Monday, September 17, 2012

AMD CFO Seifert resigns


Sep 17, 2012 05:49 pm | IDG News Service
The chip maker is now hunting for a replacement

by Agam Shah

Advanced Micro Devices announced Monday that its chief financial officer, Thomas Seifert, has resigned from his post and that a hunt is on for his replacement.
AMD has appointed Devinder Kumar, senior vice president and corporate controller, as interim CFO until a replacement is found. Seifert will stay on at the chip maker until the end of September to help with the transition, AMD said.
Seifert joined AMD in 2008 and has been one of the few remaining executives from the management team that included former CEO Dirk Meyer and former product chief Rick Bergman.
Seifert was made CEO on an interim basis after Meyer's resignation and played a key role in the search for AMD's new CEO, a job other executives including Apple's Tim Cook, Oracle's Mark Hurd and VMware's Pat Gelsinger were said to have shied away from.
AMD ultimately appointed former Lenovo President and Chief Operating Officer Rory Read in August last year.
AMD has since overhauled the management team, appointing Mark Papermaster as chief technology officer and Lisa Su as senior vice president and general manager of the global business units.
Seifert left on his own accord, an AMD spokesman said.
"Seifert's departure is not based on any disagreement over the company's accounting principles or practices, or financial statement disclosures," AMD said in a statement.
AMD has been struggling financially and in July reported that its quarterly profit declined by 40 percent year over year to US$37 million, with revenue dropping 10 percent to $1.41 billion. The company blamed a weak consumer PC market for the lower profits.
Kumar joined AMD in 1984 as a financial analyst. He became corporate controller in 2001.
Agam Shah covers PCs, tablets, servers, chips and semiconductors for IDG News Service. Follow Agam on Twitter at @agamsh. Agam's e-mail address is agam_shah@idg.com

Read more »

Oracle buys SelectMinds to boost capabilities gained from Taleo acquisition


Sep 17, 2012 05:36 pm | IDG News Service
Oracle is battling SAP and now IBM in the HCM (human capital management) software market

by Chris Kanaracus

Oracle on Monday said it has agreed to acquire SelectMinds, a maker of "social talent sourcing software," in a bid to flesh out the capabilities it gained through this year's US$1.9 billion acquisition of Taleo.
Terms of the deal, which is expected to close this year, were not disclosed.
SelectMinds' software aims to help organizations find high-quality job candidates through social media channels. Beyond posting job ads on sites such as Facebook and LinkedIn, companies can create "talent communities" and help their current employees share information about openings, according to SelectMinds' website.
"Recruiting candidates through employee referrals is widely acknowledged as the most effective method to find talent through trusted contacts," said Thomas Kurian, executive vice president of product development at Oracle, in a statement.
SelectMinds' products already work with Oracle's cloud-based recruiting, performance management and HCM (human capital management) software, according to the statement.
Oracle's Taleo acquisition was seen as a competitive response to SAP's purchase of Taleo competitor SuccessFactors. While Taleo's products are centered on talent management, Oracle is aligning them as a suite along with its Fusion HCM product, which covers areas such as payroll.
Software vendors are eager to get a strong foothold in the HCM market because the applications can potentially be licensed for many or all employees within a company, compared to more specialized software, which may only be used by a single department.
That desire was highlighted by IBM's recently announced $1.3 billion acquisition of HCM vendor Kenexa. IBM has long maintained that it has no interest in being a business applications provider and competing with the likes of Oracle and SAP, but the Kenexa deal marked a shift in that position.
Chris Kanaracus covers enterprise software and general technology breaking news for The IDG News Service. Chris' email address is Chris_Kanaracus@idg.com

Read more »

