Became a Part of Best Network & Service

Sunday 12 April 2015

CSIRO beats Cisco in fight over logo


By Allie Coyne on Apr 10, 2015 8:04 AM (2 days ago) 
Filed under Strategy

Australia's peak science and research organisation has successfully beaten down an attempt by technology giant Cisco to stop it from registering its logo as a trademark.

In 2012, the CSIRO lodged an application with Australia's trademark office to register its distinctive logo.
However, Cisco took issue with the registration later that year, claiming the CSIRO logo was markedly similar to its own.
At a hearing in February this year, Cisco representative Angela Stark argued that the Cisco logo - a series of vertical stripes representing the Golden Gate Bridge - had been in place in various forms since the company's inception in 1984.
A rebranding of the logo in 2006 resulted in the current iteration seen today.
"[The logo] is a valuable asset to Cisco, and is considered one of the most valuable brands in the world," Stark argued, pointing out that it maintained a top 20 position in the world's top 100 brands as ranked by consultancy InterBrand, currently coming in at number 14.
Representatives from the CSIRO similarly argued that the science and research organisation enjoyed great recognition in Australia.
Its logo is made up of a series of vertical stripes representing a map of Australia.
"Results [from a 2010 Ogilvy Illumination report] showed that the [CSIRO] is the first mentioned organisation doing science and research in Australia for 73 percent of respondents," they argued.
However, the trademark office ultimately disregarded both arguments in favour of discerning whether the two trademarks were deceptively similar in appearance.
It found that Australians were likely to recognise the separate logos as representative of the particular icon each was attempting to convey.
"[The CSIRO logo] is likely to be recognised by virtually all Australians as a stylised rendition of the outline of the continent in which they live," the trademark office ruled.
"Similarly, the device component of [Cisco's logo] bears a marked resemblance to the Golden Gate Bridge in San Fran​cisco. That bridge is of iconic status and as such is likely to be recognised by many Australians."
The office similarly found that it was "most unlikely" an invididual would be confused by the similarity in letters - CISCO and CSIRO - used in the logos.
"'Cisco’ is immediately recognisable as a short-form for the words ‘San Francisco’. The juxtaposition within [Cisco's logo] of the word ‘Cisco’ with the abstract rendering of the Golden Gate Bridge lends reinforcement to the significance and denotation of the other and is likely to be perceived as such," the trademark office found.
While the logos were composed of similar elements, they were "unlikely to be confused".
"As a consequence, there is no significant likelihood of confusion and deception and the Opponent has not established its ground under section 44 of the Act," the office ruled.
Cisco was awarded to pay the CSIRO's costs.

Saturday 11 April 2015

Hack takes down French TV network


By Russell Brown on Apr 10, 2015 6:30 AM (2 days ago) 
Filed under Security

Broadcast, email and social media systems all struck.
The French government is calling an urgent meeting of the country's media groups after a hacking attack on the country's TV5Monde network by a group affiliated to Islamic State.
The attackers took all 11 of the public broadcaster's TV channels off air from 10pm Wednesday to 1am Thursday (local time) and seized control of its social media accounts and website.
The station's Facebook page carried messages reading "CyberCaliphate" and "Je SuIS IS", along with copies of ID cards and other documents purportedly belonging to relatives of French soldiers engaged in the battle against Islamic State.
The Paris prosecutor’s office has opened a terrorism investigation into the attack.
With the assistance of the French National Information Systems Security Agency, ANSSI, TV5Monde was able to begin broadcasting pre-recorded programs across the channels from about 2am and has since regained full control of its channels, which broadcast to more than 200 countries.
But the station's website is still down and employees still have no access to email almost 24 hours after the attack began. 
CyberCaliphate is the same name used by the attackers who took over the US military’s Central Command social media accounts in January, and those of Newsweek magazine in February.
But IS expert Wassim Nasr told the France 24 English channel that there were "weird" anomalies in the messages posted in French, Arabic and English by the attackers, "including many things that cannot be said in Arabic … it looks like Google Translate".
Christophe Birkeland, vice-president of engineering at the US-based security firm Blue Coat Systems, told The Guardian the "initial infection" was "probably either someone’s stolen credentials, probably for remote networking access, or the installation of a remote administration tool used to access deeper and deeper levels of the network and attack systems. Both of these attacks typically use social engineering."
Reports suggest that TV5Monde's internal defences were not robust and once they had gained entry to its networks, the attackers were able to reach the systems controlling playout to air and live broadcasts.
"Social engineering might be incredibly low-tech sometimes, but once you’ve got the compromise, most security systems are not set up to deal with the idea of someone using security credentials in a non-authorised way, which allows attackers to reach even the deepest, most secure sections of a corporate network, which is likely what has happened here," Blue Coat employee Robert Arandjelovic toldThe Guardian.

The mobile-enabled enterprise: Are we there yet?

Apr 10, 2015 05:42 pm | IDG News Service
The potential is considerable, but plenty of challenges remain
by Katherine Noyes


