<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-4159521332392189672</atom:id><lastBuildDate>Wed, 09 Oct 2024 01:32:02 +0000</lastBuildDate><category>Blogs</category><category>Twitter</category><category>Google</category><category>blogging</category><category>Pradeep Chakraborty&#39;s Blog</category><category>micro blogging</category><category>bloggers</category><category>semiconductors</category><category>Global Sources</category><category>search engines</category><category>Blogger</category><category>Indian IT industry</category><category>mobile phones</category><category>telecom</category><category>websites</category><category>Gartner</category><category>Hong Kong</category><category>LinkedIn</category><category>NASSCOM</category><category>mobile Web</category><category>Europe</category><category>Gmail</category><category>Google Analytics</category><category>Google SearchMasters Conference 2009</category><category>Hulbee</category><category>IPL</category><category>IT initiatives</category><category>India</category><category>Indian Elections 2009</category><category>Microsoft</category><category>Nokia</category><category>Reed</category><category>SEO</category><category>SMBs</category><category>Techfools</category><category>Twitpic</category><category>Virtualization</category><category>Yahoo</category><category>blog posts</category><category>blogosphere</category><category>email</category><category>enterprises</category><category>leadership</category><category>malware</category><category>online</category><category>phishing</category><category>print</category><category>semicon</category><category>semicon blog</category><category>social networks</category><category>solar/PV</category><category>spam blog</category><category>3D</category><category>3G</category><category>A.R. Rehman</category><category>AIIM</category><category>ARM</category><category>Abba</category><category>Adam Lasnik</category><category>Amimon</category><category>Apac</category><category>Attention Index</category><category>Aude Bourliataux</category><category>Beatles</category><category>Beegees</category><category>Bing</category><category>BitDefender</category><category>Blip.tv</category><category>Blog2Print</category><category>Bloggers Unite</category><category>Bluetooth</category><category>Boney M</category><category>Bordeaux</category><category>Break.com</category><category>C-Change 2009</category><category>CIOL</category><category>CIOs</category><category>Carnalpedia</category><category>Chennai Super Kings</category><category>Cisco</category><category>Cognizant</category><category>CollegeHumor</category><category>DailyMotion</category><category>Deccan Chargers</category><category>Delhi Daredevils</category><category>Deloitte</category><category>Dr. Manmohan Singh</category><category>EDN</category><category>EDN Asia</category><category>EE Times</category><category>Facebook</category><category>Fake IPL Player blog</category><category>Filttr</category><category>France</category><category>Freelance Supermarket</category><category>Friendships</category><category>Frost</category><category>Frost and Sullivan</category><category>GPS</category><category>Google Chrome</category><category>Google Chrome OS</category><category>Google Earth</category><category>Google Maps</category><category>Google Video</category><category>HCL Infosystems</category><category>Hitachi</category><category>IBM</category><category>IBM Global Financing</category><category>IPTV</category><category>IT</category><category>IT firm</category><category>IT leaders</category><category>ITRS</category><category>Indian Premier League</category><category>Indian energy sector</category><category>Indian software developers</category><category>Indian telecom industry</category><category>Infosys</category><category>International Women&#39;s Day</category><category>Internet Radio</category><category>Internet Threat Security Report</category><category>Internet bus</category><category>Internet technologies</category><category>Invest in Photonics</category><category>Jambi</category><category>Jogli</category><category>Jonathan Lloyd</category><category>Karnataka</category><category>KartOO</category><category>Kings XI Punjab</category><category>Kolkata Knight Riders</category><category>LG Electronics</category><category>LTE</category><category>Limoges</category><category>Limousin</category><category>MIMO</category><category>MS Office</category><category>MVAS</category><category>Maxitweet</category><category>Michael Jackson</category><category>Motorola</category><category>Mumbai</category><category>Mumbai Indians</category><category>NFC</category><category>OFDM</category><category>OWP</category><category>Open Office</category><category>Opera</category><category>Opera Mini</category><category>Orkut</category><category>PAN</category><category>PMP</category><category>PR agencies</category><category>PR industry</category><category>PV</category><category>PolySpace products</category><category>PostRank</category><category>PostRank Discovery engine</category><category>Profession</category><category>Rajasthan Royals</category><category>RedTube</category><category>Rediff</category><category>Royal Challengers</category><category>SMEs</category><category>Samsung</category><category>Self belief</category><category>Seven practical ways</category><category>Sharp</category><category>Singapore</category><category>Slumdog Millionaire</category><category>Sony</category><category>Symantec</category><category>TD-SCDMA</category><category>TMT</category><category>Tamil Nadu</category><category>TechNewsWorld</category><category>Technorati</category><category>Test and Measurement</category><category>The Mathworks</category><category>Thriller</category><category>Tube2Keep</category><category>Twazzup</category><category>TweetDeck</category><category>Twingly</category><category>TwitGeek</category><category>Twitter spam</category><category>TwitterJobSearch</category><category>UGC</category><category>UK</category><category>UPA</category><category>USA</category><category>Union Budget 2009</category><category>V. Srikumar</category><category>VCSELs</category><category>VozMe</category><category>WHDI</category><category>WHDI Special Interest Group</category><category>WIF 2008</category><category>We Are The World</category><category>Web 2.0</category><category>Webdesign International Festival</category><category>Who Should I Follow</category><category>WiFi</category><category>WiMAX</category><category>Wireless Week</category><category>Wordpress</category><category>Workhound</category><category>World Press Freedom Day</category><category>Yahoo Mail</category><category>Yola</category><category>YouTube</category><category>Zinnov</category><category>adult industry</category><category>advertising</category><category>blog search engine</category><category>bots</category><category>broadband</category><category>business growth</category><category>business networking</category><category>carrier Ethernet</category><category>cloud computing</category><category>computers</category><category>consumer electronics</category><category>creative writing</category><category>cross media</category><category>data center</category><category>data clouds</category><category>dedication</category><category>developer community</category><category>developers</category><category>devotion</category><category>discipline</category><category>electronic components</category><category>electronics</category><category>embedded Internet devices</category><category>enhanced checking support for JSF++ rules</category><category>entertainment</category><category>femtocells</category><category>freelance jobs</category><category>geeks</category><category>hackers</category><category>jobs</category><category>journalists</category><category>manufacturing</category><category>media predictions</category><category>mobile OS</category><category>mobile TV</category><category>music search engine</category><category>netbooks</category><category>networking</category><category>nuclear energy</category><category>online videos</category><category>open web platforms</category><category>operating systems</category><category>optical networking</category><category>pharma</category><category>photonics</category><category>photonics blog</category><category>photos</category><category>photovoltaics</category><category>pop</category><category>porn</category><category>press</category><category>professionalism</category><category>recession</category><category>save costs</category><category>seciurty</category><category>sex</category><category>sex encyclopedia</category><category>social media</category><category>solar</category><category>solar/PV blog</category><category>spam</category><category>technologies</category><category>technology portals</category><category>technology projects</category><category>telecommunications</category><category>three Ds</category><category>top 20 IT firms in India</category><category>top 20 Indian IT firms in manufacturing</category><category>unicode characters</category><category>visual meta search engine</category><category>visual search</category><category>web hosting</category><category>wiki</category><category>wikipedia</category><category>wireless</category><category>wireline</category><category>x86 chips</category><title>TechFools</title><description>Tech stuff to entertain and have fun!</description><link>http://techfools.blogspot.com/</link><managingEditor>noreply@blogger.com (Pradeep Chakraborty)</managingEditor><generator>Blogger</generator><openSearch:totalResults>118</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-1394153142696285198</guid><pubDate>Fri, 10 Oct 2014 08:30:00 +0000</pubDate><atom:updated>2014-10-10T14:52:39.267+05:30</atom:updated><title>Symantec announces new strategy to fuel growth</title><description>MOUNTAIN VIEW, USA: Symantec Corp. announced that its Board of Directors has unanimously approved a plan to separate the company into two, independent publicly traded companies: one business focused on security and one business focused on information management (IM).&lt;br /&gt;
&lt;br /&gt;
Symantec’s decision to pursue a separation follows an extensive business review of the company’s strategy and operational structure. Creating two standalone businesses will allow each entity to maximize its respective growth opportunities and drive greater shareholder value.&lt;br /&gt;
&lt;br /&gt;
“As the security and storage industries continue to change at an accelerating pace, Symantec’s security and IM businesses each face unique market opportunities and challenges. It has become clear that winning in both security and information management requires distinct strategies, focused investments and go-­‐to market innovation,” said Michael A. Brown, Symantec president and CEO.&lt;br /&gt;
&lt;br /&gt;
“Separating Symantec into two, independent publicly traded companies will provide each business the flexibility and focus to drive growth and enhance shareholder value.”&lt;br /&gt;
&lt;br /&gt;
The separation will allow each company to:&lt;br /&gt;
* Focus on its unique growth opportunities, R&amp;amp;D investments, and go-­‐to-­‐market capabilities.&lt;br /&gt;
* Reduce operational complexity.&lt;br /&gt;
* Enhance strategic flexibility, pursue partnerships, and develop independent M&amp;amp;A strategies.&lt;br /&gt;
* Set distinct capital allocation policies.&lt;br /&gt;
&lt;br /&gt;
Brown continued: “Taking this decisive step will enable each business to maximize its potential. Both businesses will have substantial operational and financial scale to thrive.”</description><link>http://techfools.blogspot.com/2014/10/symantec-announces-new-strategy-to-fuel.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-8991562872975038572</guid><pubDate>Mon, 01 Sep 2014 18:49:00 +0000</pubDate><atom:updated>2014-09-02T00:19:15.838+05:30</atom:updated><title>Symantec launches cyber readiness challenge for corporate India</title><description>BANGALORE, INDIA: Symantec will be hosting Cyber Readiness Challenge (CRC) in India for the first time on Wednesday, 03 September at the Vivanta by Taj on M.G Road, Bangalore.&lt;br /&gt;
&lt;br /&gt;
The CRC is an immersive, interactive ‘capture the flag’ competition that models scenarios based on the current threat landscape using realistic IT infrastructure. A first of its kind by a security vendor, the CRC has already seen participation from hundreds of enterprises across the globe and will be launched in Mumbai and Delhi next.&lt;br /&gt;
&lt;br /&gt;
As targeted attacks and advanced persistent threats (APTs) that are capable of stealing financial/customer data and intellectual property, by compromising critical information assets become more real for organizations, the need for increased security awareness and strong protection against threats has never been stronger.&lt;br /&gt;
&lt;br /&gt;
Symantec’s CRC is designed to enable security experts in organizations to experience new attack methods with the latest technologies. Designed for many levels of technical skill and experience, it puts participants in the hacker&#39;s shoes to better understand their targets, technology and thought processes so they can ultimately better protect their organization and themselves. By completing security-related challenges to capture the most flags, the participants sharpen their ethical hacking and cyber-forensic skills and raise their awareness of cyber security targets.&lt;br /&gt;
&lt;br /&gt;