Microsoft's Office 365 Home Premium to cost $99.99 annually per subscription


Sep 17, 2012 05:33 pm | IDG News Service
Office 365 Small Business Premium will cost $149.99 per employee, per year

by Juan Carlos Perez

Microsoft has announced the consumer and small-business prices for the new Office suite, which will be sold both via traditional single-device, perpetual licenses and via a new annual, multi-device cloud subscription.
The subscription version for consumers, called Office 365 Home Premium, will cost US$99.99 per household, while the small-business version, called Office 365 Small Business Premium, will cost $149.99 per employee per year, Microsoft announced Monday.
The licensed versions, called Office Home & Student 2013, Office Home & Business 2013 and Office Professional 2013, will cost $139.99, $219.99 and $399.99, respectively.
Microsoft will offer details later about versions of the new Office suite for large companies. It hasn't said when the new Office versions will be available commercially.
Since announcing the new Office, Microsoft has been clear in saying that it would prefer that buyers choose the new subscription model, but that it recognizes that there will be people who prefer the conventional license.
Now that the pricing information is available, customers will have the last word about which purchase model ends up being the preferred one -- paying once for the suite and using it for years on one device, or paying an annual fee that lets them access the suite in multiple devices.
One Office 365 Home Premium license gives the buyer the right to install the suite on up to five Windows 7, Windows 8 or Mac OS computers. In the buyer's household, multiple people can use the suite, each with his or her own account. The software is downloaded from a Microsoft data center and will be updated with new or updated features several times a year, according to Microsoft.
The Office 365 Home Premium license includes 20G bytes of storage in the SkyDrive online storage service, and 60 minutes of Skype IP telephony per month. Settings, preferences and documents can be synchronized via the cloud among the different devices included in the subscription.
A feature called Office on Demand lets users stream the suite to a device not included in the subscription for one-time editing purposes, such as when users are traveling and using a hotel PC. Office 365 Home Premium includes Word, Excel, PowerPoint, OneNote, Outlook, Access and Publisher.
Office 365 Small Business Premium works in the same way, except that licenses are per employee at a cost of $12.50 per month. Businesses can have licenses for up to 25 employees. Each employee can install the software on up to five Windows 7, Windows 8 or Mac OS computers.
In addition to the applications in Office 365 Home Premium, Office 365 Small Business Premium includes Lync Online and InfoPath, as well as Exchange Online -- shared calendars, 25G-byte mailboxes with virus and spam protection -- and SharePoint Online, which includes 10G bytes of cloud storage overall plus 500M bytes per user and tools to create websites.
Meanwhile, the conventional license suite Home & Student 2013 comes with Word, Excel, PowerPoint and OneNote, while Home & Business 2013 adds Outlook. Professional 2013 comes with the previous applications plus Publisher and Access.
All versions, whether subscription or conventional, have a new interface consistent with the "Modern" -- formerly called "Metro" -- interface of Windows 8, which is optimized for touchscreens, such as those in tablets.
Microsoft also announced that starting Oct. 19, buyers of Office 2010 or Office for Mac 2011 will be able to sign up free for a one-year subscription of Office 365 Home Premium or the equivalent Office 2013 offering. Small-business owners will get a three-month trial of Office 365 Small Business Premium.
The company recently said that the Office version that will ship with Windows RT devices will be available between November and January. Windows RT is the Windows 8 version for ARM-based tablets and devices.
Juan Carlos Perez covers enterprise communication/collaboration suites, operating systems, browsers and general technology breaking news for The IDG News Service. Follow Juan on Twitter at @JuanCPerezIDG.

Read more »

