Hi-Tech

  Home  Promotions  Services  Vendors  News


 

About ABA
Products
Vendors
Services
Resellers
Contact ABA

 

Apple planning 12.9-inch iPad for 2015

 

Apple Incorporated is preparing to roll out a larger, 12.9-inch version of its iPad for 2015, with production set to begin in the first quarter of next year. The report comes as Apple struggles with declining sales of its 10-inch and 7.9-inch tablets, which are faltering as people replace iPads less frequently than expected and larger smartphones made by Samsung Electronics. Apple is expected to introduce larger versions of its 4-inch iPhone next month, although the company has not publicized plans for its most important device.

===================================

Supermicro MicroClaud Solution

Up to 24 Modular UP Server Nodes in 3U

These advantages have helped Supermicro establish itself as a true leader in server technology. The full range of Supermicro products stand above the competition on their own merits by delivering industry-leading performance at extremely competitive prices. With the most extensive product line in the industry to meet the widest range of customer needs, it is easy to understand why Supermicro has become a world leader in server design and manufacturing.

===================================

Total Solution Event - Amsterdam 2013

IBM Total Solution Event is the place to be, if you want to stay informed about the latest technologies that continue to bring innovation and set the right business context. This event will be held on Tuesday, March 12 through Thursday, March 14,2013  in Amsterdam.
Parallel tracks and breakout sessions presented by the International Technical Support Organization and WW experts.
This 3-days education event is free to IBM clients residing in Belgium, Luxembourg, and the Netherlands.

 

===================================

BlackBerry® Z10 @ Rogers

===================================

 

Google will start charging small businesses for Google Apps

Google has announced a significant decision that will see it cease allowing users to sign up to its Google Apps service free of charge.
Clay Bavor, director of product management for Google Apps, explains that the move is being made in order to focus the quality of the user experience on the needs of paying, business users, with fuller support. However, those that have already signed up for the service for free will still be able to use it as before.

“When we launched the premium business version we kept our free, basic version as well,” Bavor explains. “Both businesses and individuals signed up for this version, but time has shown that in practice, the experience isn’t quite right for either group. Businesses quickly outgrow the basic version and want things like 24/7 customer support and larger inboxes. Similarly, consumers often have to wait to get new features while we make them business-ready. ”

Google is now encouraging users to sign up to Gmail, storage service Google Drive and its other consumer-facing products, instead of Google Apps. Those that do want to use Google Apps can get the premium version, which remains $50 per user, per year.

Google says that the end of the free version will allow it to focus on providing business-grade service, including 24/7 phone support for issues, a 25GB inbox and its 99.9 percent uptime guarantee.
 

===================================

Logitech Bluetooth® Illuminated Keyboard K810

 

Introducing: Logitech Bluetooth Illuminated Keyboard K810 for Windows®, Android® and iOS®—a stylish, backlit keyboard with one touch easy-switching between your PC, tablet, and smartphone

Switching made simple: Logitech Easy-Switch™ allows you to quickly change between typing on your PC to typing on your tablet or smartphone with the touch of a button.

Better typing—day or night: Keys are sharp, bright and always easy to read thanks to auto-adjusting illumination which dims or brightens depending on the amount of light in the room.
 

===================================

Fastest supercomputer in Canada

 

===================================

Make your phone your wallet

Rogers bringing mobile payments to Canadians

When it comes to mobile banking, Canadians are the fastest adopters of mobile apps. Did you know that more than 2.5 million people in Canada are using mobile banking applications for daily banking? That’s 38% of smart-phone users with data plans.

Rogers announced an agreement with CIBC to launch Canada’s first mobile payment solution, allowing Canadians to pay with their CIBC credit card at the checkout counter using their Rogers “Near Field Communications” (NFC)-enabled smartphones. This means that later this year, Rogers customers will be able to use this payment capability at merchants across Canada where contactless credit card payments are accepted.

