logo

Your source for the latest technology information of interest to community banks across America.

Subscribe to our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

October 18, 2021


Hardware News

 

Lenovo and VMware Partner for Resilient Edge Servers

VMware and Lenovo have collaborated on edge computing systems, with the goal of making them more robust and resilient. As part of the deal, Lenovo's Infrastructure Solutions Group will pre-load VMware's edge software on its ThinkSystem SE350 Edge servers, a pair of ruggedized servers designed specifically for edge deployments. This includes vSphere, vSan, and Tanzu.

networkworld.jpg

 

Marvell Announces Some Very Smart SmartNIC Processors

Marvell has begun to sample the Octeon 10, a server microprocessor aimed at intelligent network management that has up to 24 ARM-compatible cores, making it as powerful as any server processor. Marvell refers to the Octeon processor line as data processing units (DPUs). They are designed to run high-throughput data in the cloud and on-premises. The DPU is more commonly called the SmartNIC because it can offload non-computational tasks from the CPU like network packet processing, data encryption and compression. That frees up CPU cores to run general-purpose applications.

networkworld.jpg

~~~

Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)

Back to Top


Software Updates

 

IDrive Remote Desktop Offers Protection from RDP Cyberattacks and Vulnerabilities

Remote Desktop, a remote access solution from IDrive that enables users to remotely access their RDP-based Windows computers and servers from any PC, Android or iOS device, is aiming to solve vulnerability issues with RDP by implementing robust access and security controls. Remote Desktop is able to assist organizations in protecting RDP via: Closed RDP Ports; Secure Access with Trusted Devices; End-to-end Encrypted RDP Sessions; and Two-step verification.

darkreading.jpg

 

Stop Using AI and ML Interchangeably

The author contends that the definitions of artificial intelligence (AI) and machine learning (ML) have evolved, so it’s important for everyone to understand the distinctions. He states that AI is a broad field that aims to bring human intelligence to machines, while ML is a subset of AI that focuses on learning from data without explicit programming. Use of ML does qualify as use of AI, but use of AI does not imply use of ML.

informationweek.jpg

~~~

Back to Top


ATMs/Kiosks

 

ITM Insights: New Data on New Formats

Launched in the 2010s, interactive teller machines (ITMs) or video remote tellers are self-service and self-directed banking tools for consumers. With digital sophistication that’s augmented by skilled staff available in real-time, ITMs are so much more than advanced ATMs. New consumer research is shedding light on consumer perception of ITMs, and this article explores this topic.

adrenaline.jpg

~~~

Back to Top


Wireless World

 

Microsoft Says Transport Latency Can Nullify Benefits of 5G

Microsoft says it has a massive amount of spare transport capacity to serve 5G traffic. They point out that that while 5G offers big boosts in speed, those speeds get watered down because “every network operator ultimately depends on the Internet at some point.” Microsoft particularly touts its traffic orchestrator for routing network packets across the Azure WAN. The software giant claims that they have developed a fast-forwarding mechanism to build a 5G overlay on their existing WAN, thereby supporting a variety of 5G network slices with different wired transport properties.

fiercewireless.jpg

~~~

Back to Top


Security Section

 

5 Steps Toward Real Zero Trust Security

This article presents five steps that will help ensure your zero trust journey stays on track and delivers value to your organization: 1) Know what zero trust really means; 2) Identify what you want to protect; 3) Design the network from the inside out; 4) Log all traffic; and 5) Commit to the long run, but take those first steps.

cso.jpg

 

List of IT Assets an Attacker Is Most Likely to Target for Exploitation

Randori released a report that identifies the most tempting IT assets that an attacker is likely to target and exploit. The list includes Solarwinds, IIS6, Cisco’s Adaptive Security Appliance (ASA), Microsoft Outlook Web Access (OWA), and RDP.

helpnetsecurity.jpg

 

