GulfTech Magazine
IT comes to You. Articles, Case Studies, Classifieds and more inside
GulfTech
Issue 3 - July 2013
Identity Theft
In Detail The Art of Authentication REVIEWS
INSIDE
LATEST UPDATE
SAMSUNG NOTE 3
Privacy of your Data
Windows Blue
A look into its latest features and expected launch.
When your data is your currency, what does your privacy cost?
A first-hand look into the latest update from Windows 8.
Editors Page
Multi-Factor Authentication
T
he stress for advanced online security methods continue to grow via newspapers, articles and social media. The need for identity theft prevention is obvious. Every day, I receive spam messages that phish for passwords, attempt to have me login to a bank site, a fake Facebook website, or try to get me to login to a doggy PayPal site to reveal my password. By time, it gets really annoying. Though how can one stop such emails from third-world countries, untraceable servers or even bots that send thousands of emails a minute to numerous inboxes. How did they get my email address in the first place? Do they know more about who I am? Most of the people I know are logged into Facebook 27/7. They share personal information and images throughout the web, without understanding how their data is being sent out to be viewed by people, whom they never met. In the same way, don’t like feeling paranoid when I go to a coffee shop and connect to their WiFi. And I really don’t like knowing that somewhere, someone spends their days trying to empty my bank account. Call me paranoid, but I’ve been playing around with WiFi networks in multiple coffee shops in Bahrain just for a laugh, renaming WiFi hotspots “Free Coffee at the counter” or “Free Refills at the counter”. The security on those routers makes you think, whether someone can actually send Trojans or viruses to your laptop. Multi-factor authentication is the answer. Indirectly, we can use multi-factor authentication for password-protected websites and services. It’s necessary. It’s no longer an option not to have this capability. We don’t balk at using SSH to connect to a remote system or at using HTTPS to connect to a website. It takes one piece of hardware to secure X amount of people connected to your website or services. Note that multifactor authentication is a two-way process, people using those websites and service should also understand why they should go through a 2-step process to authenticate themselves. Today, we find remote wipes for our smartphones and devices that make us feel secure and a step ahead of thieves. Though what about our data? Our information stored on servers across the world? I am not saying start an alias account or get a fake name online, but always ask yourself how much of YOU should be shown to everybody. When I get an email from HSBC stating my card has “expired” and I should enter my card details online for
2
www.gulftechmag.com
a new one, I don’t buy it though others might. Which brings us to a cross-road, who is responsible for bring cybercriminals to an end? If I went knocking door-to-door with a fake business card stating im from HSBC, I’d find a police car chasing me within 30 minutes. Not that I would do it. Multi-factor authentication will stop a lot of identity theft that’s associated with stealing passwords. There are other types of multi-factor authentication that don’t involve one-time passwords using a random number key fob device. There are biometric schemes, random multiple question authentication, and services that allow you to more securely connect to sites and services with less chance of a stolen ID. The problem with passwords is that the simple ones can be guessed, attacked with dictionaries, or brute force guessed. Complexity helps some but it also causes people to write down passwords or to use something simple. Even worse, the same password can be used on every site. These weaknesses make multi-factor authentication a ‘must.’ In this issue, we tackle different authentication methods to secure your server, website, laptop and even your WiFi access point. We also explain how social media websites, who give users free access to share information to friends and family, for free. Have a look at The Art of Authentication and When your Data is your Currency and send me a quick email on your views. I would love to know how you, the reader, think of the two subjects. - Hamad Al Sindi hamad@gulftechmag.com
Contents
Contents
P8
ISSUE 3 | JULY 2013 | GULFTECH MAGAZINE BAHRAIN
P4
eGovernment Awards 2013
P6
News: Around Bahrain
P8
The Art of Authentication
P10
Gadgets and Smartphones
P13
Banking and IT
P14
Knowing your Form Factors
P16
iConnect 2013
P17
GISEC Dubai 2013
P18
The Future Printed in 3D
P20
When your Data is your Currency, What Does your Privacy Cost?
P22
Winodws Blue : The Latest update from Windows 8
P25
1001 Network Technologies: Interview with Mr. Sediqqi
P27
5 Ways Google Translate Can Rock Your World
P28
The Chief Data Officer Rises
P30
Jazz up your PowerPoint Presentations
P32
IT in Healthcare
P34
Around the Gulf
P36
Jobs Offered
P37
Sell IT
P39
Highlights & News
The Art of Authentication With identity theft rising, know how to fight cyber attacks when it hits you
P14
Know your Form Factor Before you buy your new device, know what your options first
P18
Contents Copyrighted 2013Š Reproduction in whole or part by any means without the consent of the publisher is prohibited. For subscriptions, visit www.gulftechmag.com Advertising rates are available upon request. The publication of any advertisements in GulfTech is not necessarily an endorsement of the advertiser or of the products or services advertised. Articles and letters are welcome and can be mailed to the address below. The publisher reserves the right to edit, reject or comment editorially on all material contributed. Team Members AbdulRahman AlSindi Managing Director
Kaaviya Ram Publishing Director
Hamad Al Sindi Executive Editor
Taryn Aldrich Illustrator
Poly Joseph Account Manager
James Hick Design Editor
GulfTech Magazine In Association with Transworld Information Technology W.L.L. Publication Š P.O. Box : 10929 Manama , Bahrain Tel : +973 17740300 Fax : +973 17740989 Email : info@gulftechmag.com Website : www.gulftechmag.com
The Future Printed in 3D Consumers can now printed threedimensional objects right from home
P39
BlackBerry Messenger coming to Android and iOS Its happening, BBM is coming to your smartphone
www.gulftechmag.com
3
EGov Awards 2013
E-Government Awards of 2013
H
.H. Shaikh Mohammed bin Mubarak Al-Khalifa, Deputy Prime Minister and Chairman of the Supreme Committee for Information and Communication Technology (SCICT), inaugurated the Bahrain International eGovernment Forum 2013 in its sixth edition. The forum is organized by the eGovernment Authority (eGA) in cooperation with Bahrain Internet Society and the Project Management Institute (Arabian Gulf ).
THE WINNERS OF EGOV 2013 AWARDS
Twenty-one local, regional and international speakers and more than 800 participants attended the forum. Sessions at the event focused on trends in information technology and eGovernment, particularly on the use of social media. The participating bodies adopted award standards and requirements based on international practices as essential principles in their work and projects and have taken them as indicators of success to provide citizens with better services. Such steps reflect a laudable growth of awareness and valuing of excellence. “The Committee’s task was not only to identify and rank the winning works, but also to assist those that did not reach the winning stage by supporting these entities with prepared reports for further development. The reports include jury members’ notes and instructions to enhance the unsuccessful projects, with clear and precise recommendations,” stated Millard. “The eGovernment Authority has taken the position of encouraging innovation and supporting excellence through the eGovernment Excellence Award, as it has become one of the ways of promoting such culture and adopting it as a platform.” Stated eGovernment Authority Vice CEO, Dr. Zakareya Ahmed AlKhaja. The winning projects in the Government Sector category will be officially qualified to represent the Kingdom of Bahrain at the GCC eGovernment Award 2013, which will be organized in the United Arab Emirates (UAE) at the end of this year. Furthermore, GCC eGovernment authorities have approved the standards and the eGovernment Excellence Awards in Bahrain as it aims to exchange and develop experiences in various ICT areas between these nations.
eService Award eMaturity Award Best eProject eContent Award eEducation Award eNGO Award ICT Solution S.P.
Ministry of Muncipalities Affairs & Urban Planning Ministry of Works Ministry of Social Development Ministry of Finance Gulf Petrochemical Industries Co. Bahrain Deaf Society Bahrain Business Machines
eEconomy Award (Non-gov.) ALBA eConcept Award
Yousif Moh’d Al Ghawas
eConcept Award
Haya Hassan Al Doseri
eCitizen Award
AbdulAziz Bu Haji
eCitizen Award
AbdulHussein Ahmed
5
Around Bahrain: The Latest News from Around the Kingdom VIVA Bahrain clinches another Award Ministry of Works Implements in ‘Best in Customer Satisfaction’ Green IT VIVA Bahrain, the Kingdom’s most innovative telecom provider, has received the prestigious “Best in Customer Satisfaction” Award at the 2013 Middle East Call Centre Awards ceremony held in Dubai earlier this month.
Works Ministry Information Technology Director Hisham Sater announced the launch of Green Information Technology Initiative, following the success in the application of the Green Building Technology.
Andrew Hanna, VIVA Bahrain Chief Commercial Officer said: “Our mission is to add value and make the lives of our customers easier by delivering differentiated customer services and providing the highest quality in the way we serve them. We are thrilled to receive this prestigious award, which reconfirms our commitment of providing superior experience to our customers at all our touch points.”
Sater explained that such strategic initiatives support the Green Information Technology Culture, which seeks to find sustainable solutions to reduce pollution and carbonic fingerprint; thus positively serving the environment related objective in Bahrain Economic Vision 2030, which takes into account public and health safety on the individual and group level and the public environment level.
He added, “We acknowledge the good work of all VIVA call centre staff for their dedication and service round-the-clock which has earned us this award, something that would have been impossible to achieve without them.”
This initiative aims to enhance staff awareness about their environmental role, create an environment friendly office culture through preserving nonrenewable resources such as papers and cartridge, save electricity power, recycling and other practices that contribute to the preserving the environment.
Batelco Wins Deal of the Year Award at TMT Finance 2013 MENA
The Information Technology Directorate transformed paper documents to electronic documents to reduce paper consumption, which was done through the activation of the EDMS at the offices of the top management, in addition to exchanging fax machines for an electronic fax and activating the communications system and electronic documents.
Batelco Group, the international telecommunications company with operations across 16 geographies, has been presented with the ‘Deal of the Year’ award at TMT Finance 2013 Middle East & North Africa Conference & Awards, held in Dubai on Tuesday 23rd April. The award in the Deal of the Year category is presented for the outstanding telecom transaction, be it a merger, acquisition, IPO, debt funding or private placement, involving a telecom company in or from the Middle East North Region during 2012 – 2013. Deals were evaluated based on their size, impact and market outlook. Batelco Group was presented with this coveted award for its acquisition of Cable & Wireless Communications (CWC), Monaco and Islands Division. Batelco Group recently completed the acquisition of CWC’s interest in Dhiraagu in the Maldives, Sure in Channel Islands and Isle of Man and CWC’s operations in Falkland Islands, St Helena, Ascension and Diego Garcia (“SADG”). Batelco also acquired 25% shareholding in Compagnie Monégasque de Communications SAM (“CMC”), which holds CWC’s 55% interest in Monaco Telecom. TMT Finance Managing Director Dominic Lowndes said that Batelco was the natural choice for this years award due to the scale and opportunity presented by their CWC acquisition.