This announcement is the first time a bank and a wireless carrier have joined forces to offer a commercially available mobile payments solution to Canadians that leverages the SIM card inside an NFC-enabled Rogers’ smartphone. This new payment solution aligns to guidelines announced  by the Canadian Bankers Association for mobile payments in Canada
 

===================================

 

Supermicro® 3U SuperServer® Leveraging 24TB Fusion ioMemory Achieves Over 10GB/s Throughput

 This dual Intel® Xeon® processor E5-2600 based platform features up to ten 2.4TB Fusion ioDrive2 Duo (F01-001-2T41-CS-0001) ioMemory products with up to 3GB/s and 935K IOPs leaving an additional PCI-E 2.0 x4 (in x8) slot available for a high-bandwidth network expansion card such as Supermicro’s 10GbE or FDR/QDR InfiniBand add-on cards. 

“Supermicro designs solutions such as 11x PCI-E slot SuperServer for maximum performance, efficiency and expandability and  open platforms create groundbreaking opportunities like this collaboration with Fusion-io,” said Wally Liaw, Vice President of Sales, International at Supermicro. “This new ultra high performance 24TB storage solution is the foundation for new products in our pipeline and we are looking forward to incorporate upcoming Fusion-io technologies into select HPC servers for even greater storage density at higher IOPs for the most demanding, cutting edge applications.”

 

===================================

Samsung Galaxy Note 10.1 tablet LTE Edition

Samsung has released the LTE edition of its Galaxy Note 10.1 tablet, but only in korea.

With Galaxy Note 10.1, Samsung gets a fresh start in tablets

===================================

Dell and Smart Grid

A smart grid is an electrical grid that uses information and communications technology to gather and act on information, such as information about the behaviors of suppliers and consumers, in an automated fashion to improve the efficiency, reliability, economics, and sustainability of the production and distribution of electricity

Dell’s Smart Grid Data Management Solution combines the high performance computing, networking and storage components needed to handle the massive flow of Phasor Measurement Units (PMUs) data generated by transmission and distribution (T&D) systems. When analyzed back at the utility’s operations centre, PMU data can alert grid operators to a current or imminent outage – enabling proactive or more speedy response to maintenance challenges. Ultimately, this analysis works to improve the health and reliability of power networks, which are coming under increasing pressure from the integration of distributed, renewable energy resources. The new offering is a joint initiative: the OSIsoft PI System provides a scalable platform for the analysis of high speed PMU measurements that stream from the grid in hundreds per second; and Dell provides the infrastructure needed to support the analytics application.

===================================

IBM and Power7+processor

IBM Boosts Security, Cloud and Analytics Capabilities With New Power Systems, Storage and Mainframe Technologies

•Power Systems family infused with new POWER 7+ processor for greater security and fast business analytics, capacity on demand, and significantly improved performance.  

The announcement is part of IBM’s continued focus on Smarter Computing systems aimed at solving the varied and intensifying challenges organizations are facing, from security vulnerabilities to managing ballooning data volumes that are expanding through social and mobile technologies.

IBM customer Toyota Australia is one example of a company with complex data management needs. Running a sophisticated just-in-time manufacturing, logistics and parts operation at its Altona plant in Melbourne, Toyota Australia uses a series of IBM Power servers running SAP software on AIX to manage and analyze data about vehicle parts availability, shipping estimates, inventory levels and sales planning. The manufacturing process is entirely reliant on this infrastructure in order for production operations to run as efficiently as possible so that not only can its dealerships receive car deliveries on time to meet consumer demand but it can meet export market demand.

According to Toyota Australia CIO James Scott, "One of our company's top concerns is data management delays. This has the potential to negatively impact our production line, costing us tens of thousands of dollars in lost productivity, and the profits of our 250 dealerships across the country. Having a fast, reliable technology infrastructure is critical to the success of our business and IBM gives us the tools we need to support the organization most effectively."

 

===================================

Hurricane Sandy Effects IT Technology

BANGALORE: Despite loss of multiple work days and shut-downs across Wall Street financial institutions, revenue for Indian information technology and business process outsourcing companies is unlikely to be impacted in any significant manner on account of Hurricane Sandy, analysts said.

"It's not going to have any recurring impact, so investors in IT sector can be assured," says Sandeep Muthangi, vice president at Mumbai-based brokerage IIFL. He said that though a number of queries have come from investors on a possible impact on Indian companies due to the hurricane, he doesn't see any siginificant fallout.

Most IT-BPO companies as well as their clients in banking and financial services sector have shut offices in New York and New Jersey this week where the storm has caused heavy rains and flooding.