AT&T Launches Managed XDR Suite to Provide Endpoint-to-Cloud Security

AT&T has launched a cloud-based, managed XDR (extended detection and response) offering designed to provide automated and orchestrated malware prevention, threat detection and continuous security monitoring of endpoint, network and cloud assets to help organizations detect and recover from security threats at scale. In addition, the platform offers the ability to integrate with third-party products via AT&T AlienApps, and provides a variety of third-party connectors.

cso.jpg

~~~

Back to Top


Technology and Marketing

 

3 Compliance Marketing Questions, Answered

This article looks at three common marketing compliance questions: 1) Do Radio and Print Ads Fall Under the Same Rules?; 2) What Stock Photos Should I Use?; and 3) Does this Postcard Follow the Rules?

auxteam.jpg

~~~

Back to Top


Online Banking/E-Commerce/Website Design

 

Buy-Now, Pay-Later Seen as Growing Competitor to Debit Cards

Increasingly popular buy-now, pay-later services are seen by many credit card issuers as stealing market share from debit cards and cash payments, according to some industry analysts. Buy-now, pay-later programs have become especially popular among Gen Z and millennial shoppers who may be skeptical of credit cards, and prefer fast, cheap payments with no interest fees and minimal credit checks. Retailers pay providers a fee for each transaction. Some 75% of the transactions are funded out of debit accounts, by some estimates.

bloomberg.jpg

 

Winning Top-of-Wallet with a Digital-First Strategy

Digitally issued cards shorten the time frame between when a cardholder receives a new card and when they begin using it for spend. Yet, digital issuance is just one step on a digital-first journey and without a full strategy, that newly issued card might not bring with it the added spend issuers are expecting. This article goes on to cover many digital-first options.

finovate.jpg

~~~

Back to Top


 

Digital Banking Industry Leaders Forum

Thought Leadership From Around the Industry by BANK tech-trends and Finopotamus:

Benchmarking Your Digital Banking Strategy

Humanizing Digital: Increasing Account Holder Loyalty and Exceeding Goals with Smart, Flexible Solutions

Alogent

 

Digital Transformation: A Banking Imperative

Three Present-Day Goals to Revolutionize Your FI’s Marketing

eSignatures Are Now a Top Priority Across the Nation

Fight Fraud by Better Understanding Your Financial Data

It’s Always About the People: 5 Rules for Digital Banking and Beyond

Back to Top

 


Internet Access

 

7 VPN Alternatives for Securing Remote Network Access

Virtual private networks have shortcomings when it comes to protecting remote network connections. Here are 7 technologies that can replace or supplement it: 1. Zero trust network access; 2. Secure access service edge (SASE); 3. Software-defined perimeter; 4. Software-defined wide area networks; 5. Identity and access management and privileged access management; 6. Unified endpoint management tools; and 7. Virtual desktop infrastructure or desktop-as-a-service.

cso.jpg

 

Dell: Hybrid Cloud ‘Long Gone,’ Multi-Cloud ‘Next Phase’

Dell Technologies’ top executives have framed hybrid cloud as a tired architecture that’s being left behind in pursuit of multi-cloud frameworks. This multi-cloud world, which Dell is reorienting multiple business units around, requires consistent infrastructure, operations, and access to the best of every cloud service.

sdx.jpg

 

The Best Way to Go ‘All In’ on Cloud

The author is confident that the long-held adage that FIs ‘might put new systems of innovation or systems of engagement in the cloud, but they’ll never move core banking’ is crumbling. He contends that app modernization is the top reason FIs are accelerating their cloud journeys, with total cost of ownership, greater agility, and improved data security as other top drivers. He adds that multicloud has much disaster recovery value, but the real multicloud value is in picking the best tools for the workload at hand.

infoworld.jpg

~~~

Back to Top


Call Centers

 

LiveVox Launches SmartStart Program for Contact Centers

LiveVox has launched their SmartStart Program. The new portal gives customers quicker access to essential LiveVox applications, including customer engagement channels such as voice, SMS, email, and chat, as well as interactive voice response (IVR) capabilities and managerial reporting.

businesswire.jpg

~~~

Back to Top

Privacy Policy DBA: TRW ENTERPRISES, LLC