357 Lotus blogs updated hourly. Who will post next? Home | Downloads | Events | Pods | Blogs | Search | myPL | About 
 
Latest 7 Posts
IBM and Apple focus on the Enterprise
Wed, Jul 16th 2014 101
CryptorBit Virus
Mon, May 5th 2014 251
Time-lapse of Product Showcase Taken from my GoPro Camera
Tue, Feb 4th 2014 322
Refrigerators Now Send Spam as Well as Keeping it Cold
Mon, Jan 20th 2014 229
Increase in Virus Activity
Thu, Jan 9th 2014 228
Virus Names translated from Chinese
Tue, Jan 7th 2014 202
Notice to Appear in Court
Thu, Jan 2nd 2014 371
Top 10
A spear-phishing attack detailed: Moving from "selling" to "stealing".
Fri, Jul 26th 2013 1841
Notice to Appear in Court
Thu, Jan 2nd 2014 371
Time-lapse of Product Showcase Taken from my GoPro Camera
Tue, Feb 4th 2014 322
CryptoLocker
Fri, Oct 25th 2013 292
Blocking EXE attachments is working great!
Fri, Dec 13th 2013 292
CryptorBit Virus
Mon, May 5th 2014 251
Popular Virus Subjects this Week
Fri, Nov 15th 2013 246
Refrigerators Now Send Spam as Well as Keeping it Cold
Mon, Jan 20th 2014 229
Increase in Virus Activity
Thu, Jan 9th 2014 228
Virus Names translated from Chinese
Tue, Jan 7th 2014 202


Lotusphere Wrapup from the Product Showcase
Frank Paolino    


This has been an interesting Lotusphere from the perspective of the Lotus  Vendor Community.  The feedback I heard, and I talked to as many Vendors as I could without distracting them from their customers and prospects, was that the attendees were more senior and more in decision making roles than last year. There were more attendees from outside the United States which was great exposure to the worldwide customer base.

Attendees were also curious to see what was new, even though they did not have a specific need, they wanted something new and exciting to bring back to their company.

Vendors were also happy with the new  Product Showcase booth layout as it invited people to wander and discover really cool new Notes App that might be in a faraway corner.

There was some vendor complaining "IBM should do this or that", to which I replied (as I always do) that IBM is not responsible for their marketing, they are. I of course encouraged them to list their Apps on the NotesAppStore to add a place where they can be found (All of them responded very favorably...more on that next week).

There was a lot of discussion about the disappearance of the word "Lotus", and the conclusion was IBM was beginning a rebranding process, the purpose of which was not clear to the Vendor community.

Alistair Rennie showed up on the floor, for only a few minutes. He was whisked away before I had a chance to film him taking my "Boardwalking" Lotusphere Trivia questions, but  his presence was appreciated  

This was the warmest Lotusphere in 3 or 4 years while the rest of the United States was getting the worst weather of the winter.

The logistics of smoothly feeding thousands  of people a very tasty lunch in one hour was noted by more than one vendor.

Next week "Boardwalking" Lotus Trivia challenge....



---------------------
http://blog.maysoft.org/blog.nsf/d6plinks/FPAO-8DQH3P
Feb 03, 2011
69 hits



Recent Blog Posts
101


IBM and Apple focus on the Enterprise
Wed, Jul 16th 2014 10:25a   Frank Paolino
Apple is working with IBM to push into the enterprise space. Apple really has mainly focused on the consumer market, but products like IBM Traveler have made BYOD a reality. Now, with IBM, Apple is going to focus on large enterprises. Tim Cook gets a corporate partner with a great enterprise player to promote Apple as enterprise ready. Ginny Rometti mentioned security, which is an overwhelming concern with BYOD. If Apple and IBM make new offerings that satisy I [read] Keywords: ibm traveler apple application blackberry enterprise security
251


