Tuesday, May 31, 2005
Laptop with credit card info for 80,000 DOJ workers stolen
Computerworld: "The FBI and Fairfax, Va., police are investigating the theft of a laptop containing the names and credit card numbers of about 80,000 U.S. Department of Justice workers. "
Critics Are Saying 'That's Too Hot' of Sexy Carl's Jr. Ad
Newsday.com: "As in a racy music video, a scantily clad Paris Hilton cavorts with a water hose as she washes a black Bentley, while singer Eleni Mandell's sultry version of Cole Porter's 'I Love Paris' pulsates throughout."
Garnet Hertz - Experiments in Galvanism: Frog with Implanted Webserver [Project Documentation]
Garnet Hertz - Experiments in Galvanism: Frog with Implanted Webserver [Project Documentation]: "Experiments in Galvanism is the culmination of studio and gallery experiments in which a miniature computer is implanted into the dead body of a frog specimen. Akin to Damien Hirst's bodies in formaldehyde, the frog is suspended in clear liquid contained in a glass cube, with a blue ethernet cable leading into its splayed abdomen. The computer stores a website that enables users to trigger physical movement in the corpse: the resulting movement can be seen in gallery, and through a live streaming webcamera."
Mom Indicted for Hiring Stripper for Teen
Yahoo! News: "NASHVILLE, Tenn. - A mother faces criminal charges after she hired a stripper to dance at her 16-year-old son's birthday party. Anette Pharris, 34, has been indicted by a grand jury on charges of contributing to the delinquency of a minor and involving a minor in obscene acts. The boy's father, the stripper and two others also face charges. "
Camera phones wear out welcome
Seattle Post-Intelligencer: "At Apple Computer's shareholder meeting in April, attendees weren't allowed to take pictures. So what did security personnel check for, among other things? Cell phones."
Wednesday, May 25, 2005
Easy to Implement Security Improvements
IT Observer - : "If your organization looks at security as a product that comes off the shelf, you will always need another product to help address security issues. As your organization makes each additional purchase to improve security, you will see a diminishing return on your investments. "
Who's helping the victims of data theft?
Cranky Consumer: "In the past several months, a parade of household names -- from Polo and Time Warner to MCI and Bank of America -- have been sending out 'oops' letters apologizing for leaving laptops around that are chock full of private data or issuing news releases about possible credit-card theft. "
Tuesday, May 24, 2005
Adholes
Adholes: "Adholes.com is a mob-blogging and social networking site for the advertising industry. Through Netmodular's relevance engine, the site stays fresh with blogs and commentary by ensuring the most popular blogs and people are rewarded with a high level of visability. "
The Evolution of Web Search
Yahoo! Finance - Tech Insider : "As we've become completely immersed in the Internet era, Google has become a verb, librarians are increasingly lonely, and most of us have mastered the basics of Boolean logic--without even knowing exactly what it is. We've become a society of information managers, navigating huge amounts of data with ease and expertly tracking down obscure facts and figures."
Google Searches Its Soul
Business Week: "The Web search king wants to offer portal-like features without cluttering its site. Can it pull it off? "
Yahoo! Catches Google, Targets Internet Phone Market
Scribe Journal: - The National Ledger: "A little more than four years ago, Yahoo was mired in the same dot-com quicksand that had engulfed Silicon Valley and erased billions of dollars in market capitalization from its technological firms. At that time, newcomer Google was mesmerizing the world of search engine technology with its enormous index of Web pages and the speed of its crawlers. "
Seven Laws of Information Risk Management
mysan.de - be updated -: "1. Your partners and employees will steal from you
As globalization and interconnectedness increases without proper
vetting and security, employees, customers and trading partners can
accidentally corrupt your data or cause regulatory compliance issues
through misuse of the data. In the worst-case scenario, they can steal
confidential data and sell it.
"
As globalization and interconnectedness increases without proper
vetting and security, employees, customers and trading partners can
accidentally corrupt your data or cause regulatory compliance issues
through misuse of the data. In the worst-case scenario, they can steal
confidential data and sell it.
"
Firms can find ways to guard personal data
Inside Bay Area - On the Move: "STEALING SOCIAL SECURITY numbers and other sensitive data isn't always a cloak-and-dagger, ultra-sophisticated operation: It's often a low-tech job made easier by carelessness and flimsy safeguards. "
Cellphone industry starts shifting gears
International Herald Tribune:
Now that most people in the Western world have mobile phones, the cellular industry is turning its attention to machines. To be sure, machine-to-machine mobile communications, or M2M, has been available for more than 15 years, from systems like Mobitex, originally developed by Ericsson, and Vodafone's Paknet. These narrowband radio networks provide highly secure, reliable communications for things like bank machines, security systems, vehicle tracking and messaging.
Now that most people in the Western world have mobile phones, the cellular industry is turning its attention to machines. To be sure, machine-to-machine mobile communications, or M2M, has been available for more than 15 years, from systems like Mobitex, originally developed by Ericsson, and Vodafone's Paknet. These narrowband radio networks provide highly secure, reliable communications for things like bank machines, security systems, vehicle tracking and messaging.
More than 100,000 notified of possible record theft
USATODAY.com : " More than 100,000 customers of Wachovia (WB) and Bank of America (BAC) have been notified that their financial records may have been stolen by bank employees and sold to collection agencies."
Experts offer tips to stop ID thieves
KRT Wire : "NEW YORK - (KRT) - The letters warning of identity theft started going out in April, and not just a few of them. More than 180,000 Polo Ralph Lauren customers who used credit cards for their purchases received letters from HSBC bank saying their names and card numbers had been compromised. There was a security breach of Polo's data bank."