6
www.gulftechmag.com
The directorate has also activated the virtual desktops initiative by replacing 30% of PC servers with virtual desktops, thus reducing maintenance costs and saving energy. Also, most of ITD’s systems have been installed on 110 virtual desktops and the automatic suspension system for computers has been implemented, also to save energy. In an attempt to change staff behavioral habits, awareness campaigns were held, all of which contribute to creating an efficient, sustainable and responsible environment. Other practices will also be applied in the future; reflecting the Ministry’s keenness to preserve environment, increase green spaces and reduce pollution resulting from the use of resources and electronic equipment, which increase carbonic emissions and global warming.
Zain Bahrain launches new premium service Zain Bahrain has launched “Signature”, a new premium service platform, as it seeks an edge in the fiercely competitive domestic telecom market. Announcing the launch during a Press conference at the company’s corporate office in Seef yesterday, Zain Signature director Hisham Abu Alfateh said the innovative experience-based service is packed
Around Bahrain
with a host of high-value benefits and rewards. Zain will be providing the value-added luxury lifestyle services through Bahrain Concierge, the local subsidiary of Kuwait Concierge. “The service is tailored to meet the needs of VIPs, business owners, corporate executives, and anyone who appreciates the finer things in life,” Mr Alfateh said. “Customers not only get exclusive telecom-bundled services with benefits such as free international minutes, free roaming minutes and free devices, but also lifestyle perks such as a concierge service, personal assistants and messengers and complimentary airport lounge access across the world,” he added. “The service is available under three tariff plans, with the entry level package at BD60 per month. “The mid-range package is for BD100 a month and the top-end comes for BD150 a month.
Forty Companies to Participate in Bahrain Pavilion at the largest ICT Exhibition –GITEX More than thirty ICT companies are expected to be part of Bahrain Pavilion at gulf information technology exhibition - GITEX 2013. The leading ICT international exhibition will be held in Dubai between the 20th and 24th of October. WorkSmart for events management, the organizer of Bahrain Pavilion announced that the first phase of registration has been completed with twenty tamkeen-approved applications; seeing that the semi governmental organization is supporting eligible companies to participate in the exhibition. The participation this year is going to be the largest since the last six years; as organizers already expanded their capacity to accommodate maximum exhibitors during the second phase of registration.
Tamkeen, twofour54 enter into two year media training pact
(CEO), Noura Al Kaabi.
Tamkeen entered into a BD600,000 public relations and graphic design professionals programme with twofour54, said the Senior Manager Human Capital of Tamkeen, Amal Kooheji. The two-year contract was signed by Tamkeen Chief Executive Mahmood Hashem Al Kooheji and twofour54 Chief Executive Officer
The agreement is expected to benefit Bahrainis availing training in public relations and communications and graphic design. Tadreeb, the training academy of twofour54, will train 100 young Bahrainis.
Batelco launches entrepreneur support programme Batelco announced the launch of an entrepreneurs support progamme. It is expected to encourage aspiring young entrepreneurs to develop and implement their ICT business ideas. The programme has been developed in line with Batelco’s ideas Centre, a state-of-the-art facility featuring the latest communications technologies, located at its Hamala headquarters. Batelco’s ideas centre, opened in November 2012, recently launched its own website to give an overview about the technologies on show there. Aspiring entrepreneurs are invited to view the new ideas Centre website to find out the innovative projects Batelco is currently working on. Furthermore, they may apply online for the opportunity to use Batelco’s incubation services, available at the centre’s entrepreneurs zone, to set up or evolve their ICT business idea. Batelco claimed it is the only player in Bahrain’s ICT industry offering services for entrepreneurs to work on and develop their innovative projects.
Mumtalakat Supports e-Shabab 2013 for Innovation Projects
Mumtalakat Holding Company, announced today its Diamond sponsorship for e-Shabab 2013, the Innovation in Technology Conference and Innovation Competition. The event is held under the patronage of His Excellency Shaikh Fawaz bin Mohammed Al Khalifa, the Minister of State for Communications Affairs, and will take place at Bahrain International Exhibition and Convention Centre from 1st to 3rd July 2013. The event will showcase the ambitions and innovations of Bahraini youth in the ICT sector. Commenting on the sponsorship, Mr. Mahmood Hashim Al Kooheji, Chief Executive Officer of Mumtalakat said: “We are pleased to sponsor e-Shabab 2013. Such events promote positive change in the community. Encouraging entrepreneurship is an important element of Mumtalakat’s Corporate Social Responsibility strategy. Through supporting such events, we seek to create innovative leaders who can come up with alternative thoughts to develop our economy.” “We invite innovators to participate and benefit from the Innovation in Technology Conference, a unique and breakthrough event in Bahrain”, he added. The event is entering an advanced stage with the introduction of the first Innovation in Technology Conference. Four hundred delegates are expected to participate in the conference, where 20 speakers will address diverse topics in the area of innovation and ICT.
The public relations programme will accommodate 50 students and the cost per student will be BD2,500 she added. The cost per student for the graphic design course is BD9,000, she said. “While the public relations course will be bilingual, the graphic design course will mostly be in Arabic with some focus in English,” she said.
www.gulftechmag.com
7
The Art of Authentication Don’t be a victim of Identity Theft
Y
ou don’t need to be a security expert to understand that attackers too numerous to count are constantly barraging companies and users with threats targeting their information. Even worse, the attacks grow in number and sophistication every day. The result is that users and organizations spend an inordinate amount of time, money, and resources mitigating these threats. This includes implementing various forms of authentication on personal devices and corporate infrastructures to verify the right people are granted appropriate access and privileges. Here we’ll review different types of authentication, means of implementation, and best practices to employ to resist any Identity Theft Attacks
IDENTITY AUTHENTICATION As the phrase suggests, “identity authentication” is essentially the act of ensuring someone is who he says he is—a process vital to personal and business situations for keeping unauthorized users and employees from accessing certain data, applications, networks, and other resources. Depending on the solution used, the authentication process generally requires providing one or more forms of proof of identity. Security experts and professionals often categorize these requirements into information a user knows (such as a password), something a user possesses (such as a security card), and information unique to a user (such as a fingerprint). Speaking of personal usage, think of the security passcode you can set up for a smartphone. Although another user might
come to physically possess the smartphone via theft or loss, he would still have to enter the passcode to access to the smartphone’s contents. In terms of business authentication, consider a password, fingerprint, or security access card an employee must provide before, say, gaining entry to a data center or accessing a corporate application. Some solutions enforce two-factor authentication in which a user must provide two types of identification, such as something he possesses and something he knows; an example of this is an ATM card and a PIN. Three-factor authentication entails providing three forms of identification; in this case, a user might provide a password, a fingerprint scan, and a randomly generated code from a key fob before gaining access to a corporate application.
PASSWORDS Companies have traditionally made use of usernames and passwords for employee authentication. Over the years, however, as instances of cyberattacks have increased dramatically and attackers have obtained scores of customer and user passwords, the appropriateness and effectiveness of username/password authentication has come into question. Still, many (if not most) companies continue using passwords alone for authentication purposes. Security experts say, “In theory, though it would be terrific if organizations were able to employ multi-factor authentication to access every
QUICK FACTS It is reported that every 3 seconds, a new victim falls under Identity Theft 3 out of 5 victims of Identity Theft did not know the source of their funds In 2012 more than 12 Million people were victims of Indentity Theft
8
www.gulftechmag.com
Art of Authen. application, that isn’t practical from a cost or use case for most companies. This is particularly true for smaller organizations.” In many cases, a strong password might be sufficient. The issue, however, is that companies often implement password policy and management poorly. We have to agree that implementing two-factor or multifactor authentication for every situation would be ideal, but it isn’t always practical. Companies should definitely consider two-factor authentication, though, if they allow employees to work remotely or use personal devices to access corporate resources.
MOBILE DEVICES A mobile device can actually serve as a second authenticating factor. If a company doesn’t allow remote workers, then IDs and passwords might be satisfactory for employees who have limited access to sensitive data and corporate resources. Overall, if employees are using remote connectivity tools, Cloud services, or mobile devices, IDs and passwords offer only basic security. Enterprises should implement either two- or multi-factor authentication or set privilege levels for different employees. Many companies continue to use usernames and passwords solely because they’re the status quo, according to trade analysts. Still, according to a recent Quocirca survey, 70% of enterprise organizations asked responded that it was either “true” or “somewhat true” that they no longer relied exclusively on username/password combinations. It is sometimes unclear whether it’s best for enterprises to require two- or three-factor authentication. For any application or asset where the data associated with it is deemed critical, confidential, or even sensitive, multi-factor authentication might be the best route. Other authentication options include the use of tokens (e.g.,, via USB key fobs) and biometrics (in the form of face, voice, iris, or fingerprint recognition systems).
ALTERNATIVES There are any number of alternatives to traditional IDs and passwords that might, in the appropriate case, be the way to go for an organization and an application, but some of these may be better used as a supplement (such as biometrics or query-based access methods).
SINGLE SIGN-ON Another possibility is to use single sign on (SSO). For small and midsized businesses specifically, biometrics (which is often integrated into devices) along with SSO can serve as a viable option. SSO essentially enables a user to access multiple applications and systems through a single pass of user authentication and authorization. In other words, one login and password action is required. SSO solves a big problem common to all forms of strong authentication: it isn’t easy to implement strong authentication for every different application. Increasingly, SSO can be used for on-demand (Cloud-based) applications, as well as in-house ones. The chief drawback of SSO is that if one user credential is compromised, the perpetrator then gains access to multiple systems. Additionally, if the SSO system becomes unavailable for some reason, users are locked out of all the systems and applications that SSO is managing.
THE RIGHT OPTION Among newer technology fields currently proving more influential to companies’ approaches to authentication and security are big data, social networking, and mobility. And within the mobility category, there is the “bring your own device” (BYOD) trend. Unfortunately, as large of a potential impact as something like BYOD could have on an organization’s security posture, most businesses don’t seem to be focusing enough of their attention on how to address security issues strategically and tactically. Some forward-looking and compliance-driven businesses are making identity and access management a priority in the face of all of these factors but unfortunately, most are still too reactive. It will probably take a significant security breach to focus their attention on the issue. As far as choosing the right protection for the company is concerned, the following factors ought to be considered: trade-offs between productivity and convenience for end users; security and risk of the resources being accessed; and total cost (acquisition, integration, deployment, and management over time). The reason so many companies still exist and are being tasked with solving password problems is because of this age-old trade-off. When choosing the right protection, it is necessary to weigh the value of the asset, depth of expertise, cost of the solution, and end user buy-in. If the solution is too obtrusive, it is going to be more of a hindrance than a help. We should also stress that choosing the right authentication solution isn’t just about protecting the application being accessed, but who is accessing it.
www.gulftechmag.com
9
GADGETS
Wearable Tech. The Future is Wearable Glove Tricorder This medical glove prototype is equipped with sensors, including an accelerometer, pressure and temp. modules. Med Sensation aims to place ultrasound pads on the fingertips, allowing doctors to peer inside your body while they examine you.
