• Google Nexus 7 Generation 2, Pack Full HD Screen And Processor Quad-Cor

    Comments Off on Google Nexus 7 Generation 2, Pack Full HD Screen And Processor Quad-Cor
    July 22, 2020 /  Computer Technology, Hardware

    Last year, many manufacturers began to play with the seven-inch tablet and the price competition is getting fierce. Google hit the market with the launch of the first Nexus tablet, named Nexus 7. Now, the biggest search engine in the world announced the second generation of its flagship tablet. Changes in what is offered?

    Nexus 7 2 7 Generation Google Nexus 2, Pack Full HD Screen And Processor Quad Core tablet pc computer news
    Still manufactured by ASUS and uses soft touch material on the back side, second-generation Nexus 7 carries a smaller design. Although the screen size remains the same, the Nexus 7 II appear slimmer and lighter. Compared to previous Nexus 7, bezel or frame is now thinner 2.8 mm, 1.8 mm thinner body and lighter weight 50 grams. To display sector, the resolution increased to 1920 × 1200 pixels with a density of 323 ppi or 50% denser than the predecessor model.

    Also a significant increase in performance. The second-generation Nexus 7 processor quad-core Krait Snapdragon S4 Pro with 1.5 GHz speed, capacity is doubled to 2GB RAM, and Adreno 320 graphics cards. Unlike the previous model, this time carrying the Nexus 7 rear 5MP resolution camera that can record 1080p video and 1.2 MP sensor on the front of the camera.

    This time Google immediately offers two models of the Nexus 7, WiFi and 4G LTE. WiFi model comes in a choice of 16GB capacity priced at $ 230 and 32GB at U.S. $ 270, while the 4G LTE models are only offered with capacities of 32GB and priced at U.S. $ 350. Google plans to start marketing its new seven-inch tablet on July 30. Hopefully not too late to Indonesia as the first generation of Nexus 7 newly announced into Indonesia after a year.

    Tags: , , , ,

  • Sisco will buy software maker Sourcefire

    Comments Off on Sisco will buy software maker Sourcefire
    July 21, 2020 /  Computer Technology, Software

    Jakarta (ANTARA News) – Sisco System said it will buy software company Sourcefire Inc. for about $ 2.7 billion to improve the network security services.

    Sisco will pay 76 dollars for each share of Sourcefire, 28.6 percent higher than the closing market price premium 59.08 dollars Monday, Reuters said in a report on Tuesday.

    The networking equipment company said the deal would likely close the second quarter of 2013 and estimates that there will be a dilution thin on non-GAAP earnings in fiscal year 2014.

    Sisco has been losing market share in network security last year, lower than the more innovative rivals such as Networks Inc., Check Point Software Technologies, and Palo Alto Networks Inc..

    Sisco compete in Web applications, social media and video streaming that require security protection is more complex than traditional firewalls.

    RBC Capital Markets analyst Robert Breza said the deal would eliminate a key competitor in the market for Check Point, Fortinet, and Palo Alto, but also strengthen the position of Sisco in the industry.

    It would also create a major competitor in the network security industry, he said, adding that Sourcefire will bring the technology of real-time network awareness (RNA) and intrusion prevention system (IPS) to Sisco.

    Tags: , , , ,

  • Stopping Google Latitude Service on August 9th

    Comments Off on Stopping Google Latitude Service on August 9th

    The world’s largest search engine company, Google will soon be officially shut down one of his services. The services that will be closed is Google Latitude which is a location sharing application.

    Closure is made after a company based in Mountain View did a massive change on Google Maps. In addition, this application also has a very low popularity. Google Latitude consumption levels far below other applications such as Foursquare or Facebook. Not only that, Latitude also less popular than the location-sharing service owned by Google.

    Google Latitude itself is a location sharing application that is integrated with Google Maps. This feature allows for automatic location tracking, check in at a place it can also be set automatically or manually.

    In the latest update Google Maps on Android, this feature is not found anymore. Selian it, Google also removed the existence of Google Latitude app available on iOS and has officially retire the Latitude API. So third-party applications that use these APIs will not work, unless using a sharing site owned by Google.

