entire digital life at super speeds with the new Verbatim Store ‘n Save desktop USB 3.0 hard drive, now available from distributor Drive Control Corporation (DCC). Available in 1 and 2 terabyte (TB) models, the Store ‘n’ Save has plenty of space to keep all of your documents, videos, music, photographs and more. And with transfer speeds of up to ten times faster than USB 2.0, large files can be moved in a matter of seconds – no more waiting around for your backups to run.

The Store ‘n’ Save incorporates a number of handy features aimed at improving usability. With Nero’s BackItUp and Burn Essentials software included on the drive, users can quickly and easily backup files, burn CDs, DVDs, and Blu-ray Discs, and sync files and folders.

Thanks to movable padded foot cushions and clever design, you can stand the Store ‘n’ Save upright, lay it on its side, or even stack several drives on top of each other, whichever is more convenient for your setup. The Store ‘n’ Save is designed to become a permanent feature on your workspace, so you always know where your important files are at all times.

“Another important feature is the Green Button Energy Saving Software, which is included on the drive. Whenever the drive is not in use for a specified time, it will automatically enter sleep mode. This saves energy since the drive is not constantly running, and also extends the life of the drive itself. The Store ‘n’ Save also comes standard with Verbatim Hard Drive Formatter software, so that the drive can be formatted for use with both Windows and Mac operating systems,” says Drika Wilkins, Verbatim Product Specialist at DCC

While the Store ‘n’ Save is optimised for use with USB 3.0 connections, it is compatible with USB 2.0. It features a rocker switch to power on and off and includes a 60cm USB cable as well as external AC power adaptor and cable. The drive itself measures 192mm x 118.6mm x 49mm (length x width x height) and weighs approximately 845 grams.

“This product is ideal for the home user who requires backup and external storage. It is not designed for portability but rather for convenience and versatility on your desktop. Power saving features allow users to just leave the hard drive connected, safe in the knowledge that the drive will power down into sleep mode whenever it is not in use,” Wilkins adds.

The Verbatim Store ‘n Save is available immediately from DCC, as well as all major retailers. The 1TB has a recommended retail price starting at R1599,00 and the 2TB from R1999,00 inclusive of V.A.T.

Kaspersky Lab uncovered unique ‘fileless’ bot attacks

By admin, 21 marca, 2012, No Comment

A simple teaser of Internet news headlines was the launch-pad for a unique malware attack, with cybercriminals creating malicious code which operated without creating files on the infected system. Experts from Kaspersky Lab uncovered the hidden attack, which exploited a vulnerability in the teasers used by a number of popular Russian news sources – and warn that similar attacks could be used to target users outside of Russia.

The investigation by Kaspersky Lab shows that Russian media websites using the AdFox teaser system on their pages unwittingly infected visitors to their pages. While downloading the news teaser, the user’s browser was secretly redirected to a malicious website containing a Java-exploit. However, unlike standard drive by-attacks, the malicious program was not loaded to the hard drive, but appeared only in the operating memory of the computer, making it much more complicated to track it down using anti-virus solutions.

Acting as a bot, the malware was sending requests and information about the user’s browsing history to a control server. If that data included any sign of using e-banking services, the cybercriminals installed the banking Trojan Lurk to steal confidential user information required to access the online banking systems of a number of major Russian banks.

The investigation has shown, however, that the AdFox network itself was not the source of the infection. News banners were modified by adding links to the malicious website code via the hacked account of an AdFox client. Modifying the code in the teaser system allowed cybercriminals to attack not only visitors to a single news site but also to other resources using the same system. As a result, tens of thousands of potential victims may have been attacked.

“We are dealing with a unique attack. A teaser network used by cybercriminals is one of the most effective ways to install a malicious code, as many popular resources contain links to it,” says Aleksander Gostev, Kaspersky Lab’s Chief Security Expert. “Moreover, for the first time in recent years, we faced a rare type of malware – the so-called ‘bodiless’ malware which does not exist as a file on the drive but appears in the operating memory of the infected machine, making its detection much more complicated. This incident was targeting Russian users. The same exploit and bodiless bot may well be used against users in other countries as they can be distributed via similar foreign banner and teaser networks. At the same time it’s highly probable that not only Lurk Trojan, but also other malware, is used for these purposes”.

Despite such programs being able to operate only until the operating system is restarted, it is quite likely that the user will return to the infected news site again. Kaspersky Lab’s experts warn that the only reliable protection is the timely installation of updates. In this case, to remove the CVE-2011-3544 Java vulnerability, we recommend installing the Oracle patch – which can be downloaded at http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html.

