UWF Baseball Hosts North Alabama in an Important Conference Series Share March 20, 2008PENSACOLA, Fla. – The West Florida baseball team plays their first conference home game since winning the 2007 conference title. The University of North Alabama is in town for a three game series with the Argos, beginning Friday afternoon at 3:00 pm for a doubleheader. Then, the series finale is Saturday at 1:00 pm. The Argos are 1-2 in conference play this season, after dropping two of three from Montevallo last weekend. Meanwhile, North Alabama is 2-1, after last weekend’s series victory over West Georgia.West Florida started conference play with an outstanding pitching performance by Kyle Ramsey, who hurled a four hit complete game in a 14-1 win at Montevallo. The Falcons defeated the Argos 12-11 and 8-6 in the other two games. The Argos offense is led by Kyle Andrews, who is third in the conference with an on-base percentage of .520, and has the conference’s seventh best 40 hits so far this season. Andrews is hitting .396, which second on the team to Jimmy Boswell’s .405 average.North Alabama, who is 16-7 overall, is led by Jeffrey Ritter, who is hitting .494, which is the second best in the conference. Ritter leads the GSC in RBI’s with 37, while teammate Matt Horton has the GSC’s seventh best batting average of .444 for the season so far. The Argos’ Greg Pron and Craig Westcott each have 24 RBI’s on the season to lead the UWF attack, while Steven Bingert is third in the conference with four triples.Statistics forecast a lot of runs to be scored at Pelican Park this weekend. West Florida, now 13-17 overall, took two out of three games from North Alabama last season, and finished three games ahead of the Lions in the standings last season during the regular season. This weekend’s games will be broadcast on stretch internet, and available to listen over the phone. Go to goargos.com, and look for the stretch internet link on the right side of the page. Click on the link and look for directions to listen in. Print Friendly Version
Brentford boss Mark Warburton hailed his side’s character and fitness after they fought back to draw 2-2 with Nottingham Forest.The promotion-chasing Bees were two down before Andre Gray scored with 10 minutes remaining, and their late pressure paid off when Jota headed home an injury-time equaliser.Warburton declared: “They never give up. They’ve got that character and also the fitness – don’t forget that, it’s a testament to them and the medical staff.AdChoices广告“Jota scoring with a header shows what the team is about. It’s an important point.”Warburton also admitted he was disappointed with Brentford’s defending in the build-up to Forest’s goals, which were both scored against the run of play.“We had to dig ourselves out of a hole after dominating possession and chances,” he said.“The ball travelled 60 or 70 yards [for the first goal] and that should never happen.“For the second goal, the ball bounced and you need to get to the ball and try to stop that.“With the amount of possession we had we’d have liked to have been in front at that stage.” Follow West London Sport on TwitterFind us on Facebook See also:Last-gasp Jota goal earns point for BeesBrentford boss explains Long’s absence
“I had many thrills in my life, but this one is broad-based and long-standing and for the right purpose. Education for young people and sports, that’s my deal.” – Spence EcclesSALT LAKE CITY — Spence Eccles could be worthy for induction to the Utah Sports Hall of Fame for his exploits on the ski slopes alone, but it’s his influence on sports in Utah makes him an obvious honoree for the Hall.Eccles and BYU athletic director Tom Holmoe are this year’s inductees for the 50-year Gala Celebration, which will be held Oct. 16 at 6 p.m. at the Grand America Hotel. More than 200 former athletes, coaches and administrators from Utah have been honored over the past five decades, and many former inductees will be on hand for this year’s banquet.Eccles, whose name is all over buildings in the state for his philanthropic contributions, was honored at a reception in downtown Salt Lake Tuesday evening in advance of next month’s induction.“For me to be part of the illustrious former inductees is a big thrill,” Eccles said. “I had many thrills in my life, but this one is broad-based and long-standing and for the right purpose. Education for young people and sports, thats my deal. After growing up in Ogden, Eccles was a member of the University of Utah ski team for four years and was named as an all-American. In 1957-58, he was selected to represent the United States at the FIS world championships.He was the chairman and CEO of First Security Corporation until 2000 when it was sold to Wells Fargo Corporation. He began donating to the U. ski program in the 1960s and funded several athletic facilities at the University of Utah, including Rice-Eccles Stadium, the Utah indoor football facility and, most recently, the Utah Ski Team Building.Kem Gardner, a prominent real estate developer and philanthropist, praised Eccles for his role in two of Utah’s biggest sporting accomplishments, the 2002 Winter Olympics and bringing the Utah Jazz to the state.“More than anyone else in the state, he has done more for sport,” Gardner said. “He helped bring the Jazz to Utah. He helped bring the Olympics to Utah. He helped build the stadium for the opening and closing ceremonies. There would not have been an Olympics without Spence. Can you imagine what this state would be without Spence? I don’t want to imagine it.”Former Utah Jazz coach and team president Frank Layden called Eccles’ impending induction “well-deserved and long overdue.”“Spence Eccles is Michelangelo,” Layden said. “He’s a creator. He takes something that ordinary and he makes it so much better. Let’s face it, where would this state be if it wasn’t for the Olympics? How about the Jazz? the Jazz wouldn’t be here if it wasn’t for his hand in keeping them here. He is one of the giants in this state.”Former Utah and Weber State coach Ron McBride praised Eccles for helping Utah football to advance to its present position as a top Pac-12 program and noted that he also funded an indoor football facility for Weber State.
