Facebook IPO Flops; Can it be Fixed?

The honeymoon is over for Facebook and Mark Zuckerberg. In fact, it ended before it began.

Facebook’s long-awaited and much hyped IPO is less than a week old and the blame game is on as the company has lost nearly 20% of its value since the initial offering.

After three days of trading Wall Street’s take on Facebook has gone from jubilant to jaundiced.

The stock ended its first full day of trading at $38.23 – essentially flat from its $38 opening price though it did manage to set an IPO record for the sheer volume of trades — 567 million shares on opening day last Friday. Investors hoped for a turnaround. That never materialized. On Monday, a selloff prompted the shares to fall by nearly 11%, ending at $34.03. The news worsened Tuesday. The stock sank another eight percent down trading in the $31 – $32 range. …

Facebook IPO Flops; Can it be Fixed? Read More »

IBM Powers Up New PowerLinux Products, Strategy

IBM this week unveiled its latest generation of industry standard Linux-only servers optimized for its Power architecture along with a new strategy targeting specific x86 applications and workloads.

IBM has been a longtime Linux proponent, supporting industry standard distributions like Red Hat Enterprise Linux (RHEL) and SUSE Linux Enterprise – on its Power Systems line for the last 12 years. This week’s announcement reaffirms Big Blue’s commitment to Linux and broadens its scope with offerings designed to drive more growth for the Power platform in the lucrative x86 arena. IBM will fuel this growth via its mantra, “Tuned to the task,” which emphasizes delivering higher quality and superior economics than rivals.

According to Scott Handy, vice president of IBM’s PowerLinux Strategy and Business Development, “This is an extension to our overall Power strategy to address the Linux x86 space and drive more growth for our Power Systems servers.” …

IBM Powers Up New PowerLinux Products, Strategy Read More »

National Advertising Council Tells Oracle to Discontinue Misleading IBM Ads

The always heated ongoing rivalry between Oracle and IBM, just got more contentious, with the recent news that the National Advertising Division (NAD) has called out Oracle for publishing misleading ads in The Wall Street Journal and The Economist claiming Oracle’s T4-4 server is 2x faster and 66% cheaper than IBM’s comparable P795 server.

NAD, a division of the Council of Better Business Bureaus, based in New York City recommended that Oracle discontinue “certain comparative performance and pricing claims” in the national newspaper ads and on the www.Oracle.com website. Specifically, the NAD took exception to Oracle advertisements claim that “Oracle’s SPARC SuperCluster T4-4 system retails for $1.2 million whereas IBM’s P795 high end server costs $4.5 million – an improbable $3.3 million price discrepancy.

The NAD functions as an objective and impartial self-regulatory forum for the advertising industry. In its official determination, the NAD took pains to remain objective. It noted that both the advertiser (Oracle) and the challenger (IBM) produce high quality computer systems. …

National Advertising Council Tells Oracle to Discontinue Misleading IBM Ads Read More »

IBM STG Group Posts Positive Gains, Offers Strong Strategy & Growth Roadmap

Vendor sponsored Analyst conferences are oftentimes long on self-congratulatory hyperbole and short on substance. That wasn’t the case with IBM’s Systems and Technology Group Analyst conference held last week in Rye Brook, NY.

The STG conference, led by Rod Adkins, Senior Vice President of the STG Group, showcased the division’s solid accomplishments over the last several years and detailed the current and future product roadmap and investment strategy. Investments focused around three major areas: Systems, growth markets and strategic acquisitions. Adkins could have easily added a fourth category: patents. The U.S. Patent Office granted IBM’s STG division 2,680 patents in 2010 and it could exceed that number in 2011. One only has to scan the headlines and peruse the ongoing patent purchasing frenzy and the plethora of lawsuits involving all of the major vendors to realize the pivotal role patents play as both and offensive and defensive weapon. IBM, in its Centenary year, holds more patents than any other U.S. technology vendor.

STG 2011 Milestones

Noting that STG is aligned with IBM’s overall growth strategy, Adkins detailed the division’s milestones throughout the first three quarters in 2011. They included: …

IBM STG Group Posts Positive Gains, Offers Strong Strategy & Growth Roadmap Read More »

IBM, Stratus, Microsoft Score High Marks in ITIC Fall 2011 Global Reliability Survey

For the third year in a row, IBM AIX v7.1 UNIX operating system (OS) running on the company’s Power System servers scored the highest reliability ratings and recorded the least amount of overall downtime from Tier 1, Tier 2 and Tier 3 outages among 18 different server OS platforms.

Over three-quarters or 78% of survey respondents indicated they experienced less than one of the most prevalent, minor Tier 1 incidents per server, per annum on IBM’s AIX v. 5.3 and AIX v 7.1 distributions. An 83% majority of IBM AIX v 7.1 and Novell SUSE Enterprise Linux Server 11 and 82% of Windows Server 2008 R2 survey respondents indicated their organizations experienced less than one unplanned, severe/lengthy Tier 3 outage per server, per annum (See Exhibit 1).