FBI warns financial institutions are being highly targeted by fraudsters


Sep 17, 2012 05:31 pm | Network World
by Michael Cooney

The FBI today said cybercriminals have recently stepped up efforts to steal money and gain access to banks and other financial institutions using spam, phishing emails, keystroke loggers and Remote Access Trojans (RAT).
Specifically, the fraudsters are looking to compromise financial institution networks and obtain employee login credentials. The stolen credentials are used to initiate unauthorized wire transfers overseas. The wire transfer amounts have varied between $400,000 and $900,000, and, in at least one case, the criminals raised the wire transfer limit on the customer's account to allow for a larger transfer. In most of the identified wire transfer failures, the perpetrators were only unsuccessful because they entered the intended account information incorrectly, the FBI stated.
In the bank fraud, the FBI said cybercriminals "used spam and phishing e-mails to target their victims. Once compromised, keyloggers and RATs installed on the financial institution employee's computer provided the attackers with complete access to internal networks and logins to third party systems. Variants of Zeus malware were used to steal the employee's credentials in a few reported incidents. In some instances, the [attackers] stole multiple employee credentials or administrative credentials to third party services and were able to circumvent authentication methods used by the financial institution(s) to deter fraudulent activity. This allowed the intruders to handle all aspects of a wire transaction, including the approval. The unauthorized transactions were preceded by unauthorized logins that occurred outside of normal business hours using the stolen financial institution employees' credentials. In at least one instance, attackers browsed through multiple accounts, apparently selecting the accounts with the largest balance."
The FBI made a number of recommendations for financial institutions to help prevent security problems:
" Educate employees on the dangers associated with opening attachments or clicking on links in unsolicited emails.
" Do not allow employees to access personal or work emails on the same computers used to initiate payments.
" Do not allow employees to access the Internet freely on the same computers used to initiate payments.
" Do not allow employees to access administrative accounts from home computers or laptops connected to home networks.
" Ensure employees do not leave USB tokens in computers used to connect to payment systems.
" Review anti-malware defenses and ensure the use of reputation based content and website access filters.
" Ensure that workstations utilize host-based IPS technology and/or application whitelisting to prevent the execution of unauthorized programs.
" Monitor employee logins that occur outside of normal business hours.
" Consider implementing time-of-day login restrictions for the employee accounts with access to payment systems.
" Restrict access to wire transfer limit settings.
" Reduce employee wire limits in automated wire systems to require a second employee to approve larger wire transfers.
" If wire transfer anomaly detection systems are used, consider changing "rules" to detect this type of attack and, if possible, create alerts to notify bank administrators if wire transfer limits are modified.
" Secure and/or store manuals offline or restrict access to the training system manuals with further security, such as enhanced access controls and/or segregation from the payment systems themselves.
" Monitor for spikes in website traffic that may indicate the beginning of a DDoS and implement a plan to ensure that when potential DDoS activity is detected, the appropriate authorities handling wire transfers are notified so wire transfer requests will be more closely scrutinized.
" Strongly consider implementing an out of band authorization prior to allowing wire transfers to execute.
" Limit systems from which credentials used for wire authorization can be utilized.
Follow Michael Cooney on Twitter: @nwwlayer8 and on Facebook.
Read more about wide area network in Network World's Wide Area Network section.

Read more »

Nasuni latest to roll out mobile access to cloud-based network storage


Sep 17, 2012 05:31 pm | Network World
by Brandon Butler

Within a few years, mobile access to cloud-based storage will be a "checkmark" feature that will be fairly ubiquitous among the major vendors, predicts 451 Research Group analyst Simon Anderson. We're not quite there yet, but more and more vendors are rolling out the feature.
The latest is Nasuni, which delivers a cloud-based network-attached storage option for enterprises. The release of the fourth version of the company's software this week extends the capability of Nasuni to access data from mobile devices.
Nasuni's offering leverages a hybrid cloud approach, which combines on-premise storage controllers that collect and encrypt data behind the enterprise's firewall, then send the encrypted data up into its public cloud, which is hosted in Amazon Web Services and Microsoft Azure. The behind-the-firewall encryption means only the customer has access to the keys to unencrypt the data, not Nasuni or its network of cloud providers.
The newest mobile access capability, which was made generally available this week, allows users to access and upload images, videos and files via iOS and Android devices. Users are authenticated through Active Directory, giving IT departments the ability to control data flow to the individual device level, and segment which data sets are available to which groups of employees. Data can be deleted from devices remotely as well.
Terri McClure, an analyst with Enterprise Strategy Group, says Nasuni's offering hits at an emerging pain point in the enterprise. Users want access to their work files outside of their office, so many turn to consumer-oriented applications, such as Dropbox, Google Drive and SugarSync. The problem, she says, is when workers do that, IT loses control of which data is where, allowing for the possibility to sensitive data to be brought outside the firewall unprotected.
"Everyone is out there using two or three devices and we want to access our files from our iPhoneiPadand our PC," she says. "When users subscribe to these services personally, IT has no visibility into what corporate data is out there." A recent ESG survey found that 77% of IT leaders have policies against or strongly discouraging employee use of personal cloud storage options for corporate data, yet 70% know or strongly suspect they're being used anyway.
Nasuni is not the first to offer mobile access to files. Egnyte, Box, SugarSync and Dropbox each have the feature.
"Adding mobile access support also will bring Nasuni into conflict with the other file-sharing services out there, the number of which seems to increase on a weekly basis," says Anderson of the 451 Group. "Nasuni believes it has a better security and control model versus cloud players like Dropbox and Box -- which it says move the control point outside of the corporate firewall -- while noting that on-premises or private offerings from the likes of VMware Octopus, Oxygen and Citrix ShareFile still require internal IT to 'babysit' the storage infrastructure, so still incur OPEX overhead."
McClure says because Nasuni is meant to be a company's primary NAS, the mobile application is therefore just an extension of the storage, differentiating it from competitors.
Network World staff writer Brandon Butler covers cloud computing and social collaboration. He can be reached at BButler@nww.com and found on Twitter at @BButlerNWW.