New virus attacks computers
KGET TV 17 : "BAKERSFIELD - There's a new computer scam claiming more and more victims. The victim is known as pharming."
Computer hacker demands ransom
icWales : "Computer users already anxious about viruses and identity theft have new reason to worry: Hackers have found a way to lock up the electronic documents on your computer and then demand �110 over the internet to get them back."
Fear the kittens.
Fear the kittens. Music- Laibach - Tanz Mit Laibach, animation by Joel Veitch, rathergood.com - I'd seen a bunch of these but not this one....
Monday, May 23, 2005
Search Engine Marketing Growing More Complex
Search Engine Journal: "Working out a marketing plan for new and evolving websites is a bit more complicated than it used to be. There are a few new things to be considered before embarking on a search marketing campaign than in previous years. Search marketing has become more important and is thus becoming more professional. With growing acceptance of online communication tools, and a number of alterations to the faces of search engines themselves, the marketing arena has
been upgraded from a three-ring circus venue to a Super Bowl sized stadium."
it's about time you guys caught up!!!
been upgraded from a three-ring circus venue to a Super Bowl sized stadium."
it's about time you guys caught up!!!
New twist on 'phishing' scam - 'pharming'
csmonitor.com: "'The pharmers are coming! The pharmers are coming!' Hang warning lanterns all over the Internet: It's under attack by a new scam.
For two years users have been hearing about 'phishing,' the sending of bogus e-mails - allegedly from a bank or other online business - by criminals who hope to hook the unwary. Those who bite by clicking on a hyperlink in the e-mail are shipped off to a phony but authentic-looking website and asked to enter sensitive information. If they type in their passwords or account numbers, thieves have that data."
For two years users have been hearing about 'phishing,' the sending of bogus e-mails - allegedly from a bank or other online business - by criminals who hope to hook the unwary. Those who bite by clicking on a hyperlink in the e-mail are shipped off to a phony but authentic-looking website and asked to enter sensitive information. If they type in their passwords or account numbers, thieves have that data."
Boomers Shake Up the Internet
Strong Usage by Tomorrow's Seniors Means Big Changes for Market : "NEW YORK, NY -- (MARKET WIRE) -- 05/19/2005 -- Marketers and the media are waking up to the power of older consumers online, as the oldest baby boomers prepare to turn 60 in 2006. "
Internet Takes Larger Role at Catalog Conference
DMNews.com: "A larger Internet presence at next week's Annual Catalog Conference compared with the event in prior years reflects not only an overall strategy by the Direct Marketing Association to incorporate the world of interactive into the organization, but also the way the DM industry is headed. "
Research Shows 96% of Senior Marketers believe Cross-channel Sales & Marketing will Become More Important...
.. but Only 32% Understand It and Its Relevance to eCommerce: "Pasadena, CA (PRWEB) May 17, 2005 -- We define cross channel sales & marketing as not only reaching customers through multiple channels of distribution (direct and indirect), but taking advantage of one channel to drive sales in another, e.g. using online sales to drive customers to a retail store, in-store activity to drive direct response sales, or direct sales to drive reseller sales. Historically, channel conflict was a major concern, which has caused some companies to lose sleep and market position. Now we can use technology and multiple channels to benefit revenue and profit. A few companies have moved beyond simple eCommerce to reach customers through one channel so that they may buy through another."
Organised crime has come a long way since the Krays used to terrorise local businessman.
The Fear Factor - Computing: "Back in the 1960s, it was common for a new business to receive a visit from a gentleman with a flashy suit and expensive motor. While the proprietor of the business was still wandering how such a cocky young upstart could afford these luxuries, the brash gunslinger would hit him hard. This is a nice business you've got here, he'd begin. Wouldn't it be a tragedy if someone was to come along and trash it? You could lose all your customers overnight. Once they've been scared off they'll never come back, he'd point out. He'd follow up this advice with what modern salesmen call a leading question, like 'and we don't want to get the police involved in this, do we?'"
Scope of bank data theft grows to 676,000 customers
Computerworld : "What is thought to be the largest US banking security breach in history has gotten even bigger.
The number of bank accounts accessed illegally by a New Jersey cybercrime ring has grown to 676,000, according to police investigators. That's up from the initial estimate of 500,000 accounts police last month said had been breached."
The number of bank accounts accessed illegally by a New Jersey cybercrime ring has grown to 676,000, according to police investigators. That's up from the initial estimate of 500,000 accounts police last month said had been breached."
OnePurdue replaces 30-year-old administrative system.
The Exponent - campus: "Using Social Security numbers to identify yourself to Purdue is a problem.
The issue of using the numbers surfaced after another security breach that involved more than 11,000 people. This is the third time in the past year that Purdue has announced a computer security breach in which personal information has been accessed."
The issue of using the numbers surfaced after another security breach that involved more than 11,000 people. This is the third time in the past year that Purdue has announced a computer security breach in which personal information has been accessed."
A Hacker Break-In Scrambles Kellogg
Business Week: "Thousands of students, alumni, and faculty have their personal info compromised. "
MCI: employee data was on stolen laptop
ABC News: "May 23, 2005 - NEW YORK (Reuters) - A laptop computer containing the names and Social Security numbers of about 16,500 current and former employees of MCI Inc. was stolen last month, the Wall Street Journal reported on Monday."