By Paul LeckerSports ReporterMARSHFIELD – The Marshfield volleyball won for the fifth time in a row, defeating Antigo 3-1 in a nonconference matchup Tuesday at Marshfield High School.The Tigers won 22-25, 25-14, 25-22, 25-18.Stephanie Rhodes had 16 kills and three service aces, Ellie Fehrenbach had 27 assists, Anna Ripp added 22 assists, Sara Dasler had 23 digs and Natalie Zuelke had 11 kills for Marshfield.The Tigers will compete at the Neenah Invitational on Saturday.(Hub City Times Sports Reporter Paul Lecker is also the publisher of MarshfieldAreaSports.com).
Why Tech Companies Need Simpler Terms of Servic… Top Reasons to Go With Managed WordPress Hosting Tags:#Product Reviews#Trends#web Related Posts A Web Developer’s New Best Friend is the AI Wai… HiveLive, a B2B social software platform provider, brings the social web to businesses by providing them with customizable tools like user profiles, blogs, discussion forums, wikis, and RSS which they can skin, edit, and secure easily, and without any coding. The platform is based on a building block called a “Hive,” whcihc can be configured to support a range of community activities, like concept brainstorms, product feedback, design reviews, voting centers, and much more. Recently, HiveLive announced a new partnership with Responsys, a marketing firm whose client list includes some big-name brands like Apple and Salesforce.com. Enterprise 2.0 is sure to follow.Responsys may not be a name you know, but you’re sure to recognize those of their clients – besides Apple and Salesforce, Responsys provides services to brands like Avis Europe, Continental Airlines, Deutsche Lufthansa, Land’s End, VeriSign, E-Loan, Harley-Davidson, Kendall-Jackson, Wells Fargo, Orbita, RSA, Petco, AOL UK, 20th Century Fox, Corel, philosophy, Avery Dennison, Lego, and more.What Responsys offers their customers are on-demand email and marketing solutions that can be anything from web sites to email to mobile. With the new partnership with HiveLive, they can expand that offering to include enterprise social networks. The partnership between these two companies is another step forward for the combination of social tools and big business. Companies are beginning to realize that the way that they should be communicating with their customers today is not through traditional marketing messages which try to convince customers of the company’s value, but by allowing customers themselves to be a part of the process. Online communities, like those that will be provided by HiveLive, will offer opportunities for companies and their employees to connect with their customers in a more collaborative, cooperative way. HiveLive Application Building (image courtesy of VentureBeat)This “Enterprise 2.0” trend fits nicely alongside the move many companies are making towards becoming more transparent. A year ago, Clive Thompson wrote an article for Wired entitled “The See-Through CEO,” about the shift in corporate values – Secrecy is dead, being “liked” is important, and customers are becoming working partners,” the article states. “The new breed of naked executives also discover that once people are interested in you, they’re interested in helping you out – by offering ideas, critiques, and extra brain cycles,” writes Thompson.Jeffrey Clayton, VP of Strategic Alliances at Responsys agrees, acknowledging that these new methods “dramatically boost customer engagement and sales,” and by partnering with HiveLive they will give their clients “another way to reach their customers that builds on the power of community.”HiveLive claims to be “the first community platform to seamlessly integrate social networks with information networks,” but in truth they compete with other similar offerings like Jive’s ClearSpace, Drupal, and Ning. ClearSpace, a roll-your-own platform, may offer HiveLive some good competition as it’s based on Java, a technology that tends to be easier to integrate into enterprise IT, whereas HiveLive is based on LAMP (Linux, Apache, MySQL, and PHP), like much of Web 2.0. HiveLive should have an advantage over Drupal and Ning, though since Drupal requires coding and Ning doesn’t offer the permission levels and granular control that HiveLive does. sarah perez 8 Best WordPress Hosting Solutions on the Market
Therefore iCloud could be noteworthy for having (at least thus far) not been a spectacular failure. But the brilliance of Apple’s marketing has left many with the impression that iCloud has no direct competition with Android. What Android does lack, and what iCloud does provide, is a context of the service as an ever-present resource that’s attached, albeit ethereally, to the iPhone, iPad, and Mac. Of course it’s an Apple-only service, but haven’t all Apple-produced disk drives since 1978 been Apple-only? From Apple’s perspective, why must a virtual device, by definition, be more platform-agnostic than a physical one?Because it’s just another Apple device, it’s programmable like an Apple device. Developers can build apps around it, and create new functions and methods that Apple Corp. hasn’t even foreseen. For any other platform, this would be a great thing; from Apple’s perspective, it could easily become perceived as an effort by independents to trim their way through Apple’s carefully walled garden. Expect some “openness” issues to crop up around iCloud throughout 2012.1. Evernote. Bill Gates was known to have overused the word “great” during his press appearances as the head of Microsoft, so there are probably thousands of sound bites of the phrase “great apps” just waiting to be compiled into the next great, annoying YouTube mash-up. Only a few apps get to be described as things of beauty. Top Reasons to Go With Managed WordPress Hosting 8 Best WordPress Hosting Solutions on the Market At its core, Evernote does one thing, and does that very well. It collects clips of data from the Web sites you’re reading or the applications you’re using, and gathers them into categories that can be synced in the cloud and accessed from multiple devices. I noticed Evernote had pervaded the apps repertoires of many of the Syracuse University students we covered during last month’s MLB.com Apps Challenge. Now that laptops, tablets, and in some universities, thin client desktops are the principal research tool of every scholar, Evernote has quickly risen to the level of ubiquitousness among this specific class of users – as invaluable to the work they do as Twitter.Whether Evernote rises to the level of “beauty” depends on whether it raises its batting average of late. My friend and colleague Joe Brockmeier discovered the latest app in the Evernote ecosystem, called Hello, was perhaps a little less than half-baked. Nevertheless, the core of Evernote has joined Box.net, Dropbox, and Google Docs as the very definition of “cloud app” among users who know the cloud, and who truly do get it. 6. Joukuu. We introduced you to this storage maintenance service last month, calling it a “cloud cloud.” It’s a Web-based console for displaying in a single list the contents of files stored to Google Docs, Box.net, and Dropbox (Microsoft SkyDrive support still forthcoming). When you work with many colleagues on a project, and they all subscribe to different services (often the case with independent contractors who happen to be paired together), Joukuu is a true timesaver. And the drag-and-drop functionality of its outside-the-browser app saves you about a thousand clicks per day. RWW’s The Consumer Cloud series by Richard MacManus:The Consumer Cloud: Your Next Big Home Computing ProjectHow to Store Your Files in the Cloud, and Why You’d Want ToWindows 8 Will Bring Personal Cloud to BillionsCloud Drive ComparisonHow to Get Started With Apple’s iCloud (for new users)Making the Transition to Apple’s iCloud (for MobileMe users)Should You Move Your Files to Amazon’s New Cloud Drive? 