Read more »

CIOs Look Ahead: Millennials, Consumer Tech and the Future


Sep 17, 2012 05:10 pm | CIO.com
by Tom Kaneshige

It's 1 a.m. and Josh Robin is busy working.
"I'm kind of stir crazy, don't need a lot of sleep, so it's probably prime time for getting things done," says the fast-talking 25-year-old director of innovation at MBTA, the Massachusetts Bay Transportation Authority.
At any moment on any given day, Robin might be Skype-ing with interns, Tweeting work updates, or tapping on his personal iPhone to manage a cutting-edge mobile ticketing project. It drives him crazy that his workplace doesn't have Wi-Fi, which basically means he can't use his personal computer there.
Robin pays the monthly iPhone bill out of his own pocket, while a corporate-issued BlackBerry collects dust. "BlackBerries have become the metaphor for old-line IT," he says. "It would be a pain in the butt," if he was forced to use it.
If you think Robin is an oddity, think again. He is part of the next generation workforce known as the Millennials. They've been called many names: Always-On Generation, Gen Y and Digital Natives. They grew up right along with Facebook, Twitter, Skype and Apple's iPocalypse. They have different ways of working, different ideas about their jobs.
They're also the ones who will be running your company in the future.
Millennials and Consumer Tech
The Millennials, born between the years 1981 and 2000, are 85.4 million strong, outnumbering even the Baby Boomers, according to 2010 statistics from the U.S. Census Bureau. Attracting the brightest among them requires understanding and, yes, even catering to their desires.
A big part of that is giving them technology freedom.
Like Robin, Millennials don't want to unplug from work on the weekends and after-hours like their older counterparts, and so they want technology that keeps up with this lifestyle. They're driving today's big tech trends, such as consumer tech and bring-your-own-device, or BYOD, which naturally blends work life and social life.
Truth is, they want to be in charge of the technology they use at work and don't want to be told otherwise. And chances are they do have a better grasp of the power of technology than older generations that grew up with, say, desktop computer towers, numeric pagers and clunky Microsoft Office.
"Millennials have little patience for bad IT solutions," says a 20-something mobile manager at a Silicon Valley company, speaking on condition of anonymity because he wasn't authorized to speak to the press. "When I interview Millennial job candidates, I ask, 'Do you have any questions for me?' They almost always respond, 'Will I have admin rights on my computer?'"
What's at Stake?
Appealing to Millennials with new-fangled technology just might be a CIO's highest priority. Fact is, Millennials will either drive your IT policy or your attrition rate.
Just ask Electronic Arts CIO Mark Tonneson. EA has been moving away from Windows-based Dell laptops and Hewlett-Packard desktops in favor of MacBooks, iPads, iPhones and Android phones. Some 10,000 smartphones fall under a sweeping BYOD policy. EA is even replacing cubicles and offices with open work spaces.
"This is a big push, and it's all in relation to the Millennials," Tonneson says. "As we look to bring on young talent, we're competing with Facebook, Zynga, Google, Apple."
EA's staff retention rate has never been better, Tonneson says, and consumer tech has played a crucial role in recruiting and keeping Millennials. It's certainly not the allure of stock options, since EA's stock has been sliding over the past year.
"They're staying because it's a great place," Tonneson says. "A lot of it is how we deliver solutions and services to them... and not encumbering them with old-line technologies."