The challenge will see IT and cyber security experts from over 25 companies including top banks, IT services, automobile and media enterprises in Bangalore sharpen their security and cyber forensic skills and deepen awareness of cyber attackers&#39; targets and tactics. The four hour competition will include five stages; reconnaissance, incursion, discovery, capture and exfiltration. &amp;nbsp;Upon completion of the competition, the teams will be ranked according to the amount of points they have scored in the shortest time.</description><link>http://techfools.blogspot.com/2014/09/symantec-launches-cyber-readiness.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-5045291182112205486</guid><pubDate>Mon, 21 Mar 2011 16:18:00 +0000</pubDate><atom:updated>2011-03-21T23:50:53.076+05:30</atom:updated><title>Deloitte identifies 10 most disruptive and emerging technologies for CIOs to consider over the next 18 months</title><description>NEW YORK, USA: Deloitte has issued a new report identifying 10 disruptive and emerging technologies that are expected to play a crucial role in how businesses will operate globally over the next 18 months.&lt;br /&gt;&lt;br /&gt;&quot;With 2011 well underway, CIOs should be evaluating the progress made on their New Year&#39;s resolutions and taking full advantage of technologies that have the ability to dramatically improve and advance their business operations and decision-making,&quot; said Mark White, principal, Deloitte Consulting LLP and a co-author of the report. &quot;We have evaluated, industry-wide, what is working and what is not when it comes to IT and have identified 10 technologies that are likely to transform the enterprise over the next 18 months.&quot;&lt;br /&gt;&lt;br /&gt;Deloitte&#39;s report, &quot;Tech Trends 2011: The Natural Convergence of Business and IT,&quot; groups the technologies into two categories: &quot;(Re)emerging Enablers,&quot; which is described as five technologies that many CIOs have spent time, thought and resources on in the past, and &quot;Disruptive Deployments,&quot; five additional technologies that showcase new business models and transformative ways to operate. The 10 technologies are:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;(Re)Emerging Enablers:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Almost Enterprise Applications:&lt;/span&gt; Quick and agile solutions like the cloud and Software- and Platform-as-a-Service (SaaS, PaaS) appeal to the business, but are they &quot;enterprise enough&quot; for IT? Almost enterprise applications are being eagerly embraced by many business leaders, and CIOs should get in front of this democratization and self-service trend.  &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;CIOs as Revolutionaries:&lt;/span&gt; With the cloud, social computing and mobility shaking up business models and transforming how business is done, the technology agenda should be considered as tantamount to the business agenda—and CIOs are the executives positioned to pull them into alignment.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Cyber Intelligence:&lt;/span&gt; While it still may be necessary to build a rapid detect-and-respond cyber security function, organizations should consider going beyond adding tools to learn and adapt, protect against upstream threats, and connect the internal and external dots to assess probable risks, and in the process move from reactive to proactive.  &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;End of Death of ERP:&lt;/span&gt; ERP can be an enabler of tomorrow&#39;s innovations, not a fading footnote of yesterday&#39;s legacy. Organizations are still able to tap ERP applications to transform processes with reduced risk — at a lower cost and at a quicker pace.  &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Visualization:&lt;/span&gt; Visualization deserves a fresh look given the evolution of the underlying tools and the rich potential represented by unstructured data. It can provide a new way to tap into millions of internal emails, instant messages and documents, as well as trillions of social media objects, Twitter tweets, text messages, blogs and other content of potential concern or opportunity for the enterprise.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Disruptive Deployments:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Applied Mobility:&lt;/span&gt; New mobile solutions are being designed to serve the full spectrum of transactional, analytical and social computing capabilities, and present the opportunity for organizations to define real and lasting value in applied mobility solutions and business enablement. This could be the year that businesses will truly begin harnessing these features into rich, yet simple and intuitive applications to solve real business problems.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Capability Clouds:&lt;/span&gt; Capability clouds have the potential to move beyond the building blocks of capacity clouds to deliver finished services that can address business objectives and enterprise goals. CIOs should be prepared to answer how they leverage the ecosystem of capabilities, services and value networks delivered by the cloud.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Real Analytics:&lt;/span&gt; As the economy resets, analytics can offer improved visibility to help companies drive operational efficiencies.  Analytics can also offer an opportunity for growth by helping companies in their efforts to address heart-of-the-business questions that can guide decisions, yield new insights and help predict what&#39;s next.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Social Computing:&lt;/span&gt; As more of our personal and professional lives are transacted via technology, rich trails of preferences, opinions and behaviors are being created. Beyond the immediate benefits of empowering stake-holders, this &quot;digital exhaust&quot; can be mined, providing a rich source of insight on market positioning.  &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;User Engagement:&lt;/span&gt; The proliferation of consumer and Internet technologies has raised expectations for IT tools at work, and can empower employees to find new insights and improve how business occurs. Enterprises should seek to learn and understand how to turn newly-connected consumers into new revenue channels and identify ways they can empower employees to better connect dots and improve efficiency and effectiveness.&lt;br /&gt;&lt;br /&gt;&quot;It&#39;s evident that the next 18 months will be pivotal for widespread adoption of technologies such as cloud, social  computing, analytics and mobile technologies,&quot; said Bill Briggs, director, Deloitte Consulting LLP and co-author of the report. &quot;Whether they are re-emerging enablers that are already somewhat at play at large among enterprises or disruptive deployments that offer new, transformative ways for organizations to operate, CIOs should keep ahead of these trends to help generate top returns not just of IT, but the business of the business.&quot;</description><link>http://techfools.blogspot.com/2011/03/deloitte-identifies-10-most-disruptive.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-1747327870622740022</guid><pubDate>Mon, 14 Mar 2011 15:28:00 +0000</pubDate><atom:updated>2011-03-14T20:59:42.627+05:30</atom:updated><title>Don&#39;t help cybercriminals exploit Japan tragedy</title><description>INDIA: Several countries and international organisations have offered to assist with relief efforts from last Friday&#39;s earthquake and tsunami in Japan. Three days after the earthquake and tsunami that rocked Japan, the rest of the world is still trying to make sense of what&#39;s happening. Citizens around the world are also looking to extend assistance in their own way.&lt;br /&gt; &lt;br /&gt;But, as the death and injury tolls continue to rise, there are some malicious people who attempt to exploit such situations, under the guise of charitable institutions and governmental organizations. Emails marked URGENT, requesting for help by appealing to the humanity in every internet user, or urging consumers around the world to offer donations to those affected, are doing the rounds.&lt;br /&gt; &lt;br /&gt;Symantec observed more than 50 domains with the names of either “Japan tsunami” or “Japan earthquake” within the first few hours of this unfortunate event. These domains are either parked, available for sale, or are linked to earthquake sites. Don’t be surprised if you see these domains been used in phishing and spam attacks. Below are a few of the samples:&lt;br /&gt;3-11-2011-[removed].com&lt;br /&gt;3-11[removed].com&lt;br /&gt;earthquake-[removed].com&lt;br /&gt;earthquaketsunami[removed].com&lt;br /&gt;earthquakerelief[removed].com&lt;br /&gt;&lt;br /&gt;Symantec has also observed a classic 419 message targeting the Japanese disaster. The message is a bogus &quot;next of kin&quot; story that purports to settle millions of dollars owing to an earthquake and tsunami victim.&lt;br /&gt;&lt;br /&gt;Previously, when such disasters occurred, Symantec observed a sudden surge in virus attacks in the form of nasty attachments and .zip files embedded in spam sent from such predatory attackers. Do not open them, especially if you don’t know the source! Use caution when opening forwarded messages related to the Japan earthquake and tsunami, and any other tragedy or event that stirs international news coverage, legitimate and otherwise. Nefarious attackers may be sending malicious Java scripts and other threats that could compromise both your personal data and your computer.&lt;br /&gt; &lt;br /&gt;Other methods that the cyber mafia uses during such events include search engine poisoning. With several internet users searching for earthquake-related news and information online, cybercriminals can poison search results for malicious websites to appear at the top of the results. Users who click on these links assuming that the information will help them make sense of the tragedy, may end up downloading malware instead.&lt;br /&gt; &lt;br /&gt;Symantec has witnessed a rise in malicious websites of late. The recent Symantec report on Attack Toolkits and Malicious Websites revealed that Symantec observed more than 310,000 unique domains that were found to be malicious.  On average, this resulted in the detection of more than 4.4 million malicious Web pages per month. It is likely that attackers will use Japan-related terms in order to attract people on to these websites.&lt;br /&gt; &lt;br /&gt;While our hearts go out to those grappling with this unprecedented catastrophe, we at Symantec want to urge users to be cautious about unscrupulous elements. Symantec recommends that our readers reach out to the affected through legitimate and secure channels so that the help sent by you reaches the intended recipients.</description><link>http://techfools.blogspot.com/2011/03/dont-help-cybercriminals-exploit-japan.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-3218183818446840445</guid><pubDate>Tue, 15 Feb 2011 13:49:00 +0000</pubDate><atom:updated>2011-02-15T19:21:30.773+05:30</atom:updated><title>Don’t let cybercriminals stump you online!</title><description>INDIA: The upcoming cricket World Cup 2011 has generated huge excitement not only among fans in India and across the world, but cyber criminals as well. Symantec has observed that big-ticket sporting events open up a vast playing field for attackers and the cricket world cup is no exception. &lt;br /&gt;&lt;br /&gt;What’s different this time, however, is that we anticipate more sophisticated and targeted attacks, particularly against Indian users since the tournament will take place in the subcontinent.&lt;br /&gt;&lt;br /&gt;With Internet usage in India growing rapidly (McKinsey estimates that the number of Internet users in India will grow fivefold by 2015 to 350 million), and the fact that tickets to matches are selling out very fast, cybercriminals are focusing their efforts on luring Indians with attractive ticket offers. Tactics used include spam campaigns, black hat search engine optimization (SEO), the injection of code into&lt;br /&gt;legitimate websites, and malicious advertisements.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Watch out for fake tickets in PDF:&lt;/span&gt; These tricks, however, are likely to be “blended” threats, where spam emails and fake websites promoting cricket-related goodies can cause users to download malware on their systems. For example, emails with PDFs of tickets attached are a common vector. &lt;br /&gt;&lt;br /&gt;Symantec’s Internet Security Threat Report XV revealed that the top web-based attacks involved applications that process PDF files, accounting for nearly half of the total attacks. This was a sizeable increase from just 11 percent the previous year. This attack is popular due to the common use and distribution of PDF files on the Web, and also because they can be executed across PCs, laptops and smartphones.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Search, and a cybercriminal may find you:&lt;/span&gt; Once the tournament begins, Indians are also likely to closely follow the matches online, searching for scores and updates. Cybercriminals know this; watch out for search engine results for terms like “World Cup”, “Cricket”, “Score” or “Cricket Schedules” that throw up malicious sites which can infect a user without his knowledge.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Rise in malicious websites:&lt;/span&gt; Websites that are set up for phishing attacks or to deliver malware, luring users by mimicking legitimate sites with a high degree of accuracy, may also increase. Symantec detects almost 4.4 million malicious web pages per month, according to the latest Attack Toolkits and Malicious Websites report. Symantec also observed more than 310,000 unique domains that were found to be malicious. Expect an increase in these sites using cricketing terminologies during the period of the world cup.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Website owners need protection too:&lt;/span&gt; This poses a threat not only to users, but also legitimate businesses that sell tickets and other World Cup gear online. Website that sell tickets and ask for financial or personal information should also be protected by SSL certificates and provide visible trust marks to verify their authenticity.</description><link>http://techfools.blogspot.com/2011/02/dont-let-cybercriminals-stump-you.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-2639736245679669518</guid><pubDate>Wed, 19 Jan 2011 09:11:00 +0000</pubDate><atom:updated>2011-01-19T18:46:27.420+05:30</atom:updated><title>Cyber attack toolkits dominate Internet threat landscape</title><description>BANGALORE, INDIA: Symantec Corp. announced the findings of its report on Attack Toolkits and Malicious Websites. The study reveals that as attack kits become more accessible and relatively easier to use, they are being utilized much more widely. This has attracted traditional criminals who would otherwise lack the technical expertise into cybercrime, fueling a self-sustaining, profitable, and increasingly organized global economy.