Media Search:



Tech companies help others, themselves with donations of software

Last month, global engineering firm Siemens made one of its largest donations, valued at $750 million, to the University of Maryland.

It wasnt a financial contribution. Instead, it was a license for its engineering software. Called Product Lifecycle Management, the software simulates the design and manufacturing processes for products such as cars and airplanes. PLM uses real data about the life span of certain parts to predict, for instance, how long a car might last.

In-kind software donations arent new. Microsoft, Apple and Google, among others, have been providing free software or hardware to schools, nonprofit groups and others for more than a decade. Tech companies often use such handouts not only to further a good cause, but also to gain exposure for their products and test new markets.

IT philanthropy can take other forms, as well. Siemens, whose U.S. subsidiary in the District of Columbia took in $22 billion in fiscal 2012, has a separate philanthropic arm donating about $7million annually to educational initiatives in the science, technology, engineering and mathematics fields.

The company distributes its PLM licenses through a program called GoPLM, which makes hundreds of such donations to academic institutions each year. But its not purely philanthropic. Its also intended to develop a cadre of engineers familiar with Siemens products, said Bill Boswell, director of partner strategy. Its a long-term investment in that pipeline of people, he said.

As products become more sophisticated, engineering students need training in technology to help them manage the design of complex products, Boswell said. Cars have hundreds of computers in them, and the cellphone has more processing power and memory than an entire Apollo moon mission, he said.

Although the software is free, universities receiving PLM grants typically pay Siemens an annual fee of a few thousand dollars for access to tech support and software maintenance.

Hardly alone

Siemens is hardly the only enterprise that has built a structure behind its donations. A new collaboration between nonprofit, academic and for-profit ventures called Journey Forward is offering free software to breast cancer survivors and oncologists, helping them to manage care after a patient is discharged from the hospital and to raise awareness of the emerging field of survivorship care.

Journey Forward developed and released the software this year. The group consists of the advocacy nonprofit groups the National Coalition for Cancer Survivorship (NCCS), the Oncology Nursing Society, UCLAs Cancer Survivorship Center, health benefits company WellPoint and biotechnology corporation Genentech.

See the article here:
Tech companies help others, themselves with donations of software

Joomla! sicher machen – Video


Joomla! sicher machen
Joomla! sicher machen aber wie? Wir zeigen es! Von den Grundvoraussetzungen, wie Passwörter, Rechte usw. über Backup-Möglichkeiten und Backupszenarien, bis h...

By: J and Beyond e.V.

Follow this link:
Joomla! sicher machen - Video

Fort Disco malware is now targeting email and FTP servers

News

By Lucian Constantin

September 30, 2013 12:15 PM ET

IDG News Service - A piece of malware designed to launch brute-force password guessing attacks against websites built with popular content management systems like WordPress and Joomla has started being used to also attack email and FTP servers.

The malware is known as Fort Disco and was documented in August by researchers from DDoS mitigation vendor Arbor Networks who estimated that it had infected over 25,000 Windows computers and had been used to guess administrator account passwords on over 6,000 WordPress, Joomla and Datalife Engine websites.

Once it infects a computer, the malware periodically connects to a command and control (C&C) server to retrieve instructions, which usually include a list of thousands of websites to target and a password that should be tried to access their administrator accounts.

The Fort Disco malware seems to be evolving, according to a Swiss security researcher who maintains the Abuse.ch botnet tracking service. "Going down the rabbit hole, I found a sample of this particular malware that was brute-forcing POP3 instead of WordPress credentials," he said Monday in a blog post.

The Post Office Protocol version 3 (POP3) allows email clients to connect to email servers and retrieve messages from existing accounts.

The C&C server for this particular Fort Disco variant responds with a list of domain names accompanied by their corresponding MX records (mail exchanger records). The MX records specify which servers are handling email service for those particular domains.

The C&C server also supplies a list of standard email accounts -- usually admin, info and support -- for which the malware should try to brute force the password, the Abuse.ch maintainer said.

Read more:
Fort Disco malware is now targeting email and FTP servers

Spurs fans persist with 'Yid' chant

Spurs fans persist with 'Yid' chant

8:50pm Sunday 6th October 2013 in National News Press Association 2013

Thousands of Tottenham Hotspur fans have defied police warnings not to use the word ''Yid'' in chants.

The Spurs faithful chanted "We'll sing what we want" and "Yid Army" at the game against West Ham United at White Hart Lane, north London.

One Tottenham fan was arrested after t he Metropolitan Police pledged they would be "on the look out" for football supporters who used the word and Chief Superintendent Mick Johnson, the match commander, insisted that "racism and offensive language have no place in football".

Officers spoke about the issue with fans on their way into the stadium.

The club has a strong Jewish following and its fans have been on the receiving end of anti-Semitic abuse from opposition supporters for many years.

In an act of defiance, some started using the word ''Yid'' themselves.

At the game home fans hailed their own star players by shouting ''Yiddo'' at them. ''Jermain Defoe, he's a Yiddo'' was often heard throughout the match.

On one occasion when Spurs fans sang ''Yids'', West Ham supporters responded with loud shouts of ''Racists! Racists!''

Original post:
Spurs fans persist with 'Yid' chant

Fans defy police with 'yid' chant

Fans defy police with 'yid' chant

6:31pm Sunday 6th October 2013 in National News Press Association 2013

Tottenham Hotspur fans have defied police warnings not to use the word "Yid" in chants.

The Metropolitan Police said they would be "on the look out" for football supporters who used the word during today's home match against West Ham United at White Hart Lane, north London.

Chief Superintendent Mick Johnson, the match commander, insisted before the fixture that "racism and offensive language have no place in football".

The Tottenham supporters chanted "We'll sing what we want" and "Yid Army" as the teams emerged for the game which began at 4pm.

The club has a strong Jewish following as its fans have been on the receiving end of anti-Semitic abuse from opposition supporters for many years.

In an act of defiance, some started using the word ''Yid'' themselves, and chants of ''Yids'', ''Yid Army'' and ''Yiddos'' are regularly sung at matches.

Mr Johnson said: " This topic has been debated at length but our position is clear: racism and offensive language have no place in football or indeed in society.

"Those supporters who engage in such behaviour should be under no illusion that they may be committing an offence and may be liable to a warning or be arrested."

Read the original:
Fans defy police with 'yid' chant