CryptorBit Virus
Mon, May 5th 2014 1:25p   Frank Paolino
There is a new and improved version of CryptoLocker. Version 1.0 made the makers of this ransomware a lot of money, and this version 2.0 is, I predict, just one of many new "feature enhanced" releases. Judging by the Bitcoin activity, there are a lot of "willing" victims out there paying to get their files back. BleepingComputer is doing a great job documenting this, so I will point you there for good advice and a possible free fix made by Nathan Scott called the DecrypterFixe [read] Keywords: virus
322


Time-lapse of Product Showcase Taken from my GoPro Camera
Tue, Feb 4th 2014 9:22a   Frank Paolino
I wanted to have a little fun at #IBMConnect so I put a GoPro camera over our booth on the Product Showcase and snapped pictures of all of our visitors over 4 days. The Product Showcase was certainly "energized", so I choose suitable music in the "William Tell Overture". [read] Keywords:
229


Refrigerators Now Send Spam as Well as Keeping it Cold
Mon, Jan 20th 2014 2:02p   Frank Paolino
Refrigerators now do more than keep spam, that tasty treat, cold, they also send spam, the electronic email version. That is the story of a compromised refrigerator that sends cold "spam" to unsuspecting users via it's internet connection. Viruses makers will try to add anything to their botnets, and the latest attack on "refrigerators" does not surprise me at all. The target of this attack was a refrigerator model running a flavor of Linux that had not been hardened or pr [read] Keywords: email linux virus
228


Increase in Virus Activity
Thu, Jan 9th 2014 2:02p   Frank Paolino
The increase in recent Virus activity has been noticeable, and the sophisticated techniques the virus makers use to evade detection make the job of stopping them that much more challenging. Many times, a new message appears and I ask "Is this some new attempt to get me to infect my machine"? Many of my customers ask me the same question, so I put a live stream of recently caught viruses subjects and attachment names on our website. (Obviously, I did not put the viruses, just their names [read] Keywords: virus
202


Virus Names translated from Chinese
Tue, Jan 7th 2014 2:22p   Frank Paolino
[read] Keywords: virus




371


Notice to Appear in Court
Thu, Jan 2nd 2014 1:42p   Frank Paolino
Yes, the title of the blog appears scary and that is what the senders of the email want, to scare you into opening the message and reading the body, then launching the phony "notice". Here is a sample of a phony notice that appears to come from JonesDay. Here are the Law firms that were spoofed in these virus outbreaks, and a sampling of the from addresses that were used. To be perfectly clear, these messages are spoofing the law firms, trying to get the rec [read] Keywords: email office virus
292


Blocking EXE attachments is working great!
Fri, Dec 13th 2013 1:42p   Frank Paolino
We have advised customers of SpamSentinel for the last month to block EXE attachments, even (especially!) inside zip files. I have been monitoring the results on one of our servers, and they are spectacular in catching new virus outbreaks before their "signatures" are recorded. These are "zero hour" zero hour viruses, fresh off the computers of the virus makers. Here is a screenshot showing the recent patterns, piggybacking on popular email types, like airline ticket confirma [read] Keywords: email virus
246


Popular Virus Subjects this Week
Fri, Nov 15th 2013 2:02p   Frank Paolino
There was a lot of virus activity this week. Here is a snapshot of 13,773 caught viruses caught on a single day. The subjects give clues to the latest approaches the virus senders are using in the hope that they can fool the recipient into opening the attachment, which releases the virus. I sorted the subjects and replaced the sender's attempt at making the message look unique with a Fed Express number, a case number or even a phone number with a sequential number, like 123-45 [read] Keywords: office virus
292


CryptoLocker
Fri, Oct 25th 2013 2:22p   Frank Paolino
CryptoLocker is such an evil virus that I wanted to create this resource of useful information and links. Cryptolocker is an extremely dangerous and virulent ransomware trojan. The virus encrypts local and network share drives and then demands either $100 or $300 ransom and gives the user 72 hours to pay. If you see this on your screen, it is already too late. Your files are encrypted and unrecoverable. Your only hope is a good backup. If you read the text, they are [read] Keywords: policies applications email microsoft network security server virus wiki




Created and Maintained by Yancy Lent - About - Blog Submission - Suggestions - Change Log - Blog Widget - Advertising - Mobile Edition