&lt;br /&gt; &lt;br /&gt;Attack toolkits are software programs that can be used by novices and experts alike to facilitate the launch of widespread attacks on networked computers. These kits enable the attacker to easily launch numerous pre-written threats against computer systems. They also provide the ability to customize threats in order to evade detection, as well as automating the attack process.&lt;br /&gt; &lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Attack kits control landscape&lt;/span&gt;&lt;br /&gt;The relative simplicity and effectiveness of attack kits has contributed to their increased use in cybercrime— these kits are now being used in the majority of malicious Internet attacks. For example, one major kit called Zeus poses a serious threat to small businesses. The main objective of Zeus is to steal bank account credentials; unfortunately, small businesses have fewer safeguards in place to guard their financial transactions, making them a prime target for Zeus.&lt;br /&gt; &lt;br /&gt;The profitability of malicious code attacks using Zeus was recently illustrated by the September 2010 arrests of a ring of cybercriminals who allegedly used a Zeus botnet in the theft of more than $70 million from online banking and trading accounts over an 18-month period.&lt;br /&gt;&lt;br /&gt;As cyberattacks have become more profitable, the popularity of attack kits has dramatically increased.  This in turn has led to increasingly robust and sophisticated kits. These kits are now often sold on a subscription-based model with regular updates, components that extend capabilities, and support services.  &lt;br /&gt;&lt;br /&gt;Cybercriminals routinely advertise installation services, rent limited access to kit consoles, and use commercial anti-piracy tools to prevent attackers from using the tools without paying.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Faster proliferation of attacks&lt;/span&gt;&lt;br /&gt;The speed at which new vulnerabilities and their exploits spread around the globe has increased due to innovations that attack kit developers have integrated into their products. Attack kits are now fairly easy to update, which allows developers to quickly add exploit code for new vulnerabilities. The result is that some exploits are in the wild just days after the associated vulnerability becomes public.  Attackers who can easily update their attack kits with recent exploits are able to target potential victims before they apply necessary patches.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;A new entry into underground economy&lt;/span&gt;&lt;br /&gt;Since attack kits are becoming easier to use, cybercrime is no longer limited to those with advanced programming skills. Participants now include a mix of individuals with computer skills and those with expertise in traditional criminal activities such as money laundering. Symantec expects that this much larger pool of criminals entering the space will lead to an increase in the number of attacks.&lt;br /&gt; &lt;br /&gt;“In the past, hackers had to create their own threats from scratch.  This complex process limited the number of attackers to a small pool of highly skilled cybercriminals,” said Shantanu Ghosh, VP, India Product Operations, Symantec. &quot;Today’s attack toolkits make it relatively easy for even a malicious novice to launch a cyberattack. As a result, we expect to see even more criminal activity in this area and a higher likelihood that the average user will be victimized.” &lt;br /&gt; &lt;br /&gt;Additional facts:&lt;br /&gt;* Popularity and demand has driven up the cost of attack kits. In 2006, WebAttacker, a popular attack toolkit, sold for $15 on the underground economy. In 2010, ZeuS 2.0 was advertised for up to $8,000.&lt;br /&gt;&lt;br /&gt;* Secondary services have emerged to direct unsuspecting users to malicious websites, where their computers can be compromised. Tactics used include spam campaigns, black hat search engine optimization (SEO), the injection of code into legitimate websites, and malicious advertisements.&lt;br /&gt;&lt;br /&gt;* Symantec observed more than 310,000 unique domains that were found to be malicious.  On average, this resulted in the detection of more than 4.4 million malicious Web pages per month.&lt;br /&gt;&lt;br /&gt;* Of the Web-based threat activity detected by Symantec during the reporting period, 61 percent was attributable to attack kits.&lt;br /&gt;&lt;br /&gt;* The most prevalent attack kits are MPack, Neosploit, ZeuS, Nukesploit P4ck, and Phoenix.&lt;br /&gt;&lt;br /&gt;* The search terms that most commonly resulted in malicious website visits were for adult entertainment websites, making up 44 percent of the search terms.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Mitigating attacks&lt;/span&gt;&lt;br /&gt;* Organizations and end users should ensure that all software is up-to-date with vendor patches.  Asset and patch management solutions may help to ensure systems are compliant and deploy patches to systems that are not up-to-date.&lt;br /&gt;&lt;br /&gt;* Organizations should create policies to limit the use of browser software and browser plug-ins that are not required by the users of the organization. This is especially prudent for ActiveX controls, which may be installed without the knowledge of the user.&lt;br /&gt;&lt;br /&gt;* Organizations can also benefit from using website reputation and IP black listing solutions to block outgoing access to sites that are known to host attack toolkits and associated threats.&lt;br /&gt;&lt;br /&gt;* Antivirus and intrusion prevention systems can be deployed to detect and prevent exploitation of vulnerabilities and installation of malicious code.</description><link>http://techfools.blogspot.com/2011/01/cyber-attack-toolkits-dominate-internet.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-7765551113203652196</guid><pubDate>Wed, 12 Jan 2011 16:37:00 +0000</pubDate><atom:updated>2011-01-12T22:16:17.088+05:30</atom:updated><title>Cloud.com, Kumoya to bring open source cloud computing technologies to Japanese IT market</title><description>CUPERTINO USA &amp; TOKYO, JAPAN: Cloud.com, Inc., a leading provider of open source cloud computing software for public and private cloud environments, and Kumoya Inc. announced a strategic partnership granting rights to distribute Cloud.com’s technology and products to the Japanese IT channel market.&lt;br /&gt;&lt;br /&gt;This is also the official launch of Cloud.com’s cloud computing platform solutions into the Japanese market, where cloud computing is emerging as the fastest growing IT segment in the industry. &lt;br /&gt; &lt;br /&gt;“There is a tremendous amount of interest and excitement around cloud computing technologies in Japan, yet there is a wide gap between what is offered today in Japan  and what is needed to deliver a truly automated cloud environment,” said Yosuke Shindo, CEO of Kumoya. “We believe that CloudStack and the Cloud Portal architecture effectively resolve this gap. With Cloud.com’s tremendous success in helping companies build large scale cloud environments, we are excited to be representing them in Japan.”&lt;br /&gt; &lt;br /&gt;Through this agreement, Kumoya, will actively market and promote Cloud.com’s technology in Japan, working with the increasing number of cloud computing-focused SI and VAR channels in Japan. Kumoya will be hosting a series of training sessions, promotional events and evangelism activities to deliver true cloud computing value in the Japanese market.&lt;br /&gt; &lt;br /&gt;“Japan is a very promising market for Cloud.com, and we are excited to partner with Kumoya, which truly understands the user-driven nature of cloud computing solutions and has a successful track record of bringing cloud technologies to the Japanese market,” said Shannon Williams, VP of Business Development at Cloud.com. &lt;br /&gt; &lt;br /&gt;Cloud.com solutions are available immediately, and a series of promotional activities for potential resellers are planned for 2011.</description><link>http://techfools.blogspot.com/2011/01/cloudcom-kumoya-to-bring-open-source.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-4214344102292635006</guid><pubDate>Thu, 06 Jan 2011 09:00:00 +0000</pubDate><atom:updated>2011-01-06T14:33:24.330+05:30</atom:updated><title>S&amp;P Equity Research issues tech sector predictions for 2011</title><description>NEW YORK, USA: S&amp;P Equity Research is looking for slower growth in the technology sector in 2011, compared to 2010, but still believes the growth will be healthy.  The S&amp;P tech equity analysts and strategists have a positive fundamental outlook and overweight recommendation on the sector.&lt;br /&gt;&lt;br /&gt;&quot;We expect notable developments regarding new products, international activity, and M&amp;A deals,&quot; said Scott Kessler, Information Technology analyst and tech sector group head at S&amp;P Equity Research.&lt;br /&gt;&lt;br /&gt;Following are select predictions for the tech sector from industry analysts at S&amp;P Equity Research for 2011.&lt;br /&gt;&lt;br /&gt;1. We think Intel will finally gain some traction in the handset and tablet markets.&lt;br /&gt;&lt;br /&gt;2. We forecast that global solar system installations will increase at least 20 percent in 2011, well below our 2010 estimated growth rate of a two-fold increase.&lt;br /&gt;&lt;br /&gt;3. We expect solar manufacturers that have a greater proportion of sales devoted to the US to outperform peers.&lt;br /&gt;&lt;br /&gt;4. We project 2011 to show a continuation of the computer hardware recovery since the deep cyclical trough of 2009. We project global PC unit shipments to rise 14 percent in 2011, after an estimated rise of 17 percent for 2010.&lt;br /&gt;&lt;br /&gt;5. Computer hardware should continue to make inroads into new markets such as self-serve kiosks in the transportation, healthcare and retail areas, based on an ongoing desire to automate transactions and offer consumers more ways to handle business.  &lt;br /&gt;&lt;br /&gt;6. We see the wide-spread emergence of visualization and cloud infrastructures requiring improved integration of datacenter switches and servers with more advanced delivery functionality. We believe companies with strong application delivery and WAN optimization capabilities, such as F5 Networks and Riverbed Technology will be attractive acquisition candidates for 2011.&lt;br /&gt;&lt;br /&gt;7. We believe Microsoft will continue to lose market share in smartphones, as Windows Phone 7 fails to capture the interest of consumers.&lt;br /&gt;&lt;br /&gt;8. We expect sales in the video game industry will be slightly up in 2011, after declining for the two prior years, driven by strong sales of Microsoft Kinect.  &lt;br /&gt;&lt;br /&gt;9. Consolidation in the data storage industry should continue in 2011, by our analysis, with most of the M&amp;A activity being centered on storage software, as opposed to hardware.&lt;br /&gt;&lt;br /&gt;10. We expect sales of tablet computers to surge and begin to cannibalize sales of netbooks and mini notebooks.  &lt;br /&gt;&lt;br /&gt;11. Despite having less functionality than tablet computers, sales of e-book readers will continue to surge in 2011, in our view.  We see unit sales increasing from 7 million in 2010 to 11 million in 2011, led by Amazon.com&#39;s Kindle.&lt;br /&gt;&lt;br /&gt;12. We expect to see at least one major strategic move from an IT services company that caters to the Department of Defense. Companies in this category include ManTech  and SAIC.&lt;br /&gt;&lt;br /&gt;13. Despite continuing revenue growth, the major India-based IT outsourcers, including Infosys and Wipro should experience margin declines in 2011.</description><link>http://techfools.blogspot.com/2011/01/s-equity-research-issues-tech-sector.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-733259772204204296</guid><pubDate>Sat, 11 Dec 2010 09:35:00 +0000</pubDate><atom:updated>2010-12-12T15:52:05.713+05:30</atom:updated><title>SonicWALL releases top 9 tips to protect against online threats, scams and frauds this holiday season</title><description>&lt;span style=&quot;font-style:italic;&quot;&gt;Interesting read!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;BANGALORE, INDIA: SonicWALL, Inc. the leading provider of intelligent network security  and data protection  solutions, today released tips on how to recognize and avoid the top holiday threats that well-wishers and online shoppers face this holiday shopping season.&lt;br /&gt;&lt;br /&gt;With the holidays fast approaching, phishers, hackers and scammers are preparing to attack  by perfecting social media scams, developing new and different merchant phishing techniques, cultivating data harvesting methods and perfecting greeting card malware. Consumers can prepare by being aware of the top online security-related frauds and scams awaiting them this holiday season and by learning how to best protect themselves.&lt;br /&gt; &lt;br /&gt;“During the holidays, consumers the rush to quickly buy presents drives consumers to let their guard down and bypass their normal security precautions. Phishers and scammers are expecting this,” said Boris Yanovsky, vice president of software engineering at SonicWALL.&lt;br /&gt;&lt;br /&gt;“We already see an increase in malware, Trojans and phishing attacks before the holiday season begins. This year, Facebook targeting is rampant. Unfortunately, consumers won’t learn the extent of any damage until it’s already too late and the holidays are over. Consumers should arm and prepare themselves now against the flood of holiday-related threats.”&lt;br /&gt;&lt;br /&gt;Malware and phishing threats  tend to show up in a variety of forms consumers often wouldn’t expect during the holidays. For example, malware disguises itself as a multimedia Christmas greeting card from a long lost friend. A new Facebook “friend” nudges you to play a special holiday game or directs you to “favorite” sites. Your favorite online retailer offers you a special discount if you “click here.”