    Tags: , , , ,

  • Hyland Software Named as a Best-in-Class ECM Vendor for three categories in Insurance Technology Assessment

    Comments Off on Hyland Software Named as a Best-in-Class ECM Vendor for three categories in Insurance Technology Assessment
    July 20, 2020 /  Computer Technology, Software

    CEB TowerGroup recently named Hyland Software a Best-in-Class enterprise content management (ECM) vendor for insurance companies in three categories in its evaluation of ECM solutions providers in the space. Hyland was named Best-in-Class for: User Experience, Enterprise Operations Support and Enterprise Support.

    The report identifies both current and future market drivers, identifies the needs of the industry and lists notable solutions providers. CEB TowerGroup selected vendors based on quantitative and qualitative analyses of each vendor’s solution features and functionality, understanding of customer needs and implementation of leading practices to maximize efficiency and ROI.

    “Selection as a Best-in-Class solution within CEB TowerGroup’s insurance vendor review verifies the relevance and ongoing benefits ECM solutions can provide insurance companies. It illustrates Hyland’s ability to offer insurers a solution that can streamline their processes, enabling them to run more efficiently and cost-effectively across their entire organization,” stated Cheryl Nulman, Hyland’s insurance industry marketing manager.

    CEB TowerGroup named Hyland Software’s OnBase a Best-in-Class solution for:

    • User Experience,  for its attributes that directly contribute to enhancing the productivity of employees across the organization
    • Enterprise Operation Support, for its attributes that support and facilitate business operations enterprise-wide
    • Enterprise Support for Hyland’s influence and ongoing relationship with customers

    “Our industry expertise, coupled with the high-value we place on customers’ feedback helps to create leading solutions to meet insurers’ needs. Our agile approach increases our viability in the industry and ensures an advanced solution offering,” Nulman said.

    “As insurance executives evaluate new IT products to support their business needs, many are overwhelmed by the volume of technologies available,” said Aaron Kissel, executive director, CEB. “CEB TowerGroup is the only advisory group qualified to evaluate such a broad range of insurance technology tools and to help insurers navigate the increasingly complex landscape.”

    *Technology Assessment Disclaimer– CEB does not endorse any vendor, product or service depicted in our CEB TowerGroup publications and does not advise technology users to select only those vendors rated “best in class.” CEB TowerGroup research publications consist of the opinions of CEB TowerGroup’s analysts and should not be construed as statements of fact. CEB disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

    About Hyland Software

    For over 20 years, Hyland Software has helped our more than 11,500 lifetime customers by providing real-world solutions to everyday business challenges. That dedication is why Hyland realizes double-digit growth, and why 98 percent of our customer base continues to renew its annual maintenance. Our customers see the ongoing value of partnering with Hyland and continue to work with us year after year.

    Seamless integrations with policy administration, core administration and claims management systems speed processing times across the entire insurance lifecycle from underwriting to policy services to claims, which increases customer service. Using OnBase, insurers are able to increase profitability through accurate and consistent underwriting decisions while decreasing response times and costs associated with claims.

    Tags: , , , ,

  • Watchful Software to Showcase Leading Cybersecurity Technologies at Microsoft’s Worldwide Partner Conference 2013

    Comments Off on Watchful Software to Showcase Leading Cybersecurity Technologies at Microsoft’s Worldwide Partner Conference 2013
    July 18, 2020 /  Computer Technology, Software

    Watchful Software, a leading provider of data-centric information security solutions, will feature live demonstrations of its award-winning cybersecurity technologies at the Microsoft Worldwide Partner Conference (WPC) 2013 this week, July 8-11. The company will showcase how RightsWATCH and TypeWATCH prevent sensitive data from being disclosed inadvertently and unauthorized users from accessing your systems. Watchful Software is also announcing a global collaboration with SECUDE and Foxit Corporation to offer enterprises running on SAP a powerful end-to-end approach to protect business critical information regardless of its form or location.

    “Often, data is being pulled out of a SAP system, and is being transformed into emails, documents, spreadsheets, etc. This transformation process creates the opportunity for data breaches,” states Charles Foley, CEO of Watchful Software. “The alliance between Watchful, SECUDE and Foxit product offerings ensures that SAP-based information is protected against leaks, loss or theft, even if it is outside of the SAP database or published into different formats. This combination gives enterprises an unprecedented level of security of their business critical information both inside and outside the SAP landscape, as it moves around the world.”

    Those who stop by stand 1825 at WPC 2013 will be able to see how Watchful’s comprehensive product suite is capable of 1) educating users and training them to handle confidential information, 2) leveraging ERM and DLP technology to classify, encrypt and protect sensitive data from being leaked, and 3) leveraging state-of-the-art eBiometrics technology, to constantly ensure that the people using your systems are who you think they are.