The detailed results of the investigation by Kaspersky Lab experts are available at www.securelist.com.

Guiding you through audit terminology

By admin, 21 marca, 2012, No Comment

“Every few months there’s a stir in the media when the Auditor General releases yet another government entity’s audit report,” says Kevin Phillips, MD of idu Software. The reports are variously damning, with the provinces and municipalities often being the worst culprits when it comes to things like “fruitless and wasteful expenditure”.

But what do these scary-sounding terms actually mean? What is really happening to our tax money in these cases – and how much of a big deal is it?

To answer those questions, let’s first recap the purpose of an audit. The auditor’s job, whether in the private or the public sector, is to make sure that an organisation’s financial statements are a fair reflection of what actually went on during a financial year. It’s about accuracy, transparency and completeness of information.

If corrupt individuals are organised enough, they can fool the audit process for a while – but it won’t be easy. Corruption doesn’t flourish where financial information is transparent and widely available, so that many people understand the broader financial picture. On the other hand, if there’s only one person in the organisation who knows what’s going on, the risk of fraud and corruption is massively higher.

So, a regular audit serves both to uncover problems and as a useful precaution: When people know they have to satisfy an auditor at the end of the year, they are more likely to follow good practice.

With that in mind, it’s easier to understand what all those audit terms really mean. A clean audit report is what everyone wants: A confirmation that there are no material errors or omissions in the organisation’s financial statements.

That little word “material” is important, however. It doesn’t mean there are no errors or omissions at all – it just means they aren’t significant enough to be a serious concern. The “threshold of materiality” is the point at which errors or omissions become large enough to influence economic decisions in the organisation. Exactly where this threshold lies will depend on the size of the organisation’s budget: A R1m discrepancy could be a sign of major trouble in a small municipality, or a mere rounding error in a large government department. This materiality issue goes some way to explaining why there is sometimes confusion about whether an organisation’s statements really are clean or not.

The next step down from a clean audit is a “qualified audit” – the accounts contain some “material misstatements”, or there isn’t enough evidence to decide whether some amounts are accurate enough.

The words “qualified” and “unqualified” also sometimes lead to confusion, because the way they are used in audit reports is different to the way we use them in everyday speech. We want our doctors and our accountants to be qualified, i.e. we want them to have all the right training and certifications and to meet certain standards. But we don’t want audit reports to be qualified; because that means the auditor has some reservations about the figures. Hence a clean or unqualified audit is better than a qualified one.

A further step down the list is the adverse audit: The auditor finds the organisation’s financials have substantial misstatements. In other words, the amount of information that is wrong or left out is significant.

Even that is not as bad, however, as a disclaimed audit: This happens when the auditors throw up their hands and say “these statements are such a mess I can’t tell what’s going on!” or the accounts are fundamentally incorrect or false. This is a red flag precisely because of the point we made about transparency above: If nobody knows what’s going on, what could be hiding in the mess?

Within each category of audit opinion, there are three kinds of problem spending that the auditor might flag. The first is unauthorised spending: That is, spending that goes over budget or wasn’t used for the purpose intended.

Irregular expenditure is something different: Spending that was incurred “without complying with applicable laws and regulations,” according to the Auditor General’s definitions. Unauthorised spending can be down to admin errors or accidents – irregular spending might raise more concerns because it suggests that procedures aren’t being followed and there is potentially more chaos to follow.

Finally, “fruitless and wasteful expenditure” is the facepalm category: Pointless spending that could have been avoided “if reasonable care had been exercised”. Penalties and interest for late payments fall into this category.

Next time you read a sensational news story about an Auditor-General’s report on a particular department or municipality, take some time to consider the details. Is the report misunderstanding, or making a mountain out of a molehill – or are things even worse?

WD announces My Book Thunderbolt Duo dual-drive storage system

By admin, 20 marca, 2012, No Comment

Up to 6 TB Capacities, Double-safe Protection, RAID, User Serviceability, and Dual Thunderbolt Ports for Daisy Chaining and Unparalleled Workflow Efficiency

Western Digital, a leader in external storage solutions, is now shipping its first external hard drive with Thunderbolt technology – the My Book Thunderbolt Duo dual-drive storage system. The new My Book Thunderbolt Duo provides professionals and Mac enthusiasts with five primary areas of performance, double-safe data protection and flexibility; ultra-fast data transfer rates for greater work efficiency; a 4 TB/6 TB large-capacity; customized dual-drive storage system with RAID 0, 1 and JBOD options; customer serviceable drives; and dual Thunderbolt ports for daisy-chaining multiple My Book Thunderbolt Duo devices or other peripherals.