&lt;br /&gt; &lt;br /&gt;To stay protected during this holiday season, SonicWALL’s Yanovsky gives tips to avoid the top 9 threats of the season: &lt;br /&gt; &lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;1. Purchasing and payments:&lt;span style=&quot;font-weight:bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt; This is a big one! Phishing for additional personal information such as your credit card number is common during the holidays. Phishing threats posing as communications from retailers like Amazon.com, eBay or PayPal will notify you that they “were unable to process your credit card transaction” or need more details to process your transaction. &lt;br /&gt;&lt;br /&gt;Be sure a site is secure and reputable before providing your credit card number online. Don&#39;t trust a site just because it claims to be secure.&lt;br /&gt;&lt;br /&gt;There are two general indications of a secured Web page:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;A) Check the Web page URL&lt;/span&gt;&lt;br /&gt;Normally, when browsing the Web, the URLs (Web page addresses) begin with the letters &quot;http&quot;. However, over a secure connection the address displayed should begin with &quot;https&quot; - note the &quot;s&quot; at the end.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;B) Check for the &quot;Lock&quot; icon&lt;/span&gt;&lt;br /&gt;There is a de facto standard among Web browsers to display a &quot;lock&quot; icon somewhere in the window of the browser (NOT in the web page display area!). For example, Microsoft Internet Explorer displays the lock icon in the lower-right of the browser window.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;2. Holiday offers from your favorite retailer:&lt;/span&gt; Each year, anticipated holiday offers from spammers increase. Consumers may find “Special Shopping Offer” or “Special Discount” spam campaigns in their inboxes. But those may have nothing to do with a holiday bargain. Be aware that this may be a drive-by Trojan download. Never purchase anything advertised through an unsolicited email.&lt;br /&gt;&lt;br /&gt;Ensure that the offer you receive is legitimate by double-checking with the Web site of your favorite retailer. If you do respond to a legitimate offer, use a primary email address for people you know and get yourself a secondary address for all other purposes. Never respond to suspicious offers, as this will confirm to the sender that your email address is “live.”&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;3. Social media threats:&lt;/span&gt; Social media applications are top destinations to browse. With access to Facebook and MySpace now accessible via mobile devices, consumers are easily able to upload and share photos and other online information. Be on alert when you get “nudges” and suggestions from “friends” to view pictures, receive special holiday “offers” or invitations to play “games.” You may become the victim of a malware or a phishing threat. &lt;br /&gt;&lt;br /&gt;Also, be aware that phishers are using social media for spam related purposes as spammers are looking to attract names. Change your Facebook privacy settings  and configure them to meet your needs; you never can be careful enough about who views your information.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;4. Discounted gift cards:&lt;/span&gt; With cash-strapped consumers looking at their wallets this holiday season, discounted gift cards may seem like an attractive gift option for stocking stuffers. Before you make your purchase, however, be sure that the Web site and the discounted offer are legitimate. Check with the retailer and use PayPal when making your purchase. If the site asks you to mail in an order or does not accept PayPal or credit cards, be aware, as you may become the victim of fraud.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;5. Greeting card threats:&lt;/span&gt; During the holiday season, the number of electronic greeting cards, sent via email grows exponentially. Clicking on an e-card or video holiday card, can direct you to a link, ask you to download Adobe Flash, another type of animation or a PDF. This can install dangerous malware on your computer. No matter whether or not you know the sender - assume that suspicious links, Flash video, animation or any PDF card, document or invoice are potentially malicious and dangerous.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;6. Delivery threats (UPS and FedEx):&lt;/span&gt; This type of phishing threat (aka “Bredlow” or “Fake Antivirus” spam) takes the form of a friendly notice from UPS, FedEx or DHL. Typically, the email message includes a few lines such as, “We tried to deliver your package, but were unable to reach you. Please click here to reschedule your delivery.” In the phishing case, once you click, malicious code gets installed on your computer and it will harvest your personal information. &lt;br /&gt;&lt;br /&gt;As with any online business transaction, never click on links that arrive unsolicited. When shopping or doing business online, instead go to the company website directly by typing the URL in your web browser instead of clicking on a link.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;7. Holiday-themed games and videos:&lt;/span&gt; Consumers should be on the lookout for any “click here” messages associated with holiday games and videos, such as the Elf Bowling game. Do not open suspicious links. The links may open malware. For those asked to view videos, users may be asked to activate a plug-in and wait for a download of a java applet—essentially a fake video codec that may be cross platform malware or Java based malware.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;8. Popular Google search results:&lt;span style=&quot;font-weight:bold;&quot;&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; While Google and other search engines have taken precautions to eliminate URLs that contain malware, searches using popular keywords like “Christmas” can still result in the download of malware. For example, a search for &quot;free printable Christmas stickers” may lead to links that initiate a malware attack. Make sure that your system is updated with the latest virus protection and the latest security patches.&lt;br /&gt;&lt;br /&gt;9. Harvest attacks after the holidays: Scammers frequently focus on November and December, the busiest shopping months, to gather email addresses of potential victims for later use in January. In fact, Trojan downloads are at an all-time high during November and December. Online shoppers should brace themselves for online fraud and phishing attempts during the second and third weeks of January—about the time December’s credit cards bills arrive.&lt;br /&gt; &lt;br /&gt;“Be wary of any email or social media interaction that requires your account or financial information even if it does not look suspicious at first,” said Yanovsky. &lt;br /&gt;&lt;br /&gt;“Scammers and phishers will be looking for new ways to lure in consumers, especially with Facebook traffic at an all-time high, and with more and more consumers looking for discounts. When shopping online, know how the online merchant communicates, especially in case of shipping delays and credit card matters. &lt;br /&gt;&lt;br /&gt;&quot;Assume that any email that either directly or indirectly asks for your account, financial or identity information is fraudulent. Lastly, double-check your credit card statement—especially in January—for incorrect expenses. Using these steps as a baseline, consumers can stay protected this holiday season.”</description><link>http://techfools.blogspot.com/2010/12/sonicwall-releases-top-9-tips-to.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-2106426085172488781</guid><pubDate>Mon, 15 Nov 2010 22:23:00 +0000</pubDate><atom:updated>2010-11-16T03:54:04.079+05:30</atom:updated><title>Facebook email: Latest strike to dominate communications?</title><description>&lt;span style=&quot;font-style:italic;&quot;&gt;Eden Zoller, Principal Analyst, Ovum&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;AUSTRALIA: If Facebook positions this as a full web email service it will put Google, Microsoft and Yahoo! on the defensive. It should also give telcos a lot to think about as Facebook is becoming an increasingly rich communication platform. All it needs to do now is put search into the equation.&lt;br /&gt; &lt;br /&gt;An email service from Facebook makes a lot of sense. It has a huge base of 500 million users that already love to communicate and share, and Facebook is giving them richer ways to do this through virtual gifts, games, location and even voice thanks to the recent integration deal with Skype.&lt;br /&gt; &lt;br /&gt;Adding email to the mix is a logical step and Facebook could tap into user data to provide an attractive, highly personalised service. You would also expect it to push mobile features given its big move in this direction.</description><link>http://techfools.blogspot.com/2010/11/facebook-email-latest-strike-to.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-7112645373617757139</guid><pubDate>Sat, 30 Oct 2010 21:46:00 +0000</pubDate><atom:updated>2010-10-31T17:36:44.336+05:30</atom:updated><title>Nearly all my Blogger blogs are being targeted by cybercriminals! Please help me, friends!</title><description>Interesting! Nearly all my blogs on Blogger -- Pradeep Chakraborty&#39;s Blog, Pradeep Chakraborty&#39;s Point, PC&#39;s Semicon Blog, have been targeted by cybercriminals from early last evening!&lt;br /&gt;&lt;br /&gt;Incidentally, I had bought one of the domains from Google itself. And now, it is reportedly under attack! &lt;br /&gt;&lt;br /&gt;I have been reporting this strange phishing site message to Google, and don&#39;t know whether they can help me out!&lt;br /&gt;&lt;br /&gt;I have also been sending regular emails to a contact at Google India with the hope that I can get help.&lt;br /&gt;&lt;br /&gt;Otherwise, there is very little I can do. I do not have the resources to check what is really happening.&lt;br /&gt;&lt;br /&gt;The same story happened last year as well! My main blog was injected with malware and taken out, while all other blogs were marked as spam. While I could not save my main blog, I did manage to save all of the others.&lt;br /&gt;&lt;br /&gt;This time, I have no idea!&lt;br /&gt;&lt;br /&gt;If Blogger and Google cannot protect bloggers like us, then who can?&lt;br /&gt;&lt;br /&gt;I am also wondering: how can a blog -- with hardly any links, and not carrying porn or other sex or fashion related stuff, or even entertainment stuff -- keeps getting attacked like this! :)&lt;br /&gt;&lt;br /&gt;Can someone throw some light? I need help, my dear friends!&lt;br /&gt;&lt;br /&gt;By the way, I have also posted this message and blog link on Twitter, Facebook and LinkedIn. So, you all know what is really going on right now! &lt;br /&gt;&lt;br /&gt;Just in case, friends, I do go on to loose all of my current blogs by the morning, will try and get all of them them up and running with different URLs.&lt;br /&gt;&lt;br /&gt;Right now, I am really, really irritated, angry and tired!&lt;br /&gt;&lt;br /&gt;I&#39;ll be back!</description><link>http://techfools.blogspot.com/2010/10/nearly-all-my-blogger-blogs-are-being.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-5819940605704620027</guid><pubDate>Wed, 13 Oct 2010 21:46:00 +0000</pubDate><atom:updated>2010-10-14T04:07:51.124+05:30</atom:updated><title>My old blog address is back! Am so happy!!</title><description>My dear friends, this is a great day for me! Rohit Basa, manager - Business Development (North America), ProcSys, who is currently in the USA, just responded to an email I&#39;d sent out inviting him for Durga Puja celebrations in town!&lt;br /&gt;&lt;br /&gt;In his mail, Rohit very kindly informed me that my old blog address -- http://pradeepchakraborty.blogspot.com -- is again available for fresh registration. His message to me was crystal clear: &quot;Book it before anyone else does and direct a link to your new website. I&#39;m a great fan of yours, your blog and articles.&quot;&lt;br /&gt;&lt;br /&gt;Indeed! I was overjoyed when I re-registered the same old blog address, and got it back! I even brought back the same old look!! Well, at least, most of it!!!&lt;br /&gt;&lt;br /&gt;The sheer pain of losing my original blog and blog address last August is something extremely difficult for me to get over! The effort I&#39;d put in to develop that blog had been immense, and the loss was really shattering, to say the least! In fact, I even used to constantly check Blogger to find out whether the old blog address was still available.&lt;br /&gt;&lt;br /&gt;While the pain has eased a bit on getting back my old blog address, I know very well that I simply cannot bring back the original traffic that it used to have. I moved my old blog to Wordpress since that day it was taken off Blogger. The blog&#39;s doing very well on Wordpress. Still, the loss of my original Blogspot blog last year has haunted me every single day!&lt;br /&gt;&lt;br /&gt;Thanks a ton, Rohit! I am so very touched and will remain forever obliged to you!!&lt;br /&gt;&lt;br /&gt;I chose Sagar Desai of Symantec, from the US, a very close friend, as the next one to be informed that I&#39;d got back my old blog address. Sagar stood by me in my darkest hour -- when my old blog was injected with malware and removed by Google in August, last year.&lt;br /&gt;&lt;br /&gt;In fact, Sagar had commented just a while ago, on seeing my Durga Puja invite -- &quot;Did not know this cultural side of yours. Good to know that your life is just not semiconductors! ;)&quot; &lt;br /&gt;&lt;br /&gt;I&#39;d then asked him whether I&#39;d got typecast. His reply was -- &quot;That’s probably more to do with the way you brand yourself. Image set ho gaya hai! You need to break the stereotype.&quot; :)&lt;br /&gt;&lt;br /&gt;It is so very nice and touching to hear such remarks from a close friend! It shows that he cares, a lot! Perhaps, I am getting typecast as a semicon blogger.&lt;br /&gt;&lt;br /&gt;Guess what! The other day, I was at a National Instruments event. A journalist friend and an ex-colleague, actually, found some new names for me. One was &#39;Semicon Bong&#39; -- since I&#39;m a Bengali, and the other was &#39;Semicon Bomb&#39;! Ok, whatever that last one means.&lt;br /&gt;&lt;br /&gt;Well, now I simply can&#39;t wait to inform Usha Prasad, my associate and buddy, that I&#39;ve managed to get back my old blogspot address. Usha stood by me during that time and has steadfastly been by my side since that time. I just can&#39;t wait to see her reaction when she hears this news! She&#39;s fast asleep now.. come morning, and this is the first thing I&#39;m going to tell her!&lt;br /&gt;&lt;br /&gt;Finally, many, many thanks to all of those friends who&#39;ve stood by me all this time! &lt;br /&gt;&lt;br /&gt;And, a very special thanks again from the bottom of my heart to Rohit! You really made my day, sorry, my year, buddy! :)&lt;br /&gt;&lt;br /&gt;Here&#39;s wishing everyone a very happy Durga Puja and Dusshera!</description><link>http://techfools.blogspot.com/2010/10/my-old-blog-address-is-back-am-so-happy.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-8133288253312494916</guid><pubDate>Thu, 23 Sep 2010 20:30:00 +0000</pubDate><atom:updated>2010-09-24T02:52:02.314+05:30</atom:updated><title>Facebook&#39;s down! Get &#39;social&#39;!! For real!!!</title><description>If you happened to try log into Facebook tonight, am sure that you would encounter a strange message saying -- Service unavailable, DNS failure. The server is temporarily unable to service your request. Please try again later!&lt;br /&gt;