MindWave Mobile A brainwave-reading device for iOS and Android devices. It lets you control games with your mind. The device, which fits like a headset, uses a single sensor positioned on your forehead that reads your brainwave frequency.
LUMO back Posture Belt A waistband device that vibrates when it senses bad posture. The sensor connects wirelessly to a mobile app that tracks your posture and your daily activities in real time.
10
www.gulftechmag.com
Apple’s Latest iOS7 Features and changes that go far beyond a regular iOS update The latest version of Apple’s flagship mobile operating system is here, and it’s almost entirely different than the versions that came before. Rumors have been flying for weeks about the new OS and now it’s here and it is, at least at this early reckoning, a massive change for the six-year-old operating system. First, we must remember that in the past, fashioning the Notes app to resemble a legal pad or the Calendar app as a Moleskine calendar notebook was part of the iOS design philosophy, as ingrained in the OS as “Slide To Unlock.” All that is now gone. New Look • iOS 7 has a new font leading the way, It’s skinny and clean. • Instead of white bars on a black background, Apple will now tell you what kind of service coverage you have with five little dots, which are white and grey depending on how strong the signal is across a translucent background. • The lock screen has changed for the first time in iOS’s history, with no more shiny top or bottom bars for “Slide to Unlock” or the clock. • Default app icons are now flatter, but not quite flat, just as predicted. • The apps all appear to have a white base, except for the Stocks app that has a black background, and the Weather app that uses motion in the background to convey the current weather. • The keyboard is more white than grey, with a translucency that lets you see what’s underneath the keyboard. Control Center • Control Center is a pull-up tray available on your Lock screen. You can adjust brightness, volume, and other settings including Wi-Fi, Airplane mode, rotation lock, or Bluetooth. • The Control Center adjusts to the layout it’s in, so if you swipe up while you’re in Mail, it will have the same blue and white coloring
beneath its translucent panel. • The keyboard is more white than grey, with a translucency that lets you see what’s underneath the keyboard. MultiTasking • iOS 7 lets you multitask between all thirdparty apps with much more efficient battery consumption. It appears to offer live previews, but Apple wasn’t clear about that. Camera & Photos • The Camera app lets you swipe between the various camera types, such as panoramic or HDR so you can quickly take a photo instead of fumbling around with settings. • Photos marks the first update to the photo gallery on iOS since it was introduced. • You can search based on date and location within the Photos app. • Apple has introduced photo filters so you can add a touch of professionalism to your pictures. • Users can share via AirDrop, iCloud photosharing, and shared Photo Streams. Activation Lock • This is for those of us who have had an iPhone stolen. • If a thief steals your phone and tries to turn off Find My iPhone, he or she can no longer turn the device back on without your iCloud password. • Users can also block messages and calls from other users.
iOS 6
iOS 7
Samsung Note 3
Samsung Note 3 – What you need to know The Samsung Galaxy Note 3 was rumored to have a release date as early as March 2013, according to a Samsung officials. Others pointed to a mid-June or July launch. Samsung held a press event in London on Thursday, June 20, so many figured they would announce the phone then and roll it out shortly—especially because we know the model number, SN-N900 and SN-N900J. But it certainly seems that Samsung is having some difficulty rolling the phone out in a timely manner, as new rumors indicate delays.
When Samsung announced their new flagship Android handset, the Samsung Galaxy S4, they introduced a number of new features like eye tracking technology with Smart Pause and Smart Scroll. These new Smart Pause and Smart Scroll features are also expected to be available in the Samsung Galaxy Note 3 when the device is launched. All in all, we can expect the Galaxy Note 3 to show up once there are more detailed leaks.
While it’s possible that the Samsung Galaxy Note 3 could launch earlier than the November release it got in the United States, there are currently no credible signs suggesting that Samsung will be announcing the device next week.
Features expected to be announced: - Qualcomm Snapdragon 800 processor (OctaCore) - 4G LTE - WiFi 802.11ac - 5.99” screen with 1080p AMOLED Screen - Android 4.2.2 and 4.3 OS - 8 core GPU - 3GB RAM - 13MP rear camera
First, the device hasn’t leaked in full just yet, something that typically happens in the months ahead of a product’s release. The Galaxy Note 3, while rumored, it is still more or less shrouded in secrecy. We don’t expect the design to leak until just before the device arrives and given that we haven’t seen it just yet, it’s not likely to arrive next week. Why the difficulty? Well, it could be that Samsung has bitten off more than it can chew while attempting to roll out two models of the Galaxy Note 3 and at the same time working on various iterations of the Samsung Galaxy S4 (e.g., Active, Zoom). We’ve been hearing several rumors that Samsung will launch a couple versions of the Galaxy Note 3, one with a new Qualcomm Snapdragon 800 processor and another with a new Samsung Exynos 5420 processor. The Note3 will also reportedly include a 2.3GHz Snapdragon 800 processor from Qualcomm, LTE, 802.11ac W-Fi and a 5.99-inch 1080p display running Android 4.2.2/4.3. The Note 3 will be the most powerful in the world with an octa-core processor, eight-core GPU, 3GB of RAM, 5.99-inch full HD display and a 13MP rear camera.
>
It’s worth keeping in mind that the Galaxy Note 3 will have the same advanced features as the Galaxy S4. It features a large screen, small bezel and rounded corners. Similar to the Galaxy S4, which is .03 inches narrower than its predecessor the Samsung Galaxy S3 but features a thinner bezel in order to incorporate a display that is .2 inches larger, the Galaxy Note 3 is expected to have a thinner bezel than seen on the Samsung Galaxy Note 2 in order to keep its overall size roughly the same.
The closest prototype that has been leaked to the real device, based on CAD files in Korea
www.gulftechmag.com
11
Banking and IT
Banking & IT
Mashreq introduces new E Cube retail concept Mashreq ushered in the new age of banking on Wednesday with a launch of the E Cube retail concept at its Dubai Internet City branch, the UAE’s first of its kind. When customers step into the Mashreq branch, they are met by interactive screens, allowing them to carry out any transaction they want. Now customers have the choice to experience banking at their own pace. Committed to maximizing customers’ experience, Mashreq has steered banking away from a traditional platform to up-to-date technology based on the E Cube’s launch. “As a next step, the bank will introduce the concept in shopping malls,” Farhad Irani, Mashreq’s head of its retail banking group, told the Khaleej Times at the inauguration of the first branch to implement the latest technology. Next week, Ibn Batutta Mall will be the first shopping mall with this concept for the bank’s second branch, Irani said, adding that the bank has planned to introduce six more branches using the E Cube by the end of 2013.
Mashreq’s E Cube retail concept offers customers speedy, smart banking and optimal interactivity with the latest technology-driven devices. Upon entering the branch, customers and passersby will be greeted by a 75-inch exterior attractor screen. This screen visually engages the public with products and lifestyle choices that suit their needs. Through touchscreen technology, Mashreq’s online representative introduces 15 different lifestyles. Customers can then discover various products and services related to each of these, with the option of physically downloading application forms and additional product information onto their smartphones through QR codes. Each screen will also feature scrolling news feeds that will be updated in real time. Also situated in the branch is a Microsoft Surface table that allows customers to make financial calculations and customize products to meet their needs. With the promise of revolutionary banking, Mashreq has appointed customer service representatives to help customers familiarize themselves with the new technology and assist them with any questions they might have.
Stolen Millions Expose Middle East Banks’ Vulnerability The men smiled at the smartphone camera, holding up wads of cash. They were members of a cybercriminal gang, eager to show off the spoils of targeting two banks in the Middle East. In two different attacks, spanning just 10 hours, United States prosecutors said the gang of eight managed to steal US$45 million by hacking into a database of prepaid credit cards belonging to the banks, and then using fake swipe cards to withdraw money from ATMs in 27 countries. Their gleeful spree would be cut short. Announcing the arrests of the gang members, the U.S. Attorney for the Eastern District of New York Loretta Lynch called it “a massive 21st-century bank heist,” adding, “In the place of guns and masks, this cyber crime organization used laptops and the Internet. Moving as swiftly as data over the Internet, the organization worked its way from the computer systems of international corporations to the streets of New York City.” Experts say financial institutions in the Middle East are tempting targets for such heists, and they are partly to blame. They argue that institutions need better Internet
security protocols, particularly when outsourcing information services, as regional companies regularly come under attack from politically motivated hackers as well. “It’s a question of enforcement of regulatory controls, which are broken and sketchy in the Middle East, so obviously you’re going to have a higher number of cyber crimes in that particular context,” said Gurpreet Dhillon. The gang were actually strangers who came together via Internet forums where illicit information is traded and people are recruited for cyber crimes. The gang planted computer viruses inside the financial institutions’ networks. Once they had gathered enough information, they produced fake ATM cards, coding stolen data onto magnetic swipe strips. The gang stole US$5 million from the two banks based in the Middle East. The weak links exploited by the gang were two card payment processing centers in India. The gang managed to hack them, raised the balance and withdrawal limits on the compromised accounts. www.gulftechmag.com
13
Form Factors
Knowing your Form Factors Which form factor suits you best? Choosing the right hardware is just as important as using the compatible version of Windows. When you’re researching online or looking on store shelves, it’s easy to feel overwhelmed by the number of choices available. But choose wisely; making the right selection when you purchase your next tablet, convertible, ultrabook, laptop or workstation can save you money, time and efficiency in the long run. The most important aspect of choosing your form factor is sticking to your budget. Tech buying can be costly when you pick aspects of hardware you don’t need, and it’s especially important when it comes to purchasing a laptop or tablet. If it’s beyond your means or not the best device for you, you’ll still be stuck with something you don’t need. So start with your priorities, whether you want a device for on-the-go or will be working from a stationary location. Make a list of features you know you can’t live without on your laptop. Need a powerful processor? Make note of it. Desperate for gaming options? A performance laptop is the one for you. Need a certain amount of battery life? Write that down, too. Don’t get sucked into a certain device because it’s shiny and neglect everything you need on a daily basis. Once you have one or two devices in mind, browse the nearest search engine to see what people are saying who own that device—or send us an email and we’ll get back to you with our findings. Spend 10 minutes to get to know your laptop before purchasing it. You might just find that it sputters after a month or fails to do something you hoped it could do. You should read reviews that we and other tech sites write until the laptop or tablet goes out of style. Also, make sure to try before you buy.