Sober ready to ruin your Monday
Security Bytes: "Sober set to strike again
After tearing through the Internet earlier this month by promising tickets for the 2006 World Cup in Germany, the Sober-N worm dropped the Sober-Q Trojan on compromised machines and began spewing messages of German nationalism. Now, CipherTrust researchers say, that Trojan will be receiving new instructions that could include a more destructive payload than merely sending out spam. "
After tearing through the Internet earlier this month by promising tickets for the 2006 World Cup in Germany, the Sober-N worm dropped the Sober-Q Trojan on compromised machines and began spewing messages of German nationalism. Now, CipherTrust researchers say, that Trojan will be receiving new instructions that could include a more destructive payload than merely sending out spam. "
Hackers use new tricks to steal IDs
South Florida Sun-Sentinel: "Tactics known as 'pharming' and 'evil twins' among latest schemes used to con users into supplying personal data over Web"
We stopped computer worm, say German experts
IOL: Computers / IT: "Bonn - German Internet security experts declared victory on Monday in an attempt to head off a computer virus before it spreads through millions of personal computers worldwide."
Identity theft risk widens at Valdosta State
Rome News - Tribune: "VALDOSTA � A computer identity breach at Valdosta State University has widened, with authorities now saying up to 40,000 people could have had their Social Security numbers accessed by a computer hacker last week."
Friday, May 20, 2005
Information Technology Association welcomes task force report on e-mail spam
cp technology news : "OTTAWA (CP) - Canada is in position to be at the 'forefront of nations' building policy to combat spam e-mail, an industry group said Tuesday. "
TechPoint Foundation Names ExactTarget Information Technology Company of the Year
TMCNet: "INDIANAPOLIS --(Business Wire)-- May 16, 2005 -- On-demand email software provider ExactTarget was honored with the Information Technology Company of the Year Award by TechPoint, the leading change agent for Indiana's technology industry. Key considerations for the award are profitability, sustainability, impact on the industry and market, and accomplishments as an outstanding corporate citizen. In 2004, ExactTarget received TechPoint's Gazelle Award, which is given to the leading technology company in business less than three years from the initial commercialization of its principal products or services. "
Wineries Toast Supreme Court Ruling on Interstate Sales
law.com - Article: "The Supreme Court gave a cork-popping victory to the wine industry Monday, striking down state laws that barred consumers from receiving direct shipment of wines from out-of-state wineries. "
WFTV.com - Action 9 - A New Age For Wine Sellers
WFTV.com - Action 9 - A New Age For Wine Sellers: "The Supreme Court Has Overturned Laws That Bar Out-Of-State Wine Shipments. That's Good News For Small Vintners And Consumers"
Calif. firm will pay Missouri $15,000 for No Call violation
BizJournals: "A Fresno, Calif., telemarketing firm will pay the state $15,000 and refrain from calling Missouri consumers for five years as part of a settlement agreement with Attorney General Jay Nixon. "
L.A. Angels deemed 'false advertising' for Anaheim team
Duluth News Tribune | 05/17/2005 : "SACRAMENTO, Calif. - The California Assembly decided Monday that the Los Angeles Angels of Anaheim are engaged in what amounts to false advertising and approved a bill that would require the team to disclose on their tickets, ads and other promotional material that its home is in Anaheim."
TechTarget's Targeted Media Properties for Fifth Consecutive Year
TechTarget Media Again Named One of the Fifty Most Powerful B-to-B Advertising Venues: "TechTarget Media Again Named One of the Fifty Most Powerful B-to-B Advertising Venues; BtoB's ''Media Power 50'' Selects TechTarget's Targeted Media Properties for Fifth Consecutive Year"
Globetechnology: Cellphone acting sick? Might be a virus
Globetechnology: Cellphone acting sick? Might be a virus: "Computer viruses recently passed a milestone: The first ones aimed at electronic devices other than computers have started appearing 'in the wild' rather than just in laboratory settings. "
Industry executives ask for new notification law
Industry executives ask for new notification law: "An industry group is asking Congress to pass a law requiring companies to notify consumers of security breaches, in part to stem the tide of state laws that threaten to create a patchwork of regulations. "
Enforcing Network Integrity
Sarbanes-Oxley Compliance Journal :: Feature: "Compliance Strategies in the Age of Material Weaknesses"
IT Observer - Securing 'strange' Wi-Fi devices
IT Observer - Securing 'strange' Wi-Fi devices: "Wireless security software company Columbitech announced at the recent Interop trade show in Las Vegas a potential plug for the gap. "
Bank urges caution after possible security breach
MetroWest Daily News - Local News Coverage: The Social Security numbers and other confidential account information of about 750 Westborough Bank costumers may be in the hands of a convicted felon with a history of fraud, the bank president told customers this week.
More Indentity Theft news..
Guest Viewpoint: We need to keep our numbers to ourselves - The Register-Guard, Eugene, Oregon, USA: "Guest Viewpoint: We need to keep our numbers to ourselves"
The password is Tinkerbell.
Quad-City Times Newspaper Online - the Quad-Cities Home Page: "How young hackers hit the jackpot with Paris Hilton�s phone"
Passports to be hacker proof, says govt
Passports to be hacker proof, says govt: "New high-tech passports to be rolled out from October this year will be computer hacker-proof, a Senate inquiry has heard."
ok... so let's throw the gauntlet..... geesh... i guess that is a good way to test it.
ok... so let's throw the gauntlet..... geesh... i guess that is a good way to test it.
Techworld.com - US federal agencies leave wireless networks open
Techworld.com - US federal agencies leave wireless networks open: "US federal agencies need to improve controls over their wireless networks, according to a report from the US Government Accountability Office."
Trend Micro to provide integrated protection for mobile devices
Trend Micro to provide integrated protection for mobile devices running on Microsoft Windows Mobile 5.0: "Trend Micro to provide integrated protection for mobile devices running on Microsoft Windows Mobile 5.0"
Thursday, May 19, 2005
Tech Girl from Texas
Tech Girl from Texas - Thirty-something girl who is a full-blown nerd... living near the telecom corridor in Dallas. Fascinated by how things work... love to ask questions and get comments from others. Come & play with me...