    “Data breaches aren’t simply a question of good versus evil; oftentimes, these breaches are a result of an error by someone who really had no intention of disclosing sensitive information. Moreover, we should accept that just because there’s a security policy manual does not mean that its readers are going to act accordingly. Experience has proven that they won’t,” states Rui Melo Biscaia, Director of Product Management at Watchful Software. “RightsWATCH delivers a powerful tool for classifying data, controlling access to that data based on its user clearance and classification, and ensuring that the end result is what the organization expects and demands.”

    The WPC 2013 is a four-day global gathering of top Microsoft partners held in Houston, Texas, USA (08 – 11 July 2013).

    About Watchful Software – www.watchfulsoftware.com
    Watchful Software was formed in 2012 to address the requirement to protect an organization’s most critical asset after its people — its information. The company is staffed by industry executives with decades of systems, software, networking, security, and compliance experience to address the growing need for protecting sensitive and proprietary information against accidental or malicious theft, leakage, or loss. Leveraging key technologies including advanced encryption algorithms, digital rights management, and e-Biometrics, Watchful Software has developed a suite of solutions that ensure only authorized personnel have access to enterprise systems or can handle sensitive information, thereby protecting against the massive economic and competitive damage often done by cyber terrorists and information thieves.

    Tags: , , , ,

  • HP Releases Desktop PC with Military Standards

    Comments Off on HP Releases Desktop PC with Military Standards
    July 17, 2020 /  Computer Technology, Hardware

    Global desktop PC sales continue to slow. However, this does not preclude Hewlett-Packard (HP) to continue releasing the latest desktop PC product lines.

    No half-hearted, at an event in Jakarta, Wednesday (07/24/2013), HP released 4 series desktop PCs at once, namely EliteOne 800 G1, G1 EliteDesk 800, ProOne 600 G1, and G1 ProDesk 600. The four were aimed at the business segment.

    Present as a business device, HP equip these devices with a variety of features that do not exist in the PC consumer.

    For example, four of which are equipped with a safety feature called HP Client Security. Using these features, users can protect the devices at every layer, including hardware, software, and BIOS.

    Other value, the products have passed the test of military standards. According to Ricky Handrian, MDM Business Desktop PC HP Indonesia, standardization include durability, shock, and temperature.

    These devices have to endure or withstand heavy overwritten with a maximum weight of 75 kg. In addition, products with military standards must withstand shock, although it has been taken away in a car in the distance.

    “Devices that pass this certification should still be able to operate, though it was taken in a truck and suffered shock, for example, 1,000 miles,” said Ricky.

    HP Series 800 G1 EliteOne a version All-in-one PC from EliteDesk 800 G1. This product is available in one version a touch screen and non-touch also.

    Those who are interested can choose the specifications of the product. To EliteOne 800 G1, specification available is generation Intel Core processors up to 4 Haswell, Windows 8 Pro, up to 16 GB of RAM, up to 1 TB HDD, and a 23-inch LED screen.

    Meanwhile, the desktop version of this device, EliteDesk 800 G1, comes with a slightly higher specification, namely 4-generation Intel Core processor Haswell, Windows 8 Pro, 32 GB RAM, and up to 2 TB HDD.

    Carrying the same concept with the EliteBook 800, ProOne 600 HP version of the G1 is the all-in-one PC from HP ProDesk 600 G1. For the problem specification, these two products have the same choice as the Elite 800 series.

    So, what distinguishes the two series? According to Ricky, the two series have different processor platforms support. 800 Series uses Intel Q87 platform. While the Pro 600 series using Q85.

    “ProDesk Series 600 is a downgraded version of the EliteBook 800. ProDesk device 600 is certainly cheaper than EliteBook 800. Yeah, let’s just ProDesk 600 as the sister of the EliteBook 800,” added Ricky.

    Tags: , , , ,

  • Try Browser, Can Direct Voucher Rp 50,000!

    Comments Off on Try Browser, Can Direct Voucher Rp 50,000!

    Although less popular among netizens, the browser application (browser) Internet Explorer apparently still prevail as the most widely used browser.

    Based on the results of research from Net Applications, between December 2012 and January 2013, the number of Internet Explorer users scored 55.14 percent in January.