Tablets Of course we all know what a tablet is, but what are 7- to 11-inch, touchscreen-enabled, low-power processor-packing devices actually good for? The absolute best thing about a tablet is its portability. Whether it be taking notes in class, presenting at a meeting, watching a movie or playing a game, just tuck it into a bag and you’d never even know it was there. Tablets are perfect for those on the go. Despite the fact that you only have an on-screen keyboard, Bluetooth-enabled tablets allow you to pair accessories such as wireless mice and keyboards directly with the device. Battery life is often fantastic on small tablets thanks to low-power processors, so you’ll get longer work time from your tablet than you would ever get from a laptop or even an ultrabook. You do need to consider just how much you want to get done with your tablet before you shore up money on it, though. These devices can have a habit of becoming an expensive secondary tool for those who own a laptop or ultrabook already, so consider your needs. Do you really need a second screen to complement your laptop, or is it just something you’re going to watch movies on? If it’s the latter, consider avoiding a tablet and investing your cash in a souped-up ultrabook instead. If you’re going to be dragging a wireless keyboard and wireless mouse around all the time just for your tablet, it might be worth getting a convertible or even an ultrabook. Low-power processors mean more than just slower battery drain.
14
www.gulftechmag.com
Form Factors
Convertible (Tablet docked to a laptop) A convertible. Sounds nice owning one, doesn’t it? A convertible can mean one of two things: it’s either a tablet that converts into a laptop-like device with the aid of a clip-on keyboard, or a tablet that flips out to expose a keyboard. Devices that have clip-on keyboards usually benefit from greater battery life because the keyboard attachments often come with extra batteries. Clip in your keyboard and expect to double your battery life, depending on which device you buy. Windows 8 convertibles straddle the tablet and laptop/ultrabook categories, meaning you get the benefits of both in one small yet powerful package: the touchscreen, battery life and portability that you’d normally find on a tablet, paired with the practicality of a touchpad or mouse nib and, more often than not, a full-sized keyboard. Some convertibles can cost as much as an ultrabook, though, so make sure you do a tit-for-tat comparison between the specs. Also be mindful of which version of Windows your convertible comes pre-loaded with.
Laptops
Ultrabooks
Good, old-fashioned laptops still exist in the Windows 8 range. Unmatched, unbeaten, unequivocal power is the promise of a high-end Windows 8 laptop. We’re talking desktop replacement territory here. Because these are essentially desktop replacement machines, you’ll save money buying one because you don’t have to buy both a laptop and workstation.
“Ultrabook” is a fancy marketing buzzword created by Intel that means your PC has to meet certain criteria that makes it an ultraportable version of a conventional laptop. Specifically, the criteria state a device must have between five and nine hours of battery life and a powerup time (from hibernation) of under 7 seconds, all while fitting into a specific height, weight and processing speed threshold to be considered an ultrabook. These devices are also surprisingly pocket-friendly—because ultrabooks are so thin and light, they’re nearly as portable and bag-friendly as convertibles.
These devices look incredible because they’re built as machines you can roll to a LAN or keep in your office. But they’re not without drawbacks—when running high-end hardware in a tiny device, two things tend to happen: excess heat and loss of battery life. When are laptops preferred over ultrabooks? Gamers, movie fanatics can answer you that. Most 1080p movies and high-end games require Intel Core i7 and upgradable hardware. That’s a step closer to a desktop workstation, though its portable to take anywhere with a limited battery life.
An ultrabook is good as an everyday work or study machine and minces your productivity tasks. But it’s still not cut out for playing the higher-end games you might want to indulge in. Only a handful of ultrabooks currently have touch-enabled panels, so be careful. Without touch, you miss out on a few features of the Windows 8 experience.
Workstations (Tower, Small-Form Factor and All-in-One) The term “desktop” has expanded into three different workstation factors. First is the Tower, with dedicated cooling and upgradable features. Secondly, the Small Form Factor (SFF) takes the small form of a workstation. The third, the All-in-One workstation, comes with touchscreen features along with a wireless keyboard and mouse. There is not much to say about Tower workstations. With upgradable features including HDD and RAM, a processor, multi-USB inputs, and DVD/Blu-Ray inputs upgradable to two or more, the Tower stands as the mega workstation that would be ideal for those looking for a powerful machine that lends itself well to routine upgrades. The small form-factor (SFF) is about 30 percent smaller than competitive Tower offerings, making it easier to use in less spacious areas. When it comes to the All-in-One, the most important aspect of its usage is the screen. With a screen ranging from 16 to 27 inches, you can enjoy movies, TV shows or even games through the TV-like workstation.
www.gulftechmag.com
15
iConnect 2013 W
hat started out as an event to honor the distributor, iPoint, for a great year in sales and support of its elite partners turned out to be a worthwhile meeting for each of iPoint’s partners, resellers and clients. The event took place on May 8th, 2013 at the Radisson Blu in Bahrain. It welcomed over 800 representatives from different companies in Bahrain and the GCC. The event started off with a word from the General Manager, Mr. John Joseph, who introduced the event and iPoint’s partners. Then the partners offered a few words regarding their views of 2013 and how they saw the market evolving in Bahrain. In our opinion, a few attendees’ thoughts were particularly powerful: those of EPSON representatives and Mr. Tariq Hijazy, the channel manager of Microsoft Bahrain. Each spoke about Cloud Computing and SkyDrive bringing people closer together in their work and personal/leisure time, as users can have a single pice of hardware to access all work and home material through the Cloud. The event went on to honor and award iPoint’s clients with gifts including BenQ LED monitors, BenQ Cameras, and even a complimentary 3-day ticket to Switzerland. This was a testament to how well the IT industry has evolved from 2012
16
www.gulftechmag.com
to 2013 as more companies such as eXtra, Transworld IT and Sharaf DJ have been diversifying to connect IT with the audio/ visual and home and office environments. New products were also introduced during the event such as EPSON’s latest multifunctional projector shooting up to 4,500 lumens. Netgear also showcased its latest lines of routers and switches. Overall, the event gained momentum from its inception to the moment it ended at 12:30am. We had a word with Mr. Roy Rebeira from Transworld IT, whose company was the most highly awarded by iPoint. In regards to the ratio of supply and demand of technology available in Bahrain’s market specifically, he remarked, “There cannot be a market for technology before the demand comes into play. We’ve covered the region and are looking to expand to areas where consumers want change. In this day and age, consumers cannot rely on one brand for all of their needs. They require specialized equipment for computing data, storing data and printing data.” Mr. Rebiera also added, “An event like iConnect 2013 gives people in the IT industry a chance to gather around and share ideas and figures. It is not only beneficial for iPoint; it also helps large companies to know their place in the market and gives smaller companies the right motivation to grow.”
GISEC 2013 G
ISEC focuses on the latest information security trends, cyber security legislation in the Middle East and cyber security solutions in addition to knowledge exchange via a strong conference line-up, which brings together information security experts from the private and public sectors. Demonstrations of the latest security intelligence software, diagnostic hardware, web applications and a wide array of innovations designed to combat the rising tide of financially and politically motivated cyber attacks took place during the first day. Visitors flocked to experience next-generation anti-hacking technologies. These included EnCase Analytics, a new security intelligence solution launched by Guidance Software, a global market leader in digital investigations. This security package specialises in pinpointing complex threats that slip under the radar of conventional detection-based security solutions. Underlining the global scope of the topics and solutions at GISEC were 87 participating companies from 18 countries including Australia, Bahrain, Canada, Cyprus, Egypt, France, India, Italy, Lebanon, Netherlands, Pakistan, KSA, Singapore, Tunisia, Turkey, UAE, UK and USA. More than 2,000 visitors were witnessed over the course of the three-day event. Participating companies included AirWatch, Akamai Technologies, Arbor Networks, Cassidian CyberSecurity, Comendo, Deep Secure, Lancope Inc., Dell Sonicwall Inc., Spire Solutions, Splunk Inc. and Watchguard amongst others. Sponsors of the GISEC conference include GBM; CSC; eLearnSecurity, Help AG Juniper Networks; Aujas Networks, BlackBerry, Guidance Software, Qualys and Zeroday. Kevin Mitnick, an information security expert and former hacker who garnered worldwide attention from authorities and the online community, due to his unconventional methods of exposing weaknesses in the information security systems of giant corporations, will share his perspective on the threat of “social engineering� - a highly effective type of attack that exploits the human element of corporate security. Mitnick illustrated why a misplaced reliance on security technologies alone, such as firewalls, authentication devices, encryption, and intrusion detection systems are virtually ineffective against a motivated attacker using these techniques.
3D Printing
The Future Printed in 3D Three-dimensional printing saw rising consumer acceptance in the first quarter of 2013, giving the automotive industry, consumer end products, healthcare and small businesses cost-effective solutions to research and development. The first compact 3D printing machine, the Replicator 2, came out in January 2013 from MakerBot. The Replicator 2 has a resolution capability of 100 microns and a massive 410-cubic-inch build volume, meaning that any shape designed to be printed will in fact be replicated in the same 3D figure.
Advantages of 3D printing to consumers The price of owning 3D printers has gone down due to several manufacturers introducing new models. Accessibility is the main advantage of 3D printing: when done in-house, it enables design teams to produce a high-quality, realistic prototype quickly and at relatively low cost compared to machining or outsourcing. For individuals, it reduces the cost of involving third-party service companies for parts and appliance care. Creating custom-made objects promotes variety and increases innovation as well. When a community shares designs and illustrations of a particular object to better serve its purpose, it opens the door to a new industry and better jobs from home. Price will dramatically decrease as there is no manufacturing, transportation or outlet cost involved.
Ethical considerations and Disadvantages
^ MakerBot’s first 3Dimensional printing machine Before the technology was introduced, wax-made models were used to study different aspects of prototypes. On a large scale, plastic prototypes were costing companies thousands in research and development. In the automotive industry, for instance, drag or air resistance on vehicles is measured on vehicle prototypes to increase acceleration and reduce fuel consumption. These tests cost companies time and money to study, produce and use to experiment. Later, the prototype is discarded if any flaws are found. In architecture, 3D models are built to aid a labor workforce, yet this increases the risk of human error. The accuracy of the 3D model in comparison to the true figure might not be precise. As 3D printing starts to increase in manufacturing in terms of size and accuracy, at the same time so do companies’ emphases on building effective prototypes in a shorter timespan. While 3D printers were once clunky, expensive devices reserved for the industrial elite, they’ve lately been adapted to fit on your desktop at home. Having a 3D printer and being well-versed in how to use it gives you another tool in your belt to tackle problems and create new objects. As an example, if a small and specifically shaped piece of plastic breaks from your laptop, you can replace it in an afternoon without having to call the manufacturer or dealer—and presumably save yourself money and time.