Monday, May 16, 2005
More about the vagueness of Sarbanes-Oaxley
Dan Phillips, CEO of SilverBack Technologies: "What is the single most challenging
Sarbanes-Oxley issue today?"
Sarbanes-Oxley issue today?"
Former employee in custody in theft of records from San Jose Medical Group
KESQ NewsChannel 3 Palm Springs, CA: "SAN JOSE, Calif. A former branch manager at a South Bay medical group is in custody after being charged with stealing computers that contained the confidential records of nearly 185-thousand patients."
Lawmakers say identity theft measure likely to pass this session
Newsday.com: Lawmakers say identity theft measure likely to pass this session: "ALBANY, N.Y. -- Proposals that would crack down on identity theft and boost protections for personal and financial information are gaining critical support and headed toward law this year, said key New York lawmakers on both sides of the aisle. "
It's time to watch our remote workers who are telecommuting.
SC Magazine: "The well-publicized cases of information leakage in recent news articles have brought to light the risks of the borderless enterprise. "
Computer hacking strikes hospital
Northwest Indiana News: nwitimes.com: "HEALTH CARE: Medical center lost line of credit, but now starting to profit again after months in the red"
Friday, May 13, 2005
Two students investigated for identity theft at high school
ABC7Chicago.com : Hackers allegedly accessed Social Secuity numbers of school's entire student body"
Defense Department hacker gets 21-month sentence - Computerworld
Defense Department hacker gets 21-month sentence - Computerworld: "Defense Department hacker gets 21-month sentence
The attack was launched by international hacking gang Thr34t Krew"
The attack was launched by international hacking gang Thr34t Krew"
The Straight Dope: What's the origin of the paisley design?
The Straight Dope: What's the origin of the paisley design? - i do like cashews...
America First sets a hook for phishers
deseretnews.com - America First Credit Union has declared open season on "phishers." Phishing, a term used to describe e-mail schemes designed to obtain personal, financial and other information for fraudulent use, is a rapidly increasing problem for Internet users and businesses.
On Wednesday, America First announced the creation of a new "Anti-Phishing Team," comprising representatives of the credit union's security, network systems, electronic support and services, audit, call center, marketing and executive divisions. Their charge, according to America First senior vice president of electronic services Rich Syme, is to improve monitoring of suspicious activity, develop additional identity verification controls, assist credit union members who believe they have been victimized or solicited via "phishing" schemes, and improve alerting procedures so that members know about these schemes faster.
"That's really the key to solving this problem, education," Syme said. "People need to know not to give their account information. A legitimate financial institution will never solicit a depositor's or member's account number, PIN number or Visa card number. There would be no reason for us to send an e-mail to someone, saying 'We don't know your account number. Can you help us?'"
However, that's just what's happening, and with greater frequency, according to the latest report from the Anti-Phishing Working Group, a Massachusetts-based organization comprising business and law enforcement agencies worldwide. APWG reported that the average monthly growth rate in phishing sites increased 28 percent from July 2004 through March 2005, and that the financial services sector is the most-targeted industry for phishing attacks. Financial services averaged 81 percent of all "hijacked brands" in March 2005, the latest monthly data available.
And, according to the APWG's report, "In this (financial services) category, phishing attacks have been reported against community banks and credit unions in addition to well-known institutions with global brands."
Syme said the number of reported phishing schemes has "remained consistent" at America First. To address the issue, the credit union established an e-mail address to which members and others may report suspected phishing activity. All messages sent to that address will be referred to security, network and support teams and, when appropriate, the Utah Cybercrimes Task Force. Senders also will receive information back from America First about what to do if they feel their personal information has been compromised.
America First is the latest financial institution to announce tougher measures, but it isn't the only one. Most banks and credit unions provide information, warnings and methods to report phishing schemes or other fraud.
Robert Brough, spokesman for Salt Lake-based Zions Bank, said Zions has a team in place "whose sole responsibility it is to protect the bank and its customers against criminals."
"We're certainly seeing that the criminals are getting smarter, using different methods to try to perpetrate their crimes," Brough said. "As a result, it behooves us as a financial institution to make sure we have the security measures in place to protect ourself. And, it also behooves the customer to know what's going on in their account."
Zions agrees that it will not ask customers via e-mail or by phone for personal or financial information. In fact, Brough said, "If you get e-mail or other correspondence, or if someone calls you on the telephone and you don't know who it is you're talking to, take whatever steps you need to to verify. Talk to your local branch manager, or call customer service. If there's a real problem, these people will know about it.
"Unless you initiated the call or contact, or unless you're certain who you're dealing with, you should not respond" to e-mail or other communication purportedly from your financial institution requesting personal or financial information, Brough said.
Wells Fargo Bank, at www.wellsfargo.com, provides safety tips and copies of recently reported phishing e-mails so customers can compare. The most recent, reported April 19, warns of possible "account theft" and requests account and Social Security numbers.
On Wednesday, America First announced the creation of a new "Anti-Phishing Team," comprising representatives of the credit union's security, network systems, electronic support and services, audit, call center, marketing and executive divisions. Their charge, according to America First senior vice president of electronic services Rich Syme, is to improve monitoring of suspicious activity, develop additional identity verification controls, assist credit union members who believe they have been victimized or solicited via "phishing" schemes, and improve alerting procedures so that members know about these schemes faster.
"That's really the key to solving this problem, education," Syme said. "People need to know not to give their account information. A legitimate financial institution will never solicit a depositor's or member's account number, PIN number or Visa card number. There would be no reason for us to send an e-mail to someone, saying 'We don't know your account number. Can you help us?'"