2. iCloud. The establishment of Apple’s stronghold in devices, and the services that support them, was deliberate, systematic, and in almost every aspect of its execution, brilliant. The exception was MobileMe, a service whose frequent slip-ups and uncharacteristically dramatic failures led Steve Jobs to openly declare its launch “not our finest hour.”RWW’s The Consumer Cloud series by Richard MacManus:The Consumer Cloud: Your Next Big Home Computing ProjectHow to Store Your Files in the Cloud, and Why You’d Want ToWindows 8 Will Bring Personal Cloud to BillionsCloud Drive ComparisonHow to Get Started With Apple’s iCloud (for new users)Making the Transition to Apple’s iCloud (for MobileMe users)Should You Move Your Files to Amazon’s New Cloud Drive? A Web Developer’s New Best Friend is the AI Wai… 5. Hojoki. (If you weren’t looking carefully enough, with definitions of Joukuu and Hojoki, you’d think this would be a foreign language course.) Entire billion-dollar-plus industries are built around so-called “collaboration platforms” that enable sharing and versioning of documents among members of teams. And yet there are individual cloud apps (Beanstalk, Dropbox, Evernote, GitHub) that are involved with the individual tasks around collaboration, and which all have managed identity, but which are not linked together.So it really took more clever observation than creative genius to create Hojoki, but the premise works just the same as if genius were involved from the beginning. Hojoki is a messaging system that looks an awful lot like something you’d see from Salesforce. It builds a stream of people with whom you’re already sharing contacts, and lets you organize them into groups for collaborative projects. The activities that all of you share within that group are pipelined through the Hojoki stream to everyone in that group, so it becomes an automatic task progress monitor. The service is currently in beta, although it’s already made significant inroads, and there will be a business model attached to a premium service once the beta cycle is complete. 4. Do.com. Nothing more thoroughly demonstrates the rapidly changing state of the applications market in general than the fact that Microsoft Outlook’s greatest competition in over a decade comes from something that isn’t really an e-mail client. Do.com from Salesforce includes the level and ease of functionality for file sharing and collaboration that enterprises may have already attached to Outlook by way of add-ons, but which aren’t available for everyday Outlook users.And by tying Do.com to Gmail as its primary messaging service, Salesforce is wedging itself beneath Outlook and threatening to uproot it from home users’ and small business users’ systems. Do.com may not be a threat yet to Exchange, though it may put a dent in Hosted Exchange services for smaller businesses. Nonetheless, it’s demonstrating that even an e-mail client with “2010” in its name is looking more and more like “1980.”3. Spotify. The reason for the decline, if not yet outright collapse, of the global recording industry is that it is has not been meaningful or desirable for consumers to own music. The industry’s principal delivery system for music, even to this date, remains a container that consumers no longer want; and the system that consumers prefer, and which a majority of them now actually use, is something that the industry has yet to truly embrace. Services like Last.fm and Pandora are more convenient than music ownership and, for more users today, more interesting than radio. For the last few years, many everyday folks who’ve been asked in surveys, “What is a cloud application?” have either guessed wrong or said they don’t know. Folks don’t know what “the cloud” is, and for the most part, that’s not their fault. Unlike the Internet, which truly is a single network of interconnected resources, “the cloud” is more of a concept, one which can be leveraged by marketing departments to mean just about anything.For this year’s ReadWriteWeb list of the most important and influential consumer-grade cloud computing apps of the year 2011, we focused our gaze on services that truly fit the formal definition: specifically, services that 1) utilize a remote resource of 2) variable capacity 3) which the user can provision for herself, 4) which is mostly or totally independent of programs installed on the user’s devices or PCs, and 5) which is not just a Web site with a big server. You may have seen Facebook on some publications’ Top Cloud lists already; by our definition, Facebook is not a cloud service. But we did look for providers that perform innovative, discrete functions built around their services.Not every entry on our list is new this year, but they have all done something innovative within 2011. Keep in mind also, these are consumer cloud apps – things that an individual would use for her personal work or livelihood. We’ll have a separate list later on for enterprise cloud innovations of the year. The functionality needs to be delivered from the cloud app, as opposed to installing an application on a PC or smartphone that just happens to borrow cloud storage.Hosting services are not cloud apps for purposes of this list; and there are plenty of innovative hosts to consider (we gave serious thought to Wistia), but in the end we decided that a hosting service is not really an application unless it provides a discrete function that goes over and above simple storage or sharing. Analytics, which Wistia provides, is right on the edge, but it’s really a measurement of a byproduct of using the service as opposed to a function that users actually perform. That’s not saying Wistia isn’t a great idea; it just belongs on another list.10. CloudApp. The largest single category of cloud apps for consumers is storage and retrieval, which is understandable because it’s a service that everyone needs to one degree or another. What’s interesting is how certain services innovate on this theme, and especially whether they