&lt;br /&gt;
Excellent!&lt;br /&gt;
&lt;br /&gt;
This gives all of us anti social beings an opportunity to really become social and call up or chat with our real life or &#39;real&#39; friends! :)&lt;br /&gt;
&lt;br /&gt;
Twitter is full of messages from users lamenting the fact that Facebook isn&#39;t currently working. In fact, the current global trends on Twiter shows topics such as:&lt;br /&gt;
&lt;br /&gt;
* DNS failure.&lt;br /&gt;
* Facebook Isnt Working.&lt;br /&gt;
* Mark Zuckerberg.&lt;br /&gt;
* Service Unavailable.&lt;br /&gt;
&lt;br /&gt;
One Twitter user has posted an interesting message, saying that since Facebook is down, it means that nine months from today, too many children will be born! Hahahahahahaa! Nice!!&lt;br /&gt;
&lt;br /&gt;
Another tweet says, Facebook RIP 2004-2010. Sincerely, one hopes not!&lt;br /&gt;
&lt;br /&gt;
Yet another says, &#39;Facebook is currently down with a DNS failure. Businesses are reporting a near impossible 480 percent increase in productivity.&#39; Hilarious!&lt;br /&gt;
&lt;br /&gt;
The Facebook page on Twitter has posted this note -- &quot;Facebook may be slow or unavailable for some people because of site issues. We&#39;re working to fix this quickly.&quot;&lt;br /&gt;
&lt;br /&gt;
One hopes that Facebook will be restored soon and everyone will be happy.&lt;br /&gt;
&lt;br /&gt;
Update: Even as I was logging off this post, I tried Facebook, and it worked! I managed to log in and log out. Hope that friends across the world are able to do the same. Best wishes.</description><link>http://techfools.blogspot.com/2010/09/facebooks-down-get-social-for-real.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-1958213631627872984</guid><pubDate>Tue, 31 Aug 2010 13:27:00 +0000</pubDate><atom:updated>2010-08-31T19:14:02.881+05:30</atom:updated><title>Spot fixing? What&#39;s wrong with these youngsters?</title><description>This post has much more to do with cricket! What a lovely game it is! Only, it is getting constantly tarnished by match fixing claims!&lt;br /&gt;&lt;br /&gt;The most recent one being the Lords Test between England and Pakistan, where two of Pakistan&#39;s fast bowlers -- the hugely talented Mohammad Amir and the brilliant Mohammad Asif -- are said to be part of spot fixing! What did they do? They are said to have delivered no balls, during a specific time of the test match, and received some payment for it, as alleged by the &lt;span style=&quot;font-style:italic;&quot;&gt;News of the World&lt;/span&gt; in its telecast.&lt;br /&gt;&lt;br /&gt;When I see Amir and Asif bowl in tandem in test matches, I wish India had such a pair of fast bowlers. But when I read about what they have &#39;supposedly done&#39;, I wince! Why? Just look at Amir, he is not even 20 years old! And Asif, barely 27!&lt;br /&gt;&lt;br /&gt;Why is it so easy to sell you country for the love of money? Don&#39;t you love your country guys?&lt;br /&gt;&lt;br /&gt;We in India are always very pleased to welcome and see cricketers from Pakistan in action. They have always been a talented bunch. And well, and India-Pakistan game has its own charm.&lt;br /&gt;&lt;br /&gt;Post 26/11, all such bilateral tours have come to a standstill. Following a brutal attack by terrorists on a bus carrying Sri Lanka cricketers in Lahore in early 2009 has led to nearly every country boycotting Pakistan. And then, not a single player from Pakistan made it to IPL 3.&lt;br /&gt;&lt;br /&gt;Given this status quo, it is a wonder whether we will see the likes of Amir and Asif bowl to greats such as Sachin Tendulkar, Virender Sehwag and Rahul Dravid anytime soon in a test match in India.&lt;br /&gt;&lt;br /&gt;What&#39;s wrong with these youngsters? Perhaps, it&#39;s the quick money, silly! Perhaps, it is the background they hail from, where youngsters want a better life for their families. Perhaps, at this age, their minds are really naive, and they are easy to fall into bad company.&lt;br /&gt;&lt;br /&gt;Perhaps, youngsters of today need serious mentoring, a father figure to hold their hands and show the way.</description><link>http://techfools.blogspot.com/2010/08/spot-fixing-whats-wrong-with-these.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-4412835251057276314</guid><pubDate>Mon, 30 Aug 2010 21:04:00 +0000</pubDate><atom:updated>2011-09-09T20:23:07.208+05:30</atom:updated><title>Do not ever disrespect work!</title><description>If you do not like this headline, please do not read this piece! :) Cheers!&lt;br /&gt;&lt;br /&gt;I had a friend with a very peculiar habit of disrespecting any work given to him. I always wondered why he had this nature! As I could understand, he always considered work = money, which is correct, but not completely. And, he probably did not respect the person who was bringing him all this work, simply because the money involved was perhaps, too small. &lt;br /&gt;&lt;br /&gt;Neither was he a good communicator. He was either very slow or late to respond to messages to contact or call, which irked people no end! This led many times to him receiving angry messages, especially from his boss/mentor asking to get in touch at the earliest. And invariably, this led to verbal and personality clashes.&lt;br /&gt;&lt;br /&gt;Further, in case the work was small, in terms of the money earned, the effort put in by this friend was either lacking or not quite visible. Also, there was a tendency to take such kind of work for granted.&lt;br /&gt;&lt;br /&gt;Very soon, this friend lost projects he was working on, or could barely manage to sustain projects. Time and again, one aspect stood out -- the effort was seriously lacking. Finally, the mentor also gave up!&lt;br /&gt;&lt;br /&gt;Work, which could have provided him with more opportunities to grow, turned on its head, and consumed him! No one wanted to give him any more work thereafter. It is frightening. However, he was lucky, and got into some other job. Hope he is doing fine now.&lt;br /&gt;&lt;br /&gt;Work does not always equal money. You are getting the relevant experience to handle a variety of work. You are getting several networking opportunities, which will stand you in good stead in the years ahead -- provided, you respect your network. Next, you come into great association with a lot of people, and particularly, your good bosses and mentors -- if you have such people around you! Finally, knowledge, which is simply priceless!&lt;br /&gt;&lt;br /&gt;No amount of money can buy these four things, ever! And, no amount of money can ever substitute either experience or knowledge!&lt;br /&gt;&lt;br /&gt;I have a tendency of loosing my cool when I see such people who do not respect work. Maybe, I am wrong, and I will always be wrong. My behavior and action is not correct. I am not related to such people and should not loose my cool. I have lost friends as I used to loose my cool and say things, which I should not have said in the first place.&lt;br /&gt;&lt;br /&gt;Today, some of those friends or people, who received my wrath sometime in the past, are doing quite well. Some among them have even cared to thank me for showing them the importance of work, however small it may have been.&lt;br /&gt;&lt;br /&gt;For all such people, who think that work always equals money, here&#39;s an advice -- DO NOT EVER DISRESPECT WORK, and DO NOT DISRESPECT THE PERSON who is giving you that WORK.&lt;br /&gt;&lt;br /&gt;No one knows what the future is going to be like. What you sow today, you will reap tomorrow. If you do not keep positive thoughts and maintain necessary action that is required for doing work, you will carry that negativity and lazy action on to your future jobs. You may even succeed for a while. But, not for long!&lt;br /&gt;&lt;br /&gt;And that&#39;s when you will wish: hey, I should have listened to that voice, which wanted me to hear it! Chances are, that voice -- of another friend, or well wisher, or a mentor, or a teacher, or even your parent -- would have been lost by then!</description><link>http://techfools.blogspot.com/2010/08/do-not-ever-disrespect-work.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-7508758966911581967</guid><pubDate>Tue, 17 Aug 2010 19:42:00 +0000</pubDate><atom:updated>2010-08-18T01:22:25.892+05:30</atom:updated><title>New intelligent summarizing software provides solution to information overload</title><description>&lt;span style=&quot;font-style:italic;&quot;&gt;This was sent to me by Smarbee. You decide if it is worth a look!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;OMAHA, USA: Smarbee Inc. has launched the GetRecap family of products, intelligent software that “reads” through documents and delivers meaningful, executive-level summaries – right on the desktop.&lt;br /&gt;&lt;br /&gt;The family of products includes GetRecap for the education market, GetRecap PRO for the business market and GetRecap DOC that integrates with Microsoft Word. In addition to providing summaries, GetRecap PRO and GetRecap DOC identify keywords, phrases and themes, and allow the user to select words to exclude when summarizing. &lt;br /&gt;&lt;br /&gt;All of the recaps delivered to the desktop provide links back to the original content. This saves the researcher time by knowing whether there is content of specific interest inherent in the document, and being able to get right to it to learn more. &lt;br /&gt;&lt;br /&gt;“As the US economy becomes dominated by knowledge workers, more and more people are responsible for research and analysis,” said Kelly L. Kirchhoff, CEO of Smarbee. “The information explosion caused by digital media means people have to sift through mountains of information to do their jobs. The GetRecap family of products is the hot, new software available now that helps them do their jobs well, saving time – and money. There really is nothing else like this in North America.”&lt;br /&gt;&lt;br /&gt;According to a March 2007 report titled “The Expanding Digital Universe,” the amount of digital information created, captured and replicated in 2005 was 151 billion gigabytes, which is about three million times the information in all the books ever written. That number has now increased six-fold to 988 billion gigabytes.&lt;br /&gt;&lt;br /&gt;The GetRecap family of products digests most digital documents, including&lt;br /&gt;Word DOCs, PDFs, html, website pages and more. &lt;br /&gt;&lt;br /&gt;Free 30-day trials are available via Smarbee.com. GetRecap PRO sells for $199.00 for a lifetime license. GetRecap is available for $49.00.</description><link>http://techfools.blogspot.com/2010/08/new-intelligent-summarizing-software.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-7228168736413029579</guid><pubDate>Tue, 10 Aug 2010 08:00:00 +0000</pubDate><atom:updated>2010-08-10T14:15:17.260+05:30</atom:updated><title>Enterprise 2.0 – drop the Web 2.0 myths</title><description>This one&#39;s an Ovum comment! Up you, to agree or disagree, folks!&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style:italic;&quot;&gt;Dr. Steve Hodgkinson, Research Director, Ovum.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;AUSTRALIA: When Enterprise 2.0 first hit the radar, many of us were excited by the new social collaboration tools and their power to usher in new collaborative behaviors.&lt;br /&gt;&lt;br /&gt;Some of this promise has indeed been realized. The market for Enterprise 2.0 software is strong and growing, with social computing functionality such as profiles, wikis, blogs, microblogs, tagging, and presence now widely available, both in specialized Enterprise 2.0 products and embedded into office productivity and unified communications suites.&lt;br /&gt;&lt;br /&gt;Organizations that are happy with their Enterprise 2.0 platforms find that they actually do lubricate interactions in ways that earlier, more rigid, groupware and content management solutions did not.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Sustaining participation in Enterprise 2.0 is harder than it first appeared&lt;/span&gt;&lt;br /&gt;While some organizations naturally embrace the collaborative paradigm that lies behind Enterprise 2.0, others remain recalcitrant. Participation in Enterprise 2.0 platforms can be slow to take off and fragile once the initial burst of enthusiasm from the passionate is over. It is becoming apparent that many organizations find it more difficult than it first appeared to sustain an architecture of participation in the workplace in the way that it appears to happen naturally in the Web 2.0 world.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Challenge the myths&lt;/span&gt;&lt;br /&gt;One theme that is emerging more clearly is the folly of assuming that innovations and behaviors that work in the consumer realm will simply self propagate in the enterprise. In the consumer realm anything goes, and whatever survives and prospers is deemed to be “good”.