Tag Archives: Software

Microsoft Corp will buy LinkedIn Corp. for US $ 26.2 billion

LinkedIn

Microsoft Corp will buy LinkedIn Corp. for US $ 26.2 billion. The purchase plan is the largest corporate action in the technology sector. The acquisition plan encourages LinkedIn shares rose while Microsoft declined earlier this week.

LinkedIn

In trading on Monday (Tuesday morning GMT), LinkedIn shares jumped 47 percent to US $ 192.21 New York time. LinkedIn shares rise the most since 2011. Shares of LinkedIn has slumped 42 percent this year as investors began to doubt the company’s future prospects.

Meanwhile, Microsoft shares fell 2.6 percent to US $ 50.14 in first this week. Twitter shares too jumped on speculation that Twitter will become the next acquisition target. Twitter shares rose 3.8 percent to US $ 14.55.

LinkedIn stock purchases represented the purchase of approximately US $ 196 per share. The share price is quite premium with an increase of almost 50 per cent of the market value of LinkedIn shares at the close of trading last Friday. However, the figure is still below the social media of the highest shares in the range of US $ 270.

LinkedIn share purchase was considered a bold step undertaken Microsoft CEO Satya Nadella is trying to make the company’s software to continue to lead in next-generation computing.

By connecting the software Microsoft Word and PowerPoint with your LinkedIn network of approximately 433 million professionals who can add to make the combination of sales, marketing and recruitment services as its core business products. This is potentially a challenging competitor cloud software like Salesforce.com.Inc future.

“LinkedIn and Microsoft share a mission of helping people to work more efficiently. There is no better way to achieve that mission than to connect professionals in the world,” said Microsoft CEO Satya Nadella.

Meanwhile, Chief Financial Officer (CFO) Microsoft Amy Hood said LinkedIn’s stock purchases will be financed by debt. It is also as a way to reduce the tax bill. The Company had funds of approximately US $ 105 billion in cash and other liquid assets.

Microsoft also said LinkedIn CEO Jeff Weiner will remain in his position in the company. Microsoft also will operate LinkedIn as a separate unit, and retains its name.

Nevertheless, the agreement would require approval from regulators United States (US), European Union, Canada and Brazil. In the process of this stock purchase, Microsoft assisted by Morgan Stanley. While financial advisor LinkedIn by Allen and Company LLC and Qatalist Partners.

Corporate action plan of this technology is considered to provide optimistic than one mega corporate mergers to succeed. “It’s a big growth for Microsoft,” said Forrester analyst Ted Schadler.

Morningstar analyst Rodney Nelson assess LinkedIn stock purchases by Microsoft can deliver new services and products that are useful for workers and the role of human resources (HR) going forward.

While Madrona Ventures Portfolio Manager Matt Mcllwain said that Microsoft buy LinkedIn as an opportunity to take advantage of the capabilities of each and combine to produce something strong and complementary.

“The future of productivity around people, identities, data and relationships between them,” said Mcllwain.

On the other hand there are also analysts pessimistic about the impact of the purchase of shares LinkedIn by Microsoft. Scott Kessler, an analyst at S & P Global Capital said that large transactions were also still requires work to be done.

Microsoft will use LinkedIn as a database of information professionals and distribution channels for software systems. While LinkedIn gain additional financing and access to millions of people, potentially combining networks.

Microsoft noted that the agreement would help the large increase in new customers. The total potential productivity of Microsoft’s market reached US $ 315 billion, up from US $ 200 billion without LinkedIn.

Not only that, for Microsoft, LinkedIn agreement into an opportunity to reverse a poor track record of acquisitions, including paying US $ 9.4 billion of HP manufacturer Nokia in 2014, and the business network Yammer approximately US $ 1.2 billion in 2012. In addition, Skype for US $ 8.5 billion.

Worst hacker attacks in various countries

Worst hacker attacks

Fears the government in a number of countries over hacker attacks that would cripple critical infrastructure occurred in December 2015, when a further constant threat (advanced persistent threat, APT) attacks on the government of Ukraine.

Worst hacker attacks

The incident became the first cyber intrusion drop and turn off the power of a nation.

Using BlackEnergy malware, hackers remotely disconnect the power 225,000 users and flooded customer service with numerous phone calls to prevent the original customer calls.

