Thursday, October 29, 2015

Snow brings Software License Manager FR3 – Computable

October 29 2015 11:00 | Outside Party

Snow Software Introduces with Snow License Manager FR3 the first software license optimization solution that provides native support for mobile devices. Snow is saying in its first vendor inventory of mobile devices & amp; license management integrates into an organization-wide software asset management program.

Snow Software, specialists in software asset management (sam), introduced with Snow License Manager FR3 the first software license optimization solution that provides native support for mobile devices. This follows the acquisition of enterprise mobility management provider ‘The Institution’ earlier this year. Snow License Manager FR3 enables customers to extend their existing sam program for various tablets and phones that run on iOS, Android or Windows.

International research of Snow, conducted in the summer of 2015, shows that already 97 percent of organizations currently mobile devices to employees. Of these organizations, 80 percent of mobile devices and apps are not included in their current software asset management policy. Expenditure in the field of mobile skyrocketing now mobile devices are becoming increasingly important in the current environment. Users connect to the business applications through the device at that moment is the most suitable. This offers business benefits, but also creates more risk in the form of unnecessary costs and errors in the field of software licensing compliance.

The combination of the technology of snow to measure enterprise and the full list of all mobile devices and apps, enables organizations to realize the same high ROI on their mobile deployments that they already see at this moment in desktop, data center and cloud apps. The most recent improvements in Snow License Manager makes it easy for authorized employees within the organization to manage costs and compliance of mobile apps. Also, managing contracts and licenses for mobile devices simple. It is also possible to trace whether mobile devices comply with the internal hardware and software policy

.

This article is derived from Computable. nl (http://www.computable.nl/artikel/5635863). © Jaarbeurs IT Media.


LikeTweet

Software manipulation: ‘Not only diesel gate should scare us’ – Emerce

Emerce is legally obliged to ask your permission for the use of cookies and similar technologies, and to inform you about its use on the site.

For some of the above points is capturing visitor behavior necessary. Third parties may place cookies on Emerce, as is the case with embedded YouTube videos on Emerce.

Emerce uses cookies and similar techniques for the following purposes:

  • optimizing the website
  • the use, management and aimed to show ads
  • the integration of social media
  • the collection and analysis of statistics
LikeTweet

Wednesday, October 28, 2015

Lenovo close vulnerabilities in system software update – Security.nl

Lenovo recently released a new version of the system software update that fixes several vulnerabilities which attackers could increase their user rights. Something that is especially a problem in corporate environments, said Martin Rakhmanov from security firm Trustwave.

He discovered one of the vulnerabilities could allow a user who has access to a system can read and delete arbitrary files, as well as assignments as manager can perform. The leak of Rakhmanov does not stand alone. In recent months, were discovered several vulnerabilities in the “System Update Software”. The software is installed on most Lenovo computers and checks for new versions of drivers and other software. Using the software, users can also download and install updates.

The leak that Rakhmanov discovered, according to the researcher, especially in corporate environments is a serious problem, since the Lenovo software is installed on each workstation Lenovo. Administrators also are advised to update to version 5.07.0013.

LikeTweet

Fair Trade Software developers want to give Kenyan opportunities – DuurzaamBedrijfsleven.nl

The Dutch ICT company Competa is working in Kenya under the name Fair Trade Software to train developers in Kenya. Dutch companies struggling to fill their sustainable agenda can bet the developers for IT jobs.

Under the name CodePamoja, Swahili for ‘encode together’, Competa in Kenya set up a training center . Kenyans learn technical skills in the training facility and project management techniques, making them along with European professionals can work on major international projects.

According Competa gives Fair Trade Software project the local economy a boost. The company states that Kenyan universities are good software developers learn to train, but that there are too few jobs. About a quarter of software developers is unemployed.

In addition, the Fair Trade mechanism Software interprets the “new” model of development. “The focus is shifting from relief and assistance to help people themselves to build their own economy,” says Technical Manager Jim Sang Wine at Compete.

The ICT company states that Dutch companies that are seeking sustainable initiatives Kenyan developers after completing the training can hire for IT jobs.

In addition to the initiative of Competa, the Fair Trade Software Foundation founded. The aim of the foundation is to the international Fair Trade model to apply in the IT industry worldwide and to issue an independent Software Fair Trade certification.

LikeTweet

Tuesday, October 27, 2015

Fair Trade Software developers want to give Kenyan opportunities – DuurzaamBedrijfsleven.nl

The Dutch ICT company Competa is working in Kenya under the name Fair Trade Software to train developers in Kenya. Dutch companies struggling to fill their sustainable agenda can bet the developers for IT jobs.

