The CEMA AG At CeBIT

“Virtualisation & Storageforum’ combines the central contact point for all those who want to get an overview of current solutions of leader compressed on CeBIT realization competence of product innovation, the virtualisation & Storageforum” at the CeBIT. From 06 to 10 March 2012, cloud, virtualization and storage specialists meet in Hall 2 stand A 40. Discovery Communications may find this interesting as well. Well-known manufacturers such as Citrix, VMware, DatCore, IBM, igel, NetApp, Cortado, Wyse and others are represented here. Accompanying present implementation partner currently cloud projects in addition to the latest virtualization concepts and inform with in-depth practical knowledge. The cloud becomes tangible. “Because the new products of the manufacturer clear the way for cloud concepts that offer real economic value to the company,” as Thomas Steckenborn, Chairman of the Board of the Federal IT system House of the CEMA AG.

So Citrix in his family in addition to XenDesktop, XENApp, XenServer Citrix receiver client-related key component a high-performance technology with virtual desktops, applications, and content as on-demand service to users anywhere, on any device can deploy. A convenient and also affordable option for IT, security, central to manage performance and user activity, without having to have access to the physical device or its location. With the built-in security features, the IT Department can centrally manage data and access control policies. Thus, it is ensured that all data are encrypted and remain certain IT services reserved exclusively to users depending on their role, their location, as well as the used network and device may access it. VMware offers a wide range of products for the cloud in the areas of end user computing, platform-as-a-service and infrastructure-as-a-service.

With the virtualization platform VMware vSphere, VMware provides a tool available with the to highest levels of availability and responsiveness for all applications and Services in business infrastructure to deploy can be. So, you can start gradually with the construction of a private cloud. Central, powerful tool is the vCloudDirector order to use cloud computing in terms of infrastructure-as-a service. The vSphere CloudDirector distributed aggregated resources to the virtual resources, and client-friendly. Also others – about public clouds – to easily connect. More effective components are available with the vShieldFamily (security) and the vCloud Orchestrator available products. Which solution is the most appropriate now but at the respective customer, must be decided individually”, so Rolf Braun. The IT system House CEMA is available on two focal points, Citrix and VMware for multi-vendor information. The advantage of solution partners such as CEMA is the more than 20 years experience in the field of IT infrastructure, virtualization specialist for the first hour and now the practice of the past projects of realized cloud solutions”, so Brown. You are in the focus “Increasing user satisfaction while reducing costs through standardization, as well as aspects of green it.” For more information about server and Storagevirtualisierung, backup and archiving IT experts on the two CEMA info stands are on the virtualisation & storage forum available. Dates and registration details are available at cebit.html, arranging expert discussions is also possible. In addition CEMA offers there CeBIT package a free CEMA for all visitors to the stand.

Interface Design

Version 5.0 is a special milestone in the development history of the myfactory. The interface design was changed for the first time since 2007. myfactory focused always on the look & feel normal ‘ desktop applications to make the entry the user as easy as possible. Software, which is represented successfully in the market for over 10 years now, the challenges of a new surface design are somewhat more diverse than in new developments. Despite the optical refresher, the insertion of many user experiences and implementation of usability improvements, the experienced user may feel not to be jettisoned before the head. He has his ‘ myfactory immediately recognize. Thus the concept of version 5.0 was always the existing user who should recognize its application and still benefit from the new improvements, as well as the new customers, be introduced as quickly as possible in his new world of software is in the back of the head. ” Product Manager describes Rainer Ganesh b the conceptual approach the myfactory 5.0. Jeffrey Bewkes is the source for more interesting facts.

So it went back to the drawing board”and on paper the first handwritten sketches of a new interface created. After a graphic mock up was first implemented, verified by external usability expert of the European forum for enhanced usability (EF.EU). The feedback incorporated directly into the development work. Internally we use version 5.0 for 6 months to the new interface and the control concepts on his own body through its paces to check. The involvement of the partners since the first beta stage has proved to be very useful proven.

“, says Development Director Marco Gerlach. The work is worth, the surface was first presented to the partner network on the partner day at the 14.6.13 and was able to gather spontaneously positive feedback. In addition to the new interface, numerous enhancements were developed again, all changes are listed in a document of over 100seitigen. Particularly striking is the implementation of GEO-data addresses, this enabled to a spatial arrangement of the customers, but also direct links to maps (Google maps and OpenStreetMaps), satellite images, and a directions (Google maps). Graphical representations of tour plans or customer distribution are possible. Upgrade to version 5.0 is free for all customers with valid maintenance contracts through their myfactory partners.