&lt;br /&gt;&lt;br /&gt;The enterprise realm, however, is more constrained in its purpose and population. Enterprises exist to pursue their mission, and are rife with processes and behaviors that stifle the social dynamics that exist in the wilds of the Internet.&lt;br /&gt;&lt;br /&gt;It is time to confront some common myths. Enterprise 2.0 is not just about appealing to “Generation Y” and digital natives – we must engage workers of all ages. Not all people will leap to Enterprise 2.0 platforms without training and support. Not everyone in the workplace loves hyper-transparency. &lt;br /&gt;&lt;br /&gt;It is not OK that 1 percent write, 9 percent comment, and 90 percent passively consume; workplace collaboration needs more pervasive participation to be useful. Not everyone is naturally collaborative – collaborating, or not, is a learned behavior at work. Collaboration doesn’t necessarily “just happen” when a platform is provided.&lt;br /&gt;&lt;br /&gt;Web 2.0 is a survival-of-the-fittest jungle, where people opt in to sites such as Facebook and LinkedIn for their own self-actualization and entertainment. Enterprise 2.0 is a designed, purposeful space, where particular behaviors and activities need to be created and nurtured.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Think like a gardener, not an engineer&lt;/span&gt;&lt;br /&gt;Enterprise 2.0 requires a different approach to traditional IT systems implementation. Implementing a transaction processing system can be viewed as an engineering task because the users really have no choice. They must use the system to do their jobs. User participation in Enterprise 2.0 platforms, in contrast, is entirely voluntary. People choose to collaborate, or not.&lt;br /&gt;&lt;br /&gt;Organizations that are experiencing disappointing outcomes with Enterprise 2.0 need to take a fresh look at how they are going about it.&lt;br /&gt;&lt;br /&gt;Thinking like a gardener rather than an engineer is helpful. Choose the right business problem to solve, create the initial structure sensitively, seed the conversations, moderate them carefully to stimulate engagement and shape behavior, show commitment to “feeding and weeding” the collaboration, acknowledge good behaviors, and manage the lifecycle of topics and threads to keep things vibrant.&lt;br /&gt;&lt;br /&gt;Successful implementation of an Enterprise 2.0 initiative is a social thing. It is all about changing people’s behavior. Enterprise 2.0 platforms are simply the gardener’s tools – if the garden dies it is seldom the tool’s fault.</description><link>http://techfools.blogspot.com/2010/08/enterprise-20-drop-web-20-myths.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-7569153355573859562</guid><pubDate>Sun, 25 Jul 2010 11:06:00 +0000</pubDate><atom:updated>2010-07-25T18:55:54.417+05:30</atom:updated><title>My WOT (Web of Trust) rank is higher than some leading sites!</title><description>I just signed up for WOT -- or Web of Trust -- for a month! In fact, I&#39;d been seeing this sign across several web sites for some time now, and was wondering whether I could check and see how my blog was ranked on the web.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;What&#39;s WOT? &lt;/span&gt;&lt;br /&gt;According to the site, Web of Trust (WOT) is the world&#39;s leading community-based, free safe surfing tool that helps all web users stay safe as they search, surf and shop online. &lt;br /&gt;&lt;br /&gt;The WOT add-on tells you which sites you can trust when using Google, Yahoo!, Bing, Wikipedia and other popular sites. Web site ratings are powered by a global community of millions of trustworthy users who have rated millions of websites based on their experiences. The free add-on works with Firefox, Google Chrome and Internet Explorer and is a free download.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;WOT Trust Seals?&lt;/span&gt;&lt;br /&gt;WOT Trust Seal helps all web sites, especially e-commerce, use their excellent reputation to increase sales, stand out from the competition and manage their reputation. Reputation data comes from the world&#39;s leading community-based safe surfing tool, Web of Trust. &lt;br /&gt;&lt;br /&gt;The WOT Trust Seal show visitors that you are trusted and give them the confidence to buy, click and sign-in online.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;My WOT rank is better than several leading sites!&lt;/span&gt;&lt;br /&gt;Well, I signed up and it offered me WOT Trust Certificate for free, for a month. Thereafter, one is supposed to pay, should one wishes to carry on!&lt;br /&gt;&lt;br /&gt;There&#39;s a box on WOT, which allows you to check your website&#39;s reputation. Naturally, I checked for my site, as well as the ones I have been associated with recently, as well as in the past.&lt;br /&gt;&lt;br /&gt;To my sheer surprise and delight, I am pleased inform you that my WOT rankings for &lt;a href=&quot;http://pradeepchakraborty.wordpress.com&quot;&gt;Pradeep Chakraborty&#39;s Blog (Pradeep&#39;s Point)&lt;/a&gt; is either on par with or better than some well known websites such as CIOL, EM Asia, Voice &amp; Data, ISA Online, Elcina, etc. NASSCOM and MAIT are understandably ahead.&lt;br /&gt;&lt;br /&gt;I am also very happy to learn that Photonics.com is ahead of me -- or alternatively, I&#39;ve more work to do to catch up with it! However, I&#39;m wondering how Global Sources is trailing me, although EE Times Asia is ahead. Also, Wireless Week is trailing me. Wonder why! I also believe that the rankings keep changing by the day, if not hour. &lt;br /&gt;&lt;br /&gt;I&#39;m not really sure why some of the country&#39;s leading websites are trailing me. My guess is: they have not been rated by WOT users. Or, what most folks dread: their sites are incorrectly rated, and sometimes, as a prank, not rated properly at all! For instance, you know a site deserves a good rating, but as a prank and fun -- or simply to play the fool, you give it a low rating.&lt;br /&gt;&lt;br /&gt;Nevertheless, I am really grateful to have been considered someone to trust by people. Ranks don&#39;t matter much; it is the trust of people that matters more!&lt;br /&gt;&lt;br /&gt;WOT is a great initiative by WOT Services Oy, a Finnish company, to make the Web a much safer place and to let us all know what are the best practices to follow on the Web. And yes, word of mouth remains the best agent to enhance your reputation online and in life. Best of luck, my friends.</description><link>http://techfools.blogspot.com/2010/07/my-wot-web-of-trust-rank-is-higher-than.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-6320595237371269254</guid><pubDate>Thu, 08 Jul 2010 19:20:00 +0000</pubDate><atom:updated>2010-07-09T00:53:56.503+05:30</atom:updated><title>CIOs should have a plan in place now to tackle a second economic downturn</title><description>&lt;span style=&quot;font-style:italic;&quot;&gt;This one&#39;s from Gartner. Don&#39;t quite agree, but nevertheless, enjoy!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;STAMFORD, USA: In 2008, most CIOs were forgiven for being unprepared to deal with the global recession, but if another recession unfolds in the next 12-18 months, no CIO will be forgiven for being unprepared a second time, according to Gartner Inc.&lt;br /&gt;&lt;br /&gt;In May 2010, investor doubts about the health of the global economy returned to the world&#39;s capital markets with a vengeance. The possibility of nations defaulting on repaying massive loans, high unemployment rates, depressed housing prices, limited access to consumer and business credit, a growing belief that a sustained economic recovery may not be possible this year, and an array of other factors have all combined to shake investor confidence to its core.&lt;br /&gt;&lt;br /&gt;As these and other factors were unfolding, many economists were still maintaining that 2010 and beyond would be a period of modest recovery and growth. Because so much uncertainty exists about the sustainability of the current recovery, CIOs should confront such uncertainty with clear and decisive action. They should augment current near-term plans by preparing for a second recession.&lt;br /&gt;&lt;br /&gt;&quot;Just the potential for a second business downturn should be sufficient to compel CIOs to plan for another business downturn,&quot; said Ken McGee, vice president and Gartner fellow. &quot;However, most CIOs will not have a response strategy prepared if a second business downturn occurs.&quot;&lt;br /&gt;&lt;br /&gt;McGee said CIOs today are uniquely placed to tackle a second economic downturn, if they plan accordingly.&lt;br /&gt;&lt;br /&gt;&quot;As questions, or even doubts, grow about the ability for economies to recover, CIOs in 2010 have one advantage over their predecessors. For the first time in the history of the IT industry, more than 90 percent of CIOs today possess extremely recent and practical experience dealing with a recession,&quot; McGee said. &lt;br /&gt;&lt;br /&gt;&quot;In light of this fact, we strongly urge these recession-hardened CIOs to leverage their recently acquired and economic battle-scarred experiences by proactively preparing their entire enterprises should another economic downturn occur within the next 12 to 18 months.&quot;&lt;br /&gt;&lt;br /&gt;Gartner recommends that CIOs take the following key actions to ensure that their enterprises are best placed to weather any potential financial storms over the next 12 to 18 months:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Enlist C-Level Action Now:&lt;/span&gt; As IT leaders learned from the recent recession, executives will once again have to make a multitude of decisions to minimize the effects of a second business downturn. Because most official national recession declarations are announced well after the actual start of a recession, IT leaders should suggest that their enterprise executives convene now, so that business downturn response guidelines may be established before capital markets, customers, suppliers, creditors, etc. panic in the wake of bad economic news.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Focus on the Current Fiscal Year:&lt;/span&gt; To save money as quickly as possible in the event of another business downturn, CIOs should work with executives to determine which IT projects scheduled and approved under the current IT budget may be postponed and which may be entirely canceled. Likewise, once all projects for the next fiscal year are identified, CIOs should determine which of those projects may be postponed and which may be entirely canceled.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Focus on the Next Fiscal Year:&lt;/span&gt; Once all projects for 2011 are identified, simultaneously determine which of those 2011 projects are relatively expendable and, therefore, may be postponed and which may be canceled, should deteriorating business conditions warrant such steps. Of course, the decision process for determining which projects may be postponed or canceled must include an assessment of the contractual exposures that may exist or arise with IT vendors for hardware, software and services.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Use Zero-Based Budgeting for Projects:&lt;/span&gt; As CIOs begin preparing for their 2011 budgets, they should adopt zero-based budgeting for projects in 2011. CIOs need to strongly suggest to C-level executives that all business unit executives sign documents affirming their understanding of:&lt;br /&gt;* The one-time costs that will be incurred to implement their 2011 projects; and&lt;br /&gt;* The annual recurring costs required to maintain those projects once they are completed.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style:italic;&quot;&gt;Use Zero-Based Budgeting for Existing Applications:&lt;/span&gt; CIOs should compile an inventory of existing applications that are maintained by the IT staff and assign a reasonable estimate of the annual cost incurred to maintain each application. Once calculated, Gartner recommends having the business unit executives sign a document affirming their understanding of the estimated annual cost for overseeing and maintaining their applications.&lt;br /&gt;&quot;Our bottom-line advice is to prepare the &#39;second recession&#39; plan, rehearse the &#39;second recession&#39; plan and hope that you never have to use the &#39;second recession&#39; plan,&quot; McGee said.</description><link>http://techfools.blogspot.com/2010/07/cios-should-have-plan-in-place-now-to.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-3334793434345712306</guid><pubDate>Tue, 22 Jun 2010 21:24:00 +0000</pubDate><atom:updated>2010-06-26T16:43:50.974+05:30</atom:updated><title>I&#39;ve been ranked on IndiBlogger!</title><description>I had chanced upon IndiBlogger just last month and well, became a member! Rather, my flagship blog on Wordpress -- Pradeep&#39;s Point -- was only approved as recently as May 29th.&lt;br /&gt;&lt;br /&gt;Today, I received an email from IndiBlogger stating that my blog had been ranked 83rd among all Indian blogs! Of course, there are several bloggers who share a rank. Wow, that&#39;s brilliant! For someone who has not really gone about publicizing his blog -- at least for the first two years -- this is a real treat!&lt;br /&gt;&lt;br /&gt;As per IndiBlogger, IndiRank is like runs in a game of cricket - the higher the score, the higher ranking one has! Blogs are ranked on a scale of 1-100. So, I hope the 83rd rank means that I am on the higher side! ;)&lt;br /&gt;&lt;br /&gt;According to IndiBlogger, its IndiRank system has been built to rank the blogs in the IndiBlogger network. Although IndiBlogger manually verifies each and every blog, and correctly so, before it&#39;s allowed into the network, the IndiRank system is said to be completely automated.&lt;br /&gt;&lt;br /&gt;Well, I only managed to find one other person blogging about semiconductors -- which is my main subject. So, does that make me no. 2 in that area? I don&#39;t really know!