Archive for January 15, 2008

ITAP inducts Lenovo as a member

Posted: January 15, 2008 in Tech

ITAP LenovoLenovo has been inducted as a member of the prestigious Information Technology Association of the Philippines (ITAP). At the induction ceremony held at the Mandarin Hotel in Makati City, Vicky Agorrilla, country general manager of Lenovo Philippines, was officially sworn in by guest-of-honor, Commission on Information and Communications Technology (CICT) Chairman Ray Anthony Roxas Chua III.

Formed in 1984, ITAP is a private, independent and non-profit association that aims to promote ICT development and usage as it contributes to the Philippines’ economic growth and enhances global competitiveness. With the induction of Lenovo, ITAP currently has 36 member companies, comprising global ICT leaders.

“On behalf of ITAP, we are very happy and honored to welcome Lenovo as a member of ITAP,” said Cynthia R. Mamon, President of ITAP. “Lenovo is a leading player in the local PC market and we look forward to working closely with them to achieve ITAP’s vision for the Philippines,” she added.

“We are thrilled to be able to play an active role in furthering ITAP’s ICT vision for the nation,” said Vicky Agorrilla, country general manager of Lenovo Philippines. “We believe that the PC is the foundation of the information economy, presenting opportunities for citizens to become part of the global economy, and Lenovo is excited to be part of the driving force in realizing these opportunities.”

Advertisements

Finjan Inc., announced that its Malicious Code Research Center (MCRC) has identified yet another significant new web attack — the latest in a genre of crimeware that threatens to turn highly trusted web sites into insidious traps for unwary visitors.

More than 10,000 websites in the US were infected in December by this latest malware. The attack, which Finjan has designated “random js toolkit,” is an extremely elusive crimeware Trojan that infects an end user’s machine and sends data from the machine via the Internet to the Trojan’s “master”, a cybercriminal. Data stolen by the Trojan can include documents, passwords, surfing habitats, or any other sensitive information of interest to the criminal.

The random js toolkit is a JavaScript code that is created dynamically and changes every time it is being accessed. As a result, it is almost impossible to be detected by traditional signature-based anti-malware products.

The random js attack is performed by dynamic embedding of scripts into a webpage. It provides a random filename that can only be accessed once. This dynamic embedding is done in such a selective manner that when a user has received a page with the embedded malicious script once, it will not be referenced again on further requests. This method prevents detection of the malware in later forensic analysis.

HP announced new economical servers, application solution “blueprints” and enhanced remote management software that can help midsize companies reduce operating costs while supporting their growth.

The company’s entry-level server portfolio now includes four new HP ProLiant server platforms (HP ProLiant DL180 G5 / DL185 G5 / DL165 G5 / DL160 G5 that help midsize customers with limited space, budgets and IT staff. The servers’ easy-to-use tools guide users through system configuration for fast installation so customers can focus on what matters most – growing their businesses.

Cisco announced a series of new technology solutions and multivendor architectures that will help retailers improve security and reduce complexity of store systems in addition to increasing employee productivity to enhance their customers’ experience.

Cisco is launching the Lean Retail Architecture, a new way to help retailers “do more with less” which features information technology (IT) improvements designed to help retailers reduce costs, enhance business flexibility and increase data protection.

Another component of the Lean Retail Architecture is Cisco application acceleration technologies that help enable retailers to move many applications from stores to the data center without compromising performance or security. With the ability to centralize business information and data outside the store, retailers will have less to worry about from a PCI-compliance standpoint.