18
www.gulftechmag.com
With enabling consumers to freely “bring to life” models set by CAD designs, the main issue lies in raised expectations, build quality, price and usability. With copyright policies being violated, build quality will decrease as no approved tests have been run regarding the durability of the device or object. The life-span of the object is limited due to its origination from powdered plaster. Plus, since consumer 3D printing is in its early stages, there are neither clear policies nor supervision on patent infringements, copyright violations and breaching international trademark laws. 3D printed parts are also not as strong as traditionally manufactured parts. Their layer-by-layer technique of manufacturing is both their biggest strength and greatest weakness. In injection molding, you have an even strength
^ Formation of an object through MakerBot injection molding
3D Printing across the part, as the material is of a relatively consistent structure. In 3D printing, on the other hand, you are building a part in layers that have laminate weaknesses: the layers do not bond as well on the Z axis as they do on the X and Y plane. The rise of black market 3D printed spare parts, generic versions, or fake brands and entire niches will no doubt expand with copied items and crafts that will harm product quality, pricing, authenticity and demand. For instance, 3D printing can be used to scan and duplicate credit cards, IDs, car keys and other private items. The obvious disadvantage to 3D printing is that it’s already serving criminals and facilitating fraud.
Final Processing: from 2D to 3D To perform a print, the machine reads the design file and lays down successive layers of liquid, powder, paper or sheet material to build the model from a series of cross sections. These layers, which correspond to the virtual cross sections from the CAD model, are joined together or automatically fused to create the final shape. The primary advantage of this technique is its ability to create almost any shape or geometric feature.
^ Barcode Scanner Prototype With the ability to mold up to any 3-Dimensional object, prototypes can be created in less than an hour depending on the CAD file used by designers. The mold will eventually develop from plastic injection to contain metal, aluminium and even silver.
19
Privacy Cost
When Your Data is Currency, What Does Your Privacy Cost? If you have perused the New York Times or Wall Street Journal recently, you’ve likely seen the NSA splashed across the headlines. What’s most important for you, as an Internet user, to know is this: where does your information go? And how much of you, as a person, can be seen online? Even though we are based in the Middle East and the GCC region, our information is still stored on Facebook, Google and any other website with which we have an account. Our data is a currency in today’s world, for better or worse. In fact, whenever you seem to be getting something for nothing, there’s a good chance you’re paying at least in part with your personal information. For example, store loyalty cards give you discounts, which you get in return for overlooking or accepting that someone now has (or could have) a history of everything you’ve ever bought from that retailer. And think about it—if an entity, outside Facebook or LinkedIn, assigned you a grocery card that tracked all your food purchases without you knowing who they were, it would seem like something out of a dystopian everybodyin-a-jumpsuit movie. But when your grocery store does it in return for a dollar off a bottle of salad dressing, it’s a nearly daily occurrence for many of us. It’s a mistake to imagine that all this is hidden from view, that consumers do all this without knowing they’re doing it. Many perfectly savvy people know very well that their information is being constantly collected by eBay, Google, Amazon and Apple, as well as banks, stores, car dealerships, cable companies, doctors, and insurance companies. In fact, the growing hassle of managing the sheer number of passwords we have is caused by the number of entities we know possess information about us (or belonging to us) that we don’t want just anyone being able to access. Last week, I opened an account with a certain bank in Bahrain, whose representative asked me for information about my previous bank from which I purchased my prior vehicle loan. I refused to supply the answer and the staff member continued as if he/she had never asked. Similarly, a friend of mine recently applied for a job in London; he was asked for his Twitter account and Facebook profile name. Many of us offer this information not because we don’t realize its use, but because there are benefits to doing so. Many of us share a relatively public lifestyle, with personal pictures
20
www.gulftechmag.com
on Facebook, a day-to-day timeline posted to Twitter, and contacts and messages uploaded daily to a Cloud server. Of course, this means somebody else who you’ve never met could find out what books you bought, what’s in your email, what music you listen to, what documents you’ve written, who you talk to, and what organizations you contribute to whenever they want. You just have to trust they won’t. We assume that we will hide in the crowd, protected by its sheer size. In a sense, we’re most comfortable with the profit motive as a reason to collect information. Amazon or Apple might know all about you, but the thing they’re most likely to do with that in practice, so far, is try to sell you their product. Yet that’s where the theory that the economy of trust in private companies can be extended to government hits one of several major snags. We “trust” private companies to be reliably self-interested, and we don’t believe there is a self-interested reason for them to read our email other than, as a worst-case scenario, to sell to us. And we further believe that their self-interest works to our advantage, because it wouldn’t be good business for people to find out that Google employees (for instance) were reading and passing around people’s embarrassing emails on their lunch breaks. People have been willing to effectively hand over their data while companies make money. But there is some support for the idea that personal data could function as a kind of online currency, to be cashed in directly or exchanged for other items of value. A number of start-ups allow people to take control of, and perhaps profit from, the digital trails that they leave on the Internet. We don’t really trust companies to limit their use of data in our best interests, but we might trust them to limit it in their own best interests. Part of our belief that they won’t do anything nefarious with the theoretically breathtaking information dump at their disposal comes from the belief that it wouldn’t make them any money. And even for those who aren’t relieved, they may be grudgingly willing to accept access to data in return for whatever security advantages it might bring along with the mundane advantages of doing business with whatever
Privacy Cost Data sold in the Black Market > Cybercriminal network operates like any other business. > The list of products for sale sounds like a standard online shopping catalog, from cheap no-frills items to more expensive ones with all the works. > PandaLabs researchers found a world where the hackers work together to buy and sell stolen bank account information, credit card numbers, passwords, and other products. > More of the PandaLabs Report can be found on our website, or send us an email on and we will send you the PDF report:
info@gulftechmag.com
tech company or cell phone provider is at issue. But not everybody is going to feel that way. Not everybody believes that they can predict what Amazon will do the way they think they can predict what Apple will do. So our willingness to submit to surveillance in return for benefits may determine our level of outrage or willingness to do business with Google. It may dictate whether the ability to ensure privacy becomes a top-tier characteristic in a tech product and whether too much cooperation is a disadvantage. The concept of treating data like currency has long excited certain computer programmers and academics. But to almost everyone else, it is boring. Personal data management has none of the obvious appeal of social
networks or smartphones. But concerns about privacy may be changing. The fact of the matter is, no matter what you look at on the Internet, the activity will be transformed into certain data about you, the user. It’s happened to me: when I was looking at new protein shakes for my diet on my work laptop during my lunch break, I skimmed through a couple of brands. Later, I went back to work when suddenly, adverts of the latest GNC protein shakes came popping out of Google. Why would Google remember what I was looking at an hour before? Because Google has your email stored in relation to what you search for, the images you open and the documents you read. This gives Google the wherewithal to market specific, paying brands directly to you.
Industries Affected by Cyber Crime (2012/2013)
www.gulftechmag.com
21
Windows Blue
Windows Blue
Top Features of the latest Update
A
fter an abundance of rumors, we finally have more concrete evidence of Microsoft’s secretive Windows Blue operating system (OS): a legitimate leak of its early build. Without further adieu, here are the 10 top features buried within the forthcoming OS (presumably Windows 8.1).
1. Half-screen app snapping Windows 8’s ability to “snap” an app to the side of the screen while another runs beside it gives the OS multitasking chops that Android and iOS just can’t match—but the only snapping option available in Windows 8 spreads one app across 75 percent of the screen, while the second is relegated to a miserly quarter of the display. Fortunately, the Windows Blue leak includes a 50/50 snapping option that should have been available from the start. Being able to dedicate half your screen equally to two separate apps makes the Snap feature much more useful for day-to-day app-based activities.
2. The rise of modern UI PC settings One of the worst flaws of Windows 8 is how it splits essential settings options between the traditional desktop Control Panel and the more modern PC Settings found in the Settings charm. The design is most painful on Windows
22
www.gulftechmag.com
RT devices, where the need to navigate to the otherwise useless desktop and fiddle with non-finger-friendly options is nothing short of a headache. Windows Blue fixes this with its vastly expanded PC Settings, which now contains many of the options previously hidden within the Control Panel. Your fingers will love the difference if you’re a Windows tablet user, but even better, the rise of Windows Blue’s PC Settings foretells a future in which the Control Panel could be excised completely.
3. Super SkyDrive The modern-style SkyDrive app does not mimic the desktop SkyDrive app as one might expect. The distinction is glaring in Windows 8, where the modern-style app can only access files previously stored in your SkyDrive—it has no ability to sync new files to the Cloud. That may change with Windows Blue.
4. Internet Explorer 11 Also found in Windows Blue: Internet Explorer 11. It’s a very early version of Microsoft’s next-gen web browser— so much so that, functionally speaking, it’s the exact same as Windows 8’s Internet Explorer 10. Under the surface, however, lies an intriguing peek at a new feature for the browser.
Windows Blue 5. New apps
7. Accidental tile shifting
Alongside the usual Mail, Maps, and Music tiles we’re all familiar with, a quadruplet of new apps appears on the Windows Blue Start screen: Alarms, Calculate, Sound Recorder, and Movie Moments.
One of the biggest frustrations of the current Windows 8 Start screen is how easy it is to accidentally move a Live Tile to a new location. If you move the mouse even a little bit while clicking on a Tile, the screen shifts to Semantic Zoom to allow you to move the Tile to another location rather than simply opening it. Windows Blue eliminates that frustration with a new Customize button.
Everything about Movie Moments oozes genuine Microsoft, from its “Microsoft confidential” warning screen at launch, to its Live Tile design, to its overall interface, which mirrors the look of the SkyDrive app. Alarms, Calculate, and Sound Recorder, on the other hand, seem handy but a bit too simplistic to be first-party Microsoft products.
6. New Live Tile size options In Windows 8, you have a couple of basic Live Tile sizing options: a medium-sized square, or a larger rectangle the size of those two squares combined. Windows Blue ups the customization ante with the introduction of two new tile sizes. One’s an itty-bitty square a quarter of the size of Windows medium tiles, while the other is a massive tile as big as a pair of Windows 8’s larger rectangular tiles. The additional sizing options afford the user much more customizability, giving you the ability to craft a Start screen that isn’t quite as grid-like as what you’re limited to in Windows 8. In that, Windows Blue’s tile sizing options echo the flexibility of Windows Phone 8’s Live Tiles.