However, that's just what's happening, and with greater frequency, according to the latest report from the Anti-Phishing Working Group, a Massachusetts-based organization comprising business and law enforcement agencies worldwide. APWG reported that the average monthly growth rate in phishing sites increased 28 percent from July 2004 through March 2005, and that the financial services sector is the most-targeted industry for phishing attacks. Financial services averaged 81 percent of all "hijacked brands" in March 2005, the latest monthly data available.
And, according to the APWG's report, "In this (financial services) category, phishing attacks have been reported against community banks and credit unions in addition to well-known institutions with global brands."
Syme said the number of reported phishing schemes has "remained consistent" at America First. To address the issue, the credit union established an e-mail address to which members and others may report suspected phishing activity. All messages sent to that address will be referred to security, network and support teams and, when appropriate, the Utah Cybercrimes Task Force. Senders also will receive information back from America First about what to do if they feel their personal information has been compromised.
America First is the latest financial institution to announce tougher measures, but it isn't the only one. Most banks and credit unions provide information, warnings and methods to report phishing schemes or other fraud.
Robert Brough, spokesman for Salt Lake-based Zions Bank, said Zions has a team in place "whose sole responsibility it is to protect the bank and its customers against criminals."
"We're certainly seeing that the criminals are getting smarter, using different methods to try to perpetrate their crimes," Brough said. "As a result, it behooves us as a financial institution to make sure we have the security measures in place to protect ourself. And, it also behooves the customer to know what's going on in their account."
Zions agrees that it will not ask customers via e-mail or by phone for personal or financial information. In fact, Brough said, "If you get e-mail or other correspondence, or if someone calls you on the telephone and you don't know who it is you're talking to, take whatever steps you need to to verify. Talk to your local branch manager, or call customer service. If there's a real problem, these people will know about it.
"Unless you initiated the call or contact, or unless you're certain who you're dealing with, you should not respond" to e-mail or other communication purportedly from your financial institution requesting personal or financial information, Brough said.
Wells Fargo Bank, at www.wellsfargo.com, provides safety tips and copies of recently reported phishing e-mails so customers can compare. The most recent, reported April 19, warns of possible "account theft" and requests account and Social Security numbers.
Thursday, May 12, 2005
Fast Company Now
Fast Company Now - When all else fails, add porno
WiMax - extremewimax.com
WiMax - extremewimax.com - Wireless (WiMax) info.
Judge Disarms Two Goliaths in Transcom vs. AT&T Case
Court backs Transcom’s status as enhanced services provider and rejects SBC’s contention.
IRVING, Texas – May 11, 2005 – Two giants, AT&T and SBC, ganged up on the little guy, Transcom, but this time the little guy won. The United States Bankruptcy Court in Dallas ruled in favor of Transcom and against SBC and AT&T on Transcom’s status as an enhanced services provider (ESP), paving the way for Transcom to resume its service agreement with AT&T and giving Transcom the validation it needs to continue doing business.
“For months we have been held hostage by SBC’s intimidation. They had been telling all Transcom customers and suppliers that we did not qualify for the ESP exemption and to stop doing business with us,” said Transcom CEO Scott Birdwell. “This ruling gave us the vindication we needed to continue doing business by offering quality services to our customers. SBC did considerable damage with their tactics, but we’re still here and ready to serve our loyal customer base.”
The saga began in April 2004 when the FCC ruled that a specific service offered by AT&T did not qualify for the ESP exemption. SBC used this AT&T ruling against legitimate ESPs, like Transcom, alleging that they were acting unlawfully. SBC pressured AT&T and other Transcom vendors and customers to stop doing business with Transcom. Coincidentally, right before the announced merger with SBC, AT&T asked Transcom to produce a ruling on their status within a period of days. Transcom was forced to seek the protection of the bankruptcy court due to SBC’s economic pressure and predatory practices. As part of the bankruptcy process, Transcom sought vindication of its position that it was an ESP entitled to the exemption, and the court agreed. In its ruling the Court clearly outlined the unique factors that qualify Transcom for the ESP exemption.
“The next step for us is to let our customers and suppliers in on the good news,” Birdwell said. “As we always have maintained, competition and innovation is a good thing, and with this ruling, our customers and suppliers can feel safe doing business with us again.”
With the pending mergers between both AT&T and SBC and Verizon and MCI, there is a growing concern that competition in the market place will be quashed and innovation cast to the side. This was evidenced by the testimony of a group of competitive local exchange carriers to the Senate Judiciary Committee last month where it was estimated that the two giants will control 80 percent of the market.
“SBC was acting in a monopolistic fashion with us – like a big bully, to put it more plainly,” adds Birdwell. “We bring an innovative solution to the market, and we are taking away customers from SBC. SBC can’t drive us out of business, and with this new ruling, we are here to stay. On a bigger scale, we feel like this was a victory for free enterprise and for the little guy.”
About Transcom Enhanced Services
Transcom Enhanced Services (TES) is a leading enhanced service provider specializing in the modification of the form and content of telephone calls and other communications to improve bandwidth efficiency, reduce costs and facilitate the development and provision of advanced applications. Established in 2003, TES uses state-of-the-art technology and a secure, privately managed packet-switched network to deliver cost-effective custom voice-over-IP solutions and converged IP applications to carriers and enterprise customers all over the world. More information is available at www.transcomus.com.
###
Timeline of events:
September 23, 2003 Ex Parte evidence submitted by Transcom in the AT&T petition distinguishing its services from those of AT&T
April 21, 2004 FCC rules that a specific AT&T service does not qualify for the ESP exemption, but reserves judgment on other, different services.
May 27, 2004 Transcom service is certified to AT&T as enhanced/information service per AT&T requirements.
July 22, 2004 AT&T announces it will no longer take local customers.
September 23, 2004 SBC sues Transcom and other companies for back access charges.
