According to DRAMeXchange, three dimensional NAND (3D NAND) will take over the solid state drive (SSD) industry this year, as manufacturers reduce their shipments of flash storage based on traditional 2D or planar NAND. 3D NAND is denser, faster and less expensive to produce than traditional 2D NAND. More than half of all notebooks shipped worldwide during the fourth quarter of 2017 will carry SSDs, while in the enterprise-grade SSD market, demand continues to rise due to strong growth in the data center and server markets.
The Latitude 7285 2-in-1 is a hybrid laptop, and claims to be the world's first wireless charging laptop. One of the options for the device is a wireless-charging keyboard base, which can be used to recharge the laptop using Dell's new desktop wireless charging pad (which is Airfuel Alliance certified). Dell is using WiTricity's wireless charging technology and the companies state that their partnership "accelerates establishment of a broader magnetic resonance-powered wireless charging ecosystem for a wide range of devices."
Intel's Software Guard Extensions (SGX) is a new security technology built into all 7th Gen Intel Core processors, making it possible to protect your passwords with hardware-enhanced security. Dashlane's password management software encrypts your stored data with AES-256 level encryption and they never store your Master Password on their servers. When Dashlane`s security architecture is combined with Intel SGX, an additional encryption key will be tied to the device and sealed to the secured chip. Once data is secured there, the companies say that it will be out of reach to advanced malware and threats, even if your computer has already been compromised.
Leveris says that they have built a modular, end-to-end banking platform from scratch that is based on SaaS technology and implemented using open standard formats, APIs and protocols. The Dublin and Prague based company claims to be able to deliver a full suite of modular, fully integrated services and applications for both personal and business customers. They also offer a lending platform that includes mortgages and personal loans, SME and auto finance lending.
Microsoft's System Center Configuration Manager (SCCM), Symantec's Endpoint Management, and Dell KACE are a few packages that can deploy software to endpoints. PowerShell (including Windows PowerShell and PowerShell Core) is a task automation and configuration management framework from Microsoft that can complement these tools to fill in the gaps, or even serve as a simple and no-cost replacement for them. PowerShell proponents contend that by using PowerShell, an administrator can do just about anything that is necessary to deploy software. Initially a Windows component only, PowerShell was made open-source and cross-platform in 2016.
ATM deployers can take heart in the Fed's recent report entitled "Diary of Consumer Payment Choice" because more than two-thirds (69 percent) of U.S. consumers still carry cash. Cash remains the top payment instrument for Americans with annual household incomes of $50,000 or less, and is the second most used form of payment for households with an annual income between $50,000 and $100,000. Somewhat surprisingly cash retains a solid rate of use (between 23 percent and 25 percent) in households with an annual income of more than $100,000.
AF International announced new additions to their Card Clene range of card reader maintenance products. The manufacturer of specialty cleaning products has launched two new kits that they say have been developed to improve sustainability as well as clean surfaces and difficult-to-reach areas:
The Open Web Application Security Project (OWASP) Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications. Their ‘Top 10 Mobile Vulnerabilities` include:
- lack of binary protections (19%)
- insecure data storage (17%)
- insufficient transport layer protection (16%)
- unintended data leakage (13%)
- weak server side controls (6%)
- poor authorization and authentication (6%)
- client side injection (4%)
- broken cryptography (3%)
- improper session handling (2%)
- security decision via untrusted inputs (1%)
STMicroelectronics (ST) Giesecke & Devrient (G&D), and FitPay have used ST`s security chip to jointly create the first secure hardware and software solution that is pre-approved for use by device manufacturers with the aim to develop integrated tokenized payments from MasterCard or Visa. The companies say that this effort reduces the barriers to implementing card payments on mobile devices and enables wearable device makers to concentrate on product development. The joint solution gives users the flexibility to load multiple payment cards from various FIs and from different payment networks onto the wearable, making contactless payments easy, and independent of the end-device`s operating system.
Malwarebytes has updated their software to version 3.0. The company says that they have combined their Anti-Malware, Anti-Exploit, Anti-Ransomware, Website Protection, and Remediation technologies into a single product. While they say that they have built Malwarebytes 3.0 to be compatible with all major antivirus software, even Windows Defender and Microsoft Security Essentials, the company labels their solution as a traditional antivirus replacement.
HEAT Software announced significant updates to three of its core IT software solutions: HEAT Endpoint Management and Security Suite (EMSS), HEAT Service Management (SM), and HEAT Desktop and Server Management (DSM). Improvements delivered in the new EMSS 8.5 release include better integration into existing infrastructure and third-party systems via REST APIs. New capabilities delivered with HEAT Service Management 2016.2 include new capabilities such as improved filtering and administration of tasks and application objects, and added capabilities for administrators to customize content and layout. Finally, key enhancements to HEAT DSM 2016.2 include simplified client management to associate users with their various endpoint devices and increased security with enhancements for software patching performance and packaging.
Battling Security Fatigue – Working Towards Usable Security
Network Box - https://www.networkboxusa.com
Read Pierluigi Stella's comments:
Many marketing experts contend that nostalgia can be an influential force and can be used to build engagement. They point to a study from the Journal of Consumer Research that found that when someone feels nostalgic they are more likely to spend money or donate to a cause. Some organizations post nostalgic images or quizzes on Social Media looking for interactions and shares. Blog posts are another way community banks can connect with customers through nostalgia - some websites devote entire sections to nostalgic themes that they think will resonant with their readers. Every year when the bank celebrates its anniversary is also a great time to get nostalgic and use it as an opportunity to promote special offers.
The top 10 credit card issuers control a vast majority of the market - by some estimates that number can tally up to 90% of the 420 million cards issued. This may seem like depressing news for banks, but some analysts contend that smaller issuers can still run profitable portfolios. Ongoing and compelling offers, great rates, well run rewards programs, and customer loyalty can all combine to help drive card user numbers.
Sindeo is an online mortgage provider that offers consumers access to a marketplace of over 1,000 loan programs from around fifty lenders. They claim that their QuickStart solution, a CFPB compliant mortgage pre-qualification tool, helps borrowers find a home loan, complete the application and underwriting process, and generate a pre-qualification letter, all in less than 10 minutes.
AT&T enabled 34% of its network in 2016 with software, which has reduced costs and increased efficiency in its network. To help create network diversity and redundancy, the service provider does not have to deploy multiple hardware elements. The company has set a large goal to virtualize 75% of its network with software by the year 2020 and thinks that this software-centric approach will allow them to provision services and functions much like an app store.
Upon completing their completion of their Level 3 acquisition, CenturyLink will become the second largest business service provider after AT&T in the United States. CenturyLink looks to save costs and increase service levels by cutting off-net circuit costs it pays to other ILECs and CLECs where it currently does not have fiber build out today. Level 3 has 64,000 route metro fiber miles and over 42,000 on-net buildings connected to its fiber network.
Cogito claims to have developed the world`s only application that guides agent speaking behavior and automatically measures caller experience on every call. The software performs in-call voice analysis and delivers real-time guidance to agents to help them be more professional and compassionate in the face of angry and emotional callers. The software appears as a messaging window and texts service reps cues such as whether they are speaking too quickly or interrupting callers. It is a cloud-based chatbot that analyzes the tone, pitch and speed of speech. Real-time dashboards enable supervisors to monitor and proactively intervene in live calls, plus they can be automatically alerted to calls in which a caller is having a poor experience.