logo

Your source for the latest technology information of interest to community banks across America.

Subscribe to our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

May 28, 2018

 


Hardware News

 

The Future of Storage Is Here

Gartner has introduced a term called “Shared Accelerated Storage” (SAS) to describe what’s next for the industry after all-flash arrays. This brings the benefits of network-based systems and direct-attached systems together by leveraging a number of new technologies, most notably Nonvolatile Memory Express— or NVMe. Plus NVMe over Fabric (NVMe-oF) gets rid of the penalty for moving storage outside the server.

networkworld.jpg

 

SSDs Get Bigger, While Prices Get Smaller

An oversupply of memory chips, plus aggressive pricing by SSD suppliers are causing SSD prices to drop, while the capacity of drives continues to increase. All of this comes as a new type of SSD hits the market, the quad-level cell (QLC) NAND flash memory jointly developed by Intel and Micron.

networkworld.jpg

~~~

Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)

Back to Top


Software Updates

 

Microsoft Locks down Windows 10 with the S Edition

Windows 10 S mode is Microsoft’s new secure platform. Its goal is to provide the familiar Windows 10 interface with a much more restricted software deployment process. Consider Windows 10 S similar to the Apple iPhone and iPad ecosystem: All applications must be deployed through a vetted deployment process. Windows 10 S can also be used to deploy systems in kiosk mode and in limited-use needs.

cso.jpg

~~~

Back to Top


ATMs/Kiosks

 

How Clean Power Can Charge up the Profitability of Your ATMs

Low-quality power can cause many different types of damage to an ATM, and it's a problem that is not always easy for a technician to identify in the field based on the symptoms the machine is exhibiting. The author contends that there are several really good power conditioners out there, and it is always a good idea to add one at the time you install your new or refurbished ATM. Plus studies by Powervar and other companies show that proper power conditioning can reduce service calls by as much as 35 percent.

atmmarketplace.jpg

 

Utilizing Deception Technology to Protect ATM Networks

Distributed deception technology does not provide a viable solution for defending ATM machines against attacks executed physically on the machines themselves. But it is arguably the most effective means of stopping the most damaging attacks - the ones executed against the larger ATM network or those enabled by compromise of network-resident systems that support ATMs.

govinfo.jpg

~~~

ATMs/Kiosks Sponsored by
Heritage Industries

 


Back to Top


Wireless World

 

Starbucks’s Mobile Payments System Is so Popular in the U.S., It Has More Users than Apple’s or Google’s

By the end of this year, a quarter of U.S. smartphone users — 55 million people — over the age of 14 will make an in-store mobile payment. More than 40 percent of those people will have done so through Starbucks’s mobile payments app, according to new data from research firm eMarketer. Apple Pay is accepted at more than half of U.S. merchants, according to eMarketer. Google Pay is less popular despite being preinstalled on Android phones. Samsung is the most widely accepted — about 80 percent of merchants have it, eMarketer estimates — but it’s the least popular.

recode.jpg

~~~

Back to Top


Security Section

 

24 Best No Cost Security Tools

This article covers two dozen tools include everything from password crackers to vulnerability management systems to networks analyzers.

cso.jpg

 

Facebook Sites Dominate Social Network Phishing

Social network phishing is a form of cybercrime that involves the theft of personal data from a victim’s social network account. The fraudster creates a copy of a social networking website (such as a fake Facebook page), and tries to lure unsuspecting victims to it, forcing them to give up their personal data – such as their name, password, credit card number, PIN code and more – in the process. At the beginning of the year, Facebook was the most popular social networking brand for fraudsters to abuse, and Facebook pages were frequently faked by cybercriminals.

darkreading.jpg

 

Deception Technologies That Camouflage the Network

What's the difference between a deception vendor and a honey pot? This article/interview covers this and looks at the benefits and misconceptions of deception technologies.

cso.jpg

~~~

Back to Top


Technology and Marketing

 

The Modern Marketing Model for the Financial Industry

Today’s financial marketer needs to embrace the dynamics of modern marketing. According to eConsultancy, this includes competencies and capabilities around domains of expertise like data and analytics, consumer experience, content, multichannel delivery and personalization.

financialbrand.jpg

~~~

Back to Top


Online Banking/E-Commerce/Website Design

 

EMVCo Creates QR Payment Mark

EMVCo, the global technical body that manages the EMV Specifications, has created a QR Payment Mark to promote global interoperability across EMV QR Code payments. EMVCo has developed reproduction requirements and a free licensing structure to enable all implementers of EMV QR Code solutions to use the mark. QR Codes are two-dimensional machine-readable barcodes, increasingly used to facilitate mobile payments at the point-of-sale.

finextra.jpg

~~~

Back to Top


Internet Access

 

Cato Networks Adds Threat Hunting to Its SD-WAN Services

The new threat hunting capabilities introduced by Cato are the latest security in its secure SD-WAN service. The Cato Cloud global SD-WAN service already provides security functions, such as next-generation firewall (NGFW), secure web gateways (SWG), and intrusion prevention systems (IPS). Now, with the Cato Threat Hunting System (CTHS), the company gives us algorithms and procedures developed by Cato Research Labs to alert on threats, which it claims is more accurate than other approaches.

cso.jpg

 

DNS in the Cloud: Why and Why Not

The upside can be better performance and resiliency with a down side of dire business impact if the DNS service provider suffers a catastrophic outage.

networkworld.jpg

 

Microsoft Trumps Google, Dropbox in Business Cloud Storage

A Spiceworks survey found that 97% of businesses believe security is the most important factor in choosing a cloud service, and 25% of companies did not believe there was anything they could do to truly secure their cloud data. In this year's survey, 51% of organizations reported using OneDrive, up from 31% in 2016. Dropbox is now tied with Google Drive at 34% each, up only one percentage point compared to 2016, when it led the field. Another 10% of organizations said they would either be switching over to or starting to use OneDrive within the next two years.

techrepublic.jpg

~~~

Back to Top


Call Centers

 

Beating Crooks at Call Center Fraud

Research shows FI contact centers lose an average of 57 cents to fraud for each incoming call—and that one in every 2,900 calls is fraudulent. That’s a big number from a fraud specialist’s point of view but for most contact center agents, that represents maybe one fraud call per month.

bai.jpg

 

Tighten up Your AHT Projections

Average handling time, like the volume of contacts, must be incorporated into planning by the half hour. Assuming the same average handling time all day for forecasting purposes will not reflect the environment accurately. Some relatively simple analysis can go a long way toward tightening up your projections. This article points out a few important prerequisites for getting this part of your forecast right.

icmi.jpg

~~~

Back to Top

 
Privacy Policy DBA: TRW ENTERPRISES, LLC