Modern mobile technology may have been born with the first iPhone, a quintessential consumer device, but it wasn't long before the business possibilities began to emerge. Fast forward to today, and it's difficult to find a company that hasn't embraced phones and tablets for its employees to some degree.
It's not difficult to see why. After all, the potential is nothing if not compelling: an untethered workforce equipped with easy-to-use tools for workers to be productive no matter where they are and at any time of day.
That allure, indeed, is surely part of the reason IT organizations will dedicate at least 25 percent of their software budgets to mobile application development, deployment and management by 2017, according to IDC. By that same year, in fact, the vast majority of line-of-business apps will be built for mobile-first consumption, IDC predicts -- and for competitive necessity at least as often as for efficiency or productivity.
The "bring your own device" trend -- in which employees bring their own devices into the workplace -- is one key factor contributing to this massive shift in enterprise computing. It's an extension of the consumerization trend seen in enterprise technology more broadly: People want to have the same mobile tools at work that they've become accustomed to in their personal lives.
"This is a revolution," said Eldad Eilam, CEO of mobile productivity vendor HopTo. "Everyone is looking into BYOD."
A veritable "tsunami of devices" has entered companies as a result, said Rana Kanaan, vice president of products at workspace-as-a-service provider Workspot. Also playing a role, however, is what Kanaan calls "the rise of the corporate citizen": independent-minded employees who place a high value on the ability to work wherever and whenever they want.
Put those two trends together, and IT is left with a very different landscape than what it faced years ago.
"Originally, we all worked on desktop computers in the office," Kanaan said. "Then, in the first generation of the mobile enterprise, we started working from somewhere else, but still on computers; we tried to solve that through desktop virtualization."
When mobile technology first began to enter the corporate world, employers tried to limit it to specific, locked-down devices and applications. But users rejected that.
"The problem is, computing happens everywhere," Kanaan said. "That kind of control doesn't work -- it made users revolt."
Today's workers simply expect to be able to use the technologies they want and to be able to use them any time, said Michael Luu, IS director for the city of Milpitas, California, which uses Workspot's technology for mobile access. "The expectation is that even if you're on vacation, you respond to email," he said. "It's just part of normalcy now."
Vendors of enterprise software are racing to address these new expectations in numerous ways. With its workspace-as-a-service offering, for example, Workspot lets users securely access apps and data from any device, it says.
Enterprise-software heavyweight Salesforce has committed to a "mobile first" philosophy with its own applications, said Anna Rosenman, senior director of product marketing for the Salesforce Analytics Cloud.
"If you look at the consumer space, people spend at least 50 percent of their time on mobile devices," Rosenman said. "We're seeing our users closely mirroring that behavior."
Even Facebook is working on an offering focused on the mobile enterprise: Facebook at Work, which is now in beta.
"The cornerstone of the experience is mobile," said Elisabeth Diana, Facebook's director of corporate communications. "It's a similar look and feel to Facebook; the primary difference is that information shared through Facebook at Work stays within the company."
A handful of companies are currently testing out the technology, and Facebook hopes to expand that number soon, Diana said.
HopTo focuses on enabling mobility while allowing companies to leverage their existing Windows-based infrastructure, including Windows Remote Desktop Services, Active Directory, SharePoint sites and cloud storage services.
"The challenge we're seeing is that many companies have a massive amount of legacy software that's used to run the business," Eilam said. "Converting that for mobile is extremely challenging."
Indeed, even as new solutions continue to emerge, there is no shortage of challenges remaining for today's newly mobile organizations -- and the vendors that serve them.
Security, for example, remains a big one: By the end of this year, only 15 percent of large companies will have adequate mobile security governance, according to IDC.
"Mobile devices tend to store things locally," Eilam said. "That creates a really serious challenge: document sprawl." HopTo's answer to that problem is to keep storage at the back end, he said. Files can be edited remotely but are saved back to the place in which they were opened, such as SharePoint or cloud storage.
Workspot's Kanaan points to a need for what she calls contextual security. The idea is to build security technology that can recognize when a user is trying to get to sensitive data on a mobile device and respond by requiring extra authentication.
"That's a huge industry challenge for us to figure out, especially when you look at regulated industries like health care and finance," she said.
There's also a need for common ground on mobile app development, Kanaan said.
"It's slow and costly to make enterprise apps work on mobile," she said. "We don't have standardization there, and enterprises are still struggling with that."
In short, there's no doubt the process of mobilizing the enterprise world is happening quickly, but there's still plenty to be addressed. Said HopTo's Eilam, "I think we'll continue to see a mix of legacy and mobile technologies for a couple of decades still."




Friday 10 April 2015

Gold MacBook back-orders mean a wait of 3 to 4 weeks

The silver and space gray models are readily available and will ship within one to three business days, according to Apple's retail site. Apple's new, lightweight MacBook is now on sale, and it appears consumers may have started to vote with their wallets on their favorite model. Back orders are the order of the day for the gold-tinted version of the Mac Book, in both 256GB and 512GB models. Customers who purchase the gold Mac Book from this point on will need to wait three to four weeks before they'll get their hands on the device. The silver and space gray models are both ready to ship within one to three business days. Apple will also have stock in stores, but it's unknown how many units of each version will be available in stores. 
The MacBook, priced starting at $1,299, isn't the only Apple product getting attention Friday. There's also the highly anticipated Apple Watch, which became available for preorders first thing this morning and which is already sold out of its initial stock online. Customers looking to buy an Apple Watch now will need to wait until July to get their devices, and that arrival date may be pushed back even further as time wears on.Apple unveiled the latest Mac Book last month at a press event that also brought details of the launch plans for the Apple Watch.
The new Mac Book is quite thin, measuring just 0.14 inch at its thinnest point, and weighs 2.03 pounds.It comes with a range of new features for the Mac line, including a Force Touch trackpad that provides improved cursor control and pressure-sensing capabilities. It also has a new keyboard technology designed to reduce typing errors and a single USB-C port that handles everything from charging to data transfers to monitor support.This year's MacBook is the first in Apple's notebook line to come in a gold model. The others are available in the standard silver.
It's unclear why the gold MacBook is harder to come by, whether the supply is short, period, or demand is intense for the gold model.
Regardless, the MacBook seems to be following a pattern set by the iPhone, which has featured a gold version for the last couple years. The gold versions have been hard to come by when new iPhone models launch and remain so for a period of time after the device's launch. By the look of things, MacBook will be following that lead.
Apple did not immediately respond to a request for comment.