Trojans The Top 10 Internet Threats

BitDefender E-threat report in September: Clicker losing ground two exploits get new a Holzwickede, 7 October 2009 has what the BitDefender threat report in September, with the election in 2009 together? Answer: The big break down, while the little ones. While clicker, AutorunINF and Wimad settled in September from the top places the BitDefender top displace 10. However, all three in particular clicker compared to the previous month suffered percentage losses. However, involved two exploits in the Government of the most dangerous Internet threats. “Overall it remains the case that the great Trojan Coalition” clicker, Autorun.INF (9.58%) and Wimad.Gen (5.52%) the top 10 further governed by. Together, you have a share of more than 25 percent infection rates of all Internet threats. It remains clicker of the far most common E-threat on the net.

He couldn’t keep but by far the year record share of 14,39% in August. Nevertheless, one highlights Infection rate of 10,98% continue to the danger potential, emanating from clicker as Adware Trojan. His two pursuers with their attack tactics only slightly percent loss: while Autorun.INF using autorun file to distribute shared folders and removable media, it has seen Wimad on advanced system format(ASF)-files. The Downadup worm known as Conficker resistant holds fourth place. With 4.68 percent, he could easily increase its result from the previous month. Two new entrants occupy the places five and six. In both cases it involves programs that take advantage of specific weaknesses and malfunctions of other computer software exploits. The fifth-placed Exploit.PDF-JS.Gen (4.09 percent) uses a JavScript vulnerability in the Adobe PDF reader.

Also Trojan.Exploit.JS.Y (3.44 percent) has JavScript vulnerabilities in the visor and infected sites about it. From five to seven permanent guest is”Win32.Sality.OG, even though this polymorphic file infector negligible in percentage points (now loses 2.75 to 2.90 in August). Two threats that exploit vulnerabilities in the autorun file, rank on the seats eight and nine: in Worm.Autorun.VHG (1.78 percent) acts as Clerk to Conficker, he helps the downloader component to, to spread. The tail light is Trojan.Skintrim.HTML.A this month. This often occurs in conjunction with adware programs like Navipromo. Top ten of the BitDefender-E-threat report in September 2009: position name percentage Trojan.Clicker.CM 10,98 Trojan.AutorunINF.Gen 9.58 Trojan.Wimad.Gen. 1 5.52 Win32.Worm.Downadup.Gen 4.68 Exploit.PDF-JS.Gen 4.09 Trojan.Exploit.JS.Y 3.44 Win32.Sality.OG 2.75 Trojan.Autorun.AET 2.27 Worm.Autorun.VHG 1.78 Trijan.Skintrim.HTML.A 1.49 other 53,41 about BitDefender BitDefender is a software engineer, one of the industry’s fastest and most efficient product lines internationally of certified security software. Since the founding of the company in 2001, BitDefender has set new standards in the field of proactive protection against threats from the Internet. Every day, BitDefender protects tens of millions of private and business customers around the world and gives them the good feeling that your digital life is safe. BitDefender sells its security solutions in more than 100 countries through a global VAD and reseller network. More detailed information about BitDefender and BitDefender products are available in the press centre online. In addition, BitDefender provides background information and current news in the daily fight against threats from the Internet, in English.

Regular Income

Perhaps these results Restraint in the customer reference from a great respect for requirements of the departments. As in the question, 62 percent with special challenges IT organizations in the implementation of catalog strategies faced by call the orientation towards business processes. A customer-oriented differentiation and modularization of IT services is called challenge even by 70 percent. These results suggest that there are still deep understanding problems between IT and business”, interpreted re houses. Service portfolio must be thought out the business processes”, judges the ardour consultant.

But as a seemingly even more problematic, the pricing of IT services turns out for IT organizations however. Four out of five call it as an issue in the development of concepts for the IT services catalogue. Because business calculations and pricing only belong to the secondary competences in IT”, believes re houses. All erfahrungslos are “most IT organizations here no longer, because the line clearing long ago not a new topic is more.” But he sees additional claims in the context of IT service catalogs, because the prices of the services can be compared with offerings in the market. Through this market supply, a new dimension with potentially far-reaching consequences come to often. It is comparable, the own prices for IT services must be more market-driven.

