Archive for Maj, 2013

Dangers of implementing BOYD into your organisation

By admin, 8 maja, 2013, No Comment

Mobile Device Management needs to be examined locally, say Kaspersky Lab

According to a Forrester survey carried out in Q4 of 2012* 75% of company employees across the globe want to use their personal mobile devices for work on a daily basis. This is a 3% increase from the figures in 2011. Most (76%) of this group is specifically interested in using their smartphone at work.

“Employees who are required to travel for business purposes are increasingly using their mobile devices for convenience, portability and easy manageability via a touch screen. This is great for the employees but can cause a number of problems for IT administrators in any business,” said Riaan Badenhorst, Head of Operations for Sub-Saharan Africa for Kaspersky Lab, says

Many companies already see mobile devices as an essential tool for employees; however companies should not forget that the rapid development of mobile devices and operating systems has attracted the attention of cybercriminals too. These days, thousands of malware programmes exist, which include mobile viruses that send text messages to premium-rate numbers without the user’s knowledge and spyware programmes that gain access to entire device’s data and tracks all the actions performed by the user.

Continues Badenhorst; “The massive popularity of mobile devices has led to corporate employees actively using their private smartphones and tablet PCs as part of their everyday toolkit. This has become a real dilemma for system administrators and IT security specialists who today find themselves losing control over the mobile segment of the corporate network, and thus they feel that they are unable to predict where new threats might come from and as such provide the right protection for the corporate network.”

This trend has been dubbed ‘bring your own device’ or BYOD and from an IT security standpoint, BYOD’s biggest challenge is that it allows “untrusted” tools to gain access to corporate systems – often without complying with corporate requirements. Whether it’s the communication principles, or the functional capabilities, mobile devices often do not fit into a specific security policy.

“To address these problems, security software developers have been working hard to create technologies and software that are collectively termed Mobile Device Management (MDM). Software using MDM technologies helps to monitor, manage, protect and maintain a broad range of mobile devices, including mobile phones, smartphones, tablet PCs and other gadgets, whether under corporate or private ownership. By controlling, protecting and managing data, the risk of compromising the network infrastructure can be dramatically reduced, while at the same time improving the reliability and performance of IT processes,” explains Badenhorst.

The technologies implemented in MDM software can use the functional capabilities available in popular systems such as Apple MDM or Microsoft Exchange. With the help of MDM, it’s possible to create, standardise and set profiles for mobile corporate mail, encrypt and remotely wipe data kept on devices, install and remove software, block lost and stolen devices, manage antivirus protection, and lots more.

Kaspersky Lab has introduced their Kaspersky Endpoint Security for Business (KESB) product, which addresses these requirements – offering businesses the Mobile Security strategy they need through one platform, one console, and at one cost.

“It is so important to understand that the rise of new threats targeting mobile platforms is real – and no longer merely theoretical. For this reason, it is critical that organisations decision makers are aware of the dangers of implementing BYOD to their organisations and stop being ignorant to the importance of security and adopting the attitude of “this will never happen to my company”. The sooner the right measures are put in place for effective BYOD, the better it is for the business.” concludes Badenhorst.

The importance of backup and recovery for mid-sized businesses

By admin, 8 maja, 2013, No Comment

By Gareth Tudor, CEO at Altonet

Starting any new business in today’s volatile economy is a formidable challenge. It is estimated that at least 50 percent of them fail within the first five years. Those businesses that do survive beyond those crucial years have to carefully refine their business processes and operations, and in particular how they manage and protect their information assets.

One aspect that is often overlooked that can bring a business to its knees, irrespective of its past and current successes, is the lack of a robust backup and recovery strategy to cater for their exponential growth of business data.

While most companies today have some type of backup strategy in place, not all backup solutions are created equal. In fact, many fall short of meeting the most basic tried and tested methodologies to securely backup and recover enterprise-wide information.

Some organisations use one or a combination of in-house hardware, tape libraries, portable hard drives and memory sticks to back up their data and only too often, such backups are done on a “as and when” basis instead of according to a fixed timetable. This can lead to missed data, duplication of data and data loss from hard disk drive failures, error-prone tape-based processes, power surges, loss or theft. Others opt for public cloud offerings, which leave them vulnerable to data compromises from hackers. They also run the risk of only having intermittent access to their business-critical information at crucial points in sales cycles with no accountability from their service provider ‘somewhere’ in the cloud.