give themselves room to continue innovating.CloudApp is for Mac OS and iOS users at the moment, and its innovation is that it’s building a little ecosystem around itself. It utilizes your choice of quick-and-easy gestures for designating a file or object to send to CloudApp’s storage, the most basic of which is dragging and dropping the object to CloudApp’s icon in the taskbar. In exchange for this gesture, CloudApp produces a URI which is copied to the Clipboard. From there, you can paste it into an e-mail, a tweet, or an IM message; when your recipient receives the link, she has instant access to the object.The way CloudApp innovates is by incrementally enhancing what can be easily uploaded, and how those objects can be utilized in their native context. One example is screenshots: You can designate a key for taking a screenshot and uploading it in one fell swoop; the recipient sees your link, clicks on it, and sees your screen. There’s no exporting or importing necessary here.But what hoisted CloudApp onto our Top 10 list this year is how well the company is promoting Raindrops. This is an extremely clever, self-promotional idea for enabling developers to build their own tools that utilize CloudApp in similarly contextual ways, with the help of CloudApp’s own API. One example the company created at the time this feature was launched in April 2010 is for Adobe Photoshop; since then, the community has contributed a truckload more, including an intelligent link interpreter for Twitter and a stand-alone CloudApp client for iOS called Stratus. Audiobox.fm, launched last year, is the streaming service that folks need anyway: one which enables them to store the music they own in the cloud ($3.99 for 11 GB is pretty fair) and also play that music from any device using the service’s own media player. ITunes users who were a bit discouraged last year by Audiobox.fm’s dedicated player were treated this year to the option of streaming their own M3U files from cloud storage, to their player of choice (with variable results, especially in the case of Winamp, but not for lack of trying). Related Posts 7. Audiobox.fm. My wife and I are both Pandora fans, although last year I found it ironic that both of us had been working – albeit without admitting it to ourselves – to make Pandora play music we actually already owned. Yes, that sounds like a pathetic waste of precious seconds, but there it is. Okay, maybe there aren’t a thousand Waze users in a city like mine (Indianapolis) just yet, but it’s surprising what you can find. There’s updates on traffic accidents and reported police sightings (which are rarer in some cities than others). What Waze demonstrates is that there are ways of making use of data that can be collected passively from a crowd of users, in ways that do not jeopardize privacy.8. Box.net. This is one of the services that comes to most folks mind when they know what a cloud app is. What’s kept Box.net in the news, including just this month – and what keeps Box.net on our list this year – is a constant stream of innovations. Customizable synchronization is one example from last fall; and earlier this month, a completely revamped iOS app that enables features like uploading photos and videos to discrete folders. This puts Box.net on a par with dedicated photo-sharing services that simply can’t expand its features list to Box.net’s size. And just this morning, the company launched an enterprise-grade option for unlimited storage. Tags:#2011 in Review > Best of 2011#web#Year in Review 9. Waze. What would be nice is if someone hired a few thousand cars to drive around each town looking for traffic incidents, and report on them in real-time. Let’s see, $25 bucks per hour salary times 1,000 reporters times 50 cities… I’ll get back to you on that idea.Or, what would be brilliant is if someone leveraged the platform that’s already in existence to enable a few thousand folks to do this job passively and voluntarily. Waze is a system that utilizes the GPS information being pinged back from iPhone, Android, Windows Mobile, and Symbian devices. It’s been in existence since 2006, but last October the 3.0 version of the service introduced a fabulous new feature (so far, just for the iPhone users) that integrates with Twitter. This way, people can tweet on what’s happening in their neighborhoods (including the good things, like street fairs) from right where they’re standing. Why Tech Companies Need Simpler Terms of Servic… scott fulton Spotify gambles with the notion that $9.99/month subscriptions to its premium mobile services (estimated last month at about 2.5 million) will be enough to pay down the royalties it undoubtedly owes for all its users, including those who use the free Spotify Radio desktop app to choose the music they want from Spotify’s huge library. RWW’s John Paul Titlow has been covering Spotify and Spotify Radio very thoroughly, in part 1 and part 2; and RWW’s Jon Mitchell named Spotify #6 in his list of overall Top 10 Consumer Web Apps for 2011.But what made Spotify qualify here again as a Top Cloud App is something it didn’t have last year: an apps ecosystem of its very own. If you’re thinking we’ve screwed up and posted a picture of Last.fm instead… well, it’s no screw-up. Spotify’s new desktop application, with music recommendation apps built-in, is so strong that it includes Last.fm as one of its recommendation providers, along with Rolling Stone magazine and TuneWiki.When fully built out, the Spotify apps ecosystem will enable what the company is calling an “authentication layer” between record labels, app developers, and users. The technology that the record industry could not find it within itself to build for itself, may just end up being built for it. When that happens, it may have a certain deity to thank, followed immediately by Spotify. Here’s an example (above) of another add-on you can’t even see (which is a good thing): The maker of SparrowMail used CloudApp’s API to develop a way to do simple drag-and-drop of attachments into e-mail messages, bypassing Mac OS’ sometimes convoluted series of steps.Building a community around something as simple as an app is a difficult thing for a small company to achieve, especially when it’s in competition with a plethora of other vendors in the same category. CloudApp is pulling this off brilliantly. (It’s worth noting that the service is built on the open-source Heroku platform from Salesforce, thus answering RWW’s question from last year on whether developers will trust Heroku: Yes.)RWW’s The Consumer Cloud series by Richard MacManus:The Consumer Cloud: Your Next Big Home Computing ProjectHow to Store Your Files in the Cloud, and Why You’d Want ToWindows 8 Will Bring Personal Cloud to BillionsCloud Drive ComparisonHow to Get Started With Apple’s iCloud (for new users)Making the Transition to Apple’s iCloud (for MobileMe users)Should You Move Your Files to Amazon’s New Cloud Drive?