October 15, 2004 AT&T told Transcom that it had been contacted by SBC; Transcom requested copies of the documentation and AT&T refused to provide the information.
October 29, 2004 Transcom makes a presentation to SBC affirming Transcom’s ESP standing
January 24, 2005 AT&T sent letter to Transcom stating that SBC had again contacted them and provided information that made it appear Transcom was violating their local services agreement.
January 26, 2005 Transcom responded, again asked for the information provided by SBC and reinforced its status as a legitimate ESP. AT&T again refuses to disclose the information it later uses as a basis to refuse service to Transcom.
January 28, 2005 AT&T demanded Transcom produce either a ruling from a regulatory authority or court on their status or a letter from SBC stating they were terminating traffic lawfully by February 4, 2005.
January 28, 2005 AT&T demanded that disputed billings be paid and a six-figure deposit made within 48 hours or their relationship would be immediately terminated; this demand was in violation of the original agreement between AT&T and Transcom.
January 31, 2005 SBC announced its intention to purchase AT&T.
February 1, 2005 Transcom told AT&T that it was ready to respond to allegations and willing to work to resolve any issues if it only knew what questions it had to answer.
February 2, 2005 AT&T declared Transcom in default because of non-payment of disputed billings and deposit.
February 14, 2005 AT&T suspends service with Transcom.
February 18, 2005 Transcom declares Chapter 11 bankruptcy because of pressure from SBC suit and AT&T suspension.
April 28, 2005 United States Bankruptcy Court for the Northern District of Texas rules that Transcom is, in fact, an enhanced services provider, rejecting AT&T and SBC’s claims to the contrary.
IRVING, Texas – May 11, 2005 – Two giants, AT&T and SBC, ganged up on the little guy, Transcom, but this time the little guy won. The United States Bankruptcy Court in Dallas ruled in favor of Transcom and against SBC and AT&T on Transcom’s status as an enhanced services provider (ESP), paving the way for Transcom to resume its service agreement with AT&T and giving Transcom the validation it needs to continue doing business.
“For months we have been held hostage by SBC’s intimidation. They had been telling all Transcom customers and suppliers that we did not qualify for the ESP exemption and to stop doing business with us,” said Transcom CEO Scott Birdwell. “This ruling gave us the vindication we needed to continue doing business by offering quality services to our customers. SBC did considerable damage with their tactics, but we’re still here and ready to serve our loyal customer base.”
The saga began in April 2004 when the FCC ruled that a specific service offered by AT&T did not qualify for the ESP exemption. SBC used this AT&T ruling against legitimate ESPs, like Transcom, alleging that they were acting unlawfully. SBC pressured AT&T and other Transcom vendors and customers to stop doing business with Transcom. Coincidentally, right before the announced merger with SBC, AT&T asked Transcom to produce a ruling on their status within a period of days. Transcom was forced to seek the protection of the bankruptcy court due to SBC’s economic pressure and predatory practices. As part of the bankruptcy process, Transcom sought vindication of its position that it was an ESP entitled to the exemption, and the court agreed. In its ruling the Court clearly outlined the unique factors that qualify Transcom for the ESP exemption.
“The next step for us is to let our customers and suppliers in on the good news,” Birdwell said. “As we always have maintained, competition and innovation is a good thing, and with this ruling, our customers and suppliers can feel safe doing business with us again.”
With the pending mergers between both AT&T and SBC and Verizon and MCI, there is a growing concern that competition in the market place will be quashed and innovation cast to the side. This was evidenced by the testimony of a group of competitive local exchange carriers to the Senate Judiciary Committee last month where it was estimated that the two giants will control 80 percent of the market.
“SBC was acting in a monopolistic fashion with us – like a big bully, to put it more plainly,” adds Birdwell. “We bring an innovative solution to the market, and we are taking away customers from SBC. SBC can’t drive us out of business, and with this new ruling, we are here to stay. On a bigger scale, we feel like this was a victory for free enterprise and for the little guy.”
About Transcom Enhanced Services
Transcom Enhanced Services (TES) is a leading enhanced service provider specializing in the modification of the form and content of telephone calls and other communications to improve bandwidth efficiency, reduce costs and facilitate the development and provision of advanced applications. Established in 2003, TES uses state-of-the-art technology and a secure, privately managed packet-switched network to deliver cost-effective custom voice-over-IP solutions and converged IP applications to carriers and enterprise customers all over the world. More information is available at www.transcomus.com.
###
Timeline of events:
September 23, 2003 Ex Parte evidence submitted by Transcom in the AT&T petition distinguishing its services from those of AT&T
April 21, 2004 FCC rules that a specific AT&T service does not qualify for the ESP exemption, but reserves judgment on other, different services.
May 27, 2004 Transcom service is certified to AT&T as enhanced/information service per AT&T requirements.
July 22, 2004 AT&T announces it will no longer take local customers.
September 23, 2004 SBC sues Transcom and other companies for back access charges.
October 15, 2004 AT&T told Transcom that it had been contacted by SBC; Transcom requested copies of the documentation and AT&T refused to provide the information.
October 29, 2004 Transcom makes a presentation to SBC affirming Transcom’s ESP standing
January 24, 2005 AT&T sent letter to Transcom stating that SBC had again contacted them and provided information that made it appear Transcom was violating their local services agreement.
January 26, 2005 Transcom responded, again asked for the information provided by SBC and reinforced its status as a legitimate ESP. AT&T again refuses to disclose the information it later uses as a basis to refuse service to Transcom.
January 28, 2005 AT&T demanded Transcom produce either a ruling from a regulatory authority or court on their status or a letter from SBC stating they were terminating traffic lawfully by February 4, 2005.