Under the name CodePamoja, Swahili for ‘encode together’, Competa in Kenya set up a training center . Kenyans learn technical skills in the training facility and project management techniques, making them along with European professionals can work on major international projects.

According Competa gives Fair Trade Software project the local economy a boost. The company states that Kenyan universities are good software developers learn to train, but that there are too few jobs. About a quarter of software developers is unemployed.

In addition, the Fair Trade mechanism Software interprets the “new” model of development. “The focus is shifting from relief and assistance to help people themselves to build their own economy,” says Technical Manager Jim Sang Wine at Compete.

The ICT company states that Dutch companies that are seeking sustainable initiatives Kenyan developers after completing the training can hire for IT jobs.

In addition to the initiative of Competa, the Fair Trade Software Foundation founded. The aim of the foundation is to the international Fair Trade model to apply in the IT industry worldwide and to issue an independent Software Fair Trade certification.

LikeTweet

Ex-worker reported using illegal software – Marqit.nl

Former employees are more likely to make a report of unlicensed software than the current employees. According to research by BSA. Of all reports received by the interest group is sixty percent from voornamelige employees. According to the research organizations use not always aware of illegal software.

The study of BSA shows that 27 percent of Dutch organizations using illegal enterprise. Georg Hernnleben, Senior Director Compliance & amp; External Affairs EMEA at BSA. “The results speak for themselves. The use of pirated software is simply risky. More and more employees betray their employer, and especially former employees. This makes you run more risk of having to pay damages for illegal use of software.



No intent

Many companies rely on software as a major vehicle for business, innovation and productivity. Businesses that use illegal software therefore in fact have an unfair competitive advantage over their peers who do comply with the law. According Hernnleben organizations use illegal software not on purpose. “They are not themselves simply unaware of the risks and know whether they have the proper licenses for their software.

Hernnleben believes that companies do not have the proper software asset management (SAM) tools and processes have. “By implementing the most simple SAM tools and processes, companies are able to inventory their software and associated licenses, the software used to assess employees and at a basic level SAM roles and responsibilities to be allocated within the organization. SAM also provides a holistic view of the software used within the organization, reduces the risk of irregularities in checks.



Fact or Fiction

Companies risks may declare (ex- ) prevent employees. To advise companies and hereby ASSISI tar BSA has launched the ‘Fact or Fiction’ campaign. Now announces to have launched the second phase. “In this second phase BSA extends its target markets out to sectors never had more to do with BSA.” It’s agriculture, shipping, retail and wholesale sector and breweries, car dealers, gas stations and factories. “

Find out more about Software License Management?

Suzanne Martens

LikeTweet

Saturday, October 24, 2015

Tesla gets permission for self-propelled software in EU – Financieele Dagblad (subscription)

Electric car maker Tesla has been allowed to bring his self-propelled software to Europe. That left CEO Elon Musk Saturday know via Twitter.

Tesla now for all markets, except Japan, received approval for the deployment of the software that run semi-autonomously should allow. The automaker sends the software updates automatically send wireless to its latest versions of the electric Model S. The software and sensors that are in the car, a driver can on the highway the car automatically change jobs. The car can self-parking.

The company’s software released last week in the United States. “Do be careful,” Musk warned at the official announcement of the autonomous car. “It’s a kind of public beta version. Keep your hands still on the wheel. “

LikeTweet

Tesla gets permission for self-propelled software in EU – Financieele Dagblad

Electric car maker Tesla has been allowed to bring his self-propelled software to Europe. That left CEO Elon Musk Saturday know via Twitter.

Tesla now for all markets, except Japan, received approval for the deployment of the software that run semi-autonomously should allow. The automaker sends the software updates automatically send wireless to its latest versions of the electric Model S. The software and sensors that are in the car, a driver can on the highway the car automatically change jobs. The car can self-parking.

The company’s software released last week in the United States. “Do be careful,” Musk warned at the official announcement of the autonomous car. “It’s a kind of public beta version. Keep your hands still on the wheel. “

LikeTweet

Green light for automotive software Tesla – Telegraaf.nl

SAN FRANCISCO (Reuters) –

The producer of electric cars Tesla Motors has received approval to also bring to Europe Autopilot software. CEO Elon Musk left Saturday on Twitter that all necessary documents are regularly

.

The software enables owners of a Tesla Model S their vehicle partly naturally let it ride. In the cars were already all built sensors. With the new technique, a driver can leave his car for example, independent of job exchange on the highway. There may also be fully automated built parked.

Tesla, the software released from last week in the United States. At the press conference Musk warned well before using it: ,, It is a kind of public beta version. We want people to be careful with that. Keep your hands still on the wheel “

When the software will become available in Europe, is not yet known In Japan, the application for approval pending

class=”clear”

LikeTweet

Mozilla is developing open source software support financially – Tweakers

Mozilla has announced a support program that aims to support the development of open source software. There is an initial sum of one million dollars available to be divided among ten projects.

