Monthly Archives: June 2019

Hyland Software Named as a Best-in-Class ECM Vendor for three categories in Insurance Technology Assessment

Hyland Software Named as a Best-in-Class ECM Vendor for three categories in Insurance Technology Assessment

CEB TowerGroup recently named Hyland Software a Best-in-Class enterprise content management (ECM) vendor for insurance companies in three categories in its evaluation of ECM solutions providers in the space. Hyland was named Best-in-Class for: User Experience, Enterprise Operations Support and Enterprise Support.

The report identifies both current and future market drivers, identifies the needs of the industry and lists notable solutions providers. CEB TowerGroup selected vendors based on quantitative and qualitative analyses of each vendor’s solution features and functionality, understanding of customer needs and implementation of leading practices to maximize efficiency and ROI.

“Selection as a Best-in-Class solution within CEB TowerGroup’s insurance vendor review verifies the relevance and ongoing benefits ECM solutions can provide insurance companies. It illustrates Hyland’s ability to offer insurers a solution that can streamline their processes, enabling them to run more efficiently and cost-effectively across their entire organization,” stated Cheryl Nulman, Hyland’s insurance industry marketing manager.

CEB TowerGroup named Hyland Software’s OnBase a Best-in-Class solution for:

  • User Experience,  for its attributes that directly contribute to enhancing the productivity of employees across the organization
  • Enterprise Operation Support, for its attributes that support and facilitate business operations enterprise-wide
  • Enterprise Support for Hyland’s influence and ongoing relationship with customers

“Our industry expertise, coupled with the high-value we place on customers’ feedback helps to create leading solutions to meet insurers’ needs. Our agile approach increases our viability in the industry and ensures an advanced solution offering,” Nulman said.

“As insurance executives evaluate new IT products to support their business needs, many are overwhelmed by the volume of technologies available,” said Aaron Kissel, executive director, CEB. “CEB TowerGroup is the only advisory group qualified to evaluate such a broad range of insurance technology tools and to help insurers navigate the increasingly complex landscape.”

*Technology Assessment Disclaimer– CEB does not endorse any vendor, product or service depicted in our CEB TowerGroup publications and does not advise technology users to select only those vendors rated “best in class.” CEB TowerGroup research publications consist of the opinions of CEB TowerGroup’s analysts and should not be construed as statements of fact. CEB disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Hyland Software

For over 20 years, Hyland Software has helped our more than 11,500 lifetime customers by providing real-world solutions to everyday business challenges. That dedication is why Hyland realizes double-digit growth, and why 98 percent of our customer base continues to renew its annual maintenance. Our customers see the ongoing value of partnering with Hyland and continue to work with us year after year.

Seamless integrations with policy administration, core administration and claims management systems speed processing times across the entire insurance lifecycle from underwriting to policy services to claims, which increases customer service. Using OnBase, insurers are able to increase profitability through accurate and consistent underwriting decisions while decreasing response times and costs associated with claims.

Tilera’s TILE-Gx72 Processor Sets World Record for Suricata IPS/IDS: Industry’s Highest Performance

Tilera’s TILE-Gx72 Processor Sets World Record for Suricata IPS/IDS: Industry’s Highest Performance

Tilera® Corporation, the leader in 64-bit manycore general purpose processors, today announced it has achieved the highest ever single-chip Suricata performance, delivering 4x the performance, and 7x the performance-per-watt of a high-end x86 multicore processor. Suricata is the industry-leading open source Intrusion Detection and Prevention System (IDS/IPS) developed by the Open Information Security Foundation (OISF) and supported by the US Department of Homeland Security (DHS) to secure networks against next generation security attacks.

Sophisticated intrusion detection and prevention, such as Suricata implements, requires deep packet inspection and pattern-matching that taxes the capabilities of even the highest performance processors. The Suricata performance achieved on the TILE-Gx72 processor is double that of the previous record-holder, the TILE-Gx36, providing organizations with network security that scales with their networks.

“Tilera’s TILE-Gx processors are continuing to lead the market in Suricata performance and the impressive results with the TILE-Gx72 demonstrates the synergy between a massively manycore processor, coupled with Suricata’s multi-threaded implementation,” stated Matt Jonkman, president, OISF. “With the continuing rise of security threats and incidents, corporate enterprises, carriers and government organizations are adopting Suricata for their IDS/IPS and leveraging the TILE-Gx processor family coupled with the MDE development environment to achieve the best performance.”