In 2015 alone, the government of the United States, the Netherlands, Ireland, and Turkey became prey to DDoS attacks, which intends to create chaos and disrupt operations.

In January 2015 in Thailand, some demonstrators angry about the government’s court verdict and launch malicious attacks against 300 government websites.

In the same month, hackers affiliated with Anonymous also initiated a similar attack against the government of Saudi Arabia and Nigeria.

Web applications and virtual DDoS violations that exploit vulnerabilities in the public sector has become more frequent and damaging.

Global risk consultancy Control Risks (Control Risks Global Risk Consulting) in the map for 2016. The annual risk report said a third of the 36 percent of cyber attacks now targeting the government sector.

DDoS attacks are becoming a weapon of destruction to digital extortionists and terrorists. DDoS attacks come in different forms.

Some of them are intended to disrupt the system, while others flood the system with requests for multiple resources (bandwidth, processor time, disk space, etc.).

In Asia, the faster the APT attacks. Territorial dispute between China, India and Southeast Asian countries continues to increase.

The hacker group known as APT 30 in recent years have been using modular malware to obtain sensitive data from their targets, including government classified secret network.

Some cyber attacks consist of emails written in the language of the recipient containing documents looks legal, but contain malware.

The attackers also made Encryption worm-like, which is attached to the hardware, such as USB thumb drives and hard disks. Once these components are in contact with other systems, such attacks would spread.

Protection against DDoS and risk APT

Derek Manky, Global Security Strategist of Fortinet said a comprehensive approach and multi-layered is one of the best ways to improve the defense of cyber threats.

Effective defense is often found when building a cohesive framework of protection and additional protection.

This framework, he added, is very important because it combines the capabilities of today’s security – technology that began to emerge and have a learning mechanism – creating a follow-up of security intelligence of the new threats detected.

Other measures include the environmental aspects of the network and devise response plans. It’s important to secure the potential narrowing, network monitoring, and make sure they go beyond major attacks and mitigation plan.

It aims to complete removal of all DDoS traffic, the strategy should seek to maintain services – especially essential services – with little disruption.

Detailed plans should include backup and recovery, additional oversight, as well as ways to restore service as quickly and efficiently as possible.

A multi-layer strategy for DDoS protection also involves a dedicated on-premise solutions that are designed to maintain and reduce the threat from all corners of the network.

“IT administrators need to remember that it is not necessary for every employee to have access to certain resources that may contain sensitive data. By limiting access whenever possible, the organization can reduce a lot of attacks,” he added.

Governments need to carefully

A strong partnership with the service provider of security, said Manky also important. Partners can provide information up-to-date and threat intelligence to the IT staff, and determine when an incident reporting channel is detected.

The government agency also should partner proactive cyber security organizations and solution providers to share threat information, so that collectively, the industry can have a more comprehensive view of the global cyber threat landscape and respond better to attack.

Lastly, although the assessment and comprehensive plan can be developed, educate government officials on cyber threats is very important.

Employees with access to sensitive information should be specially trained to know how to handle such data. For example, limiting employee access to the USB drive is a good option to protect the network.

Because, APTs, worm outbreaks, DDoS, botnets, or inbound and outbound attacks today are more sophisticated and intrusive.

“Governments need to carefully consider their security posture, proactive and adopt a multi-layered approach to minimize the risks they face,” Manky lid.

Great, active users Snapchat overshoots twitter

snapchat

Application-based video and photo messages, Snapchat, is now more popular than social networking Twitter.

snapchat

In fact, the age of the application made by Evan Spiegel was only 4 years old. While Twitter is now treading the age of 10 years in cyberspace.

Based on Bloomberg lapaoran, Snapchat now has the number of daily active users were 150 million users.

While the number of active Twitter users is less than 140 million people per day. However, both Snapchat and Twitter has not made its comments on this.

Even so, the strong suspected that Twitter’s growth is not so high that one of the factors Twitter defeat on Snapchat.

In fact, it is considered a major factor Twitter has recorded a dismal performance on Wall Street. The growth of social networking users that Twitter was reportedly dropped dramatically compared to the past two quarters.

Meanwhile, Snapchat become one of the social networking service that diligently releasing new features and filters to attract the attention of users.

End of April 2015, Bloomberg also reported that all Snapchat users watched 10 billion videos per day. This figure rose dramatically from February 2015, in which as many as 8 billion videos are viewed by all Snapchat active users per day.