While there are many horror stories about what could happen if a business suffers data loss, companies that aren’t able to resume operations within a few days of losing business-critical information are likely to suffer dips in revenue and reputational risk with their customers. It is estimated that 65% of businesses that suffer a significant loss of data do not survive beyond a further 12-month period.

As small businesses grow to become mid-sized companies, it is vital for them to have rigid and automated operational backup and recovery strategies in place that will allow them to safely and securely store their data. Compliance and governance also becomes a greater issue as companies drive business value, so gaining visibility over their technology infrastructures is also a legal obligation that these organisations have to satisfy. In addition, many large customers will require companies to certify their compliance to strict risk management which will include disciplined and provable strategies for data protection.

These requirements place an additional burden on companies. Most growing organisations need all their people resources at their disposal to keep up with the pace of the expansion and cannot add additional resources to focus on rigorously backing up critical data on a continuous basis. Additionally, the lack of visibility over which files are business-critical versus those that are more transitory is increasing organisational risk.

As the technology landscape continues to evolve, specialist cloud computing providers have emerged that offer secure off-site cloud data protection solutions backed by Service Level Agreements (SLAs). These next-generation cloud solutions provide organisations fast, assured and automated backup of their mission critical information with the ability to recover lost data via web interface in a timely manner. Automated cloud-based backup and recovery solutions not only reduce cost and administrative headaches, but frees up staff to focus on growing the business.

In addition, leveraging the cloud for backup and recovery offers small to medium businesses (SMB) a range of advantages:

  • By opting for cloud backup, businesses know that their data is stored in a reliable, off-site, redundant environment in line with compliance and governance regulations.
  • Some providers offer flexible retention and deployment configuration depending on an organisation’s requirements, be it on-premises, cloud-based or hybrid.
  • Reputable cloud providers offer companies advanced backup and restore capabilities, with the ability to roll back their backups to restore previous versions of the same documents, if the need arises, especially if they merely have a need to recover corrupted data and not the whole data set.
  • Due to the economies of scale within the provider environment, backing up in the cloud reduces the costs associated with a dedicated backup infrastructure, simplifies IT budgeting. Many offer budget flexibility with ‘pay as you protect’ offerings.
  • Most providers offer scheduling of backups, which reduces human error in backup procedures.
  • SLA’s are also top of mind for growing businesses to ensure that there is business continuity and respectable cloud providers offer users pro-active, web-based monitoring and around the clock operational support to manage possible backup errors and detect possible vulnerabilities.

In closing, when going the cloud based route it is important to ensure that service providers demonstrate the strictest processes and technologies to safeguard a company’s data. This not only includes physical security of its data centres and acts of nature, but also written policies for pro-active monitoring, data encryption in transit, encryption during storage, controlled access and verification of data integrity. If these requirements are satisfied, growing businesses can ensure that their journey to complete backup and recovery peace of mind is a successful one.

The Notebook Company opens new consumables division

By admin, 8 maja, 2013, No Comment

The Notebook Company, the Pretoria-based notebook and accessories retailer – and one of the biggest sellers of Apple iPads in the country – has announced the opening of a consumables division.

Said Christopher Riley, CEO of The Notebook Company: “We are always looking at value added services to offer our clients and we believe this is a good move for us – by expanding into the cartridge and toner business. There is a big demand from our client base for this service and we therefore made a decision to diversify our market focus. The consumables divisions is already up and running,” said Riley.

Commenting further, Riley said that, besides “satisfying current clients”, the company hopes to attract new clients via its consumables division – and hopes that they will become “notebook and tablet buyers as well”.

“This will definitely generate a new revenue stream for us. The investment has not been huge as we already have the infrastructure in place. Besides this positive factor, because this is not our core focus, it enables us to come into the market on a competitive footing – and offer our clients really pencil-sharpened prices. We don’t have to make big profits from this division. It is a value added offering – which, in itself – will bring its own business benefits. We are not hunting for market-winning margins,” he said.

Planet F1 laps the competition during Malaysian Grand Prix

By admin, 8 maja, 2013, No Comment

During the recent Bahrain Grand Prix, the number of site visits to Planet F1, the largest independent F1 website in the world, spiked dramatically with an increase of around 30% on the day of the event. Furthermore, during the recent Malaysian Grand Prix, Planet F1, saw a record number of users when the site received 198,863 visits and 120,487 unique visitors on race day. This is the largest number of visitors in the website’s 10 year history and confirms its place as a leader in motorsports reporting.