You can’t rearrange Live Tiles in Windows Blue unless you right-click on an empty portion of the desktop, then click a brand-new Customize button. You’ll need to unselect the customization option to continue using Live Tiles normally. It’s a simple alteration, but a welcome one. Interestingly, the All Apps button—the only one available in the Start screen options bar in Windows 8—has been scrubbed from Windows Blue.
8. New gestures That doesn’t mean the All Apps screen is eliminated from Windows Blue entirely, however. The Verge reports that Windows Blue includes new gesture controls, such as the ability to swipe up from the bottom of the Start screen to reveal all your installed apps. Swiping up from the bottom of the desktop reveals a hidden app bar that includes snapping and projector options, amongst other things.
Windows Blue features suited for Businesses Access Control
Security Accessibility
Device Encryption
The device encryption feature that Microsoft previously offered on Windows RT and Windows Phone 8 is now available in all Windows 8.1 editions
Smart Remote Wipe
Admins can issue a smart remote wipe so that only corporate data, not personal, is removed from users’ devices
Workplace Join
The ability to join an Active Directory domain has been added to the Metro-based PC
Work Folders
This feature lets you sync key folders in your servers to your PC so the contained documents are available when you’re offline
New Policies
New group policies have been added so admins can control features like the layout of tiles on users’ Start screens, ensure that key apps are available, and prevent users from customizing.
WiFi Direct Printing Miracast Wireless Display
Connectivity
Support devices with fingerprint-based biometrics and simpler access to multi-factor authentication for virtual smart cards
Mobile Broadband Broadband tethering VPN improvements
Added compatibility with WiFi direct printing capability Windows 8.1-based devices will be able to project their displays wirelessly to Miracast-compatible monitors and screens Devices can have embedded wireless radios that provide better power savings, longer battery life Any Internet-connected device can be turned into a wireless hotspot with support for up to 10 devices Automatic prompting to sign into the built-in VPN when an app or other program needs to access a resource that requires that kind of connection
www.gulftechmag.com
23
Interview
1001 Network Technologies
BACKGROUND
An exclusive interview with Mr. Mahmood Sediqqi Mahmood Sediqqi, a Bahraini whom has been in the networking and IT field for over 9 years. With over 14 certifications from Cisco, Huawei and ISO he put his time to publish “1001 Network Technologies”. We met with Mr. Sediqqi to know more about his book and his past. Excerpts from the Interview:
1. Your role as Network and Communication Manager made you an expert in many technical aspects of IT. What inspired you to write a book? The idea behind my book came from the fact that the Corporate Networking is totally ignored by the public but otherwise well known in the International Media. So I wanted to introduce this field to the public. Also, I’ve been strongly influenced by Arab literature and Islamic history and heritage like Alfiyat ibn Malik (i.e., thousand-line poetry, summarizing all of Arabic grammar). could positively contribute to it.
Name Mahmood Sediqqi Position Manager of Network and Communication Sector Airline Field & Communication
2. What was your path towards publication like? Was it easy to find a publisher in the field of Information Technology? It was difficult to find a publisher for IT/Networking material in the region, which is why I chose an external online publishing organization that helped me publish my book in a professional manner. They also took into consideration giving insights over other IT/Networking publications which helped ease publishing the book “1001 Networking Technologies”.
3. Please give us a summary of your book. The book is laid out as follows: • Basic networking terminologies • Advanced networking terminologies • Terms related to networking • A brief history about networking and how it first began.
4. How large of a role has social media played in the promotion of your book?
With the help of Social Media websites and applications such as Facebook and Instagram, i managed to spread the word over Bahrain, GCC and the World. Many of the followers have been from Bahrain and advanced countries in the field of networking such as the United States and England.
5. If a few of your readers told you they were just starting out in their careers, what single piece of advice might you offer? I would suggest finding an appropriate field whereby it relates to the current situation the market is in and their interests. Also, to encourage them to continue seeking further knowledge in that field, be it networking, IT or even business.
6. What lies ahead for your writing?
I hope to continue writing about networking and related areas. My interest in networking has grown more than what I expected after publishing the book, I hope to continue writing about that topic and related areas of Information Technology as developments in that field continue to excel.
www.gulftechmag.com
Google Translate
5 Ways Google Translate App Can Rock Your World
T
ranslating work can be rather messy, especially if not done right. With the Google Translate Mobile App, such concerns need not be even considered at all. To get the best use out of it, here is some of the neat ways that you can do with the app.
1. Voice (Speech Recognition) Google’s voice recognition technology works remarkably well for almost all major languages. If you’re trying to get directions from a local, you no longer have to rely on hand gestures and miming - simply pull out Google Translate, change the setting to Conversation mode, and speak into your phone. The app will even read the translation out loud.
2. Offline Mode In the latest update of the Google Translate app for Android, the power of the translation engine resides inside your phone via downloadable language packs. Once you enable the offline languages feature, you can instantly perform translations offline. While the smaller size of the offline models has more limitations than their online equivalents, you can now carry the world’s languages right in your pocket anywhere you go. Just select the [Offline Languages] setting in the app menu, and from there you can download offline language packs for whichever languages you will need for your next trip away from home.
3. Camera Snap It’s hard enough trying to figure out what something says in a foreign language, but with some languages, like Chinese, Japanese, and Korean, it can be trickier because you might not know how to enter those foreign characters into your device for Google Translate. Entering these characters is now easier than ever as there is now camera-input support. Just tap the camera icon, snap a picture of the text, and brush your finger over the part you want translated.
4. Handwrite Sometimes you don’t know how to say what you want translated or you can’t type it. Sometimes it’s easier just to write it. We have a solution for that: just use the handwriting icon and draw in the black space. For Chinese, Japanese, and Korean, it even provide multiple language character support.
5. Favorites With Google Translate, you can find the right thing to say and its translation at just the right time. To save commonly used phrases into Favorites in the Translate app, simply click the star by the top of the translated text to add the translation in your Favorites and, with such a simple gesture, you now have easy access to these phrases. *Note: you can also use Phrasebook on the desktop version of Translate as well.
www.gulftechmag.com
27
CDO
The Chief Data Officer Rises Why the CDO is more vital than ever
I
t seems to be popular these days amongst industry pundits to recommend that organizations add a new Cxx role: the Chief Data Officer (CDO). Advocates of this move claim exactly what you might expect: the rapidly accelerating importance of information in the enterprise and, just as critical, business executives’ heightened awareness of its importance. The attention on information comes from the plethora of rich new data that simply didn’t exist before: sensor data from the Internet of information, social media, process data—essentially the enormous volume of data resulting from the digitization of everything. But what is the Chief Data Officer expected to do? First and foremost, the CDO should be responsible for the overarching data strategy within an organization. If big data is implemented throughout the organization, at all different levels and departments, then the Chief Data Officer is appointed to ensure the strategy is implemented correctly, the data is accurate and secure and the customers’ privacy is governed properly. As data-based decision-making becomes increasingly central in organizations, the CDO should also be a member of the executive board, reporting directly to the Chief Executive Officer. We must realize that data in itself has negligible value; it only becomes worthwhile when analyzed and turned into information. Therefore, this role could also be titled Chief Information Officer. To stress the importance of data and the enterprise-wide governance and utilization of data as an asset, however, it is better called Chief Data Officer. Emphasizing the data with a Chief Data Officer can spur a data-driven culture that will lead to an information-centric organization.
the organization’s strategic big data priorities. Because the CDO is familiar with the big data overview, he or she can identify new business opportunities based on available data and guide various teams within the organization on which data to store, analyze and use for what purposes. In the end, the CDO has the task of generating more revenue or decreasing costs through the use of data. Another responsibility of the Chief Data Officer should be to adapt the four ethical guidelines discussed earlier on the platform. While driving data usage within the organization, the CDO should also be the data conscience of the company. The Chief Data Officer should enforce radical transparency about what sort of data is collected and how it is used. Consumers should be made aware of the data that’s been collected about them and allow them to delete it in case the data is not stored anonymously. In addition, the CDO should let users simply adjust any privacy setting related to collected data. If this is implemented throughout the organization, it will build trust. With all data collected and stored, security is critical. Therefore, data security data should be discussed at board level. Being hacked or having data stolen can seriously endanger a company; therefore, this should be addressed at the highest level. In the end, the CDO should be held accountable for whatever data is collected, stored, shared, sold or analyzed as well as how those processes occur. Big data privacy and ethics are too important not to be discussed at C-level.
The Chief Data Officer should also oversee all the different big data initiatives underway within an organization. He or she should craft and manage standard data operating procedures, data accountability policies, data quality standards, data privacy and ethics policies as well as be able to understand how to combine different data sources within the organization. The Chief Data Officer should have a complete overview of what is going on within the organization related to data and represent this as a strategic business asset at the board level. The Chief Data Officer should be responsible, too, for defining
>
Gartner predicts that by 2015, 25% of organizations will have a CDO and further estimated that 45% of Chief Information Officers (CIOs) have already taken on the responsibilities of the CDO.
28
www.gulftechmag.com
BE PART OF THE ACTION WITH FULL HD 3D PROJECTION ENJOY OUTSTANDING SPORTS, MOVIES AND GAMING WITH THE LATEST PROJECTION TECHNOLOGY Change the way you view home entertainment with the Epson EH-TW6000 Series – three of the most affordable 1080p Full HD 3D projectors available*1. This is immersive big screen viewing made simple, with Epson 3LCD technology for bright, smooth 2D or 3D images even in daylight. You don’t even need cables with the latest wireless 3D technology*2. Get closer to the action with Epson. For more product information visit www.epson.eu
*3
*1As of September 2011. *2Epson EH-TW6000W. *3Source: Futuresource Consulting Ltd.
PowerPoint Tips
Jazz up your PowerPoint Presentations Charts, Graphs & 3D Animations
T
he scenario is familiar to traveling professionals: your PowerPoint presentation is all set when new and relevant information comes to light and must be added. If you’re on the road or in the sky and find yourself having to add charts or graphs to a PowerPoint presentation, this article will help. We include tips designed for PowerPoint novices and adept PowerPoint users seeking specific chart-making advice.
Create a Basic Chart or Graph To insert a colorful chart or graph illustration into your PowerPoint presentation, locate the Insert tab and select Chart. Next, look through the available chart types, select the design that best represents the information you want to share, and click OK. A Microsoft Excel chart will open with placeholder text and figures you can replace with relevant data. When you finish entering information, click File and Close to open the finished chart in PowerPoint.