    While Firefox and Google Chrome remained in a two and three, which stood at 19.94 per cent and 17.48 per cent.

    In detail, IE10 get 1.29 percent of the market, while IE9 was 20.93 percent and IE 8 is still the best value for Microsoft with 23.54 percent.

    Although the youngest position, IE10 recently earned the most secure browser (Read: Adu Safe, IE10 Defeat Firefox and Chrome).

    However, it is not know it was love? Therefore, Microsoft Indonesia Kompas.com invites readers to try out the most secure browser.

    Not only could give it a try, you will also receive a voucher directly from the online shopping site Lazada of Rp 50,000 (these terms and conditions) as soon as you download this browser.

    How easy really. You live register and download IE10 on the following link, and also provide a unique commentary. The three most interesting comments will get a voucher worth Rp 200,000.

    Tags: , , , ,

  • Windows 7 Losing Steam in the Enterprise but Microsoft Holds Steady

    Comments Off on Windows 7 Losing Steam in the Enterprise but Microsoft Holds Steady
    July 17, 2020 /  Computer Technology, Software

    While still the most popular operating system in the enterprise, including at midsize businesses, Microsoft Windows 7’s reality in this new age of business computing is that it is slowly losing market share. Mobile operating systems, like Android and iOS, and even Mac OS are quickly making inroads, largely driven by BYOD policies implemented by IT departments in the last few years.

    Even with Windows 7 losing market share, Microsoft still rules the roost, however, as an overall analysis of current computer platform use at the enterprise revealed in late April at CITEWorld. Some businesses still use Windows XP. These companies still using XP need to take note that Microsoft is discontinuing support for the OS in April 2014.

    Windows 8 Still to Come for the Midsize Business

    In contrast to the leadership status held by Windows 7, Microsoft’s new OS, Windows 8, is making small inroads at the corporate level. Many midsize businesses appear hesitant to adopt 8, due to concerns about the usability of and training issues involved in rolling out the new tile-based operating system. Expect the next version of Windows to take steps to improve usability, including returning the Start button, and possibly offering an option to boot-up to the classic Desktop, instead of the newer Metro interface screen.

    The CITEWorld article analyzes statistics revealed in a Forrest Research report on the growing operating system diversity at the enterprise. One statistic that perfectly illustrates the migration to alternate operating systems shows that while 67 percent of all computing devices were powered by a version of Windows in 2008, today 70 percent use alternatives. Of course, the rapid growth of mobile devices at the workplace played a major role in the increased diversity.

    The Midsize Business Needs to Embrace Operating System Diversity

    Even with Windows 7 losing market share, it is still a very popular OS at the midsize business. If the next version of Windows improves some of the issues with Windows 8, Microsoft will continue to maintain a role in business computing. Still, functional alternatives to Redmond exist and need to be considered at enterprises of all sizes.

    A forward-thinking midsize business needs to allow for diversity in operating system choice, especially when considering mobile devices. As Cloud computing continues to grow in importance, hybrid tablet/notebook computers allow employees access to their work from home. A BYOD policy needs to consider this type of use, as it allows for improved efficiency as well as a potentially better work-life balance for employees. IT executives responsible for operating system choice at the midsize business need to realize that the days of one dominant operating system are over.

    Tags: , , , ,

  • Yahoo! Acquisition AdMovate, Develop Mobile Advertising Service

    Comments Off on Yahoo! Acquisition AdMovate, Develop Mobile Advertising Service

    Internet giant head of Marissa Mayer, Yahoo!, recently rumored to re-acquire a startup working in the areas of mobile advertising, AdMovate. The umpteenth time that the acquisition by Yahoo! Yahoo! is regarded as an effort to improve service advertisements that are considered “lackluster” lately.

    Yahoo! via his blog on Tumblr, has officially announced the purchase AdMovate engaged in the mobile advertising services. AdMovate parties themselves have confirmed this issue by stating that they were aimed at helping advertisers to reach consumers at the right time and place via private message certainly be provide by AdMovate.

    Quoted from a news release The Next Web today (18/7), Yahoo! states that carried AdMovate personalization technology can improve the ability of Yahoo! in advertising through the mobile platform. In addition, after the acquisition of all employees AdMovate instantly brought to the Yahoo! offices are located in Silicon Valley, USA.