Email and the Generation Gap
The effort to keep Millennials happy, though, has a dark side.
At last year's Consumerization of IT Expo, or CITE, in San Francisco, tech leaders spoke of the growing animosity between older workers and the Millennials. (For more CITE coverage, see BYOD: Making Sense of the Work-Personal Device Blur.)
When one company told its employees that they had to use a new enterprise social network to communicate with each other rather than email, older workers saw this as a sign that the company was prioritizing Millennials. Older workers felt their jobs were threatened.
The biggest difference among the generations is how people communicate, says Adam Noble, CIO at GAF Materials. Baby Boomers rely on the telephone, Gen X is all about email, and Millennials prefer social networking, instant messaging and even video chat. Tensions rise when, say, an old-line worker gets a video call across his PC from a Millennial worker.
"I often joke that if I email my teenage daughters, I'll never get a response," Noble says. "But if I put something on their Facebook page, I may get a response in seconds."
The challenge is to incorporate different styles of communication. Both GAF Materials and EA are working to integrate email and social communication to make the transition easier. Eventually, old-line employees will have to get on board with newer forms of communication.
"You can absolutely devolve into an argument of you-are-young-and-you-don't-get-it versus you-are-old-and-you-don't-get-it," says the Silicon Valley mobile manager. "But people who are the most creative and open-minded are going to adopt the coolest technology, regardless of how old they are."
Millennials Take Work Personally
If you don't embrace consumer tech, will Millennials bolt to a competitor?
Probably not right away, but down the road is another matter. The reason, say CIOs, stems from a common Millennial trait: Their identity is wrapped up in the job more so than older generations.
"Millennials tie a lot of their self-worth to the job," the mobile manager says.
Such a tight bond can lead to job-hopping. If they don't have the tools they think they need to perform at a high level, they may take it personally and become discouraged. As job performance suffers, they will look elsewhere.
Don't expect an older generation's sense of company loyalty to keep Millennials from jumping ship. Millennials have watched their parents get laid off, have their salaries cut, and their 401k's plummet. "Millennials have very little loyalty for sticking around a company," the mobile manager says.
Throwing cash at Millennials won't help, either. Last year, Cisco surveyed more than 2,800 Millennials and found that 40 percent of college students and 45 percent of young professionals would accept a lower-paying job if it had more flexibility on device choice, social media access and mobility.
The most effective way to foster loyalty among Millennials is by supporting trendy consumer tech in the enterprise, from iPhones to social communication to BYOD. They believe strongly that these tools play to their skills and give them the best opportunity for success, both personally and professionally.
Put more simply, MBTA's Robin says, "Technology tools today can facilitate the different ways people work, so why should technology get in the way?"
Tom Kaneshige covers Apple and Consumerization of IT for CIO.com. Follow Tom on Twitter @kaneshige. Follow everything from CIO.com on Twitter @CIOonline and on Facebook. Email Tom at tkaneshige@cio.com

Read more »

Jenkins integration server suffers security vulnerabilities


Sep 17, 2012 04:48 pm | InfoWorld
Four vulnerabilities, including two affecting the Jenkins core and one deemed critical, have been identified