Save & Manage Chart Templates If you want to adjust the look of an existing chart, click the chart in the PowerPoint slide, and the Chart Tools contextual tab appears. Keep in mind Chart Tools will only appear when you select a chart. Open the Design tab and you can manipulate the overall layout of a chart, adjust its style, and save it as a template for future presentations. To adjust the orientation, size, or spacing of a chart’s data and graphical elements, expand the Charts Layouts pane and choose one of the nine layout options. You can also change chart elements and background colors by selecting options from the Chart Styles section on the Design tab. When you’ve fashioned a chart you’d like to reuse, click the Save As Template button on the Design tab. Name the chart and PowerPoint saves it with the .CRTX file extension, which indicates it is a chart template.
Insert a Chart that’s Linked to Excel If you’re used to working in Excel and prefer to construct the skeleton of your chart first, you can compile data in Excel and then create a chart in Excel to use in PowerPoint. Start by entering values in an Excel workbook. Highlight all necessary data cells, click Insert, and apply a preferred chart style in the Charts pane. Next, select the newly created chart and click Copy in the Home tab. Open a current or new PowerPoint slide and find the Clipboard pane. Click the Paste drop-down arrow and choose Keep Source Formatting & Link Data (to maintain the appearance of the Excel file) or Use Destination Theme & Link Data (to match the chart appearance with the presentation).
Edit & Add Labels A chart that includes a lot of numbers or a detailed legend may require some editing, especially because you want it to look polished for presentation purposes. These fine-tuning tools are located in the Labels pane of the Layout tab on the Chart Tools contextual tab. If you notice that your chart is missing a title, you can add one by clicking Chart Title and selecting Centered Overlay Title or Above Chart—this displays a title at the top of the chart. You can browse the remaining label options to add axis titles, insert legend variations, and manipulate data.
www.gulftechmag.com
>
30
Having different pictures can be posted as backgrounds of graphs, no more will you have to abide by bar, line or pie graphs shapes
PowerPoint Tips
Adjust Style & Text To put the finishing touches of color and contrast on a chart, start by clicking the Format tab in the Chart Tools contextual tab. You can enhance backgrounds, category shapes, and 3D chart elements when you use options on the Shape Styles pane for each feature. Options on the WordArt Styles pane let you apply fill colors, outlines, and effects to chart text. To view every part of your chart (such as depth, floor, horizontal axis, side wall, and so on), click the drop-down arrow at the top of the Current Selection pane.
Modify Data in an Existing Chart Regardless of whether you created your initial chart in Excel or PowerPoint, you should be able to modify data without much hassle. In PowerPoint, click the chart you intend to change and select the Design tab in the Chart Tools contextual tab. Next, click Edit Data in the Data pane. Excel opens the data sheet in a new window and from here you can click and edit individual cells. Simply closing the Excel file will refresh and save the new content.
Add Animation If you want to emphasize a particular data group, you can add animations to a graph or chart. Under the Animations tab, the Animation pane has approximately 30 default animations you can apply to a chart. Explore extra effects by clicking More Entrance Effects, More Emphasis Effects, or More Exit Effects at the bottom of the Animation menu. To stagger the animation of individual objects, click Effect Options and select one of the following functions: As One Object, By Series, By Category, Be Element In Series, or By Element In Category. 3D Example of Charts & Graphs While having a two dimensional graph can be easily read, impressing the viewers with 3D graphs can come at the right time. With different pie graphs, bar graphs and even evaluation graphs, you can customize your data to fit your graphical needs, not the other way around.
2D Example of Charts & Graphs Choosing the right graph can be tricky, you can choose from one of the templates given by Office 365, Office 2010 or even third-party vendors. There are endless number graphs that can be shaped, formed or even illustrated manually to suit the table of data provided.
www.gulftechmag.com
31
IT in Health Care
Information Technology in Healthcare:
KHUH: Datix to ensure quality control King Hamad University Hospital (KHUH) was established as part of a medical strategy to develop a Centre for organ transplant surgeries and Trauma in the Kingdom of Bahrain, using state-of-the-art medical technology and the most sophisticated information systems, in addition to innovative methods to eliminate red tape and bureaucracy and support sound diagnostic and therapeutic decision making. The very first hospital to set up digital operations theatres . The project covers 11 operations theatres which are the most advanced digital technology in the health sector. The Commander of King Hamad University Hospital said the project comes in the framework of a system that is unique in its kind and is used in the most advanced hospitals worldwide, known for providing advanced and high quality health services. The project aims at ensuring full control of equipment and systems in the operations theatres and interfacing them with the internal and external environments, in addition to receiving information and issuing it electronically by obtaining great and timely benefit from digital technology which contributes to the performance of surgeries and operations for patients with utmost accuracy. King Hamad University Hospital announced recently that it has successfully deployed the first phase of a new Datix - patient safety software for healthcare risk management solution. This was implemented to deliver state-of-the-art technology supporting patient safety and reducing risk around patient care at KHUH. Datix is web-based patient safety software for healthcare risk management applications. The solution delivers safety, risk and governance elements through a variety of integrated software modules, enabling you to provide a comprehensive oversight of your risk management activities.
Features of Datix: • Incident, adverse event and near miss reporting • Patient relations • Malpractice claims management • Risk assessment • Safety alerts • Patient experience and feedback • Accreditation self-assessment • Complaints, compliments, comments and concerns Datix, based in London, is customizable and configurable, which means it can be tailored to a specific structure and unique requirement. Datix delivers a complete patient safety risk workflow, where all improvement actions can be managed together, regardless of whether they are initiated by an investigation, a complaint or an informal comment. KHUH is striving to implement the unified electronic file, which is considered the first of its kind in the world, and obtain state-of-the-art equipment which helps in improving therapeutic and diagnostic services, in addition to providing the best accommodation services to the Hospital’s in-patients.
32
www.gulftechmag.com
FOR SMALL BUSINESSES WITH BIG IDEAS
FAST, ECONOMICAL A3+ BUSINESS-QUALITY PRINTING FROM THE EPSON WORKFORCE SERIES From high-speed A3+ printing and A3 multi-page scanning, copying and faxing*1 to Wi-Fi and Ethernet sharing, high-capacity paper trays and double-sided printing*2 the Epson WorkForce A3+ Series will transform any busy small office. With up to 50% lower cost per page than competitive colour laser printers*3 you will enjoy significant savings too. Epson WorkForce All-in-Ones also feature Epson Connect*4 for direct printing from your smartphone, tablet PC or via email from anywhere in the world. Turn your big ideas into reality with Epson. To find out more please visit www.epson.eu and www.epsonconnect.com
Epson WorkForce WF-7015
Epson WorkForce WF-7525
Epson WorkForce WF-7515
Scan, copy and fax functions not available on WF-7015. *2 Up to A4. Not available on the Epson WorkForce WF-7515. *3 Comparison made against the top 10 A4 colour laser printers and MFPs sold in France, Germany, Italy, Spain and the UK in Q4 2010 as tracked by IDC. Cost per page is calculated from manufacturers’ official list prices for toner cartridges and published yields in France, Germany, Italy, Spain and the UK as of December 2010. *4 Epson Connect not available on WF-7015.
*1
AROUND THE GULF Dubai & Ajman authorities seize counterfeit HP products
nine million units of counterfeit products and components seized, thus preventing them from being sold in the EMEA marketplace and beyond.
COM.IT builds on 11 years of rich GITEX experience to enrich local ICT landscape
Bahrain’s mobile firms told to boost services
HP announced that its Anticounterfeit Program in Europe, Middle-East & Africa has supported law enforcement officials in the UAE in the largest single seizure of counterfeit HP products to date. The raids on counterfeiters followed an investigation by HP, leading to the confiscation of more than one million fake printer cartridges and components. During simultaneous raids on five premises across Ajman and Dubai in April 2013, officials confiscated around 150,000 laser print cartridges, 100,000 fake cartridge boxes, nearly 50,000 security labels and over 750,000 empty print cartridges. Such actions help to prevent the spread of illegal fakes throughout the Middle East and beyond. During the raids, officials gained valuable insight into counterfeiting networks which will be used for further investigations to protect honest traders and their customers. Original HP supplies distinguish themselves by their superior quality and reliability at competitive prices. Across EMEA, over the last four years, HP has conducted nearly 1,000 investigations, resulting in over 800 enforcement actions (raids and seizures by authorities) and nearly
34
www.gulftechmag.com
Bahrain’s mobile telecom firms have been ordered to improve their performance, after an increase in the number of complaints about bad voice quality and unstable data services, a report said. The Telecommunications Regulatory Authority (TRA) issued the order after auditing the quality of mobile voice and mobile broadband services. A TRA audit last month found that 2% of calls “failed”, while 1% of calls were “dropped”. It prompted the TRA to formerly contact operators last week to recommend immediate industry attention and action. Each mobile network operator has now been asked to investigate and report reasons for the level of call failures and dropped calls and take appropriate action. The percentage of calls that lasted for two minutes stood at 96.8%. Meanwhile, average web downlink speeds increased significantly – with ranges between 3,400 kbps and 5,600 kbps depending on the network.
Saudi Arabia is on track to remain the Gulf’s biggest IT market this year, with IT spending projected to increase by 6.6% to SAR 15.3 billion. Among the factors driving growth are major opportunities in healthcare and education, broadening cloud computing adoption, and targeted investments towards smart systems. To support the buoyant Saudi market performance and maximize existing prospects, Riyadh Exhibitions Company has announced that it will be organizing a new industryenergizing show called COM.IT. The event builds on REC’s 11 years of experience in organizing GITEX Saudi Arabia, the Kingdom’s former leading information and communications technology (ICT) trade fair, which COM.IT is set to replace. The inaugural COM.IT 2013 will take place from November 16 to 19, 2013 at the Riyadh International Convention & Exhibition Center. COM.IT 2013 will display a wide range of ICT products and services, including telecommunications equipment and systems, networking and office automation solutions, the latest PCs and laptops, mobile phones, multimedia devices and digital products. It will also showcase various educational and entertainment gadgets.
Oman’s ITA Teams Up With
AROUND THE GULF SAP To Boost Graduate Employment Prospects
SAP, the world’s largest business software company, has revealed details of its innovative Mawared graduate training program in Oman. The Mawared program is currently educating 20 talented Omani graduates, who were selected from a pool of over 300 applicants. A further 20 students are set to join in the fourth quarter of 2013. Current Mawared students are well on their way to gain essential business, IT and leadership skills. As a part of the program, they recently took part in networking and knowledge-sharing session with local businesses and industry heads in Muscat. Moving forward, Mawared students could be funded by organisations such as the ITA and the private sector, which will benefit from access to a peerless pool of technologically articulate, business-savvy consultants attuned to local market needs. Training will include hands-on project experience and encompass everything from negotiation and communication to conflict management and “design thinking”. In addition, the initiative will offer SAP certifications to associate level in core business and industry solutions. Mawared engages students from the region’s top universities, and the rigorous selection process ensures only the brightest and most capable
are recruited. The program, which is central to SAP’s plans to certify more than 2,000 new consultants in the region within 2015, is a direct response to a distinct skills gap in the market and a lack of opportunities for talented young graduates.
