Subscribe in a reader

Since 'the geek shall inherit the earth', this geek is just waiting for his day to rule the world. In the meantime, he is a young Padawan for CNET Asia whilst toying with a myriad of fun stuff disguised as work and pretending to advise companies on tech business and new media strategies. His playmates range from startups, (un)Fortune 500s, to government organisations.
Subscribe to Geekonomics by Email

CONTACT Geekonomics

Now in this geek's bag:

. iPhone 4 32GB
. Kindle Graphite
. Canon Legria HFM32
. Samsung Galaxy Tab
. Algo Tablet
. LG Optimus 7
. Nokia N8
. Sony VAIO VGN-P23G
. Blackberry Bold 9780
. Lenovo Thinkpad W700ds a.k.a. "Chewie"
. Canon PowerShot G11
. Lenovo S10-2
. Jawbone 3rd Gen Bluetooth Headset with Noise Assassin
. Ultimate Ears Triple.fi Pro

Formerly in this bag:
. Lenovo Ideapad U260
. Blackberry Bold 9700
. Nokia N900
. iPhone 3GS 16GB
. Sony Ericsson Xperia X10 mini pro
. HTC Snap
. Plantronics Discovery 975 headset
. Acer beTouch E100
. Zune HD
. Nokia N97 Mini
. HP Probook
. Apple iPod Touch 2nd Gen with Ultimate Ears super.fi
. Nokia BH-902 Bluetooth Headset
. Blackberry 8800
. Nokia N96
. Blackberry Bold 9000
. LG WM6.5 Prototype
. Jawbone 2nd Gen Bluetooth Headset with Noise Assassin
. HTC Touch Cruise
. Lenovo Thinkpad T400s
. Canon Powershot G10
. Lenovo IdeaPad U350
. Canon Digital IXUS 990 IS
. Samsung Galaxy
. Canon Legria FS200
. Canon SX10 IS
. Blackberry Curve 8320
. Canon EOS 5D Mark II
. Canon Digital IXUS 980 IS
. Gigabyte Netbook M912V Tablet
. Lenovo Ideapad S10
. Lenovo Thinkpad X200
. Samsung Innov8
. Samsung Omnia
. Apple iPhone 3G
. Apple iPod Shuffle
. Kohjinsha SX Series
. Kohijnsha SC Series
. Canon Powershot S5 IS
. Canon EOS 1000D
  • 28Jun

    images[1] Symantec ApplicationHA features integration with VMware vCenter Site Recovery Manager, rapid deployment of business critical applications and improved dashboard management

    SINGAPORE – June 28, 2011 – Symantec Corp. (Nasdaq: SYMC) today announced the latest version of Symantec ApplicationHA, Symantec’s high availability solution for VMware virtual environments that provides customers the ability to confidently virtualise their business critical applications. The latest version of Symantec ApplicationHA extends the existing capabilities for disaster recovery with VMware vCenter Site Recovery Manager integration and provides a dashboard to monitor and manage hundreds of applications within VMware vCenter Server.

    Symantec ApplicationHA, based on the industry-leading Veritas Cluster Server technology, provides high availability for business-critical applications through application-level visibility, control, and recovery in VMware environments. ApplicationHA runs inside a VMware guest operating system and fully integrates with VMware High Availability.  In the event of an application failure, ApplicationHA coordinates recovery and restarts the application and/or virtual machine.  This enables organisations to confidently move their business critical applications into VMware virtual machines.

    Read more…

    Share/Save/Bookmark

  • 08Jun

    Today is World IPV6 Day with a number of organisations starting to offer Internet services using the replacement Internet Protocol version 6 (IPv6) standard, that contains a number of improvements over the legacy IPv4. A key benefit is a huge increase in possible address space.

    From a security perspective, Symantec feels this move raises some new and potentially interesting problems for malware authors, anti-virus companies and system/network administrators. With the introduction of IPv6, it is now unlikely for cyber criminals to perform brute force IPv6 address scans to profile a network or identify a possible attack vector in this way.

    Events like World IPv6 Day are important steps towards a full adoption of the replacement protocol. But as we move towards this goal, we are facing a learning curve where new threats while not yet fully apparent, will gradually emerge as malware authors are certain to take note and begin adapting.

    As always, Symantec recommends that you keep your definitions, signatures and firewall rules up to date to ensure protection against threats.

    Read more about this brave new world of IPv6 at Symantec’s security blog

    Share/Save/Bookmark

  • 02Jun

    Looks like MOL is on the acquisition path, fresh from the acquisition of friendster. I suppose this purchase will extend their reach and presence across Asia.

    MOL logo-FinalMANILA, Philippines, June 1, 2011 – MOL AccessPortal Sdn Bhd (MOL), a leading payment service provider for online games, virtual worlds and social network in Asia, today announced that it has acquired 100% of LoadCentral, Philippines’ leading prepaid payment platform.

    The acquisition will create synergy for both organizations and enhance growth prospects.

    LoadCentral’s leading position in providing prepaid payment platform to consumers in the Philippines will give valuable access to new channels for delivery of MOL’s products. Following the acquisition, the combined company becomes the largest payment provider for prepaid services for the growing online gaming market in the Philippines.