&lt;br /&gt;&lt;br /&gt;Also, according to IndiBlogger, it has combined traditional ranking mechanisms such as a blog&#39;s Google PageRank, Incoming links and Alexa ranking. The system also checks to see the frequency at which a blog is updated -- well, I definitely try and update frequently -- as well as two other secret ingredients. Some of these factors have more weightage than the rest. &lt;br /&gt;&lt;br /&gt;Fair enough! I am happy with whatever rank I can manage inside a fortnight or so of my joining. Thanks a lot, IndiBlogger.</description><link>http://techfools.blogspot.com/2010/06/ive-been-ranked-on-indiblogger.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-7933857925918022551</guid><pubDate>Tue, 04 May 2010 22:26:00 +0000</pubDate><atom:updated>2010-05-05T04:51:27.172+05:30</atom:updated><title>Google Places helps build your online presence!</title><description>Google Places has not really impressed me! It could have been much better! Perhaps, I go back a long time in web development, hence, this impression.&lt;br /&gt;&lt;br /&gt;I was part of a significantly huge exercise at Global Sources, Hong Kong, back in the late 1990s in developing the search engine -- specifically, developing a four-layer deep search, as well as the product specifications search for the massive site I independently managed -- Global Sources Telecom Products -- along with my colleague, Len Sangalang. Of course, all of this was made possible with the guidance of Raj, and Rita&#39;s assistance with the actual web development, and the backing of Spenser Au and Daniel Tam. We were trying to achieve all of this before GSOL was listed on the NASDAQ on 14 April 2000. Hence, the tremendous pressure and rush to complete all of our projects!&lt;br /&gt;&lt;br /&gt;In those days, thanks to the backing of Raj Gopinath and Rob Nelson -- my bosses, I had actually rolled out four big sites under Telecom Products -- incorporating Wireless, Broadband, Telephones &amp; Systems, and Telecom Accessories &amp; Parts -- all of this inside one month -- post the NASDAQ listing of GSOL! Hope, my friend, Romy Udanga (in Auckland, New Zealand) is reading this post, as he also made this happen, by passing my proposal!&lt;br /&gt;&lt;br /&gt;We had a lot of SMEs in place as well, and had to really do a lot of hard work. Remember, in those days, there was no Google, Yahoo was coming up, and well, there were no good models of online search and web presence. We did it all by ourselves! Heady days, those! Okay, let me get back to Google Places!!&lt;br /&gt;&lt;br /&gt;Having said all that, Google Places is a cool Web tool for startups and those looking to make a very quick online presence, especially on Google! It is especially useful for those who do not want to invest in a website, but can have an online presence about their business up and running in a matter of less than five minutes!&lt;br /&gt;&lt;br /&gt;Google Places, previously known as Local Business Center, helps a company verify and supplement business information, including hours of operation, photos, videos, coupons and product information, etc., thereby providing a way to communicate with customers. It will give businesses new insights that enable should them to make smart decisions.&lt;br /&gt;&lt;br /&gt;Giving a demo of Google Places, Manik Gupta, product manager, Google India Pvt Ltd, highlighted the really easy procedure that anyone can use to set up the online presence. The best thing is: all of this comes free!&lt;br /&gt;&lt;br /&gt;According to him, India is a nation of small entrepreneurs and it is estimated that there are more than 30 million small businesses in India. However, only a fraction of these are online. &lt;br /&gt;&lt;br /&gt;He added: &quot;We have also observed that one out of five searches on Google is related to a user&#39;s location, and very often people are looking for local businesses. As small businesses in India are realizing the advantages of having an online presence, Google Places is the ideal solution since it’s free and easy. The growth of Google Places in India has been phenomenal and we have seen over 40 percent growth in businesses registering on Google Places over the past six months.&quot;&lt;br /&gt;&lt;br /&gt;The online presence is a customer verified listing, based on the information provided by the customer. Thereafter, Google crawls through all of the relevant information associated with the content provided by a company/entity, and summarizes it for the user. This concept is called a &#39;place page.&#39;&lt;br /&gt;&lt;br /&gt;Once you&#39;ve signed up for your page, an SMS is sent to your mobile phone containing a PIN, which the user is required to add in the relevant place. Gupta added: &quot;We do not believe in regulating. Users would need to verify themselves.&quot;&lt;br /&gt;&lt;br /&gt;There&#39;s no provision as yet, to directly link to your Twitter or Facebook accounts, although, you could use your social media web address -- as a web address, if required, while filling up the information table.&lt;br /&gt;&lt;br /&gt;Google is not looking at monetizing Google Places in India at the moment. At some point, it may introduce certain relevant products.&lt;br /&gt;&lt;br /&gt;I wonder whether Google could work with the leading B2B and/or B2C websites of the world and extend Google Places. A debate regarding who controls the content may arise, but then, it is expected that such issues can be sorted out. Best of luck!</description><link>http://techfools.blogspot.com/2010/05/google-places-helps-build-for-your.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-7339602114532921479</guid><pubDate>Mon, 12 Apr 2010 14:29:00 +0000</pubDate><atom:updated>2010-04-12T20:03:41.552+05:30</atom:updated><title>Worldwide IT spending to grow 5.3pc in 2010</title><description>&lt;span style=&quot;font-style:italic;&quot;&gt;This release is from Gartner!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;STAMFORD, USA: Worldwide IT spending is forecast to reach $3.4 trillion in 2010, a 5.3 percent increase from IT spending of $3.2 trillion in 2009, according to Gartner, Inc. The IT industry will continue to show steady growth with IT spending in 2011 projected to surpass $3.5 trillion, a 4.2 percent increase from 2010.&lt;br /&gt;&lt;br /&gt;&quot;Following strong fourth quarter sales, an unseasonably robust hardware supply chain in the first quarter of 2010, combined with continued improvement in the global economy, sets up 2010 for solid IT spending growth,&quot; said Richard Gordon, research vice president at Gartner. &lt;br /&gt;&lt;br /&gt;&quot;However, it&#39;s important to note that nearly 4 percentage points of this growth will be the result of a projected decline in the value of the dollar relative to last year. IT spending in exchange-rate-adjusted dollars will still grow 1.6 percent this year, after declining 1.4 percent in 2009.&quot;&lt;br /&gt;&lt;br /&gt;Worldwide computing hardware spending is forecast to reach $353 billion in 2010, a 5.7 percent increase from 2009 (see Table 1). Robust consumer spending on mobile PCs will drive hardware spending in 2010. Enterprise hardware spending will grow again in 2010, but it will remain below its 2008 level through 2014. &lt;br /&gt;&lt;br /&gt;Spending on storage will enjoy the fastest growth in terms of enterprise spending as the volume of enterprise data that needs to be stored continues to increase. Near-term spending on servers will be concentrated on lower-end servers; longer-term, server spending will be curtailed by virtualization, consolidation and, potentially, cloud computing.&lt;br /&gt;&lt;br /&gt;&quot;Computing hardware suffered the steepest spending decline of the four major IT spending category segments in 2009. However, it is now forecast to enjoy the joint strongest rebound in 2010,&quot; said George Shiffler, research director at Gartner. &lt;br /&gt;&lt;br /&gt;&quot;Consumer PC spending will contribute nearly 4 percentage points of hardware spending growth in 2010, powered by strong consumer spending on mobile PCs. Additionally, professional PC spending will contribute just over 1 percentage point of spending growth in 2010 as organizations begin their migration to Windows 7 toward the end of the year.&quot;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Table 1: Worldwide IT Spending Forecast (Billions of US Dollars)&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSU1n5rWyAdyBVtgZkZNiJnkrNUnbJz_AA9enIo-yR_COYM0mOEwd7pJy6kZNgWTEUhnI25d7p4IAzcaYeIFyX_SbrQ2th7dw87dzkFkXrztIH-paTjM-zgE3p-jv6s2Z6nGssEImGBLzS/s1600/IT+spend.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 126px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSU1n5rWyAdyBVtgZkZNiJnkrNUnbJz_AA9enIo-yR_COYM0mOEwd7pJy6kZNgWTEUhnI25d7p4IAzcaYeIFyX_SbrQ2th7dw87dzkFkXrztIH-paTjM-zgE3p-jv6s2Z6nGssEImGBLzS/s400/IT+spend.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5459258687807727986&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-style:italic;&quot;&gt;Source: Gartner (April 2010)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Worldwide software spending is expected to total $232 billion in 2010, a 5.1 percent increase from last year. Gartner analysts said the impact of the recession on the software industry was tempered and not as dramatic as other IT markets. In 2010, the majority of enterprise software markets will see positive growth.&lt;br /&gt;&lt;br /&gt;The infrastructure market, which includes all the software to build, run and manage an enterprise, is the largest segment in terms of revenue and the fastest-growing through the 2014. The hottest software segments through 2014 include virtualization, security, data integration/data quality and business intelligence.&lt;br /&gt;&lt;br /&gt;The applications market, which includes personal productivity and packaged enterprise applications, has some of the fastest-growth segments. Web conferencing, team collaboration and enterprise content management are forecast to have double-digit compound annual growth rates (CAGR), in the face of growing competition surrounding social networking and content.&lt;br /&gt;&lt;br /&gt;&quot;Cost optimization, and the shifts in spending form mega suites to the automation of processes will continue to benefit alternative software acquisition models as organizations will look for ways to shift spending from capital expenditures to operating expenditures,&quot; said Joanne Correia, managing vice president at Gartner.&lt;br /&gt;&lt;br /&gt;&quot;Because of this, vendors offering software as a service (SaaS), IT asset management, virtualization capabilities and that have a good open-source strategy will continue to benefit. We also see mobile-device support or applications, as well as cloud services driving new opportunities.&quot;&lt;br /&gt;&lt;br /&gt;The worldwide IT services industry is forecast to have spending reach $821 billion in 2010, up 5.7 percent from 2009. The industry experienced some growth in reported outsourcing revenue at the close of 2009, an encouraging sign for service providers, which Gartner analysts believe will spread to consulting and system integration in 2010.&lt;br /&gt;&lt;br /&gt;&quot;We continue to see a long-term recession &#39;hangover&#39; as a more-cautious mind-set continues as the norm among a lot of buyers who keep looking for small, safe deals where cost take-out is a key factor, said Kathryn Hale, research vice president at Gartner. &quot;In the face of that ongoing strong pressure to renegotiate contracts, and in the absence of equivalent pressure from stockholders, we believe vendors will generally choose to maintain margins over revenue growth.&quot;&lt;br /&gt;&lt;br /&gt;Worldwide telecom spending is on pace to total close to $2 trillion in 2010, a 5.1 percent increase from 2009. Between 2010 and 2014, the mobile device share of the telecom market is expected to increase from 11 percent to 14 percent, while the service share drops from 80 percent to 77 percent and the infrastructure share remains stable at 9 percent of the total market.&lt;br /&gt;&lt;br /&gt;Worldwide enterprise network services spending is forecast to grow 2 percent in revenue in 2010, but Gartner analysts said this masks ongoing declines in Europe and many other mature markets as well as an essentially flat North American market.&lt;br /&gt;&lt;br /&gt;&quot;Longer term, the global enterprise network services market is expected to grow modestly, largely on the back of growth in Internet services, such as hosting,&quot; said Peter Kjeldsen, research director at Gartner. &quot;Ethernet services will also grow significantly, albeit at the expense of both legacy services and multiprotocol label switching (MPLS).&quot;</description><link>http://techfools.blogspot.com/2010/04/worldwide-it-spending-to-grow-53.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSU1n5rWyAdyBVtgZkZNiJnkrNUnbJz_AA9enIo-yR_COYM0mOEwd7pJy6kZNgWTEUhnI25d7p4IAzcaYeIFyX_SbrQ2th7dw87dzkFkXrztIH-paTjM-zgE3p-jv6s2Z6nGssEImGBLzS/s72-c/IT+spend.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-350622940206686731</guid><pubDate>Sat, 27 Mar 2010 21:46:00 +0000</pubDate><atom:updated>2010-03-28T03:19:54.915+05:30</atom:updated><title>I&#39;ve moved to http://www.pradeepchakraborty.com</title><description>Okay, this should have been done long ago! As they say, better late than never! &lt;br /&gt;&lt;br /&gt;I have now moved my flagship blogspot blog to a proper domain -- again, using my name as I really don&#39;t know what else to use! :) Maybe, it will be easier for people to search by my name as they are already familiar with my blog&#39;s name for so long.&lt;br /&gt;&lt;br /&gt;The new address is: &lt;span style=&quot;font-weight:bold;&quot;&gt;&lt;a href=&quot;http://www.pradeepchakraborty.com&quot;&gt;Pradeep Chakraborty&#39;s Blog&lt;/a&gt;&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;The link is already working, although Google indicated that it will take a couple of days. So, thanks a lot, Google.</description><link>http://techfools.blogspot.com/2010/03/ive-moved-to-httpwwwpradeepchakrabortyc.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-7362433450219387808</guid><pubDate>Mon, 08 Mar 2010 19:49:00 +0000</pubDate><atom:updated>2010-03-09T01:35:08.612+05:30</atom:updated><title>Storage software market has typical Q4 jump, as well as slight increase from last year</title><description>&lt;span style=&quot;font-style:italic;&quot;&gt;This is courtesy, IDC.