by Paul Krill

Jenkins, the open source continuous integration server that forked out of Oracle's Hudson project, is facing several security vulnerabilities Monday, with the Jenkins project leader recommending upgrades to the Jenkins core and some plug-ins to fix the problems.
A security advisory posted by project leader Kohsuke Kawaguchi cites four vulnerabilities, including two affecting the Jenkins core. The first vulnerability has been deemed critical. "The first vulnerability in Jenkins core allows unprivileged users to insert data into Jenkins master, which can lead to remote code execution. For this vulnerability to be exploited, the attacker must have an HTTP access to a Jenkins master, and he must have a read access to Jenkins," the security advisory said.
[ Prevent corporate data leaks with Roger Grimes' "Data Loss Prevention Deep Dive" PDF expert guide, only from InfoWorld. ]
The second vulnerability in the core involves a cross-site scripting vulnerability, allowing an attacker to craft a URL that points to Jenkins, with an attacker able to hijack a legitimate user's session. Two other vulnerabilities, also involving cross-site scripting, affect the Violations and Continuous Integration Game plugins. The Violations plug-in scans for violation XML files in the build workspace; the Game plug-in offers tips on improving builds.
To fix the core vulnerabilities, main line users should upgrade to Jenkins 1.482, and LTS (Long-Term Support) users should upgrade to version 1.466.2. To fix the Violations plug-in, users are to upgrade to version 0.7.11 or later, while the CI game plug-in can be remedied by upgrading to 1.19 or later.
Kawaguchi said the fixes plug all known holes. "However, the nature of this game is such that someone will find a new vulnerability --- it's just a matter of when. So we encourage users, especially those who run Jenkins in a higher-risk environment (on the public Internet, in a security sensitive environment, etc.), to monitor security advisories by subscribing to the mailing list or an RSS feed."
He assuaged fears about the vulnerabilities, noting limitations. "Those who are running Jenkins inside a corporate firewall, which I think are the majority, [have] a mitigating factor, because one of the vulnerabilities requires an attacker to have an HTTP access to the Jenkins master and the other vulnerability requires the attacker to know the URL of your Jenkins. So it pretty much requires an attacker to be an insider." But he added, "Nonetheless, we recommend everyone to update to a version that contains the fix in a timely fashion."
Hudson forked out of Project Hudson in the wake of Oracle's 2010 acquisition of Sun Microsystems. Oracle has since handed Hudson over to the Eclipse Foundation.
This article, "Jenkins integration server suffers security vulnerabilities," was originally published atInfoWorld.com. Follow the latest developments in business technology news and get a digest of the key stories each day in the InfoWorld Daily newsletter. For the latest developments in business technology news, follow InfoWorld.com on Twitter.
Read more about security in InfoWorld's Security Channel

Read more »