End Part IIHaving minimized the damage of the first attack, the IT staff will continue to prepare in anticipation of more cyber attacks. Antivirus is a must for any IT infrastructure. Without it productivity is quickly reduced as viruses run rampant in the environment. Keeping Antivirus installed and up to date is vital to ensure continuity of business services. In Part 2 the IT team for Mighty Modern Marketing is put up to the challenge of protecting their network from viral attacks. Using Symantec End Point Protection, Altiris and the Intel vPro technology, they work to ensure that the viral attack and subsequent virus attempts fall ineffective. If you have not read Part 1 in this article series, please refer to it as this is a continuation of the story begun there: Mighty Modern Marketing HQ – Boston, MassachusettsThe commuter rail stretched out across the Charles River, but Jessica Langley didn’t notice. Her eyes remained fixed upon the screen of her smartphone, scrolling through the emails that continued to pour in. The subject lines all contained the same word. Her shoulders hunched, feeling like a tremendous weight settled on them. She closed her eyes briefly, rubbing at them with her left hand, the PDA held forlornly in the right.When she opened her eyes the word jumped up at her.Virus.This wasn’t the first time this had happened at Mighty Modern Marketing. Viruses routinely showed up as email links or attachments, and it didn’t matter how often she or Tevita sent out stern emails reminding people to leave email attachments and links alone unless they were expecting them. People continued to click that link to see the latest movie trailer, or to run the fun and exciting application their aunt or long-lost friend mysteriously sent them from out of the blue.This time was worse. She’d painted a large red X on her by pushing the Intel vPro technology, and now it seemed everyone stared at her when anything ill befell the network.She jumped to her feet the moment the train stopped, snatching up her purse and bolting for the nearest door. As she ran down the platform towards the exit of North Station, others gave her curious looks. She smiled briefly. Normally people ran towards the train to avoid missing it. She often saw them frantically running in high-heels or other dress shoes towards a departing train when the work day was over. Who wanted to run into work?As she staggered into the main lobby at work, glad for the cool air that greeted her, she vowed to start exercising. She hurried through the building.”I’m glad you’re here early,” Tevita said in his deep voice as she fell into her chair. “We’re in trouble.””I noticed,” she said in-between deep breaths. “What’s the situation?””I’m not sure, but somehow a virus was planted on a new system as it came online. It appears deliberate.””But… we have Symantec End Point Protection (SEP). It should keep everything out…”Tevita smiled, though his eyes shifted to his own monitor, his shoulders shrugging uncomfortably. “Yes… about that. You see, the base image hasn’t been updated yet to include that…”Jessica stared at him.He waved a hand at her. “I know, no need to look at me like that. That’s what I’ve been doing; recreating the image so it’s there from the get-go.”She tried not to groan. “So how widespread is it?”He laughed, though no humor made it into his tones. “All over the place. They used a vulnerability in one of Bobby’s applets to spread it. Of course the first thing it did was disable the antivirus. If SEP had been installed it has protection against… Anyway, those systems without SEP are all hit.”Tevita’s eyes glanced up, and widened. Jessica whirled to see Bobby walking up, his hands shoved in his jean pockets. He stared at the floor, his mouth moving as if he counted his steps.”Bobby?” she inquired.He looked up, looking like a boy lost out in the desert.”It got through my firewall!” he exclaimed, extracting his hands so he could ball his fingers into fists. “It shouldn’t have been able to do that. I can’t even use IM.”Tevita gestured to an empty chair. “Have a seat.”Bobby slumped into the chair. “Whoever sent us this thing knew what they were doing,” he said with a scowl. “The cursed thing used UNC to move about the network. Only someone with intimate knowledge of our network could do that. It has to be New Nifty Networks!””Do you really think…?” Tevita began.”Bobby,” Jessica said quickly. “Have you fixed the vulnerability?””How can I?” he lamented. “It jumped from computer to computer, and with mine infected I quickly turned it off. I need your to help me get that virus off so I can patch the applet.”Tevita smiled. “You actually walked over here.”Bobby looked up, his frown deepening. “Yeah? So?””It’s unprecedented… You usually stay in your cave, even during power outages. Does it make you nervous to enter the world of real people?”A flush bloomed on Bobby’s sunken cheeks. “Not everyone’s as social as you.””You should stop by more often so…””So you can ridicule me?” he retorted.”Guys,” Jessica said, rolling her eyes. “Focus here. Bobby, do you have one of the new vPro systems?””Yes, of course,” he responded, “I always get the latest hardware from procurement.””Hey, why don’t I see any of it?” Tevita blurted.Jessica ignored him. “Good,” she responded to Bobby as she turned back to her computer. She launched the Altiris Console. “If you have one, it should already be provisioned. Let’s check the All Provisioned Computers collection… is this yours?””No, my computer is named Superman.”Tevita laughed, and Bobby managed to turn an even more alarming shade of red. Jessica kept her expression passive despite the twitch in her lips from a potential laugh. The computer name Superman showed in the list, and she double-clicked on it. She clicked on the Real-Time tab, entered her credentials, and loaded the Hardware Management page under the Real-Time System Manager, Administrative Tasks folders.”I have a boot ISO of Symantec’s Antivirus scan,” Jessica explained as the hardware management page loaded. “I’ll just turn on