Bringing fans lively, informed and entertaining coverage on the art of racing, PlanetF1 readers enjoy unbiased reporting on every Formula1 event around the globe, with live commentary and up to the minute action reported on the site and social media pages. They are able to create this independent arena as they form part of digital media company, TEAMtalk Media, and are therefore not owned or affiliated to a specific sporting federation.

Michelle Foster, editor of Planet F1, was not shocked by the amount of traffic the site saw during the Grand Prix. “As the love for Grand Prix has grown, we have continued to grow as a trusted website with both a loyal fan base and unique visitors who can trust us when it comes to providing accurate and entertaining coverage. What we have created and built up over the past decade is a platform where fans can express their views, catch up on news headlines and results and interact within our established social media communities.”

On the day of the Malaysian Grand Prix, Planet F1 was listed as the third most read South African published website, behind News24 and HowzitMSN, according to digital media company, Effective Measure. Beyond South Africa what we are seeing is a truly global growth of interest in this sport with top visitors for the site coming from the United Kingdom, United States, Australia and Canada.

“We are thrilled to have reached this milestone with the Malaysian Grand Prix and look forward to overtaking it soon!” concludes Foster. Aficionados can visit PlanetF1 at, or subscribe to the entertaining monthly newsletter which gives a trackside view of the world of Formula1.

Speedy, secure virtual backups make motor industry leader more agile

By admin, 8 maja, 2013, No Comment

From near-disaster to global leadership: TiAuto (Pty) Ltd and Tiger Wheel & Tyre’s a division of TiAuto’s virtualisation journey

Virtualised IT environments bring new opportunities for cost savings and efficiency – but they also bring new risks to business continuity, and the need for new tools to manage those risks, as leading local automotive company Tiger Wheel and Tyre has discovered.

One of the most important tools, says Group IT Executive, Melody Fourie, is Veeam, a backup solution designed from the ground up for virtualised environments. “Every single IT executive has the right to know about Veeam,” she says. “If I could get software this good to mitigate my other risks I’d be very happy.”

Not only has Veeam dramatically reduced business continuity risks, adds Fourie, it has also made the IT team, and thus the entire business, more agile. “It’s changed our approach to new software development,” she says. “We can create a new VM server in seconds to do live test scenarios. If it works, we keep it; if it doesn’t, we can roll back just as quickly. We have become more innovative and more willing to take risks in our development. This business is constantly on the move, they can reinvent themselves in weeks – and we’re able to support that.”

Fourie discovered Veeam after a near-disaster: “We lost a disk in our Storage Area Network (SAN) array, and it was 50-50 whether the array would be able to rebuild itself successfully or we’d need to go into a full-scale data recovery. We had the conventional backups to tape, but we weren’t 100% sure we could restore from those, and it would have taken at least two weeks. That was all our critical business servers.”

In the end, the SAN rebuilt itself successfully and the company lost only about eight hours of head office operations – but, says Fourie, “we were very, very lucky. We knew we had to change something and called our partners that same day. One of them mentioned Veeam, which was brand new at that point. We spent about two days setting it up and testing, then licenced all our servers and never looked back. We’ve simulated many, many recovery instances since then and every one of them has been successful.”

Fourie describes Veeam as “insanely fast”: It takes her team less than 15 minutes to restore business critical services and under five hours to restore the entire data centre. Individual virtual machines, or even single files, can be restored within minutes. “It happens at least once a fortnight that somebody deletes a file in a folder on a shared drive and we need to restore it from a backup. That used to take a senior resource two days to do from tape – now it’s a 30-second drag and drop”.

Disaster recovery and change management is now the easiest part of her IT audit, says Fourie. “We show the auditors live how we recover a machine and they sit there with their eyes wide open. I only wish I’d discovered this sooner.”

At VMWorld Europe in 2012, Tiger Wheel & Tyre was awarded the best virtualisation and server consolidation project award, as well as the best of show award for its innovative use of technology.

Wearable CCTV surveillance – a ‘fly on the wall’ for guarding

By admin, 8 maja, 2013, No Comment

Wearable CCTV surveillance gives security personnel, organisations the real version of events

Many companies in South Africa employ security personnel as their first line of defence in shop fronts or as part of their business operations. However, when a security ‘incident’ occurs, in reality it is often difficult to assess the liability of the parties involved. Incidents are usually dealt with ‘after the fact’. SerVision’s real time low bandwidth streaming allows the control room to view the activity of the incident in question via GSM or WIFI and respond accordingly in real time. This is according to Mark Chertkow, Managing Director, at Graphic Image Technologies (GIT), a company that specialises in mobile and remote closed circuit television (CCTV) and control room technologies.