    Read more…

    Share/Save/Bookmark

  • 20May

    Symantec alerted this geek to a new spam which all of us should be aware of:

    There is currently a new spam campaign spreading across Facebook. The spam has an appearance similar to the following:

    It is worth mentioning that the app_id in the requests is “6628568379”, which may cause the post to look as though it was sent from an iPhone when this is not the case. This is done to give an appearance of further credibility to the scam.

    Read more…

    Share/Save/Bookmark

  • 22Mar

    200x150[1] Came across this release by Symantec a week back. Now why is this geek not surprised? Guess the now and current is more important to many than the past. Interesting angle Symantec took to do the survey, I must say, including questions on whether victims would be willing to pay a ransom to get their phones back. This geek was just musing about “internet dependency”. I guess this warrants some thought on the new topic “mobile dependency”.

    About half of Singaporeans have had their mobile phone lost or stolen and 84 percent of them found the experience stressful.

    SINGAPORE, 15 March 2011 – Smartphones today have become an indispensable tool in our everyday life; as our primary way to communicate, work, share and collaborate.  A survey conducted by Norton reveals that 52 percent of adults in Singapore have fallen victim to mobile phone loss or theft, and despite that, only 37 percent currently have a password protecting their devices.  The imminent need for mobile protection is increasingly important in Singapore where 89 percent of Singaporeans never leave home without their mobile phones and nearly half cannot live without their phones.

    Read more…

    Share/Save/Bookmark

  • 08Dec

     

    Well looks like Symantec does it again. 3rd and 4th year consecutive wins are pretty impressive results, if you ask me.

    SINGAPORE – December 8, 2010 – Symantec Corp. (Nasdaq: SYMC) today announced that Symantec Endpoint Protection 11.0 and its VeriSign Identity Protection Authentication Service have won the 2010 NetworkWorld Asia Readers’ Choice Product Excellence Awards for Best Anti-Spyware/ Malware and Best Identity Management Suite categories respectively. This is Symantec’s fourth consecutive win for Symantec Endpoint Protection and its third consecutive win for the VeriSign Identity Protection Authentication Service.

    Read more…

    Share/Save/Bookmark

  • 18Nov

    Facebook_Privacy[1] Facebook has announced its new email service which brings together Facebook messages, instant messaging chat and SMS messages in one place.

    This geek was alerted to some of the security implications through an FAQ guide which Sophos has setup.

    "Before signing up, users need to realise that these new features increase the attack surface on the Facebook platform, and make personal accounts all the more alluring for cybercriminals to break into," said Graham Cluley, senior technology consultant at Sophos. More from Sophos after the break.

    Read more…

    Share/Save/Bookmark

  • 08Oct

    Sounds like something straight out of a spy movie? In this day and age, you never know especially after Google claimed that the Chinese government orchestrated an attack on their services just early this year. Read the full release from Symantec for yourself and be your own judge:

    SINGAPORE, October 7, 2010 – Symantec Corp. (Nasdaq: SYMC) has released the findings of its 2010 Critical Information Infrastructure Protection (CIP) Survey, which highlights that 53 percent of critical infrastructure providers report that their networks have experienced what they perceived as politically motivated cyber attacks.  Participants claimed to have experienced such an attack on an average of 10 times in the past five years, incurring an average cost of $850,000 to their businesses.  Survey participants from the energy industry reported that they were best prepared for such an attack, while participants from the communications industry reported that they were the least prepared.  Critical infrastructure providers represent industries that are of such importance either to a nation’s economy or society that if their cyber networks were successfully attacked and damaged, the result would threaten national security.

    Read more…

    Share/Save/Bookmark

  • 14Sep

    Another announcement at Intel Developer Forum 2010. This geek is not really into KVM but this looks interesting allowing you to watch a full PC boot sequence remotely.

    September 13th 2010: At Intel Developer Forum (IDF) in San Francisco, RealVNC will be demonstrating VNC Viewer Plus connecting directly to the KVM remote control functionality embedded in the 2010 Intel®Core™ vPro™ processor family. This unique solution enables IT teams to benefit from additional cost-saving manageability functions such as remote reboot, remote power on/off and IDE redirection.

    With VNC Viewer Plus connected to a VNC Server embedded in the hardware, IT departments can diagnose more complex issues remotely such as OS failures and boot problems. Users can watch a full PC boot sequence, manipulate BIOS settings and re-install an operating system, reducing the need for desk-side visits and any downtime.

    Read more…

    Share/Save/Bookmark

  • 10Sep

    Norton Cybercrime Report is the First Study to Gauge Emotional Impact of Cybercrime on Internet Users and reports of victims feeling very ripped off and upset.

    Singapore – September 9, 2010 – The next time you surf the Internet, consider this: you might just be one click away from becoming the next cybercrime victim. A new study released today from security software maker Norton, reveals the prevalence of cybercrime in Singapore where 70 percent of Internet users have fallen victim to cybercrimes, including computer viruses, online credit card fraud and identity theft. This silent digital epidemic is the result of consumers‟ apathy, which leaves them vulnerable and exposed in the online world.

    The Norton Cybercrime Report: The Human Impact

    Read more…

    Share/Save/Bookmark

« Previous Entries