UAE’s ICT industry is growing by 25-30% per year across all sectors
The ICT sector continues to be one of the highest growing sectors in the UAE with projected growth to hit 22.3% in 2013. Most organizations from different industries across the region use ICT to carry out essential functions and to sharpen competitive advantage through the deployment of the latest networking, applications and communication technologies. IDC, a leading global market analysis firm, reported that global spending on information technology (IT) surged by 8% to US$1.5 trillion last year, with the UAE recording 15% year-on-year increase. Another report based on the feedback of experts taking part in the 8th Financial Technology Summit shows that the UAE’s ICT industry is growing by 25-30% per year across all sectors including hardware, software, mobile and internet services. Moreover, the rapid growth of the IT market in the UAE will present significant commercial and
employment opportunities as the demand for and the deployment of new technologies continues to spread over the next few years. As a result, marketing and PR agencies need to keep pace with the evolving needs of clients by enhancing their services.
41% of Arab world’s Facebook users are from UAE
Of all the Facebook users in the Arab world, the UAE has some 41%, almost double the amount of the country next in line, according to the fifth edition of the Arab Social Media Report series. Analysing demographics, the report reveals that the UAE continues to score the highest amongst all Arab countries in terms of Facebook penetration at 41%, while Egypt claims around 25% of Arab Facebook users and Saudi Arabia has more than half 50% of the Arab active Twitter users. However, for the first time, most GCC countries saw a drop in social media adoption for the first time in 2013. When surveying students, 55% of students said they used social media as a classroom resource, and 10% of parents said their children have access to social media platforms in the classroom, more than half said their children’s classrooms did not encourage Facebooking or Tweeting. More than half of parents, 56%, said they were worried that their children got distracted from other tasks with access to social media.
www.gulftechmag.com
35
Jobs Offered
JOBS OFFERED Find a job with GulfTech
Ref: O/02 Position : Network Server Engineer Industry : Banking Job Role: Skilled networking engineers, knowledge in Windows 2008 Server and above, Cisco, Juniper. Number of Vacancies : 2 Experience Required : 5 years minimum
Ref: O/04 Position : Cisco Security Engineer Industry : Banking & Finance Job Role: Role to manage and configure pure Cisco networking environment, along with build firewalls, control users and program L2 and L2 devices. Number of Vacancies : 1 Experience Required : 6 years minimum
REF:IS3/07 Ref: O/01 Position : SQL/C++/Web Programmer Industry : Financial Sector Job Role: Operate a fully functional cloud based database along with 12-hour monitoring, 4 days a week. Number of Vacancies : 2 Experience Required : 7 years minimum
Ref: O/03 Position : Oracle Programmer Industry : Private Business (Outsource) Job Role: Looking for skilled programmers, capable of troubleshooting codes, build modules, manage projects and work in a team of 5. Number of Vacancies : 4 Experience Required : 5 years minimum
Ref: O/05 Position : Desktop Support w/ License Industry : IT Company Job Role: Knowledge in supporting and troubleshooting software and hardware problems with PCs, printers, scanners and laptops. Number of Vacancies : 3 Experience Required : 3 years minimum
Ref: O/06 Position : Data Entry Operator Industry : Oil/Petrolium Industry Job Role: Candidate required to have good communication skills along with excellent computer knowledge, especially of MS Word and Excel. Part time and Full time allowed. Number of Vacancies : 5 Experience Required : 3 years minimum
Ref: O/07 Position : Desktop Support Team Industry : Private Business Job Role: Required 5 candidates to be skilled in communication, handling software/hardware problems, managing helpdesk calls and reporting everyday. Number of Vacancies : 5 Experience Required : 3 years minimum
Ref: O/08 Position : Hardware Electronics Technician Industry : Private Business Job Role: Required two technicians capable of fixing capacitors, soldering monitor cables, troubleshoot printer and PC problems. Number of Vacancies : 1 Experience Required : 4 years minimum
Ref: O/09 Position : Database Entry Operator Industry : Investment Bank Job Role: Knowledge in MySQL and ASP.NET is required as first-hand language, also required past experience in Javascript, HTML and Hascall. Number of Vacancies : 2 Experience Required : 8 years minimum
Advertise your vacancies with us by contacting info@gulftechmag.com To Apply for the jobs offered, please send the Ref number to jobs@gulftechmag.com
36
www.gulftechmag.com
Sell IT Dell Desktop (Dual Core) Condition: Good (Rating: 3/5) Specification: Dual Core 1.8GHz Processor, 160GB HDD, 1GB RAM with 19” LCD Monitor, keyboard & mouse. Price: BD.55/Contact: 39812609
Sony Xperia ION 4G 16GB Condition: Like New (Rating: 5/5) Specification: Sony Xperia phone with 4g LTE, 4.6” Screen, 12MP camera. Warranty is still active Price: BD.110/Contact: 36004470
Samsung Galaxy S4 Condition: Like New (Rating: 5/5) Specification: Used for 15 days, white S4 with packaging and orginal accessories. Warranty is still active. Price: BD.210/Contact: 39897189
Apple iMac 21.5” Laptop Condition: Good (Rating: 3/5) Specification: 2.7GHz Intel i5, 8GB RAM, 1TB HDD, running OS X with mouse and keyboard, original boxing. Price: BD.450/Contact: 33045169
Sell IT Dell Latitude E6410 3.4GHz Condition: Good (Rating: 4/5) Specification: Intel i7 2640QM, 4GB RAM 1600MHz, 250GB HDD, HD 14.1” Screen, WiFi and Bluetooth. Price: BD.320/Contact: 39102200
MacBook Pro 13”
Condition: Like New (Rating: 4/5) Specification: 2.4GHz processor, 4GB RAM, Intel i5, 500GB HDD, Latest OS X installed along with Windows XP. Price: BD.320/Contact: 39102200
Apple iPhone 5 Condition: Like New (Rating: 4/5) Specification: 32GB iPhone 5 with original package and charger, minor scratch on the side. Price: BD.160/Contact: 33632794
Toshiba Libretto Q100 Tablet Condition: Like New (Rating: 5/5) Specification: 1.2GHz Intel Processor, 2GB RAM, 62GB SSD, rarely used tablet with original accessories. Price: BD.400/Contact: 39408024
Sony VAIO Laptop
Condition: Used (Rating: 3/5) Specification: Intel Core i7 740QM, 4GB RAM, 500GB HDD, VAIO VPCF121GX. Price: BD.350/Contact: 33133386
Want to Sell IT? Email us on: sellit@gulftechmag.com www.gulftechmag.com
37
Tel: +973 - 36400818 +973 - 34302951
HIGHLIGHTS & FACTS Finally, BBM Coming To Android
Highlights & News
JARGON BUSTER Test your TechKnowledge on Technology Terms MPEG vs. H.264 Compression
Blackberry has announced that its flagship BBM will be coming to Android this summer. It will be available as a free download from the Play Store, and will compete with the likes of Google’s new Hangouts app, Facebook Home and WhatsApp in the battle to dominate the mobile messaging space. Blackberry was the market leader in messaging and ranked among the world’s biggest smartphone manufacturers. Today the company’s share stands at less than 3% and falling. The same figures put Android’s share at a whopping 75%. Messaging is increasingly becoming one of the key battlegrounds in the mobile, and is seen as one of the best ways to lock users into a particular platform. Meanwhile ‘over the top’ messaging apps are plentiful. It’s into this crowded market that BBM is making its move. The brand may be diminished and the decision may appear to be a last resort for Blackberry, but the app and service are still more than competitive and fondly remembered by many of its past users. That should at least guarantee a certain level of interest in the app when it arrives this summer.
MPEG1 compression gives VHS-quality video, while MPEG2 compression is used for DVD movies. H.264 provides quarter-pixel precision for motion compensation enables very precise description of the displacements of moving areas. H.264 is a new standard for video compression which has more advanced compression methods than the basic MPEG-4 compression.
What is Beta? Beta versions of software are those that are almost complete, but not yet finished. Beta versions are often released so they can be tested. Usually, Beta versions are released with minor bugs and are later updated with patches to fix minor issues with compatibility and errors.
USB 3.0 vs. USB 2.0
Wireless Tips : Get the most of your Wireless Router Most routers broadcast in the 2.4GHz frequency range, thus many interferences could occur while your trying to gain the maximum out of your router. Buying a 5GHz router can help avoid obstacles that other electromagnetic frequencies have on that area. It is advisable to have simultaneous dual-band router to support a wide area. A router with external antennas can provide greater control over the strength and directionality of your wireless signal.
SAMSUNG BOLTS IT UP Samsung Electronics has partnered with athletic superstar Usain Bolt to launch its latest compact system camera, the NX 300. Samsung hopes to showcase the parallels between Bolt’s exceptional status and the features of the NX300 through a host of exciting initiatives. Samsung will be working with Usain Bolt Foundation to provide photography lessons and equipment to aspiring young photographers under the name “NX Junior Photographer” providing the young with necessary guidance needed to excel.
Features:
- Shutter speed, handles up to 8.6 FPS with its superfast 1/6000 sec shutter speed. - Capturing 3D images and video although a separate lens. - Presented in either white, black or brown with a stylish constrastive silver band.
Making Life, Easier In this issue, we wanted to make your life easier by giving you tips and tricks on using Windows 8 OS. Here you can learn the shortcuts that can help you, gain speed over your work and ease-of-use over the OS. Ctrl + up/down ~ moves the cursor to the beginning or end of the current paragraph. Ctrl + home/end ~ moves the cursor to the beginning or end of the page. Ctrl + shift + home/end ~ selects the content above or below of the current position of the cursor. Ctrl + left/right ~ move the cursor to one word left or right. Ctrl + shift + left/right ~ select the word left or right of the current position of the cursor.
A faster version of the USB standard used to connect devices to a computer. USB3.0 is expected to be more widespread by 2013 end, although some external storage devices already support the new standard and adapters to add USB3.0 sockets to computers have been available since 2010. USB 3.0 is capable of transfer speeds of up to 5Gbps. That’s a little over 10 times faster than USB 2.0’s 480Mbps.
System Restore A safety feature built into Windows that periodically creates a copy of settings on the computer. This enables the computer to revert to its former settings if a problem occurs.
Google Analytics A free service provided by Google used by website owners to see which pages on their site are the most popular.
BitTorrent A technology for downloading files. Allows even very large files to be downloaded quickly through special ports.
Dual Core Where two processors are combined into a single chip to give efficient speed and processing power.