Thunderbolt technology brings a new way to connect high-speed storage devices to any desktop or notebook computer with a Thunderbolt port while delivering unmatched speed for multitasking activities such as, editing video/music, 3D rendering, and completing other high definition graphics-intensive projects.

Says Anamika Budree, Western Digital Country Manager for South Africa, “The local market is ready for the ultra fast read/write times, making it ideal for creative pros and today’s ‘need it now’ consumers. When considering the digital world we live in, consumers require more performance, power and capacity, enhancing the storage and retrieval of their digital content, especially in the ‘connected home’. Creative professionals such as graphic designers and video editors will also be in awe of the difference this hard drive will make to their professional lives.”

“Offering lightning-fast throughput in both directions, the new WD Thunderbolt Duo storage systems are just what I need for organising, editing, and archiving complex High Definition video projects,” says Bruce Dorn, DGA (Director’s Guild of America). Configurable as either RAID 0 or RAID 1 – and offered in both 4 TB and 6 TB capacities – these new WD Thunderbolt Duo systems are the perfect solution for video filmmakers who are desperate for an uber-fast time sensitive project management solution.”

“The My Book Thunderbolt Duo offers large storage capacities for creative professionals and enthusiasts who produce, edit, or need quick access to large files, including HD video,” says Jody Bradshaw, general manager of WD consumer storage solutions. “Its dual Thunderbolt ports provide amazing creative flexibility while allowing daisy-chaining of up to six My Book Thunderbolt Duo drives or other high performance peripherals for fast and efficient workflow. The combination of storage, backup, security, flexibility and speed makes the My Book Thunderbolt Duo the ideal choice for creative professionals that need to write, store, protect and edit high-definition and graphic intensive projects.”

My Book Thunderbolt Duo is an ideal, all-in-one external drive for creative professionals, enthusiasts, and consumers who own vast amounts of digital content including videos, music, and photos. The drive serves as a safe and reliable way to backup content stored on your computer while providing the fastest way to get information to and from the WD drive. In addition, its RAID 1 support allows users to create a second copy of their digital content on the drive for double-safe protection, and peace of mind. The drive also supports a JBOD mode (allocate each disk individually to a specific task) excellent option for users running Windows OS on a Mac.

Additional features found on the My Book Thunderbolt Duo include out-of-the-box compatibility with Mac OS Time Machine and formatting for HFS + Journaled for Mac; capability for multi-stream workflows; and a 3-year limited warranty.

Prepaid airtime just a click away with Nashua Mobile’s Click2Recharge service

By admin, 20 marca, 2012, No Comment

Independent telecommunications service provider Nashua Mobile has completely revamped its popular ‘Click2Recharge’ online service to make it simpler, faster and more convenient for anyone to buy prepaid airtime for themselves or for an employee, friend, or family member.

The service currently allows corporate and individual customers to buy prepaid airtime for MTN, Vodacom and Cell C through the Nashua Mobile website. Nashua Mobile will soon add other prepaid services from 8ta and Neotel as well as prepaid electricity to the list of products customers can purchase online. The current service allows customers to make multiple recharges with the click of a mouse.

Nashua Mobile contract customers can pay for the airtime when they pay their monthly bill. This service is also offered to prepaid and non-Nashua Mobile customers via credit card payment. Click2Recharge aims to provide customers with a secure and user friendly way of buying and sending airtime.

Click2Recharge is quick, easy and incredibly convenient as purchases can be made from almost anywhere via a PC, tablet or even a mobile phone. There is no risk of theft or loss of recharge vouchers. Customers can buy airtime 24/7 for as many phones as required and view real-time information to see how much money they are spending on prepaid airtime.

Says Chris Radley, Managing Director at Nashua Mobile: “The Click2Recharge service has proven popular over the past seven years. However, as we see more of our customers moving to top-up contracts, where ad-hoc airtime purchases during the month are required, we felt that it was time to upgrade and improve the service to make it slicker, more responsive and easier to use than ever before.

“Whether you are paying for staff airtime or buying airtime for yourself, this is the fastest and easiest way to recharge on the three largest networks. It’s especially powerful for company financial administrators since it helps them to better manage their cellular budgets through tighter control over spending and increased visibility into transaction information. It’s a free service, so all you pay for is the airtime.”