Microsoft’s Windows Server 2008 R2 (which scored the biggest year-over-year reliability gains), and Novell’s SUSE Enterprise Linux Server 11 closely challenged IBM’s AIX v 7.1 server OS reliability and uptime – particularly with respect to the most severe and costly Tier 3 outages. Unplanned Tier 3 outages – whether manmade or as the result of a disaster — typically cause downtime in excess of four hours. There is widespread disruption of applications and network operations; customers and business partners are frequently impacted and Tier 3 incidents will almost always require remediation by a significant portion of the IT staff. …

IBM, Stratus, Microsoft Score High Marks in ITIC Fall 2011 Global Reliability Survey Read More »

Stu Sjouwerman Q&A: Security

Longtime security professional, Stu Sjouwerman is the founder and CEO of KnowBe4.com a Tampa, Florida-based security startup that specializes in on-demand Internet Security Awareness Training (ISAT). The company’s goal is to enable organizations to quickly solve the increasingly urgent security problem of social engineering and avoid attacks before they occur. Sjouwerman also publishes an Electronic newsletter called Cyberheist. Prior to founding KnowBe4.com, Sjouwerman was president, CEO and founder of Sunbelt Software – now GFI Software which makes the VIPRE security package. He is also the founder and former editor of the popular WServerNews electronic newsletter which has a worldwide distribution. ITIC recently sat down and interviewed Sjouwerman about security threats and how companies can defend themselves.

Laura DiDio, ITIC: Tell us about KnowBe4.

Stu Sjouwerman: We are next generation security awareness training. That means old style security training doesn’t cut it anymore – it’s not enough to follow dos and don’ts. We do simulated phishing attacks – fully automated – for customers to let them know who the culprits are in advance of an attack. It’s preventive. We train people to be well aware of phishing attacks that are out there. Our main focus is on phishing attacks but it’s not our only focus.

ITIC: What’s the top headline in security these days?

SS: Cybercrime is big business. It’s everywhere, but it’s especially proliferating and flourishing in Eastern Europe and Russia. There are many are ex-KGB agents who have teamed up with the local organized crime; they have a very well developed and broad criminal economy. There are social networks for cyber criminals and tons of technical support sites for malware. Business is booming: it’s at least a $1B a year industry and growing every day. It’s very easy and very profitable to be a cyber criminal.

ITIC: You’ve been in the security business for 15 years now. How have the security threats changed and evolved?

SS: In the last 15 years we’ve seen five generations of threats. Today’s security hacks and attacks have evolved; they are not the work of amateurs. It used to be that teenaged hackers did it for the thrill or to make a name for themselves and get hired to work for a security firm. Ten or fifteen years ago, hacking was a means to an end. Today hacking is the end game. The hackers have gone pro. And the security threats are much more professional and stealth-like which makes detection more difficult. Many organizations and individuals don’t find out until after the fact and it’s damaged their networks. Back in the “good old days” circa 1995, a company’s worst case scenario was a DOS attack which caused the server to go down and applications to be unavailable. In 2011 – soon to be 2012 – the threats are much worse. Organizations are facing two types of damage. The first is stolen customer data, Intellectual Property, corporate designs etc. Once it’s stolen, highly sensitive data oftentimes ends up for sale to the highest bidder on criminals’ social media networks. The second, very pernicious threat is that hackers frequently install a stealthy Trojan/key logger and at regular intervals it will send the information e.g. accounting information to the hackers. They literally take control of the account and transfer out the money in small chunks usually $10K at a time. It’s then forwarded on to their “money mules” and organizations lose monies. Once a company has been the victim of a cyberheist, recovering the money, tracking and prosecuting the hackers is difficult, time consuming and expensive.

ITIC: How aware are companies of these threats and do they take them seriously?

SS: Every organization: the largest businesses, small Mom and Pop shops, academic institutions, non-profits and religious institutions are all at risk. Nothing is sacred and no one is safe. The large enterprises like banks and brokerage houses, usually have good proactive defenses in place to minimize risk, delay and thwart attacks and to alert them when an attempt to penetrate the perimeter or network occurs. Ironically, the biggest threat facing companies – particularly SMBs – is a false sense of security. Many small businesses, non-profits and churchesare operating under a serious misperception that they’re too small to be of interest to hackers and thus they won’t be targeted. The Fortune 500 firms know they’re targets and have relatively good defenses in place. But these small businesses often do lag behind a bit in security awareness training unless they’re forced by SOX or HIPPA regulations to do security awareness training because they get audited. Some organizations just do it perfunctorily to pass a required audit and that just won’t cut it.

ITIC: What’s your advice to businesses?

SS: If you are a corporate cyberheist victims are NOT insured. The FDIC does not insure corporate accounts; they insure personal accounts. So the banks and insurance companies won’t refund your money UNLESS you purchase specific cyberheist insurance policies. Otherwise you’re SOL (shit out of luck) – and if the theft is big enough, many SMBs could find themselves out of business. The hackers are also not confining themselves to SMBs – they attack non-profits, local and municipal governments and churches with equal impunity.

