IBM Beefs Up
IBM is unveiling a new version of its Connections enterprise social networking (ESN) software, which businesses use to give their employees social media capabilities adapted for workplace collaboration, such as employee profiles and blogging.
Enhancements in IBM Connections 4.0 include a more interactive activity stream, broader support for mobile devices, more granular usage analytics and integration with email and calendar systems, according to Heidi Ambler, director of product management for IBM Social Software. It is available immediately.
“This new release helps customers grasp the power of social analytics, gives them anytime-anywhere access to the software and provides cutting-edge capabilities,” she said.
Instead of a list-like news feed, the new software has an activity stream in employee profiles that users can filter for relevance, as well as act on the notifications right from the Connections interface.
For example, users can trigger pop-up boxes from the activity stream notifications and see the latest comments made about a file, see who posted the latest version of it and add tags to it.
An integration with IBM’s own Lotus Notes-Domino and with Microsoft’s Outlook-Exchange email and calendar systems lets users manage email messages through Connections.
Is Nokia Sitting On A Gold Mine?
August 31, 2012 by admin
Filed under Smartphones
Comments Off on Is Nokia Sitting On A Gold Mine?
Mobile phone company Nokia might be suffering, but the big technology companies are hoping that it does not wake up to the fact it is sitting on a troll’s gold mine.
Recently Nokia flexed its muscles and orderied Apple to pay Nokia a royalty fee for each iPhone sold. Logically it could clean up if it hit Google with something similar over its Android operating system. According to IP expert Florian Mueller, Nokia holds the most patents relating to the cutting-edge 4G/LTE technology.
This puts it in a position similar to what Microsoft had with its 2G/3G technology which allowed them to collect half of all the profits of each Android device sold. This gave Microsoft more than $3.2 billion per year so this indicates that Nokia will make triple this amount in the future. Nokia has sued HTC, RIM and View-sonic and their defence against Nokia is weak.
To make matters worse Nokia signed a 2010 cross-licensing agreement with Motorola which precludes Google from transferring the numerous patents it recently acquired from Motorola Mobility. This means that any protection that Google might have gained from owning Motorola Mobility are not counted. But this is only the tip of any iceburg and indicates how the entire mobile phone industry can be stuffed up by patents.
Recently a Google executive claimed that a standard smartphone contains more than 250,000 separate patented technologies. All of these have to be paid before a product can be released. What is worrying is that Nokia own a vast majority of this patented technology.
Adobe Patches Security Holes in Flash
Comments Off on Adobe Patches Security Holes in Flash
Adobe has released a security update for Flash Player in order to address several critical vulnerabilities, including one that is being exploited in the wild.
The Flash Player 10.3.183.10 for Windows, Mac and Linux, and Flash Player 10.3.186.7 for Android, contain patches for six security flaws.
One of them is a cross-site scripting (XSS) weakness that can be exploited to execute rogue actions on behalf of web sites or webmail providers if victims click on maliciously-crafted links.
“There are reports that this issue is being exploited in the wild in active targeted attacks designed to trick the user into clicking on a malicious link delivered in an email message,” Adobe warns in its security advisory.
XSS vulnerabilities are the result of improper user input validation and allow attackers to execute rogue code in the context of the current web site. For example, they can be leveraged to extract session cookies or load rogue forms into legitimate pages, which makes for very credible phishing attacks.
Adobe credits Google for reporting this cross-site scripting vulnerability, which is identified as CVE-2011-2444. This means it might have been detected in attacks against Gmail users.
Two other patched vulnerabilities allow for arbitrary code execution and are located in the AVM stack. One of them can also lead to a denial of service condition. Two remote code execution logic errors and a Flash Player security control bypass have also been addressed.
Users should deploy the new update as soon as possible because browser plug-ins like Java, Adobe Reader or Flash Player are amongst the most attacked pieces of software one can have on a computer. However, unlike Adobe Reader X (10.0) which features sandboxing technology, Flash Player doesn’t have any anti-exploitation mechanism built-in.
Flash Player 11 Launched With 3D Gaming
Comments Off on Flash Player 11 Launched With 3D Gaming
Adobe Systems announced Flash Player 11 and Adobe Air 3 software Wednesday to assist developers in building more sophisticated applications with dozens of new features across smartphones and tablets as well as desktop computers.
The releases are Adobe’s biggest in two years, and will be available free of charge in early October, said Anup Murarka, Adobe’s director of product marketing. The related tools, Flash Builder and Flex, will support new features in Flash Player 11 and Adobe Air 3 by the end of the year.
The releases will enable delivery of 2D and 3D games over the Internet to various devices, Murarka said. Developers of enterprise applications will also find the 3D capabilities popular for data-centric apps. Enterprises, for example, will be able to build application dashboards to “visualize complex data sets” with 3D images, he said.
Developers will also be able to use the tools to more deeply integrate business software like Excel and Outlook in devices and to access hardware programming interfaces for functions such as Near-Field Communication being used more widely in smartphones, Murarka said.
The new versions will also help developers build more secure applications with the ability to leverage cryptographically secure random number generation, he said.