January 28, 2005 AT&T demanded that disputed billings be paid and a six-figure deposit made within 48 hours or their relationship would be immediately terminated; this demand was in violation of the original agreement between AT&T and Transcom.
January 31, 2005 SBC announced its intention to purchase AT&T.
February 1, 2005 Transcom told AT&T that it was ready to respond to allegations and willing to work to resolve any issues if it only knew what questions it had to answer.
February 2, 2005 AT&T declared Transcom in default because of non-payment of disputed billings and deposit.
February 14, 2005 AT&T suspends service with Transcom.
February 18, 2005 Transcom declares Chapter 11 bankruptcy because of pressure from SBC suit and AT&T suspension.
April 28, 2005 United States Bankruptcy Court for the Northern District of Texas rules that Transcom is, in fact, an enhanced services provider, rejecting AT&T and SBC’s claims to the contrary.
NextiraOne Becomes the Guardian of Converged Networks
New Information Security Practice to Provide Security Services for Mission Critical IP Telephony Networks.
HOUSTON – May 11, 2005 – For companies wanting to deploy IP telephony, security is no longer a big question mark – especially for financial institutions, hospitals and other mission critical organizations, where downtime is not an option. With extensive expertise in both voice and converged enterprise network environments and a reputation as a highly skilled enterprise communications solutions provider, NextiraOne, a Platinum Equity Company, today announced the introduction of its IP telephony information security practice. This development is a logical next step for NextiraOne in helping its large base of PBX clients manage and prepare for the eventual migration to IP communications platforms.
“Companies have come to expect their voice systems to work and be protected all the time, and when they convert from traditional PBX systems to IP networks, that expectation doesn’t go away,” said NextiraOne CEO Dale Booth. “Most IT departments are not staffed or equipped to adequately secure their converged networks. Our clients needed an experienced and reliable ally to secure their converged networks and we are filling that void with our new security offerings.”
NextiraOne will roll out the information security practice over the next few months and work with leading players to offer a suite of services designed to help clients plan for and manage the security of their communications networks. The practice will address end-to-end security needs for converged networks through education, consulting and managed security services. The initial launch will include two distinct security education courses targeted at key technology stakeholders within the client organization. The first offering is designed to prepare clients for CISSPÃ’ (Certified Information System Security Professional) certification. This service is being offered in affiliation with the (ISC)2 (International Information Systems Security Certification Consortium, Inc.) This level of certification represents the gold standard in the information security field. This certification process helps clients gain knowledge and understanding in all critical security domains such as applications and systems development security as well as business continuity and disaster recovery planning. The second offering is a Voice over IP (VoIP) security education seminar designed to help clients implement proper security measures in a VoIP environment.
Future service offerings will be centered on security planning and design, vulnerability assessment and management, and compliance testing. NextiraOne will offer a host of managed and professional services to meet the growing security needs and support of converged network clients. Specific security consulting and managed services will be announced in the coming months.
“Traditional network security may be effective in protecting traditional data networks, but adding IP telephony introduces a new layer of concerns for an information security team,” adds Booth. “Our new offerings will help our clients secure their converged networks to make them as reliable as the traditional PBX systems they replace.”
With more than 40,000 client sites installed and over half of the Fortune 50 companies as clients, NextiraOne has a rich history and strong base of experience in the telephony marketplace.
About NextiraOne
NextiraOne North America is a leading provider of integrated enterprise network, IP telephony, voice and data solutions and services that enable effective business communications. Built on a foundation of telecommunications industry experience dating back to the 1970s, the company’s expertise ranges from planning to the implementation, support and management of traditional, IP and converged voice and data communications networks. NextiraOne also provides solutions featuring best-in-class technologies from leading manufacturers and vendors. The company offers consultation and solutions development ranging from contact center applications to unified messaging and IP telephony. NextiraOne also provides the professional services, including information security services, required to make these applications and networks efficient, reliable and secure. The NextiraOne companies enjoy a rich history that has been woven from the fabric of Williams Communications Solutions, Milgo Solutions, Racal-Datacom, Timeplex and Executone. For more information, please visit www.NextiraOne.com.
NextiraOne is owned by Platinum Equity (www.platinumequity.com), a global acquisition firm specializing in the strategic operation of mission-critical services and solutions businesses according to a unique M&A&OSM model of value creation.
HOUSTON – May 11, 2005 – For companies wanting to deploy IP telephony, security is no longer a big question mark – especially for financial institutions, hospitals and other mission critical organizations, where downtime is not an option. With extensive expertise in both voice and converged enterprise network environments and a reputation as a highly skilled enterprise communications solutions provider, NextiraOne, a Platinum Equity Company, today announced the introduction of its IP telephony information security practice. This development is a logical next step for NextiraOne in helping its large base of PBX clients manage and prepare for the eventual migration to IP communications platforms.
“Companies have come to expect their voice systems to work and be protected all the time, and when they convert from traditional PBX systems to IP networks, that expectation doesn’t go away,” said NextiraOne CEO Dale Booth. “Most IT departments are not staffed or equipped to adequately secure their converged networks. Our clients needed an experienced and reliable ally to secure their converged networks and we are filling that void with our new security offerings.”
NextiraOne will roll out the information security practice over the next few months and work with leading players to offer a suite of services designed to help clients plan for and manage the security of their communications networks. The practice will address end-to-end security needs for converged networks through education, consulting and managed security services. The initial launch will include two distinct security education courses targeted at key technology stakeholders within the client organization. The first offering is designed to prepare clients for CISSPÃ’ (Certified Information System Security Professional) certification. This service is being offered in affiliation with the (ISC)2 (International Information Systems Security Certification Consortium, Inc.) This level of certification represents the gold standard in the information security field. This certification process helps clients gain knowledge and understanding in all critical security domains such as applications and systems development security as well as business continuity and disaster recovery planning. The second offering is a Voice over IP (VoIP) security education seminar designed to help clients implement proper security measures in a VoIP environment.
