Here at High Tech Realm we pride ourselves on our consistent delivery of quality analysis and reporting to our clients, whether they are startups just entering the tech space, or Fortune 500 companies looking to top the ranks of Google and boost their online image. As shown by our proven work with clients, High Tech Realm has consistently delivered content which greatly exceeds what can be purchased from a content farm or even a generalist marketing firm.
Most recently our expertise in technology helped Midsize Insider – a journalistic division of IBM devoted to helping midsize businesses stay atop of the latest developments in technology – win the 2013 Digiday Award for Best Content Marketing Platform. By consistently delivering quality evergreen content to IBM pertaining to: security, business analytics, cloud technologies and more, High Tech Realm was a key player on the writing team.
Recently IBM announced they will be teaming up with Thomson Reuters to increase the quality of the Midsize Insider program. We are happy to announce High Tech Realm was selected as one of the key providers to help continue with the program, and as such we are now glad to add Thomson Reuters to the list of clients.
Check back as more details will be posted about this arrangement in the coming days. Additionally if you would like to retain High Tech Realm to provide technology insights or even just have suggestions for topics we should discuss on this blog, feel free to reach out!
Chances are when you use a shared wi-fi connection you already know it is fairly easy to steal your personal information through the network, however there are few new tricks attackers are using to steal sensitive information from the average user. While many individuals have been focusing on improving the digital side of their security, today attackers are increasingly relying on old school tactics to gather information. Similar to how a rogue internal employee can do more damage than an outside attacker because of the level of trust, individuals also are falling victim to many tricks which rely on a false sense of security.
Overall while it can seem a bit daunting trying to protect yourself from these attacks, one of the best ways to protect yourself short of setting up a VPN (which can do more harm than good if a reputable provider is not chosen) is to install the HTTPS Everywhere extension on all your browsers. The plugin, created by the Electronic Frontier Foundation helps to ensure that whenever a secure connection to a website is available, it is automatically activated so you have some extra security when browsing on public wi-fi networks. Although it isn’t foolproof, the plugin is one of the best ways to harden your security regardless of your technical knowledge.
Although the mobile payment space has been gaining significant amounts of traction, Google Wallet is one of the biggest players in the space. Users of Google Wallet benefit from the fact they can store all their credit and debit cards on Google’s secured servers ensuring that when the user is out shopping, they are able to pull up payment information instantly without having to fumble through their purse or wallet. Other services of note include Square Wallet and Apple’s Passbook which also allow consumers to store their credit and debit cards in an orderly fashion while also giving consumers the option to receive relevant discounts based on their location and interests. By implementing digital wallet systems into your mobile strategy, your company can greatly increase revenue with minimal effort.
Why Mobile Payments Matter
Although mobile payments are relatively new, the adoption of such technologies has gotten a significant boost as shown by a relatively recent article in Mashable showing the announcement that Samsung and Visa have teamed up to integrate mobile payment capabilities in all Samsung phones. As Visa currently owns their own technology, Samsung devices will not support Google Wallet. Additionally Verizon Wireless also is blocking Google’s NFC technology out of reliability concerns. Regardless, mobile payments will likely benefit greatly due to the fact Visa has a much larger network of merchants than Google which will ensure the technology gains traction in the near future.
As a business owner you likely have heard about the recent surge of mobile applications such as Foursquare, Yelp, and others, but chances are you have been slow to embrace such systems because the market is saturated. Between Facebook, Twitter, Google+, and others it can be difficult to choose which networks to support. Despite the complexities, the process can be simplified by embracing a solid mobile strategy. In particular, location-based marketing is an important strategy to embrace because it allows you to tap into customers who are right near your business in real-time.
Although Foursquare and Yelp are crucial for any business, there are a few technologies that greatly enhance the shopping experience for your customers. Digital wallets such as Google Wallet, Square Wallet, and Apple’s Passbook provide consumers with the ability to track loyalty program statuses, receive relevant offers based on their location and interest, and even store tickets in a central location that can help encourage spending by streamlining the shopping process. One of the biggest benefits Square Wallet has over its competitors is the fact it requires little upfront merchant investment, has low merchant fees, and the plans are contract free. Google Wallet works with Android and iOS but it requires a traditional merchant arrangement, while Passbook is limited to the iPhone but it can be embraced by companies with ease.
For decades companies have struggled to keep costs reasonable when it comes to IT infrastructure. Between the complexities of running internal servers, paying hefty licensing costs for vital software, and ensuring all end-user systems functioned properly made provisioning an developing software a painful experience for any firm. Fortunately today cloud computing technologies have emerged as a way for companies of all sizes to slash information technology overhead costs while allowing companies to prototype code rapidly and provision software with ease. Overall the cloud is a vast field however there are three key areas which encompass the majority of the cloud.
Although the cloud is often associated with rapidly building applications and providing access to essential data when on the go, many IT professionals have been unfamiliar with cloud OS technologies until now. Many professionals are used to accessing applications via their browsers, cloud operating systems provide an added layer of security because they allow users to access all their data and applications from a central interface which can be accessed from virtually any internet connected computer. Additionally by using a cloud operating system, users can access all their applications though a single login thanks to single sign on (SSO) technology. Although there are many cloud operating systems available to IT professionals, two of the leading platforms are eyeOS and Jolicloud.