The TILE-Gx72 is the world’s highest performance and highest efficiency processor with integrated System-on-Chip (SoC) features including eight 10Gb Ethernet ports, 24-lanes of PCI Express, four DDR3 memory controllers, and 23 Mbytes of on-chip cache. The wire-speed, programmable mPIPE front end processes 240 Mpps of bi-directional Ethernet traffic and improves the efficiency of network-heavy applications. With its exceptionally low power profile, several TILE-Gx72 processors can be populated in a single compact datacenter appliance, providing 576 cores of compute and 640Gbps of packet processing with 8 sockets.

The multi-threaded Suricata IDS/IPS application, version 1.4.0, was ported using Tilera’s Multicore Development Environment (MDE) version 4.1, a full-featured and standards based run-time Linux environment for TILE-Gx processors. The recent “live rule swap” update supports dynamic insertion of new threat signatures into Suricata and enables rapid response to threats such as Zero-Day Attacks.

“We track Moore’s Law with the tile-based architecture and significantly raise the bar with our TILE-Gx72 processor, incorporating twice the number of cores of our previous high-end processor. Tilera’s high-performance iMesh interconnect enables Suricata performance to scale linearly with the additional cores,” said Devesh Garg, president, and CEO of Tilera. “Once again, we are demonstrating that the TILE-Gx architecture provides a real-world advantage in scalable application performance, power efficiency, and overall compute density.”

The Suricata solution is available on all of Tilera’s TILE-Gx platforms, ranging from the TILEncore-Gx series of PCIe cards with multiple 10Gbps Ethernet interfaces, to the TILEmpower-Gx 1RU standalone appliance and the TILExtreme-Gx 1RU multi-socket platform with up to 288 cores of compute.

Cisco’s acquisition of Sourcefire Rp 27 Trillion

Cisco’s acquisition of Sourcefire Rp 27 Trillion

California – The company manufactures and network equipment Cisco Systems Inc. will buy security firm Sourcefire. Companies based in San Jose, California that want to expand their business network security sector.
According to the Head of Business Development Cisco, Hilton Romanski, the company wanted to find a target security firm to grow its business. “We look at the major players security business, Sourcefire apparently the most fitting,” she said on Tuesday (23/7) local time.
With this purchase, the shares of each Sourcefire will be priced at U.S. $ 76. Sourcefire’s stock price jumped 28 percent from Monday’s closing price, U.S. $ 59.08.
Cisco is now focused on the security sector. They will mengenjot safety factor in the hardware, software and cloud. Sourcefire is strong in the security sector, especially the matter of detecting and protecting against any attacks.
According to analysts, this penjuala is expensive but worth it. Because in the security market, the market pie Cisco rivals such as Juniper Networks seized Inc., Check Point Software Technologies, and Palo Alto Networks Inc.. But Cisco reluctant to let market. Cisco Security Head Chris Young said the company will not stop until I can be a pioneer in the field of security.
With this acquisition, research firm IDC rate, Cisco should reach growth of as much as 7.8 percent. Brian White, analyst at Topeka Capital Markets judge, with this acquisition, the kinds of large competitors Dell and Hewlett Packard will also provide bid security for their clients.

3-D Gun Printing: Here’s the Software That Stops It

3-D Gun Printing: Here’s the Software That Stops It

New software has been developed that aims to restrict the manufacture of firearms that have been created using new 3-D technology.

The world’s first gun made using 3-D printing – called “The Liberator” – was successfully fired on May 6 in Austin, Texas. In just three days the blueprint created by startup Defense Distributed to produce the plastic gun had been downloaded around 100,000 times, according to Forbes Magazine.

Anti-gun campaigners have criticized the project, whilst lawmakers in different U.S. states have moved to pass new legislation to prohibit the manufacture, sale and use of the digitally made firearms. And now Danish startup Create It REAL has produced software that it says blocks users from printing guns in the first place.

“The likely buyers are 3-D printer manufacturers who want to minimize their liability risk and offer a firearm parental control feature to their customers,” Create It REAL’s CEO Jeremie Pierre Gay told CNBC.

“The feature creates a unique digital fingerprint of the firearm…the manufacturer could decide to block the print or to simply give a warning to the user of the potential danger.”

The software has taken a year to develop. The firm realized there was a gap in the market after surveying end users and 3D printer manufacturers. Gay told CNBC that his previous job working with Digital Rights Management (DRM) for technology firm Motorola served him well.

“[We realized] people are interested in the ability to put a lock on their firearms at home, the same should be possible on a 3D printer as a parental control feature. I would say that this feature is customer driven even if they did not know they wanted the feature when we asked,” he said.