    Marissa Mayer as CEO of Yahoo!, concerning this acquisition had expressed interest in re-focusing the Yahoo! mobile services that could be left behind. According to him, the future of Yahoo! ‘s business models will be on the mobile segment in which this segment continues to experience a significant increase, “Yahoo’s future is on the phone. So we put the products for mobile phones, “he said.

    In a blog post on tumblr, Scott Burke who is SVP of Display Advertising and Advertising Technology Yahoo! said Yahoo! is now trying to focus on investments in the mobile segment, “Yahoo is currently investing more in the purchase program and advertising on mobile phones,” she called.

    Description Scott was indeed not a hoax. Yahoo! is just a period of four months was reported to have acquired 10 startup that Summly, Astrid, Milewise, Loki Studios, Go Poll Go, PlayerScale, Rondee, Ghostbird Software, Tumblr, and most recently Qwiki, and it is almost entirely a startup working in the mobile field. With the acquisition AdMovate which is a provider of mobile advertising services, then shopping “wholesale” a la Yahoo! The Yahoo! could be an attempt to break through the mobile industry is growing rapidly these days.

    Tags: , , , ,

  • Acquainted with BASH Scripting

    Comments Off on Acquainted with BASH Scripting
    July 16, 2020 /  Computer Technology, Programming

    It is undeniable that over time, the popularity of Linux is increasing every day. Linux Kernel project which was originally just a fun project by Linux apparently transformed into a project that became the basis for the evolution of the digital world today.

    We can see that more and more digital devices are therein using Linux in it. Changes were made in all areas so that Linux can be used by all users, both from the ground level up to the experts though.

    One thing that remains a hallmark of Linux is the existence of a shell that is never lost on any Linux distro. Shell is a command-line interpreter on duty to translate the commands entered by the user directly to the system through the help of a terminal or console as a zoom interface (such as Command Prompt on the Windows platform). Although today most of the Linux distributions already to offering graphical display, the shell is still regarded as one of the strengths of Linux shell bridge where users can interact with the system in order to be more flexible. Many things can be done on a shell because we are dealing directly with the system, coupled with the many variants of the shell that offers a variety of features in it, such as csh, sh, bash, ksh, tcsh, ash, zsh, etc.

    One of the most common type of shell used is BASH (Bourne-Again Shell) which was created by Bryan Fox in 1988. Shell is a replacement of the Bourne Shell (sh) existing first and is still used in some Linux distributions. Currently BASH shell has become a de facto standard for almost all Linux distributions because it is considered the most feature-rich and has a fairly high degree of portability. For comparison between variants shell can be seen on the Wikipedia website

    To be able to understand the Linux system with better and also improve your productivity and take advantage of the flexibility offered by Linux, so it’s good we are trying to learn programming BASH script. PCplus using Slackware Linux distro, but this tutorial can be applied to all Linux distributions for use BASH version 4.2 and above. You can use any text editor because basically BASH script is plain text file. You can also try it on a Windows platform with the help of Cygwin,

    open the editor:

    1. The first step in creating a shell script is telling the system what shell you want to use, because it could be available in a Linux distribution over the shell variant. Because we want to use bash, then write this line in the first row of each bash shell script that will be created

    This code is called the shebang and a special instruction that will determine what the interpreter is going to be used to process a shell script. For example, for a script that utilizes Perl interpreter, it will contain information

    2. Because the shell script is basically able to execute commands on the shell, then we can run shell commands from a shell script. For example, we want to display today’s date along with the name that we use username to login. Use the code on the listing-1 as an example. Before you can run the script, give it execute permissions on the file with the command chmod + x’s listing 1.sh (adjust the file name you gave) then run the command.

    Date command displays the current date information while whoami will menapilkan your user information to login.

    3. What if we want to display the text coupled with a shell command? Use the echo function to display a message to the screen shown in listing-2. Echo function accepts parameters in the form of a text message that will be displayed kelayar. You might ask, why the date and user information are on different lines with text displayed? This is due essentially echo function will display a message and then change the next line. To be able to display an information to the right of the text is displayed, use the-n parameter on the function like echo in the listing-3.

    4. You can try some of the commands contained in the location / bin and / usr / bin. If not sure of the usefulness of a command, run the command man <nama-perintah> on the console or terminal, for example, man ls and manual information about the ls command will be displayed. Each command has a variation of different parameters with each other, so there are times when we have to read the manual to know every option available.

    Tags: , , , ,