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;FRAMINGHAM, USA: According to the IDC Worldwide Quarterly Storage Software Tracker, the worldwide storage software market experienced a slight increase in year-over-year growth in the fourth quarter of 2009 (4Q09) with revenues of $3.09 billion, representing 0.5 percent growth over the same quarter one year ago, as well as 6.3 percent growth from the previous quarter (3Q09).&lt;br /&gt;&lt;br /&gt;&quot;The storage software market was able to increase in typical fourth quarter fashion, with all top six vendors showing positive growth from the third quarter,&quot; said Michael Margossian, associate research analyst, Storage Software at IDC. &quot;Data protection and recovery was once again a strong market with the top four vendors showing growth from a year ago. IBM had the strongest year-over-year growth with revenues up 19.3 percent from the fourth quarter of 2008, while EMC enjoyed the greatest gains over the third quarter – a 13.1 percent increase – with the help of strong hardware growth.&quot;&lt;br /&gt;&lt;br /&gt;&quot;Sequential and year-over-year growth has returned for storage software, suggesting the market has started to show signs of recovery, said Laura DuBois, research director, Storage Software. &quot;Another sign that bodes well for the segment is that, as storage consumes larger portions of IT budgets, driven by the exponential growth of data, the need for storage management and efficiency increases. Into 2010, storage capital investments are aimed at making more efficient and reliable use of data, data storage, and data management resources.&quot;&lt;br /&gt;&lt;br /&gt;EMC led the overall market with 23.7 percent revenue share in the fourth quarter of 2009. Symantec held onto the second position with 17.5 percent revenue share, while IBM finished in the third position with 13.2 percent revenue share. NetApp finished in the fourth position with 7.9 percent revenue share, while HP and CA rounded out the top 5 with a statistical tie with 3.9 percent and 3.8 percent revenue share, respectively.&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEir3V30fp0FIHcJ6uy43T4u2OzKKMfTRW_e3pdJXCiFzgps-xsUIgbYRD5x-PN_5JUX3H1A0Cjurr9tUfW5pnJX6SeIFNCD191jdmIGZCyebXKhLFdZ-dbySf-fVHFQhuJn2-8Cfc0GzML-/s1600-h/IDC1.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 238px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEir3V30fp0FIHcJ6uy43T4u2OzKKMfTRW_e3pdJXCiFzgps-xsUIgbYRD5x-PN_5JUX3H1A0Cjurr9tUfW5pnJX6SeIFNCD191jdmIGZCyebXKhLFdZ-dbySf-fVHFQhuJn2-8Cfc0GzML-/s400/IDC1.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5446353587364674258&quot; /&gt;&lt;/a&gt;&lt;br /&gt;For the full year 2009, EMC led the overall market with 22.7 percent revenue share. Symantec held onto the second position with 17.9 percent revenue share, with IBM finishing in the third position with 13.5 percent revenue share. NetApp finished in the fourth position with 8 percent revenue share, along with CA rounding out the top five with 4 percent market share in 2009.&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIZrgL1_9ULq1KV6uWyM6pqrpeer_XAxtyv77MRGiSxc_6rtiYdc6JJNeQ-Vl6ctN0sySkoFUzvXBrhtHvuWoecWFcn13LqWLfRhVvuHYAve1shaSei3ymrllnhFTQw23yMuTeAeBH1vBH/s1600-h/IDC2.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 217px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIZrgL1_9ULq1KV6uWyM6pqrpeer_XAxtyv77MRGiSxc_6rtiYdc6JJNeQ-Vl6ctN0sySkoFUzvXBrhtHvuWoecWFcn13LqWLfRhVvuHYAve1shaSei3ymrllnhFTQw23yMuTeAeBH1vBH/s400/IDC2.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5446353706678704594&quot; /&gt;&lt;/a&gt;</description><link>http://techfools.blogspot.com/2010/03/storage-software-market-has-typical-q4.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEir3V30fp0FIHcJ6uy43T4u2OzKKMfTRW_e3pdJXCiFzgps-xsUIgbYRD5x-PN_5JUX3H1A0Cjurr9tUfW5pnJX6SeIFNCD191jdmIGZCyebXKhLFdZ-dbySf-fVHFQhuJn2-8Cfc0GzML-/s72-c/IDC1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4159521332392189672.post-6648055290678052386</guid><pubDate>Wed, 27 Jan 2010 17:14:00 +0000</pubDate><atom:updated>2010-01-27T22:47:04.879+05:30</atom:updated><title>Deloitte&#39;s top trends for technology industry for 2010</title><description>&lt;span style=&quot;font-style:italic;&quot;&gt;This is courtesy, Deloitte.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;BANGALORE, INDIA: The Technology, Media and Telecommunications (TMT) practice at Deloitte announced its 2010 predictions for the technology sector, forecasting that 2010 will be the breakout year for net tablets.&lt;br /&gt;&lt;br /&gt;The connected portable devices are expected to offer a more appealing balance of form and function, and are anticipated to be purchased by tens of millions of people in the year ahead.&lt;br /&gt;&lt;br /&gt;Rajarshi Sengupta, Senior Director, Deloitte &amp; Touche Consulting comments: “The rise of the net tablet could constrain the growth of the nascent e-reader market. For every million net tablets sold there will be a corresponding impact on e-readers. We also predict that in 2010 many enterprise purchasing decisions will be based more on the preferences of individual employees, rather than traditional IT department criteria.”&lt;br /&gt;&lt;br /&gt;Deloitte also forecasts that Virtual Desk Infrastructure, a computing model based on thin or stateless clients, centralised applications and processing power, will be taken far more seriously than in previous years. An anticipated 1 million seats are expected to go thin client in 2010, with the largest deployments involving tens of thousands of seats. By 2015, thin client may reach 10 percent of all enterprise client devices.&lt;br /&gt;&lt;br /&gt;The CleanTech sector’s performance is anticipated to be mixed, according to Deloitte.  Although solar demand is likely to grow strongly in 2010 and 2011, some subsidy cuts and cheaper-than-expected electricity rates may prevent that growth from being as strong as some might hope. It is expected that the solar technology subsector will be outperformed by the broader CleanTech industry.&lt;br /&gt;&lt;br /&gt;Rajarshi Sengupta said: “2010 will also see the world’s first laboratory scale carbon-negative cement plant delivering significant reductions in global CO2 emissions.  In contrast, solar power technology could struggle in 2010 due to the cost of solar equipment, tools and raw materials, overcapacity and weak economics.”&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Thinking thin is in again: virtual desktop infrastructures challenge the PC&lt;/span&gt;&lt;br /&gt;Deloitte predicts that in 2010 thin client will be taken far more seriously than in previous years, even if it does not outsell its thick client counterpart. Over the next five years, thin client should reach 10 percent of organisations’ computers, with the majority of medium to large businesses considering a shift to virtual desktop infrastructure.&lt;br /&gt;&lt;br /&gt;Thin client can help to deliver direct savings by minimising and making IT support and maintenance more efficient, as well as reducing hardware costs and licensing fees. There are other less tangible benefits to virtual desktop infrastructure including; mobility, increased productivity, lower real estate costs, lower power consumption and better security. &lt;br /&gt;&lt;br /&gt;Those charged with deploying thin client may need to convince workers who begrudge the lack of a local hard disk drive that pure forms of thin client entails. However, abetted by a backdrop of recession or slow recovery, employers may consider it a good opportunity to reshape working conditions.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;IT procurement stands on its head&lt;/span&gt;&lt;br /&gt;In the past, technology and telecommunications hardware and software manufacturers have targeted products to the enterprise market, specifically the gate-keeping IT department. In 2010, many enterprise purchasing decisions will be based more on the preferences of individual employees. &lt;br /&gt;&lt;br /&gt;With the rise of the ‘prosumer’—employees who buy a phone for both work and play—more and more enterprises are likely to allow employees to choose their own phones, or at least allow prosumer-selected phones to integrate better with enterprise networks.&lt;br /&gt;&lt;br /&gt;Enterprise-focused vendors will need to alter sales techniques originally designed to sell to monolithic buyers whose concerns were enterprise in scale. While IT departments will have to become more flexible, best practices are still necessary, such as deleting data on employees’ devices if they change jobs. &lt;br /&gt;&lt;br /&gt;Also, given the faddish nature of consumer sentiment, processes that reduce product churn will be needed. The future of many enterprise computing and telecom tools will likely involve compromises between work and personal life, that is, employees being available 24/7 but allowed to choose their own smartphone.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;CleanTech makes a comeback. But solar stays in the shadows&lt;/span&gt;&lt;br /&gt;After the CleanTech industry’s near-collapse during the economic crisis, government stimulus and investor interest has caused a sharp recovery. However, not all areas are sharing the bounty. &lt;br /&gt;&lt;br /&gt;Although the CleanTech Index is up 75 percent since its market lows, the view for the dominant solar technology—crystalline silicon photovoltaic (C-Si PV)—and its infrastructure is less positive in the next year or two. Currently, C-Si PV faces two challenges that could limit its recovery: overcapacity and weak economics.&lt;br /&gt;&lt;br /&gt;Prior to the 2008 economic downturn, governments created a spike in demand for C-Si PV manufacturing capacity and installation. Capacity expansion continues unabated, largely in China and the United States. By 2010, over-capacity will mean C-Si PV utilisation will be barely above 25 percent. &lt;br /&gt;&lt;br /&gt;The economic crisis has also caused conventional energy prices to be lower than forecasted and some developers of PV installations are seeing payback on investment remain at around 15 to 20 years without subsidies. Consumers and utilities will benefit from the significant drop in PV silicon prices, making solar more affordable for those with longer-term investment horizons.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;From grey to green: technology re-invents cement&lt;/span&gt;&lt;br /&gt;In 2010, technology’s contribution to CO2 reduction could result in electric cars, more efficient airplanes and leaner data centres. Yet there is another largely-overlooked industrial segment that may deliver equal benefit: cement. Cement production represents about 5 percent of global emissions – almost double that of the aviation sector – but is an essential driver of economic growth.&lt;br /&gt;&lt;br /&gt;2010 should see the world’s first laboratory scale carbon-negative cement plant, with an industrial scale plant expected in 2011. The total resulting reduction in global CO2 emissions and construction costs could be significant. The full benefits of carbon-negative cement could be realised after five to 10 years, with sidewalks and driveways likely to be the first carbon negative constructions rather than skyscrapers.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Smaller than a netbook, and bigger than a smartphone – net tablets arrive&lt;/span&gt;&lt;br /&gt;NetTabs, connected portable devices will be purchased by tens of millions of people in 2010. These devices have an advantage over smartphones—which are small for watching videos or web browsing—and notebooks, netbooks, and ultra-thin PCs, which are too heavy or expensive.&lt;br /&gt;&lt;br /&gt;The likes of Apple and Microsoft teaming up with Hewlett-Packard, are anticipated to launch their products early this year, following news out of the Consumer Electronics Show in January 2010. Custom-designed tablets are also likely to be released by start-ups, some existing phone and PC makers, netbook leaders, and various smaller manufacturers using open-source phone operating systems.&lt;br /&gt;&lt;br /&gt;Since netTabs are designed to connect wirelessly over WiFi, wireless carriers are likely to try to push users off cellular networks and onto WiFi as much as possible. NetTabs are also more expensive than most smartphones, and consumers are likely to demand big upfront subsidies.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Moore’s Law is alive and well in 2010&lt;/span&gt;&lt;br /&gt;Despite forecasts of a gloomier scenario, Moore’s Law will probably work in 2010, with advances allowing for greater transistor density. However, this may not yield more powerful chips. Moore’s Law — the traditional ability of the global semiconductor industry to double the number of transistors in a square centimetre of silicon every 18-24 months — is not expected to come to a screeching halt in 2010, or even slow down.&lt;br /&gt;&lt;br /&gt;The increased density is unlikely to be used to produce larger or more computationally powerful chips. Instead, “good enough” chips that are smaller, use less electricity and cost less money could emerge. With current growth of lower cost laptops and ultra low-cost netbooks, the next generations of PC chips are likely to be optimised for price, with consideration given to power consumption, but little focus on performance.&lt;br /&gt;&lt;br /&gt;Other hot markets - smartphones, and perhaps tablets - will likely be optimised for power consumption, and possibly price, however, performance will be almost irrelevant. Although some chips will remain performance-driven, this segment may not see much growth. &lt;br /&gt;&lt;br /&gt;Many IT applications (server farms, etc.) are large users of electrical power, so more efficient chips are a good thing. New equipment that uses less electricity and requires less cooling may allow for re-architected or larger data centres without necessitating increased refrigeration or power supplies.</description><link>http://techfools.blogspot.com/2010/01/deloittes-top-trends-for-technology.html</link><author>noreply@blogger.com (Pradeep Chakraborty)</author><thr:total>0</thr:total></item></channel></rss>