“The possibility to make a firearm at home is not new, there are many plans on how to do it on Internet, the problem with 3-D printing is that it could become simply too easy, this feature makes it more complicated again.”

Cody Wilson, the man behind nonprofit Defense Distributed was skeptical that the product would actually be able to prohibit the printing of guns, which are produced as separate parts and then assembled. “The Liberator” is printed with hard plastic and fires a standard .380 caliber bullet. The only non-printed piece is a common hardware store nail which is used as its firing pin.

“Such software must walk a very fine line, of which I’ve no doubt it is incapable…It’s interesting PR to the uninitiated only,” the 25-year-old law student at the University of Texas told CNBC.

“‘The Liberator’ pistol is an assembly of over 17 parts, most of which individually would not set off a detection software unless the exact model was blacklisted. Think about it, springs, hammer, even the grip. These are not ‘guns’.”

‘Wild West’ Regulation

Both New York City and New York State have introduced legislation to curb the making of 3-D printed firearms or ban their use altogether and similar bills have been introduced in California. Linda Rosenthal, a New York State assembly member told CNBC that New York’s bill is currently sitting with the Codes Committee after the legislative session ended on June 21.

“I have all intentions of pursuing this legislation next session,” she told CNBC. “The controversy surrounding the passage of the SAFE ACT (the New York Secure Ammunition and Firearms Enforcement Act) will make passing any piece of gun-related legislation that much more difficult, but I think this is a very important issue that must be addressed before the technology becomes widely available.”

New York State should act as a leader to provide a national model for other states to follow, Rosenthal said, and welcomes the new software that she says is effectively the industry regulating its own behavior.

“It is important that industry and government partner with each other to address this issue. Neither acting alone will be able to accomplish enough to deter dangerous behavior….Given that no technology is foolproof, it is critical that the states have strong tools available to discourage wrongdoing and criminalize bad behavior,” she told CNBC.

“3D printing is a very new technology, and in terms of regulation, it is the Wild West out there.”

Despite the issues surrounding the manufacture of firearms, 3-D printing – creating three-dimensional solid objects from digital models – is gathering momentum and is transforming everything from medicine to home goods. Printers that once cost $30,000 now are priced closer to $1,000 and have the potential to rewrite the rules of global manufacturing.

The market for 3-D printing was estimated at about $1.7 billion in 2011 and could hit $6.5 billion by 2019, according to research firm Wohlers Associates.

SuVolta’s transistor technology speed-power benefits are validated in ARM processor

SuVolta’s transistor technology speed-power benefits are validated in ARM processor

The ARM Cortex-M series processor was manufactured with SuVolta’s Deeply Depleted Channel (DDC) technology on a 65 nm bulk planar CMOS DDC process. With SuVolta’s transistor technology, designers are able to reduce power or improve performance, depending upon design requirements.

“ARM’s heritage is based on low power, so technologies that can further improve power consumption, such as DDC technology from SuVolta, will always be welcomed by ARM and our Partners,” said Noel Hurley, vice president, Strategy and Marketing, Processor Division, ARM. “SuVolta has shown that the DDC technology, when incorporated into an ARM processor, can provide additional power reductions or a significant performance boost. As the Internet of Things continues to expand, innovative ultra-low power technology for Sensors and other devices will be vital to ensure that ARM remains at the forefront of this opportunity.”

When compared to an identical ARM Cortex-M0 processor manufactured in the conventional 65 nm process, with a 1.2 V supply voltage, the DDC transistor-based ARM implementation operating at 0.9 V demonstrates a 50 percent lower total power consumption at matched 350 MHz operating speed. There is also a 35 percent increased operating speed (performance) at matched power. In addition there is a 55 percent increased operating speed when operated at matched supply voltage.

“We’ve now validated the benefits of the DDC technology in a complex SoC, by combining the ARM Cortex-M0 CPUs with SRAM instances and various analog components,” explained David Kidd, senior director, digital design at SuVolta. “The results speak for themselves – power-performance optimized CPU cores, with results that hold across process corners and temperature, plus, SRAMs with 150 mV lower minimum operating voltage, 50 percent less leakage power at matched SRAM read current, and more than 5x less leakage power in retention mode.”

“Reducing power consumption and enhancing performance are key to providing next-generation capabilities for a variety of advanced digital products,” said Bruce McWilliams, president and CEO at SuVolta. “By validating the speed-power advantages of the DDC technology in a SoC that includes ARM processors, we’ve reached another significant milestone in demonstrating the value of our technology in a system.”