How to Manage Data Center Complexity


Sep 17, 2012 04:45 pm | CIO
by Thor Olavsrud

Complexity in the data center has a number of unwelcome effects on the enterprise, from increased costs to reduced agility and even downtime. For the past five years, organizations have been virtualizing their data centers in an effort to reduce complexity and increase efficiency. But while virtualization offers significant benefits, many such projects have shifted rather than eliminated complexity in the data center. To truly mitigate data center complexity, organizations need training, standardization and information governance.
"So many people think that virtualization is the penicillin of the data center, but in reality, what we've seen is that while people are investing heavily in virtualization, they didn't necessarily have the foresight to see the ramifications of virtualizing so quickly," says Danny Milrad, director of product marketing at Symantec, which just released the results of its 2012 State of the Data Center Survey. "One of the benefits of virtualization is spinning up an application so quickly, but they don't think about how big the footprint of that application can become."
Business-Critical Apps Drive Data Center Complexity
The increasing number of business-critical apps is the primary driver of complexity in the data center: 65 percent of respondents in Symantec's study listed it as a driver of the complexity of their data centers. Symantec contacted 2,453 IT professionals from 32 countries. They included senior IT staff focused on operations and tactical functions, as well as staff members focused on planning and IT management.
"Show me an app that isn't a business critical application outside of file and print these days," Milrad says. "Now you've got to replicate it, and your storage footprint goes up. With all these new applications coming online, they're being virtualized, and you've got a ton more data than you ever expected."
When that happens, organizations hit a wall. "As they virtualize more and more, the cost of storage and the cost of virtualization licenses and everything that falls out of that grows faster than expected," he says. "Storage is cheap, but it's still very expensive when you have to buy 10 times more than you expected."
Other key drivers of data center complexity include the growth of strategic IT trends such as mobile computing (cited by 44 percent of respondents), server virtualization (43 percent) and public cloud (41 percent). The most commonly cited result of data center complexity is increased costs (47 percent). But other effects include reduced agility (39 percent), longer lead times for storage migration (39 percent) and provisioning storage (38 percent), security breaches (35 percent) and downtime (35 percent).
Complexity a Key Contributor to Data Center Outages
The survey found that the typical organization experienced an average of 16 data center outages in the past 12 months, at a total cost of $5.1 million. On average, one of those outages was caused by a natural disaster (costing $1.5 million), four were caused by human error (costing $1.7 million) and 11 were caused by system failure resulting from complexity (costing $1.9 million).
That's not to say virtualization is a bad thing, Milrad is careful to note, but it does mean IT needs to pay attention and prepare for the potential side effects.
"It's much like what happened with the introduction of SharePoint," Milrad says. "SharePoint created a power and cooling nightmare. It wasn't expensive for marketing or sales to spin them up, but power, cooling and storage costs went up as a result. It's the same thing with virtualization. IT needs to get [its] arms around it and manage it as part of the infrastructure. It's just a matter of slowing down and looking at what you're doing."
The survey found that 90 percent of organizations are implementing or actively discussing information governance in an effort to get their data center complexity under control. They cite enhanced security, ease of finding the right information in a timely manner, reduced costs of information management and storage, reduced legal and compliance risks and moving to the cloud among the benefits they seek to achieve.
Best Practices for Mitigating Data Center Complexity
Trevor Daughney, also a director of product marketing at Symantec, recommends adopting the following best practices to help reduce data center complexity:
Get visibility beyond platforms. Understand the business services that IT is providing, and all of their dependencies, to reduce downtime and miscommunication.
Understand what IT assets you have, how they are being consumed, and by whom. This will help cut costs and risk. The organization won't buy servers and storage it doesn't need, teams can be held accountable for what they use and the company can be sure it isn't running out of capacity.
Reduce the number of backup applications to meet recovery SLAs and reduce capital expenses, operating expenses and training costs. The typical organization has seven backup applications, generally point products for particular databases.
Deploy deduplication everywhere to help address the information explosion and reduce the rising costs associated with backing up data. It's not to simply deduplicate the backup. Consider placing an archive that has deduplication capabilities next to applications such as Exchange or SharePoint that tend to be the biggest data offenders.
Use appliances to simplify backup and recovery operations.
Establish C-level ownership of information governance. Building an information-responsible culture and creating an umbrella of information governance can help organizations capture synergies across focused projects.

Read more »

Two Romanians plead guilty to point-of-sale hacking

Sep 17, 2012 04:42 pm | IDG News Service
The two men were part of a conspiracy causing $10 million in losses from customers of Subway restaurants