Browsing Incognito Mode in Chrome Not Always Safe

google chrome

When it wants to access the internet for more private in the Google Chrome browser, usually many users will choose to use incognito mode. Therefore, this mode allows browsing on the internet is not stored in the browser history.

google chrome

However, the events experienced by a student of the University of Toronto recently found that not always incognito mode promising surfing privacy.

Is Evan Andersen, who plans to be logged on to play Diablo III, was welcomed by the porn video seen some time ago to use incognito mode in Google Chrome.

Andersen said that he has closed the browser after watching the video. However, upon discovery of an error in drivers from Nvidia GPU, video memory is not erased.

So, when he tried to load the frame buffer, the graphics card instead draw what last used by Google Chrome. In fact, the information should not be stored because it access to incognito mode.

However, Andersen claimed that he could solve the problem. According to him, a patch for the GPU driver can be used to ensure that the buffer always be erased before it is sent to the application.

Furthermore, he explained that it is usually done by the operating system to the CPU RAM. Therefore, it is natural that it also occurs with the GPU. In addition, Andersen said that Google Chrome can remove its GPU resources before stopping.

Nevertheless, a blog created by Andersen, both Google and Nvidia are already aware of these problems. Unfortunately, Google said that it could not be repaired because the incognito mode in Chrome is not designed to protect users from other users on a single computer.

Meanwhile, the NVIDIA explained that the problem is related to memory management that is in the Apple operating system, and not the graphics card NVIDIA. Therefore, the NVIDIA driver has followed the policy of the operating system. Moreover, these problems are also not found in the Windows operating system.

This problem is not a first for Google Chrome. Previously, Google also already know that there is a similar problem occurs for the mobile version of Chrome.

King of YouTube Make Game Absurd

pewdiepie game

After successfully luring more than 10 billion viewers and 39 million subscribers, PewDiePie alias PewDiePie which is also touted as the King of YouTube to try their luck in the mobile gaming industry.

pewdiepie game

Youtuber Swedish releasing mobile games themed himself with the title PewDiePie: Legend of the Brofist.

Released in two platforms, Android and iOS, PewDiePie: Legend of the Brofist display pixel version of Kjellberg and some fellow youtuber, such JackSepticEye, Markiplier, CinammonToastKen, Marzia, and several others. All the characters in the earlier game have an equal voice with the original figures.

The story offered on PewDiePie: Legend of the Brofist relatively little absurd. PewDiePie told to deal with the forces of evil and save some fans on YouTube abducted.

Yes, something like that. Unfortunately, PewDiePie: Legend of the Brofist not free. To be able to download this game you have to spend at least USD 4.99.

This is not the first time for Kjellberg to expand outside YouTube. Previously, he has signed an agreement with publisher Penguin Random House by launching his first book in October 2015 titled This Book Loves You. The book consists of 250 pages it contains important advice and quotes that inspire.

Researching Your Options before Using Different Computer Programs

Infinite

Technology continues to change at an ever-impressive rate. The programs on which you relied just a few years ago are quickly becoming outdated. When you need to keep the same data and information on your old programs, however, you may wonder how you can upgrade to platforms that are more technologically advanced and compatible with your computer. You can research your options and how to carry out such upgrades by going online and reading more about processes for transitions like AS400 migration. Once you read more about it, you can then decide if these changes are ideal for you.

Infinite

The website is set up so you can research at your leisure. For example, if you want to learn about the newest solutions the company makes available, you would use the solutions tab at the top of the page. You can read about the different types of migration available, as well as GUI and cloud storage. If you want to learn about the new products ready for use, you can use that link at the top to read about BABY, Infinite, and database migration. All of the information you would need to make a sound decision about your own computer program upgrades and changes is available to you on one page.

Even with reading all of the information, however, you still may have plenty of questions. One of the best ways to get answers to your questions is by reading the FAQ section on the front page. You can read about how this program works, what it is exactly, and other details that will help you understand it better. You can also see an Infinite demo if you learn better by seeing something in action rather than just reading about it.

Another FAQ section can be found at the top of the page under the support tab. This section can answer other questions that were not found on the front page of this product. You can also use the contact option at the top of the page on the right hand side if you want to email or call someone from the company. Learning about new technology can be mind-boggling at first. However, by taking your time and reading about all of the details of this technologically advance program you can decide if this migration upgrade is right for you and your business.