Copper is in a fix

By admin, 20 marca, 2012, No Comment
VoIP and mobile telephony and broadband threaten fixed lines

“The three biggest current trends in telephony are all related,” says Rob Lith, Director of Connection Telecom.

Along with the rise of mobile phones and mobile Voice over IP (VoIP), there is a related demise of landlines, with big implications for telephony (as well as broadband Internet).

This is true around the world.

Global
• In developed countries, landlines have decreased by almost 10% since 2001.
• In developing countries, the trend is not as clear; with little teledensity to begin with in 2001, fixed line penetration first increased before dropping.
• However, the worldwide trend reflects the truth – we’re back where we were 10 years ago in terms of copper in the ground, and the big winner is mobile, and to some degree networked voice (VoIP).

Copper
Copper


Source: ITU

South Africa
According to a 2008 BMI-TechKnowledge study comparing SA’s telecoms and broadband performance (services and pricing) with five “peer” countries (Brazil, Chile, India, Malaysia and South Korea), South Africa’s fixed line situation is similarly challenged.

Along with Malaysia, we are the only country with fewer landlines in March 2008 (under 10% of citizens) than in December 2000 (around 12%). Is this a case of bowing to the inevitable sooner than most other countries, or simply the work of an underperforming fixed line operator? And what of the effect of a declining copper base on the growth of ADSL?

Telkom
Telkom’s financial results for the six months to September 2011 give a fairly clear indication of the answer. The numbers show a 13.7% increase in ADSL subscribers to 795 000 – 19.5% of the fixed line base (around 4 million). In other words, while fixed line penetration is waning, ADSL is growing in absolute numbers and as a percentage of fixed line installations.

ADSL growth is therefore clearly unsustainable, but to be fair to Telkom, the strategy is both predictable and reasonable, given the rise of mobile and the poor business case for copper in disadvantaged and rural areas. Where the install base of copper is mature, stable, and not under threat from thieves, ADSL can continue to grow. As for new installations and threatened areas, wireless (microwave over long distance and WiMAX over shorter distances) is the better broadband delivery model.

As for telephony, Telkom’s response to these market issues has been to launch low-cost mobile carrier 8ta, which will ultimately give the company a winning value proposition as the only carrier with a fixed-mobile converged offering.

The rest of the market
In short, Telkom is a microcosm for the SA market as a whole: For now, as regards Internet, copper-based broadband is growing, but its stagnation is not that far off. As for fixed telephony, it is already on the wane.

By and large, the gap will be filled by mobile and wireless solutions, but also by networked voice (VoIP) offerings from a plethora of alternative telcos. Again understandably, it is not in Telkom’s interests to play in the VoIP market, as it would cannibalise its traditional voice business. Nor is the company keen to share last-mile ADSL access with VoIP service providers or to improve the quality of service of ADSL – which often makes up at least some of the access component of a VoIP solution, whether hosted or on-site.

Nevertheless, VoIP is making increasing inroads, worldwide as well as in South Africa. The technology is strong in greenfields implementations (new companies or branches) and as replacements of end-of-life analogue systems.

The future
Quite clearly, VoIP is part of the future of voice. If you’re not thinking about it yet, now could be the time, before your system is relegated to the unsupported wilderness, or the public telecoms infrastructure becomes overwhelmingly IP-centric, to the point that your system becomes a dinosaur.

Strategy, Negotiation and Robot Building: All in a Day’s Work for Junior Achievers

By admin, 20 marca, 2012, No Comment

First Junior Achievement South Africa Innovation Challenge sponsored by RIM

Research In Motion (RIM), the company behind the BlackBerry® solution, sponsored Junior Achievement South Africa’s (JASA’s) first Innovation Challenge. This is in line with RIM’s global commitment to help develop business, science and mathematics skills and inspire more students to choose these subjects.

The event, held on 24 February at the University of Johannesburg’s Intellilab, saw 40 Grade 11 learners compete in teams of four to solve a series of challenges that aimed to teach them basic business skills as well as inspire them in science and technology. The learners were from McCauley House, Dawnview High School, Sunward Park High School and Ponelopele Oracle Secondary School.

They started the day in a special workshop where they disassembled BlackBerry® smartphones to learn how mobile phones work. They were also given BlackBerry® PlayBook™ tablets to use for the day to take photos and videos and earn extra points for their team.