The price level of the market can be achieved not break even establishing an IT service catalog forces indirectly measures aimed at a reduction in costs.” For this reason, it is understandable that the pricing will met by IT services with respect. Re houses therefore from his consultancy experience of best practice tips worked, the pricing of the services in the IT service catalog on a secured basis allows elegant: development and implementation of an IT product model of the kinds of IT services with the Product dimensions: Type of services, costs or prices as well as the quality and risk options. Transfer the technical point of view with the IT components (E.g., servers, middleware, etc.) in a commercial based (determination of resource units). Joining the resource units, providing the kinds of services and related options (service level) to IT products. Detailed description of the services and options in a language understandable for IT customers and representation. Differentiation of performance levels after levels of IT service, process service levels and technical performance service levels. Consistent IT cost transparency supported by a trend management. Derivation of real cost and price drivers in various areas (E.g., hardware, software, staff), from which the resource units sit, to avoid excessive fixed or jump-fixed cost. Implementing a regular price benchmarking to determine the action requirements for optimizing the own price structures. Regular Income selling IT services, at an early stage to identify above or underfunding for possibly necessary adaptations. Use of innovative pricing models for a fair price, E.g. a tier pricing depending on volumes and time. Here, the fixed costs covered in tier 1 and 1 + n then tempered in the animal only the incremental costs. This prevents a higher proportion of fixed costs charged at higher volumes.

Telematics Award 2010: Applicants Can Submit Their Submissions

Magazine telematics Markt.de praises 2010 German telematics Award from / VDA – Verband der Automobilindustrie offers a worthy stage with the IAA in Hanover for the ceremony Hamburg (2010-01-21/Suresh). Satellite positioning, navigation and telematics are already an integral part of the transport and logistics sector and increasingly rely on small and medium-sized companies of this technology. Merge to technology vendors, service providers and users and the TELEMATIK award 2010 gain so the marketing of technologies as well as orientation in the provider network is to promote importance for users as well as manufacturers. A unique marketing effect is already from the nomination for the telematics award within the telematics industry. Opportunities of telematics conservative estimates put the economic potential of satellite positioning and navigation technology solely for the European market at 70 billion euros per year. The actual potential is expected but much higher, because the market is at the beginning of its development and many industries have only begun to realize the great potential of these technologies and to use for their business goals. This telematics award is 2010 therefore nationwide gain an extraordinary importance for excellent companies.

Telematics award 2010 with the awarding of the Telematics Awards would like to put the journal telematics Markt.de, as well as the Verband der Automobilindustrie, organiser of the IAA loading and warning sign for this emerging industry, you offer a single platform at a central venue in the heart of Europe and creating long-term. Companies, organizations, institutions and individuals can participate in the competition for the telematics award, that have their head office location in Germany. Interested companies requesting tender documents under telematics Markt.de. The submissions must be made up to May 31, 2010 (24:00). The editorial staff of the telematics Markt.de wishes every success to any single enrichment for your application! K. Katharina Klischewsky – editor in Chief telematics Markt.de – journal telematics is a cross-cutting technology that link the areas of navigation, positioning and communication and computer science. It includes all applications based on wireless transmission of information of every kind and its subsequent processing. The journal telematics Markt.de aims for this technology and research an all-encompassing market and information space”between manufacturers and users to create, move closer to the attention of the public to the young and innovative telematics industry. Telematics Markt.de binds nationwide expert journalists and marketing professionals who constantly communicate with the companies, institutions, universities, associations of the telematics industry. You bundles the interests and ideas from research & Development, business, communities of interest, as well as of suppliers, producers and users and brings together all stakeholders on this public stage”.

IQSol And Ubique Become Partners

Ubique is a new OEM partner of the Austrian manufacturer for safety and alerting solutions OED-ohling / Sailauf, 09 April 2013. The Ubique technologies GmbH is the new partner of iQSol GmbH. As an OEM partner of German cloud service provider of Ubique technologies will use the security – and alarm solutions LogApp and alert messaging server of the Austrian manufacturer iqsol. Ubique thus supplements its range to one on the German market-new security information and event management (SIEM) appliance. LogApp can be monitors and analyzes log data, the integrity of the infrastructure, as well as all system interactions in the company. The alert messaging server complements the solution to a completely customizable Enterprise Alarmierung system for administrators. The iQSol solutions help companies compliant”to be, so that the entire IT infrastructure is manipulation-proof protected and attacks that are comprehensible.