your machine but use IDE Redirect (IDER) to load the antivirus disk. We’ll wipe the virus, and turn the system off.””That’s great,” Bobby said as he shrugged his bony shoulders,” except the minute you bring it back up the virus will propagate again.”Jessica smiled. “Not if I invoke a Network Filter.””What’s that?” Tevita asked, as if on cue.”Tevita, we’ve covered this. It’s the Intel System Defense. You know, block all traffic except to certain ports and IP Addresses. If you want to read up on it I’ll email you the URL. (.””System Defense!” Bobby exclaimed. “I read up on that technology. I created a script that provides a text interface where you can specify which ports you want to allow. I call the API’s provided by Intel’s SDK. It’s great stuff.””RTSM and Task Server already have it configured to only use communication to them,” Jessica said, trying not to smile.”Oh.” Bobby cleared his throat as he pushed himself up onto his feet. “That sounds good. Do you need me to stick around…?”She gave him a grin. “Just for a minute while I do this.”Bobby sat back down, but leaned forward, staring at her monitor. Tevita slid over, looking on with interest. She said a quick silent prayer that it would all work like she theorized it would.She choose the ‘Power on’ radial option, and under the Redirection options checked the ‘Perform boot from’ checkbox. She also checked the ‘Display task progress and remotely control computer’ option. Under the device drop down she left it at CD image, and then click ‘browse’ and located the Symantec ISO. She lastly clicked ‘Run Task Now’.A new window popped up, showing the computer boot. It loaded the CD and a textual menu showed up giving her scan options. She initiated the scan.”Looks like it’s working,” Tevita said.Bobby nodded. “I had my doubts since I’ve been unable to ever get Wake-On-LAN to work across my router…””Wake-On-LAN packets don’t get by any of our switches are routers,” the Tongan responded. “I believe you’re the one who recommended the network security scheme we use.””I know, but Altiris did have an Altiris Agent mechanism to try and deal with it, but I couldn’t get it to work in my environment. This vPro stuff sure made that easy. I didn’t have to touch the router.””That’s the point,” Jessica said with just a hint of exasperation in her voice. “Were both of you sleeping when I gave my presentation on vPro last month?”Tevita smiled, tugging at his collar. “Have I ever mentioned I don’t like PowerPoint?””Only twice daily. But I showed demos… oh who am I kidding? That’s the last time I supply lunch before a presentation.”The two men exchanged glances with sheepish grins, and then focused back on the screen. She looked back to the scan. It finished quickly, showing the virus as detected and quarantined. She closed the remote window and clicked on the Network Filtering node under Administrative Tasks in the Real-Time Console. She checked the ‘Override default solution settings’ checkbox and changed the radial selection to ‘Filter network traffic other than to and from the Notification Server’. She clicked Apply. When the page finished refreshing it contained the message, “Machine was successfully moved into quarantine”.”Alright Bobby. I’ll use the Power Control to boot your machine up so you can Patch your applet and install SEP. You head back and get it done ASAP. Once it’s patched I’m going to mass-remediate all the vPro systems doing the same actions we just did except on a mass scale with Task Server.”Bobby jumped to his feet. “Sounds good. IM me if you need anything…””Except IM won’t make it through the Network Filter,” she responded dryly.”Ah… yes. Well… you know where I am.””Quick question, how long will it take you?””Less than an hour.”As Bobby walked away Tevita smiled hugely, some of his natural humor finally flowing back into his features. “He’s a real gem.””You should cut him some slack,” she scolded.”Bobby? I’m holding back, really I am. It’s just too much of a temptation. He’s classic nerd. But he is a master at what he does, so I’ll be sure to keep it friendly.””I’m reassured,” she said, rolling her eyes for the third time that day. She then gave him a sly smile.”What?” he said, his smile drooping. “You have that look.””Regardless of blame, even though you should have updated the image weeks ago to include Symantec Endpoint Protection so I blame you for this mess, I need you to create a CD out of the Antivirus boot ISO and load SEP on a flash drive so you can manually remediate those systems without vPro.”Tevita swallowed. “Hey, we’ve had a pretty busy workload…”She softened her look. “I know, sorry. Anyway… when you get to each system, yank the network cable, use the ISO to clean the virus, then load SEP, and then put the cable back in. I’d even suggest making several copies so you can do a handful at a time. And here’s a printout of all non-vPro systems.”Tevita took the printout and nodded. “I’m on it.”Jessica focused back on the Altiris Console after Tevita left clutching ten copies of the ISO and SEP installer. She browsed under Manage, Jobs, Tasks and Jobs, right-clicked on Jobs, and choose ‘New Folder’. She right-clicked on the new folder and choose ‘New > Task/Job’. In the resulting window she choose ‘Server Job’ under the ‘Jobs’ folder. The first element popped up a message from a VB script stating that an emergency procedure would fire in 60 seconds, and instructing the user to save all data. Her second task was a ‘Boot Redirection Task’ that booted up a modified ISO that automatically ran the scan and took any appropriate actions against detected threats. The third task invoked the Network Filter, allowing only NS and Task Server communication capability with the system. For the fourth Task she located the SEP install Tevita had made with Altiris Software Delivery Solution and put it into a Task Server Deliver Software Task. Finally she created the fifth and sixth tasks that removed the filter and invoked a reboot to finish the process.She saved the job and selected her own system to test it.”Mrs. Langley,” a