Each team needed to build a robot which they entered into a ‘robot race’ which was the highlight of the day. To win, they needed to trade robot parts in boxes at various ‘Market Points’ around the campus, choosing the right moment to make their purchases according to the fluctuating exchange rate.

They also had to trade robot parts with other teams, since none of the boxes contained all the spares needed to build a complete robot. Once they had all the parts, they needed to assemble and programme their robot for the race. The Duiker team won the race in a dramatic finish and was awarded a range of BlackBerry® prizes as well as R300 airtime for each team member. To watch the race, click here.

Several RIM employees volunteered to oversee the day’s activities and mentor the students as part of Proud2Be, a group of RIM programmes that help employees get involved in the community.

Says Robyn Milham, Head of Sales for Southern Africa at RIM: “This is a great example of our global strategy to support science, technology, engineering and maths learning to ensure a solid talent pool for the technology industry in the future. Since business, science and mathematic skills are so important to South Africa’s development, it was wonderful to see the children take so much joy in the day’s learning and activities.”

The JASA event was the first of six school events in EMEA that RIM will be sponsoring with Junior Achievement with the aim of bringing science and technology to life while teaching business and entrepreneurship skills. The next event took place in Italy on 15th and 16th March.

 

Virtualisation and Security should go hand in hand says Kaspersky Lab

By admin, 20 marca, 2012, No Comment

According to the IDC¹, virtualisation and server consolidation will be the top priorities for CIOs in 2012. Certainly as these priorities change, so too does the role and focus of the CIO evolve and in line with this, the Mother City will be hosting the IDC CIO Summit this week – an event aimed at identifying how this role is evolving and highlights key areas that CIOs need to be focusing on, where Kaspersky Lab are once again proud to be part of this thought leading event.

Says Sergey Novikov, Head of Kaspersky Lab Global Research and Analysis Team; “The role of the CIO is certainly becoming a more complex one, especially if we consider the rate at which technology evolves. With virtualisation becoming key for many businesses and subsequently a focus, the issues of security in light of virtualisation need to become a consideration for CIOs, as, as with everything technology based, security measures need to be implemented. It is with this in mind that we are again thrilled to be at the Cape Town IDC CIO Security Summit providing insight and tools for securing ever expanding enterprise networks and looking at anti-malware security for virtualised environments, including virtual data centers, virtualised servers and desktops running a virtualisation platform.”

Considering the current economic uncertainties that businesses have and continue to face, it is easy to see why there will be a strong focus on virtualisation throughout 2012 – businesses today require technology to offer them greater efficiency, higher productivity, increased agility, reduced costs as well as a competitive advantage – all by products of a virtualisation IT model.

“A recent CDW² report indicated that small businesses are moving steadily towards a more virtualised computing approach. This is likely due to the benefits that virtualisation offers and in the South African market, where the majority of businesses are small medium sized enterprises, we will likely see the same move take place by CIOs, meaning that local businesses need to know and take the right security measures for a virtualised business model today,” adds Novikov. “There is a myth within the industry that the virtualisation approach is a more secure one and less prone to being targeted by malicious threats. This is a fallacy! While virtual machines may be less prone to threats relating to spyware and ransomeware, they are vulnerable to malware in various other forms such as Trojans and botnets.”

In fact, the National Institute of Standards and Technology³ states that virtualisation actually adds layers of technology, which can as a result increase the security management load. “It is evident then that security for a virtualised environment is a must and should not be ignored. With CIOs striving to align IT security objectives with those of the wider business and endeavouring to enhance business efficiency and agility, this conference promises to be one that offers insight and valuable information,” concludes Novikov.

The conference will be taking place at the The Westin Hotel, Cape Town, South Africa from 19th – 20th March 2012.

For more information visit http://events.idc-cema.com/eng/events/41751-idc-s-africa-cio-summit-2012?g_clang=ENG

¹ Virtualization Tops CIO Priorities In 2012: IDC, Information Week, http://www.informationweek.com/news/storage/virtualization/232400150
² CDW Report: Growing Numbers of Small Businesses Gain Agility, Cut Costs with Server Virtualization, CDW, http://newsroom.cdw.com/news-releases/news-release-08-31-11.html
³ Security for Virtulisation, finding the right balance, Kaspersky.com/beready

wielkoformatowe wydruki Lublin kolorowe kopiarki Warszawa wielkoformatowe skanowanie kolorowe skanowanie Lublin skanowanie w lublinie skanowanie lublin drukowanie map lublin projekty powykonawcze dokumentacja powykonawcza skanowanie do pliku wielki format wydruki z internetu lublin