 Mozilla logo One of the goals for funding to support projects that make use of Mozilla itself. Which tools that the company has not yet disclosed, but the intention is that they should be open source and free to use in order to qualify. However, Mozilla has a website where all tools whose use is registered created.

In addition to supporting software used Mozilla will also support projects that can contribute to the open source community, according to the browser maker on his blog. To identify such software programs Mozilla enlists the help of its users; which can propose candidates.

Initially, there is dollars, converted approximately 910.000 million euros available to fund open source projects, but it is possible that this amount will be raised in the future. There will be provisionally ten projects eligible for funding, which thus received in all probability each $ 100,000.

Mozilla says that it wants to do with the funding program something back to the open source community, as the company is self arise from is’. For December 12 must be known which projects are the first to qualify for financial support from Mozilla.

LikeTweet

Friday, October 23, 2015

Trainees hacking expensive software from Oracle in an hour – Macworld

Great was the indignation in the country after Oracle security this summer reported that the company felt it unnecessary for ethical hackers to test their products for holes. The reverse engineering of source code would henceforth be dealt with harshly by Oracle. Anger so was the ethical hackers and the relevant blog post quickly taken offline by Oracle

.

Well, that Oracle conscience. It has this week released a monster patch which six very important holes are repaired that have been found by – wait – yes: ethical hackers. And not just hackers, claiming discoverer ERPScan but only trainees who hardly needed for a few hours to discover the gaping holes.

So it is very basic errors in the flagship product of Oracle, the E-Business Suite. What about simple cross-site scripting and SQL injections? User Enumeration or even an ineradicable error. “It still comes here to the base of apllicatiebeveiliging says Polyakov of ERPScan at CRN.” Everything easily found by our trainees. What should I add now about that? “

LikeTweet

Thursday, October 22, 2015

Software update VW engines often inadequate – AD.nl

AD.nl uses cookies and similar technologies (“Cookies”) among others to bring you the best user experience. We can therefore capture and analyze visitor behavior and thereby improve our website. Cookies ourselves and others can be used to show ads and articles in command on AD.nl that fit your interests.

Cookies can also be used to display on third party sites relevant ads . Third party cookies also allow you to share information via social media such as Twitter and Facebook. More information can be found in our cookie statement.

The service can be contacted on telephone number 088 – 0505 050.
service page can be found here. Click here to directly read the digital newspaper.

LikeTweet

Software update VW engines often inadequate – NU.nl

At about three million cars in Europe must engine to be replaced, said a spokesman for the embattled company Thursday by news agency Bloomberg .

These are cars with 1.6 liter engines. With other models, which is cheating, alone is a software update.

Volkswagen announced last week that there are about 8.5 million cars in Europe must go back to the garage because the diesel scandal. Globally it comes to eleven million automobiles. VW keeps in mind that the diesel scandal over 6.5 billion euros will cost.

The German Transport Minister Alexander Dobrindt estimated earlier this month that 3.6 million cars in Europe, of the 8.5 million which are recalled, changes to the hardware need. That means there must also replace parts. Such repair takes much longer than just updating the software.

The recall of VW, one of the greatest ever, starting in January. For the Volkswagen drivers, there are no charges. The next time they will be informed. Nevertheless, for many of them long before the car was completely alright

. <- block: | article link end ->

File VW Scandal

By: Reuters

LikeTweet

Wednesday, October 21, 2015

The most frequently asked questions about software defined – Computable

<- googleoff: index -> <- googleon: index ->

Time flies, especially when we’re talking about technology. Where I was involved in 2013 in an investigation into the status of IT professionals in relation to the new software defined technology, it is now a hot topic

.

In 2013 gave half of the 117 surveyed IT professionals to be able to form no opinion yet on software defined, because there is not enough information was available. Only 29 percent saw software defined as the future. Unfortunately, I also have the (still) does not have new figures, but one thing is certain: no lack of information anymore. Different opinions, perspectives and even definitions dominate the trade press. Software defined is therefore frequently discussed at the IT department

The job of the IT administrator

.

It strikes me that after two year still confusion about what software defined technology now is. The technology means that hardware and software are completely separate. A separate management layer over the hardware is not a software defined, even though some suppliers sometimes called something different. It is a fact that software defined traditional IT infrastructures on its head. And of course, this is accompanied by a variety of advantages and disadvantages. During workshops we organize at Telindus on this subject, it strikes me that there is often the same questions come up. And it’s interesting, almost all of them are related to the current job of the IT administrator. I put three in a row:

1. Do I need to be a programmer?
2. I need nothing more soon to know the bottom? In other words, can I throw all my accumulated knowledge overboard
3?. I later still have a job?