familiar voice prompted. Normally she caught movement in the mirror mounted on her flat panel monitor when someone walked up to her, but she’d been so focused that this time she started almost violently in surprise, whirling around in her chair.Edgar Watts stood behind her, his hands conspicuously empty of printouts. Her first impulse was to point to her screen and tell him she had a plan with vPro to take care of the virus in a timely manner.She rose to her feet, trying to place a polite and not strained smile on her face. “Hello Mr. Watts.””Since my computer is down, I’ve been using my laptop to research the impact of viruses to corporations, specifically impacts to finances.”He frowned, briefly rubbing a forefinger along his jaw. He didn’t immediately continue, his vexed expression seeming to say he was seeing those numbers again and loathing what he saw.”We’re working on it,” she said, trying not to sound defensive.”I know,” he responded. “I’m astounded at the amount of this company’s hard-heard cash flow flowing down the drain.””We’ll have your and all vPro enabled systems up within the hour,” she said, forcing that smile to remain on her face.””One hour?” he responded, looking down at his watch as his brow drew low over his eyes, almost like a thundercloud.She braced for some kind of outburst, feeling sour in the pit of her stomach. It seemed like her stomach wanted to remain clenched, and she couldn’t relax the muscles in her shoulders. What more could she do? She often woke in the middle of the night, her sleep-clouded mind immediately whirling through all the issues she needed to address immediately. She needed to prove vPro, identify and eliminate any threat from their nefarious competitor, keep Edgar’s expense-cutting knives away from her department, and still find enough time to enjoy time with her husband. Lying awake at night, trying to will herself to sleep, got old fast. Two days ago her husband had recommended quitting.That seemed wrong. She’d never given up on anything in the past, and she didn’t want to give up on this now, especially when all of Mighty Modern Marketing needed her at this critical time.When Edgar looked back up from his watch he smiled, a rare sight that stilled her thoughts, her breath catching in her throat.”All vPro capable systems, you say?” he asked.”Yes sir,” she responded after a moment of stunned silence.”I came down to wish you luck, but perhaps you don’t need that luck after all. Good day, Jessica.”He turned around and walked away, and she stood and stared at him. She almost chuckled, but she still felt too emotionally invested and she just might break down and tear up. She slowly sat back down, staring at the Altiris Console. With renewed vigor she tested her job, made a few tweaks to the command-line of the rollout job, and then brought up a Run Now window, selecting All Provisioned Systems. Her mouse hovered over the Run Now button.”Come on Bobby,” she whispered. The few minutes before the IM popped up declaring “Applet is patched” seemed like an eternity.She clicked the Run Now button.She got up and took a quick water break, grabbing a drink and throwing it down as if a shot in a drinking contest. She didn’t want to return to her desk. What if it failed on most systems, especially the executive team’s? What if she hadn’t accounted for different hardware platforms in her job? What if?She squared her shoulders, throwing off the ‘what if’ game. She walked resolutely back to her desk and sat down, refreshing the job.Ninety percent success rate brought a smile to her lips.For the next few hours she used RTSM to connect to and patch those systems where the Task Server job failed for whatever reason. Most she could figure out the issue by using RTSM, aided by the article, , since RTCI was the component that executed most Task Server and RTSM commands against AMT.Toward the end of the business day she leaned back. All vPro capable systems, a good 75% of the environment, was patched. Just as she shut down her computer Tevita showed up. His natural good humor managed to put a smile on his face. His long-sleeved dress shirt had the sleeves rolled up, his tie loose and top button of his collar undone. Sweat glistened on his forehead, remnants of computer dust bunnies streaked on his hands and forearms.”Hi!” she said, unable to keep from smiling in amusement at him.”Let me guess,” he said, his smile twisting a little, “you’ve managed to patch all vPro systems.””Yes,” she responded, putting her purse back down on her desk. “How’s the other systems coming?””I’m… uh… half done.”She nodded, picking up her phone. “Tevita, give me just a moment. Hi, Rob? I’m fine, though it looks like I’ll be here a while. It’s mostly under control, but we have a few more systems to fix. I know, I’m sorry. I’ll see you later tonight, honey. Love you too, bye.””What are you doing?” Tevita asked, frowning.”We need to finish up, right?””Well… yes. But you don’t really have to…””I’m thinking your wife wants to see you at least some time tonight. I’ll take the third floor, you finish up the second, and the last one done has to bring donuts tomorrow.”Tevita looked relieved. “Deal. Thanks, Jessica.”Bobby walked up, a laptop case in his hands. “I’m heading out. Thanks for getting me back up so fast.”Jessica turned to him, her smile growing. “Bobby, we need your help,” she said without preamble. “We have a few more systems to remediate…”Bobby shook his head, his expression tightening. “No way, I have a Halo 3 party…””Bobby, you can’t abandon us…”Bobby looked down at the case in his hands. “Ah nuts! You don’t know what this does to me. I’ll lose my leader spot…””You’ll make it up,” Tevita said confidently. “If we get this done quickly imagine how impressed they’ll be when you join late and still take the top spot.”Bobby’s stricken look abated. “Yes. Yes, that would be impressive. Ok, I’ll help.”Hours later Jessica left the building, running towards North Station to catch one of the late trains home, her shoulders feeling much lighter than when she’d rode in.