“Security management teams have to rely on the guard’s version of events or eye witness accounts, without having a comprehensive view of the reported incidents as they happen. This can have serious implications. Complaints against security personnel have the potential to cost them their jobs as they have to prove their standpoint from their version of events alone. Often it comes down to a ‘he said, she said’ scenario and companies face a difficult task to take decisive action if necessary, be it legally or otherwise. The additional live access moves the solution from a post-event analysis tool to a real-time proactive solution,” says Chertkow.

He says there has always been a need for a fully fledged wearable CCTV solution that is affordable, allows for live streaming of the CCTV and forms part of an organisations’ CCTV operation, but technology and cost constraints have hampered deployment in the past.

“Traditionally wearable closed circuit television CCTV security solutions were bulky and uncomfortable to carry around for long periods of time, and also not easy to use or rugged enough to withstand everyday wear and tear. In addition, they do not allow for live viewing of the CCTV pictures.

“Also, while being able to log events, video recording was limited to due hard disk drive space constraints and guards had to resort to recording as and when incidents happen and then download it later at their control centres. As a result, there was often no accurate representation of the chain of events to legally protect the jobs of the guards and reputations of their companies,” he adds.

In response to this, SerVision developed a lightweight wearable CCTV security solution – the CVG-M video gateway unit – using proprietary video compression technology to transmit and record live high quality video with the use of its built-in 3G GSM module or Ethernet interfaces.

Says Chertkow: “The unit is compact enough to be worn comfortably by security personnel for long periods of time and is powered by a 12V portable battery. Housed in a small hip pack or backpack, the CVG-M sports an internal cellular modem and supports two video inputs for live streaming, using miniature cameras as well as an audio input which is connected and mounted on a shoulder strap.”

It also features a built-in GPS module, which allows management to track the location and movement of the on-duty guard at all times.

“The miniature cameras and microphone fit on the shoulder strap or helmet of the guard, which makes it well-suited for undercover operations. The live video feed is recorded and accessed directly by high-level control room personnel and first response teams either via a mobile device or on site.”

“Should the unthinkable happen to one of the security personnel, the probability of the perpetrators getting caught thanks to the video and audio surveillance is significantly higher,” he says.

Concludes Chertkow: “The unit allows organisations to spend less time on assessing wrongful accusations, and also increases the accuracy of the security incident reports, making staff more efficient and productive, with the assurance they have proof to back up their version of the disputed incidents. In addition, the CVG-M provides a proactive support element to your guarding solution.”

The CVG-M video gateway unit is exclusively available through GIT’s resellers. For more information visit:


The SIMS 4 coming to PC and MAC in 2014

By admin, 8 maja, 2013, No Comment

Sul Sul! Maxis and Electronic Arts today announced that The Sims™ 4 is currently in development at The Sims Studio for release on PC and Mac in 2014. The Sims 4 celebrates the heart and soul of the Sims themselves, giving players a deeper connection with the most expressive, surprising and charming Sims ever in this single-player offline experience. The Sims 4 encourages players to personalize their world with new and intuitive tools while offering them the ability to effortlessly share their creativity with friends and fans.

The Sims franchise is fueled by the passion and creativity of its millions of fans around the world. Their continued devotion to the franchise ignites the fire of creativity of the team at The Sims Studio, driving them to continually improve and innovate on one of the world’s most popular simulation games that has sold more than 150 million copies worldwide.

As a thank you for the support of the more than 30 million fans that share and discuss stories about The Sims across global social networks, a special VIP briefing was held this morning where several of the world’s top fans were amongst the first to hear the news about The Sims 4. This select group was the first in the world to hear from the creative team for The Sims 4, and they will receive special access to the development team as the game progresses.

The Sims 4 is not yet rated by the Film and Publication Board (FPB) of South Africa. To stay up to date with the latest information please visit

MICHAEL JACKSON – Megamix World Tour (Part 1) / PICTURE DISC / 12" Vinyl / NEW

By admin, 7 maja, 2013, No Comment

ABBA – The Greatest Megamix / PICTURE DISC / 12" Vinyl / NEW

By admin, 7 maja, 2013, No Comment

♥7♥ TWO MAN SOUND Samba Megamix

By admin, 7 maja, 2013, No Comment
wielkoformatowe wydruki Lublin kolorowe kopiarki Warszawa wielkoformatowe skanowanie kolorowe skanowanie Lublin drukowanie drukowanie projektów w lublinie wielki format w lublinie skanowanie lublin skanowanie dokumentów lublin kopiarki warszawa