Electronic Arts recently made the headlines due to the release of the latest and greatest edition of the hit simulation SimCity which actually has gotten top scores, however in true EA fashion, as done in the past, the quality game was crippled thanks to draconian digital rights management (DRM) which severely hinders the ability of users to play the game even when they are in single player mode. Before continuing, it is important to note that this issue also came up back in 2008 when EA released the hit game Spore which also carried glitchy copy protection software which was known to crash legitimate users systems even when Spore was not running. Ultimately because of the DRM Spore became the most pirated software ever thanks to the DRM which caused many would be legitimate customers to torrent the software, not because of greed but because of the damage caused to their systems by the copy protection.
Unfortunately fast forward to 2013, and EA has not learned from their mistakes. In fact the negative effects have been taken a step further for SimCity users by requiring them to utilize an always on internet connection to perform basic tasks such as saving copies of their city data (as all data is stored in the cloud local saves are impossible). Although this might be understandable since EA totes this limitation as a way for users to access their game saves on any internet connected computer, the reliance of company servers for such a simple task has caused tons of pain since EA in the week following the launch of SimCity couldn’t even keep the authentication servers up meaning that paying customers of the game were unable to play for days at a time – with the issue becoming so bad that SimCity was pulled from Amazon.com soon after the launch. Although EA is now trying to make good with customers by offering them a free game (titles to be announced) it does little to resolve the underlying problems of SimCity which will likely take months to resolve if EA decides to correct their ways.
Last month, Kim DotCom shook up the online storage industry with the launch of his venture, MEGA. For those unfamiliar with Kim DotCom, his claim to fame was the creation of the now defunct MegaUpload website where users were able to upload files ranging from a few megabytes to hundreds of gigabytes for a nominal fee. Although the site served legitimate purposes, it was widely used by piracy networks because of the anonymity provided by the site, and the simplicity of the service. Users simply could upload files, and post the links on their websites without having to worry about signups and logging of traceable information. Although MegaUpload was based in New Zealand, the United States managed to shut down the site in January of 2012 due to MegaUpload owning servers in Virginia. Currently this legal battle is ongoing however it is not going to be the focus of this article.
Fast forward to February 0f 2013, despite having ongoing legal battles Kim Dotcom launched MEGA which is intended to be the successor to MegaUpload. By offering generous portions of file hosting – starting with 50GB for a free plan and going up to 4TB for only €29.99/month – MEGA is carrying the torch of it’s predecessor MegaUpload. One of the biggest differences between Mega and MegaUpload however is that the former implements extensive amounts of encryption intended to protect the privacy of users, no matter what they use the service for (including piracy).
Image courtesy of Master isolated images / FreeDigitalPhotos.net
Here at High Tech Realm we are happy to announce that over the past couple of months we have expanded our client base to include technology analysis and news coverage for large companies such as IBM Midsize Insider an outlet which is devoted to information technology in midsize companies and Iron Mountain which specializes in providing information management services to midsize to enterprise companies.
Additionally High Tech Realm is now working with Boundary - a cloud based application monitoring suite – to provide content related to cloud computing written with IT professionals in mind.
Despite our commitments with these clients, High Tech Realm is still open to working with companies of all sizes to provide assistance with their technical writing needs – whether it is documentation creation, technical translation, analysis of current IT systems, and more.
Additionally the High Tech Realm shop will soon be updated with new tutorials, eBooks, whitepapers, and more as our teams are currently evaluating numerous topics for coverage. If you would like to request more information about our services or simply suggest a topic for materials in the shop, feel free to contact us.
As corporate activities in many companies are now increasingly reliant on computers, implementing proper security initiatives is a topic which need to be tackled by both management and any information technology staff which are within the firm. Since all security systems are only as good as the weakest link in the chain, today security is a top down approach where all levels of staff in a company play a significant role in the integrity of any digital security system
Trustwave recently released a whitepaper titled the “2013 Trustwave Global Security Report” which provided numerous insights into current trends of the security industry. One of the key bits of information is the fact that in 2012 nearly every industry, country, and data was involved in some type of data breach. Additional findings of note include:
Retail companies made up the highest percentage of breach investigations at 45%
Mobile malware exploded by 400% in 2012 alone
E-Commerce sites today are the number one targeted asset of companies accounting for 48% of investigations
The average time to detect a breach is 210 days
Much of the responsibility of dealing with zero-day attacks is increasingly on all staff since patch deployment can take extended periods of time
Although spam volume has declined, it still represents 75.2% of all emails to firms, 10% of those messages are malicious
Many companies have neglected to put in basic security safeguards to protect internal systems
Although security for companies is a vast field which is difficult to encompass in a single article, there are a few concepts which when implemented correctly by IT teams, can lay the foundation for proper security initiatives across the board. Key findings include:
Ensuring all employees are using strong and unique passwords for all online activities
Implementing two-factor authentication when possible is vital since passwords today provide little security
Installing operating system, browser, and general software patches rapidly is essential to protect against rapidly spreading malware and zero-day attacks
Implementing security education programs for employees at all levels to minimize reliance on traditional software suites, because no security suite can detect all threats
In general, the key theme of security is to emphasize a common sense approach to managing technology infrastructure. For example employees should be taught: not to open attachments from emails unless they are expected; rather than clicking links in emails always directly type in the URL; and to avoid downloading applications on any device unless it is from a reputable source. These measures combined with proper security software will help to provide a solid balance to help companies deal with modern security threats.