(Read More: The Economic Times )

 

============================================================================

IT and The SMB: Coping with Consumerization

SMB space, adopts app style and design

Steve Heck CIO of Microsoft Canada

Steve Heck Said "There will be an increase in the number of small companies that can play in the SMB space, SMBs can bring a product to market and compete with the bigger guys based on the merits of a good idea and not based on who has a deeper bank account."

" The days of buying a CD and coming home and loading, the program are gone. The SMB space is adopting a consumer feel, even though people are using it for business" said Heck.

He Said "It is going to open up a lot of opportunities for the SMB space. SMB companies will enjoy the ability to get an enterprise grade experience that they have't in the past, in ways that are affordable."

Article Publisher: IT in Canada  Oct 2012 Volume3 Number 5

(Read More: www.itincanada.ca)

 

 

*** FYI  (for your information)

SMB stands for Server Message Block which is a network application that enables the sharing of resources, like a file server or printers. SMB does not provide network connections. It relies on network services to carry its traffic, which usually follow the TCP/IP networking model.

SMB has evolved into other networking systems, which are called “dialects” of SMB. SMB was created in the early eighties. It was originally meant to run over a NetBIOS network. The early development of the PC was a collaboration between Inter, IBM and Microsoft. The DOS operating system of the PC was the responsibility of Microsoft and they soon took over responsibility of developing SMB, which was the networking strand of the DOS operating system. NetBIOS networks give a name to each computer or device on the network, called a host name. TCP/IP networks use a numeric addressing system for networks. As TCP/IP networks are now much more common than NetBIOS systems, SMB usually runs on NetBIOS over TCP/IP. 

 (Read more: www.ehow.com)

 

 

 

======================================================================

 

Computer Bots

"Bot" is derived from the word "robot" and is an automated process that interacts with other network services. Bots often automate tasks and provide information or services that would otherwise be conducted by a human being. A typical use of bots is to gather information (such as web crawlers), or interact automatically with instant messaging (IM), Internet Relay Chat (IRC), or other web interfaces. They may also be used to interact dynamically with websites. Bots can be used for either good or malicious intent. A malicious bot is self-propagating malware designed to infect a host and connect back to a central server or servers that act as a command and control (C&C) center for an entire network of compromised devices, or "botnet." With a botnet, attackers can launch broad-based, "remote-control," flood-type attacks against their target(s). In addition to the worm-like ability to self-propagate, bots can include the ability to log keystrokes, gather passwords, capture and analyze packets, gather financial information, launch DoS attacks, relay spam, and open back doors on the infected host. Bots have all the advantages of worms, but are generally much more versatile in their infection vector, and are often modified within hours of publication of a new exploit. They have been known to exploit back doors opened by worms and viruses, which allows them to access networks that have good perimeter control. Bots rarely announce their presence with high scan rates, which damage network infrastructure; instead they infect networks in a way that escapes immediate notice.
 

Virus

A computer virus is a small malware that propagates by inserting a copy of itself into and becoming part of another program that spreads from one computer to another and leaving infections as it travels and attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program. When the host code is executed, the viral code is executed as well. Normally, the host program keeps functioning after it is infected by the virus. However, some viruses overwrite other programs with copies of themselves, which destroys the host program altogether. Viruses spread when the software or document they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected e-mail attachments.

Worms

Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. To spread, worms either exploit a vulnerability on the target system or use some kind of social engineering to trick users into executing them. A worm enters a computer through a vulnerability in the system and takes advantage of file-transport or information-transport features on the system, allowing it to travel unaided.

Trojan

A Trojan is another type of malware named after the wooden horse the Greeks used to infiltrate Troy. It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems. After it is activated, it can achieve any number of attacks on the host, from irritating the user (popping up windows or changing desktops) to damaging the host (deleting files, stealing data, or activating and spreading other malware, such as viruses). Trojans are also known to create back doors to give malicious users access to the system.

Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. Trojans must spread through user interaction such as opening an e-mail attachment or downloading and running a file from the Internet.

(Read More:  www.cisco.com)

 
 
About ABA |  Products |  Vendors |  Services | Resellers | Contact ABA
Copyright © 2010  ABA Canada corporation All rights reserved.