ITIC: What proactive measures should organizations take to protect their businesses?

SS: First make sure that you have good quality anti-malware and keep it up to date and have a good firewall and then make sure you perform good quality security awareness training. You have to constantly reinforce that they need to be tested – we recommend testing at least once a week. The weakest link in any organization will be the users. The security perimeter has been broken thanks to mobile and remote users. The network and the firewall used to be the perimeter but the consumerization of IT has changed that. The hackers are now professional. The spear fishing attacks are very sophisticated.

ITIC: What should organizations and individuals look for?

SS: This sounds mundane, but never open an attachment that you didn’t ask for or one that came from an unknown source.

Be suspicious of all your Emails, even those from so-called trusted sources and friends because their accounts may be spammed or hacked. This includes things like direct messages from people you know and are friends with on the various Social Media sites like Facebook, Twitter and Yahoo. Pay very close attention to how your Email looks e.g., be on the lookout for spelling and grammatical errors and missing elements or things that just don’t appear right.

ITIC: Do you have any last insider tidbits for our readers?

SS: Yes, be aware that currently there’s only one bank that insures business accounts from cyber criminals and cyberheists and that’s JP Morgan Chase.

URL: http://www.knowBe4.com

Based in Tampa Bay, FL.

Stu Sjouwerman Q&A: Security Read More »

Direct Edge Stock Exchange – Richard Hochron

Direct Edge Stock Exchange Uses Microsoft SQL Server 2008 Parallel Data Warehouse to Scale Trading

Business Profile: Direct Edge Stock Exchange

“Microsoft Parallel Data Warehouse is a real win for us. The combination of SQL Server 2008 R2 and the PDW appliance is extraordinarily powerful. Our stock exchange needs very high reliability, very high processing speeds, excellent security and ease of use. SQL Server 2008 R2 and PDW delivers. The deployment was as smooth and seamless as Microsoft promised. We’re purchasing something that scales into the hundreds of terabytes range.”

– Richard Hochron, Chief Technology Officer at
Direct Edge Stock Exchange in Jersey City, N.J.

Direct Edge Stock Exchange – Richard Hochron Read More »

ITIC Survey Finds CRM Usage Soars Among SMBs, SMEs

Thanks to the 300 of you who took time out of your busy schedules to respond to the joint ITIC/GFI survey on customer relationship management and for OSF-Global in assisting us in composing the questions.

The survey results showed that nearly three-quarters – 74% — of companies are currently using a CRM solution and 57% of survey participants revealed that interest in CRM is increasing significantly. And perhaps most surprising, a 52% majority of survey respondents said they use more than 51% of their CRM solution’s functionality; of that number 18% utilize over 75% of CRM features.

CRM Usage Soars Among SMBs and SMEs

Customer relationship management (CRM) solutions long a staple in large enterprises are now also being widely embraced and deployed by small and mid-sized businesses to more efficiently track and manage businesses’ interactions with customers and partners. …

ITIC Survey Finds CRM Usage Soars Among SMBs, SMEs Read More »

Spring 2011: Hackers Had a Bonanza

Hackers have had a bonanza in April, May and June (so far). Nary has a day gone by without news of yet another major attack. Here’s a partial list of some of the most publicized hacks of the last 10 weeks:

RSA Security: On April 1, in a move akin to raiding Fort Knox, RSA’s Secure ID technology (one of the industry’s gold standards in security software) was hacked. RSA executives described the hack as “very sophisticated.” They characterized it as an advanced persistent threat (APT)-type targeted attack. It used a routine tactic – a phishing Email that contained an infected attachment that was triggered when opened.

Epsilon:  This Irving, TX –based company handles customer email messaging for over 150 firms, including large banks and retailers like Best Buy, JPMorgan Chase, Citigroup and L.L.Bean. In April, millions of consumers learned that Epsilon’s networks were breached when they received Emails from their banks and credit card companies informing them that the hack might have exposed their names and Email addresses to the hackers. Epsilon released a statement assuring consumers that only Email addresses and names were compromised and that no sensitive data was disclosed. …

Spring 2011: Hackers Had a Bonanza Read More »

Security Wars: Time to Use Continuous Monitoring Tools to Thwart Hackers

It’s time for corporations to wise up and use the latest, most effective weapons to safeguard and secure their data.

High tech devices, software applications, Emails, user accounts, social media and networks – even those presumed safe — are being hacked with alarming alacrity and ease.

Security tools, encryption and updating your networks with the latest patches are certainly necessary, but they are not enough. Corporations must arm themselves with the latest security tools and devices in order to effectively combat the new breed of malware, malicious code and ever more proficient hackers. I’m referring to the new breed of continuous monitoring tools that identify, detect and shut down vulnerabilities before hackers can find and exploit them. …

Security Wars: Time to Use Continuous Monitoring Tools to Thwart Hackers Read More »

Scroll to Top