We’ve told you once. We’ve told you twice. Heck, we’ve told you four times: if you’re still running Windows Server 2003, you need to take action as soon as possible because the EOS is fast approachingOpens in a new window on July 14th, 2015.Need a refresher on what lies ahead? Well, good news, we’ve put together all the information you need to stay safe.The upcoming Windows Server 2003 EOS means Microsoft will not be issuing any patches or security updates after the cut off date. While hackers are off rejoicing, this raises major security issues for those still running Windows Server 2003. And that appears to be quite a few of you.According to SoftchoiceOpens in a new window, a company specializing in technology procurement for organizations, 21 percent of all servers are still running Windows Server 2003. More worrisome is that 97 percent of all data centers are still running some form of Windows Sever 2003 within their facilities.But migrating from Windows Server 2003 and ending up with proper security doesn’t have to be a pain. In our previous posts in this series, we’ve highlighted three different options for migration and how to secure the target environment. Let’s recap them here:Option 1Opens in a new window: Upgrade to Windows Server 2012Because Windows Server 2008 will be losing support in January 2016, it’s a good idea for organizations to directly upgrade to Windows Server 2012 R2. This will require 64-bit servers and a refreshed application stack for supported configuration.Likely, your organization might be looking to invest in a hybrid cloud infrastructure as part of this upgrade. Depending on what a server is used for, you’ll need optimized security solutions to secure your private virtual machines.Intel Security has you covered. No matter what you’re running, you should at least employ either McAfee Server Security Suite EssentialsOpens in a new window or McAfee Server Security Suite AdvancedOpens in a new window.If you’re running an email, sharepoint, or database server, consider McAfee Security for Email ServersOpens in a new window, McAfee Security for Microsoft SharePointOpens in a new window or McAfee Data Center Security Suite for DatabasesOpens in a new window, depending on your needs.Option 2Opens in a new window: Secure the public cloudAs the cloud ecosystem matures, the public cloud is becoming a reasonable alternative for many infrastructure needs. However, one issue remains: while public cloud solutions secure the underlying infrastructure, each company is responsible for securing their virtual servers from the Guest OS and up. Meaning, you’ll need a security solution built for the cloud.Luckily, we’ve a solution that will help you break through the haze and gain complete control over workloads running within an Infrastructure- as-a-Service environment: McAfee Public Cloud Server Security Suite.McAfee Public Cloud Server Security SuiteOpens in a new window gives you comprehensive cloud security, broad visibility into server instances in the public cloud and dynamic management of cloud environments.Option 3Opens in a new window: Protecting the servers you can’t migrate right nowFor the 1.6 million of youOpens in a new window that are behind schedule on Windows Server upgrades and won’t be able to migrate by the EOS date, you have a tough challenge ahead. Hackers know full well that Microsoft won’t be patching any newly discovered security issues, and as such, your servers might be a target.But it’s not all doom and gloom – Intel Security can tie you over and keep you protected, until you’ve finished migrating.With McAfee Application Control for ServersOpens in a new window, you can command a centrally managed dynamic whitelisting solution. This solution will help you to protect your unsupported servers from malware and advanced threats, by blocking unauthorized applications, automatically categorizing threats and lowering manual input through a dynamic trust model.Make your migration easy and get started today.Be sure to follow along with @IntelSec_BizOpens in a new window on Twitter for real-time security updates. Stay safe out there! Windows Server 2003 EOS This blog post is episode #5 of 5 in the Tech Innovation Blog Series View all episodes >Opens in a new window or view previous episode
TagsTransfersAbout the authorFreddie TaylorShare the loveHave your say Southend chairman confirms interview for Ex-Man Utd, Celtic striker Larssonby Freddie Taylor24 days agoSend to a friendShare the loveFormer Celtic and Manchester United striker Henrik Larsson is meeting with Southend chairman Ron Martin about the club’s managerial position.Larsson was in attendance as the Blues lost 1-0 to Accrington in League One at the weekend.While there are other managers interested in the job, including Kevin Bond and caretaker Gary Waddock, Larsson is the high profile option.”We know the qualities within the manager that we are looking for but the combination of those characteristics or persons are not always available and it’s right we carry out, as we are, proper due diligence in arriving at the right choice,” Martin said to reporters.”Henrik Larsson is obviously one of the individuals that we have been interviewing but he is not the only candidate and no decision has been made as I write this statement.”I am going to Stockholm in the morning, back in the afternoon, to meet potential ‘back room staff’ but that’s it, gathering information. There are five shortlisted candidates and Gary Waddock is certainly included.”It’s sometimes difficult for the assistant to step into the shoes of the manager but in this instance Gary has had very considerable experience and he is well-placed to stamp his authority.”
Florida Softball Mother DanceAnyone who’s ever been to a college softball game knows that there is a lot of cheering and a lot of taunting. But one Florida softball fan (presumably the mother of a player on the team) took it to the next level Wednesday night.In the sixth inning, with Florida leading Michigan 4-1 in the championship game of the Women’s College World Series, the Wolverines intentionally walked Gators star Lauren Haeger both to avoid her and set up a potential double play. It did not sit well with everyone in attendance.Nice chicken dance, Florida Mom. https://t.co/dUaJUGKMRU— Drew Hallett (@DrewCHallett) June 4, 2015The move did eventually pay off, as Michigan got out of the inning without any damage. But Florida still won the title. We’ll assume this woman was happy with the overall result.