by Grant Gross

Two Romanian men have pleaded guilty to participating in a US$10 million scheme to hack into the computers of hundreds of Subway restaurants in the U.S. and steal payment card data, the U.S. Department of Justice said.
Iulian Dolan, 28, of Craiova, Romania, pleaded guilty Monday to one count of conspiracy to commit computer fraud and two counts of conspiracy to commit access device fraud, and Cezar Butu, 27, of Ploiesti, Romania, pleaded guilty to one count of conspiracy to commit access device fraud, the DOJ said.
Dolan and Butu were two of four Romanians charged in December in U.S. District Court for the District of New Hampshire with hacking Subway point-of-sale computers.
In his plea agreement, Dolan has agreed to be sentenced to seven years, and Butu has agreed to be sentenced to 21 months in prison. 
The two men, in their guilty pleas, acknowledged participating in a Romanian-based conspiracy, lasting from 2009 to 2011, to hack into hundreds of U.S. point-of-sale (POS) computers, the DOJ said. Co-conspirator Adrian-Tiberiu Oprea is in U.S. custody and awaiting trial in New Hampshire. The group used stolen payment card data to make unauthorized charges or to transfer funds from the cardholders' accounts, the DOJ said.
The scheme involved more than 146,000 compromised payment cards and more than $10 million in losses, the DOJ said.
During the conspiracy, Dolan remotely scanned the Internet to identify vulnerable POS systems in the U.S. with certain remote desktop software applications (RDAs) installed on them, the DOJ said. Using these RDAs, Dolan logged onto the targeted POS systems over the Internet.  The systems were often password-protected and Dolan attempted to crack the passwords to gain administrative access. 
He then installed keystroke logging software onto the POS systems and recorded all of the data that was keyed into or swiped through the POS systems, including customers' payment card data, the DOJ said.
Dolan electronically transferred the payment card data to various electronic storage locations, called dump sites, that Oprea had set up, the DOJ said. Oprea later attempted to use the stolen payment card data to make unauthorized charges on, or transfers of funds from, the accounts, the DOJ alleged, and he attempted to sell the stolen payment card data to other co-conspirators. 
Dolan stole payment card data belonging to approximately 6,000 cardholders, the DOJ said. Dolan received $5,000 to $7,500 in cash and personal property from Oprea for his efforts, the DOJ alleged.
In his plea agreement, Butu said he repeatedly asked Oprea to provide him with stolen payment card data and that Oprea provided him with instructions for how to access the website where Oprea had stored a portion of the stolen payment card data, the DOJ alleged.
Butu later attempted to use the stolen payment card data to make unauthorized charges on, or transfers of funds from, the accounts. He also attempted to sell, or otherwise transfer, the stolen payment card data to other co-conspirators. Butu acquired stolen payment card data from Oprea belonging to approximately 140 cardholders, the DOJ alleged.

Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's e-mail address is grant_gross@idg.com.

Read more »

Smartphones and tablets may be making you sleepless, fat and sick


Sep 17, 2012 04:26 pm | Computerworld
Using back-lit devices and laptops decreases melatonin, researchers find 

by Sharon Gaudin

Having trouble sleeping? Gaining a bit of weight?
Your smartphone or computer might be to blame.
Actually, the problem is more likely about your obsession with your laptop and devices than the devices themselves.
A new study from researchers at the Rensselaer Polytechnic Institute in Troy, N.Y. shows that even a two-hour exposure to any backlit device - smartphone, laptop, tablet - suppresses your body's ability to produce melatonin, which could cause sleeplessness, especially in teens and seniors.
Melatonin is a hormone that helps regulates the body's sleep clock.
The study also showed that exposure to back lighting over the course of "many consecutive" years could also lead to an increased risk for obesity and diabetes, as well as breast cancer.
"Technology developments have led to bigger and brighter televisions, computer screens, and cell phones," said university researcher Brittany Wood, who worked on the study. "This is particularly worrisome in populations such as young adults and adolescents, who already tend to be night owls."
Zeus Kerravala, an analyst with ZK Research, said he's not surprised that devices are affecting health because so many people are obsessive about them, constantly keeping them close by - even when they're sleeping.
"I can see that the obsession with Facebook, Twitter, text messages, e-mail and the other dozen or so ways to communicate is hurting our health," said Kerravala. "People used to disconnect from the outside world when they went to bed. They don't anymore. Almost everyone I know sleeps with their device no more than a few feet from their head so they don't miss out when something happens."
And when text messages or emails come in, devices buzz and light up with alerts. That means even during sleep, we're being bombarded with that electronic light.
To sleep better and head off other health issues, people should avoid using their devices at night -- especially, before bedtime. And they should not keep them beside the bed at the night.
"People need to want to disconnect," said Kerravala. "Plug the phone in another room to charge. Use an alarm clock as an alarm clock instead of your phone, and realize whatever is happening in the social media world can wait until tomorrow."
However, Kerravala noted that this will be a difficult change for a lot of people to make.
"I think we're really hooked," he noted. "The smart phone is like an addictive drug. The more you use it, the more you want it. It's almost like we need SPA (Smart Phone Anonymous) where we need counselors to help us."
University researchers said they're hopeful device manufacturers will be able to use this information to change the lighting in their devices so users won't be so affected by it.
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin, on Google+ or subscribe to Sharon's RSS feed. Her email address is sgaudin@computerworld.com.
Read more about smartphones in Computerworld's Smartphones Topic Center.

Read more »