Gigabyte S1185 Padbook: Relies on Full Screen HD and Full Connectivity

Gigabyte S1185 Padbook: Relies on Full Screen HD and Full Connectivity

Computing products manufacturers from Taiwan, Gigabyte, again presents a PC-based Windows 8 tablet newest Padbook Gigabyte S1185.
Padbook Padbook Gigabyte Gigabyte S1185 S1185: Relies on Full Screen HD and Full Connectivity pc tablet computer news
Gigabyte S1185 Padbook: Relies on Full Screen HD and Full Connectivity
Gigabyte S1185 comes Padbook relying Full HD IPS touch screen measuring 11.6 inches. Performance is supported by the use of an Intel Core i5-337U 1.8GHz (Ivy Bridge) with support for 4GB of RAM and a 64GB SSD. To replace a regular keyboard, Gigabyte S1185 Padbook magnetic kit comes with a keyboard that can dilepaspasang and equipped with various advanced features such as Optical Finger Mouse Buttons and Navigaton and Smart Switch Technology.
Port connectivity is complete enough from its port D-Sub, HDMI, USB 3.0, Bluetooth 4.0, WiFi to support 3.5G (optional). Additionally there is support THX TruStudio Pro technology to accommodate the needs of multimedia such as watching movies, listening to music, or playing games. And present a 5 megapixel main camera and 1.3 megapixel front camera that can be used for video chat.
Datascrip, as the sole distributor in Indonesia Padbook Gigabyte, Gigabyte will price Padbook S1185 with prices ranging from about Rp9.275.000.

Google releases Chrome 28 with Blink browser engine

Google releases Chrome 28 with Blink browser engine

Google on Tuesday released Chrome 28, the first polished version of the browser to use the company’s home-grown “Blink” rendering engine. On Windows, the upgrade also sported Google’s new notification service that lets developers of Chrome apps and add-ons display messages and alerts outside the browser window.

The upgrade was the first since May 21, when Google shipped Chrome 27 and touted some minor performance improvements.

[ Also on InfoWorld: Bug bounty programs provide strong value for Google, Mozilla. | Get your websites up to speed with HTML5 today using the techniques in InfoWorld’s HTML5 Deep DivePDF how-to report. | Learn how to secure your Web browsers in InfoWorld’s “Web Browser Security Deep Dive” PDF guide. ]

Google announced in April that it was dropping the open-source WebKit browser engine — at the time also used only by Apple’s Safari — and was instead launching Blink, a WebKit variant, to power Chrome. Since then, Opera Software’s Opera has also adopted WebKit as an interim step before it eventually moves to Blink.

Google cited difficulties in adapting WebKit to Chrome, and in the first weeks after the announcement, stripped copious amounts of unnecessary-for-Chrome code from the fork that became Blink. Previously, only the rougher “Dev” and “Beta” builds of Chrome relied on the Blink engine. Users can verify that Blink is present by typing chrome://version/ in the Chrome address-search bar, dubbed the “Omnibox.”

Also included in Chrome 28 is new support for more sophisticated notifications that appear outside the browser pane and display even when the browser’s not running. “Packaged apps” — ber-Web apps that look and behave like “native” code written specifically for the underlying OS — and add-ons can push brief messages and alerts to Chrome users after their developers have enabled the feature.

Only the Windows version of Chrome 28 currently supports these next-generation notifications, but Google promised that the feature would soon make its way to OS X and Linux. On a Mac, Chrome notifications are not integrated with OS X Mountain Lion’s Notification Center.

Along with the debut of Blink and notifications, Chrome 28 contained patches for 15 security vulnerabilities, one of them rated “critical,” Google’s most serious threat ranking. According to Google’s terse security advisory, that flaw was a memory management bug — dubbed a “use-after-free” vulnerability — in the browser’s network sockets code.

But while Colin Payne, who reported the bug, received an impressive reward of $6,267.40, another researcher was handed triple that. Andrey Labunets was paid a record $21,500 for filing several vulnerability reports, including two in the Google synchronization service and an unknown number of others that Google said were “…since-fixed server-side bugs.”

That last phrase and the amount paid were clues that Labunets discovered one or more flaws in a core Google service. In April, Google boosted bounties for vulnerability reports in its core websites, services and online apps, resetting the top reward to $20,000 for remote code executable bugs, those that attackers could use to slip malicious code onto a server or into an app or site.