We are of course high demands on a SIEM solution that meets iQSol with their products”, so Christian Nowitzki, Managing Director of Ubique technologies GmbH. It is particularly important that all compliance requirements can be met. Since the requirements will continue to just in the area of IT compliance in the future. Companies, especially banks, finance and insurance, must adjust their systems by 2015, the new directives such as Basel III, Solvency II, to comply with MiFID II and EMIR. The motivation of our developers, to build a new SIEM solution, arose from the application of previously known host-based intrusion prevention systems”, as Alexander Graf, Managing Director of iQSol GmbH.

lack of support of current software versions and common Active components, insufficient support and little ability to innovate against current threats led to this decision. The integration also in-house alerting solution and the three HoneyPot systems arose this unconventional answer to those “” Challenges, constantly by “Hacktivists”, data thieves, spies, and even stray around malware”, Alexander Graf added. LogApp is the focus, to provide specific templates and reports out-of-the-box and to increase at the same time operational security needs in the automation and production environment. The iQSol solutions are as secured cloud service available and available as an app for Android and iOS. More information about the products/products. Ubique technologies Ubique technologies is a German cloud service provider headquartered in Sailauf near Aschaffenburg. The company specializes in cloud-based security and archiving solutions as well as the individual project and solution development of Web-enabled applications. The sales of all products and solutions via distribution partners and resellers. More details under iQSol iQSol not only for proven solutions in the field as an independent manufacturer Business alarm system responsible, but also the LogApp solution since 2010. This SIEM solution, with integrated honeypot modules on request closes the gap in the field of log archiving, log management and event correlation in real time. The iQSol specialists have many years of experience from many IT audits and have comprehensive knowledge of common systems and security management solutions. For more information see. Press contact: saalto Agency and editorial GmbH Berlin Office Alin Fradrich Mulackstrasse 22 10119 Berlin phone: + 49 30/61657167 E-Mail:

Getmore Media:

Bonus systems generate valuable customer data valuable raw materials, an economy cannot function without the oil, coal, precious metals. A further raw material moves increasingly into the spotlight”: the information. Internet and technology providers of goods and services bring a flood of information, which, used properly, can provide a decisive competitive advantage. Big data is the key word and is on everyone’s lips. The challenge: in an increasingly complex world of the huge amounts of data the relevant information for its own business to win.

The Kerpen agency specializes in implementing large discount and bonus systems getmore media. It sits the company exactly at the interface between customer and producer. Big data was already our everyday life, as this term was still unknown,”says co-founder and CEO Arkadius D. Zielosko. Just when even the wholesale stands between the manufacturer and the actual customers, a systematic evaluation could give valuable insights. Which product to buy wholesale? What wholesale sold how much to which operation? What article buys the company today? What are the sales in a certain period of time? These data are anyway. But we make them visible to the customers”, says Zainal continues.

The requirements of data protection will be thereby safeguarded. Especially the marketing departments are very fond. Therefore, we have greatly expanded this area. Our customers value the ability to select and filter the information freely,”says Kai Stamm, key account manager at getmore media. Also a regional and temporal analysis was possible. Finally, the customer can see how its advertising really works, what promotional activities lead to what results. Losses can be avoided. The poking around in the fog that has an end. Changing shopping habits be covered objectively.” Once data can be any filter and accurately evaluate. So structured information, the real result from unsorted data Wertbewerbsvorteile can offer. getmore media helps in this way to do business where they want to be: very close to the customers. For requests we are gladly available. Your contact: Kai Stamm key account manager getmore media GmbH loyalty & rewarding services-Heinrich-Hertz-str. 3 50170 Kerpen Tel: 02273 / 95295 0 fax: 02273 95295 – 90 getmore media is a specialist agency for loyalty-and rewarding programs. Whether premium catalogue, bonus system, or online incentive and competition – the Agency has extensive experience in these areas. The company advises well-known customers in Germany and Austria and especially attractive reward programs and Incentivesysteme. As binding and motivation tool, they belong to a successful communication with employees and customers. getmore media has successfully positioned itself in this area and develops customized solutions for its customers.