Infrastructure is programmable

With an infrastructure in which the software is dominant, it is understood that the box of the IT manager certainly will change. But if we look at one question, no, IT administrators do not have to be programmers. But you will need programmers. In practice, a programmer usually know little or nothing of IT infrastructures and the IT administrator anything about programming. An IT administrator so will never be as fast programming as a programmer. However, the whole area will be programmable. Configure happened often before in a cli (command line interface), and depending on the complexity could sometimes take up to several days. With software defined this is achieved at the touch of button because scripts are deployed automatically. The administrator is given the task to make the translation from the network to the commands, the programmer executes the commands.

Responsibility

The moment a software defined environment is implemented, it does not mean that nothing can go wrong. Because everything is included in scripts and policies reduces the risk of errors, but the consequences greater when things go wrong because the script does not work for example. At those moments, knowledge of basic infrastructure is essential.

You can compare it with a visit to the garage. Where before the hood was up, it creates a link to a plug under the dash. But to find the cause, is still required specific knowledge. Not everyone can be a car ‘read’. In the data center physical servers virtual and it is up to the administrator to change with it. This does not mean that knowledge must be thrown overboard, because you still have to know what you’re building: what’s under hood. After all, you’re responsible for it runs.

Change Functions

It is a logical question, whether there are job losses in the management department as a result of software defined. The management of the infrastructure is there in recent years not become easier. Many companies have to deal with different systems over the years, and next to each other to function. Each system has its own specific features which knowledge within the IT department is needed. Not so much job losses, but roles will change

As previously indicated.; it is still important to know how the underlying infrastructure works. This knowledge will have to stay there. To a lesser extent, the physical setup, but more in the translation how to make this work by programming or to work together with other components within the IT infrastructure.

more and more managers will find themselves in the future have to deal with applications, in place of the complex infrastructure. Software Defined ensures that the focus for IT departments more will be placed on demand management rather than technical management. The technical management will be increasingly outsourced and IT professionals can focus on the customer within the company. Jobs disappear not, but there is also a responsibility of the managers to continue to develop and grow themselves.

LikeTweet

Tuesday, October 20, 2015

This software allows someone else to control your face – Wedding

Trouw.nl uses cookies and similar technologies (“Cookies”) among others to bring you the best user experience. We can therefore capture and analyze visitor behavior and thereby improve our website. Cookies ourselves and others can be used to show ads and articles in command on Trouw.nl that fit your interests.

Cookies can also be used to display on third party sites relevant ads . Third party cookies also allow you to share information via social media such as Twitter and Facebook. More information can be found in our cookie statement.

The service can be contacted on telephone number 088 – 0561 588.
service page can be found here. Click here to directly read the digital newspaper.

LikeTweet

“Security software is also but flat software ‘- Automation Guide

: Size the image correctly ?? ->

Beveiligingssoftware- and devices should be viewed with the same suspicion as any other component of IT systems, IT security expert says Kenneth van Wyk

.

The incident with a zero-day exploit in popular FireEye appliance, Kenneth Van Wyk was no reason to raise the eyebrows. However, the reactions that followed. He finds it in the least surprising that there are errors in the software for IT security. “You should not have blind faith in what you allow on your network and that applies equally to security tools” he states in an article at Computerworld. Van Wyk knows what he is talking with an experience of 20 years at CERT / CC at Carnegie Mellon University and the US Department of Defense.

In the case of the FireEye appliance was vulnerability in the Apache Network Service which forms the core of the activities of the unit. There sat a vulnerable PHP script in which a malicious enabled to appropriating administrator rights on the system. Van Wyk says that it was obviously not a good thing, but that the risk is as great a security company that overlook as a supplier of any other solution. “Safety always has to bow to perfection,” said van Wyk.

He cites a number of tips that also apply to security:

  • Security products they are based on software. Errors can occur and do so. Have faith, but also check.
  • Security equipment must be subjected to rigorous testing, like any other system that attaches to the network where you are responsible for.
  • Reduce the potential for attack, for example by making use of dual interfaces. A pre-production-management-data and one for data. The production interface should never be used for mission-critical services.
  • Security equipment must, like any other software, are regularly provided with the latest software updates. From the field Van Wyk know that in many cases the firmware is several versions.
  • Never rely on the security or will be at the time. Also check the vendors whether they update their equipment quickly enough.
  • Keep the traffic on security in mind as measured for other network devices. An unexplained increase in traffic on the security could betray danger.
  • Create the network monitors as many invisible. By outgoing traffic to prevent this equipment is not et impossible to hack them, but makes it a lot more difficult.

LikeTweet