Labunets is no stranger to large bug bounties. Earlier this year, after reporting a string of weaknesses in Facebook’s authentication protocol, Labunets was awarded $9,500 by the social networking giant.

Altogether, Google this week paid bounties totaling $34,901 to six researchers, including Payne and Labunets, for reporting eight different bugs. Through Tuesday, the Mountain View, Calif., company has awarded nearly $250,000 thus far this year in bounties or hacking contest prizes.

Users can download Chrome 28 from Google’s website. Active users can simply let the automatic updater retrieve the new version.

First prize of the Microsoft Bug IE11 So Google Employee Owned

First prize of the Microsoft Bug IE11 So Google Employee Owned

You might remember the prize program offered by Microsoft for anyone who finds a bug in his software? One of the applications included in the program is IE11. And interestingly, the first to earn prizes in finding bugs in IE11 program turned out to be one of the Google employees.

In a statement through the official blog, Microsoft said that they had paid out prizes for IE11. But they did not mention who the person is beruntuh. Furthermore, in another day, one Microsoft employee named Katie Missouris revealed that the lucky person is engineer from Google named Ivan Fratric. It was not clear how many gifts given to Fratric Microsoft.

IE11 program to offer cash prizes worth 11 thousand USD for a finding bugs and ends in late July. Meanwhile, a similar program aimed at Windows 8.1 still ongoing with no time limit.

DataCore Software Builds on Software-Defined Storage Momentum and Names Paul Murphy as Vice President of Worldwide Marketing

DataCore Software Builds on Software-Defined Storage Momentum and Names Paul Murphy as Vice President of Worldwide Marketing

DataCore Software, the premier provider of storage virtualization software, today announced the appointment of Paul Murphy as the vice president of worldwide marketing. Murphy will oversee DataCore’s demand generation, inside sales and strategic marketing efforts needed to expand and accelerate the company’s growth and presence in the storage and virtualization sectors.  He brings to DataCore a proven track-record and a deep understanding of virtualization, storage technologies and the pivotal forces impacting customers in today’s ‘software-defined’ world. Murphy will drive the company’s marketing organization and programs to fuel sales for DataCore’s acclaimed storage virtualization software solution, SANsymphony™- V.

“Our software solutions have been successfully deployed at thousands of sites around the world and now our priority is to reach out to a broader range of organizations that don’t yet realize the economic and productivity benefits they can achieve through the adoption of storage virtualization and SANsymphony-V,” said DataCore Software’s Chief Operating Officer, Steve Houck. “Murphy brings to the company a fresh strategic marketing perspective, the ability to simplify our messaging, new ways to energize our outbound marketing activities and the drive to expand our visibility and brand recognition around the world.”

With nearly 15 years of experience in the technology industry, Murphy possesses a diverse range of skills in areas including engineering, services, sales and marketing, which will be instrumental in overseeing DataCore’s marketing activities around the globe. He was previously Director Americas SMB Sales and Worldwide Channel Development Manager at VMware, where he developed go-to-market strategies and oversaw both direct and inside channel sales teams in both domestic and international markets.

Prior to that, Murphy was senior product marketing manager at NetApp, focusing on backup and recovery solutions and their Virtual Tape Library product line. In this role, Murphy led business development activities, sales training, compensation programs and joint-marketing campaigns. An excellent communicator, he has been a keynote speaker at numerous industry events, trade shows, end-user seminars, sales training events, partner/reseller events and webcasts. Before moving into sales and marketing, Murphy had a successful career in engineering.

“The timing is perfect. DataCore has just updated its SANsymphony-V storage virtualization platform and it is well positioned to take advantage of the paradigm shift and acceptance of software-defined storage infrastructures,” said Murphy. “After doing the market research and getting feedback from numerous customers, it is clear to me that there is a large degree of pent-up customer demand. Needless to say, I’m eager to spread the word on DataCore’s value proposition and make a difference in this exciting and critical role.”

About DataCore Software

DataCore Software develops storage virtualization software leveraged in virtual and physical IT environments to obtain high availability, fast performance and maximum utilization from storage. DataCore’s SANsymphony-V storage hypervisor is a comprehensive, yet hardware-independent solution which fundamentally changes the economics of provisioning, replicating and protecting storage for large enterprises and small to midsize businesses. For additional information, visit the DataCore website at or call (877) 780-5111.

DataCore, the DataCore logo and SANsymphony are trademarks or registered trademarks of DataCore Software Corporation. Other DataCore product or service names or logos referenced herein are trademarks of DataCore Software Corporation. All other products, services and company names mentioned herein may be trademarks of their respective owners.