Future service offerings will be centered on security planning and design, vulnerability assessment and management, and compliance testing. NextiraOne will offer a host of managed and professional services to meet the growing security needs and support of converged network clients. Specific security consulting and managed services will be announced in the coming months.
“Traditional network security may be effective in protecting traditional data networks, but adding IP telephony introduces a new layer of concerns for an information security team,” adds Booth. “Our new offerings will help our clients secure their converged networks to make them as reliable as the traditional PBX systems they replace.”
With more than 40,000 client sites installed and over half of the Fortune 50 companies as clients, NextiraOne has a rich history and strong base of experience in the telephony marketplace.
About NextiraOne
NextiraOne North America is a leading provider of integrated enterprise network, IP telephony, voice and data solutions and services that enable effective business communications. Built on a foundation of telecommunications industry experience dating back to the 1970s, the company’s expertise ranges from planning to the implementation, support and management of traditional, IP and converged voice and data communications networks. NextiraOne also provides solutions featuring best-in-class technologies from leading manufacturers and vendors. The company offers consultation and solutions development ranging from contact center applications to unified messaging and IP telephony. NextiraOne also provides the professional services, including information security services, required to make these applications and networks efficient, reliable and secure. The NextiraOne companies enjoy a rich history that has been woven from the fabric of Williams Communications Solutions, Milgo Solutions, Racal-Datacom, Timeplex and Executone. For more information, please visit www.NextiraOne.com.
NextiraOne is owned by Platinum Equity (www.platinumequity.com), a global acquisition firm specializing in the strategic operation of mission-critical services and solutions businesses according to a unique M&A&OSM model of value creation.
Technology Business Council of the Greater Dallas Chamber of Commerce
Technology Business Council of the Greater Dallas Chamber of Commerce: "The mission of the Technology Business Council is to establish and sustain the position of the Dallas and Fort Worth region as the broadest and deepest technology center in the world."
Tuesday, May 10, 2005
Monday, May 09, 2005
The Liddle Effect: why three out of four women spy on their men
News: It notoriously did for the marriage of journalist Rod Liddle (who's in trouble again, see below). Careless texts cost Becks dearly, too. Small wonder that more and more women are turning sleuth to test the fidelity of their men. Andrew Johnson reports
Friday, May 06, 2005
Data providers and lawmakers expressed support for tempered data breach notification legislation at a House Financial Services Committee hearing this
DMNews.com | News | Article: "House Committee Talks Data Breach Notification"
Hackers Keep Up With Every High-Tech Development
Newhouse A1: "Keeping safe on the Internet used to seem simple: Don't open strange files and attachments sent with e-mail messages.
Ah, the good old days.
During the past year, technology professionals say, the computer netherworld has grown more devious, resourceful and organized. Honing an expanded arsenal of sinister tricks -- ploys with bizarre names such as 'phishing,' 'pharming' and 'drive-by downloads' -- digital bad guys have turned the world of Web sites into a virtual hall of mirrors.
Search engines can be fooled to spit back nefarious information. Music, video and photo files have been seeded with malicious software. The mere act of visiting a Web site can make your personal computer sick.
And no longer is it just your PC at risk. As digital technology reaches into living room entertainment centers, the car in your driveway and the Internet-connected refrigerator of the future, nasty folks are finding additional opportunities to hack into your life for fun and, increasingly, for profit.
Next-generation viruses are targeting hand-held computers and mobile phones. Some cell phones can get infected if you simply walk too close to another infected phone. One bug dials itself to all your contacts, running up everyone's bill. Another ruins your mobile phone. A virus in Japan has caused cell phones to flood emergency lines with calls.
Wireless Internet networks pose especially juicy targets. Electronic hackers (dubbed 'evil twins') can mimic your Wi-Fi access service, intercepting everything sent from your laptop at the local cyber cafe, where coffee is served along with wireless Internet access.
'Wireless is growing ... more quickly than the security guys can devise solutions,' said Wade Trappe, a professor at Rutgers University's Wireless Information Network Labo"
Ah, the good old days.
During the past year, technology professionals say, the computer netherworld has grown more devious, resourceful and organized. Honing an expanded arsenal of sinister tricks -- ploys with bizarre names such as 'phishing,' 'pharming' and 'drive-by downloads' -- digital bad guys have turned the world of Web sites into a virtual hall of mirrors.
Search engines can be fooled to spit back nefarious information. Music, video and photo files have been seeded with malicious software. The mere act of visiting a Web site can make your personal computer sick.
And no longer is it just your PC at risk. As digital technology reaches into living room entertainment centers, the car in your driveway and the Internet-connected refrigerator of the future, nasty folks are finding additional opportunities to hack into your life for fun and, increasingly, for profit.
Next-generation viruses are targeting hand-held computers and mobile phones. Some cell phones can get infected if you simply walk too close to another infected phone. One bug dials itself to all your contacts, running up everyone's bill. Another ruins your mobile phone. A virus in Japan has caused cell phones to flood emergency lines with calls.
Wireless Internet networks pose especially juicy targets. Electronic hackers (dubbed 'evil twins') can mimic your Wi-Fi access service, intercepting everything sent from your laptop at the local cyber cafe, where coffee is served along with wireless Internet access.
'Wireless is growing ... more quickly than the security guys can devise solutions,' said Wade Trappe, a professor at Rutgers University's Wireless Information Network Labo"
Thursday, May 05, 2005
Internet Advertising Awards
Internet Advertising Awards - Web Marketing Association Announcing Winners of the 2005 Internet Advertising Competition Awards
FOR IMMEDIATE RELEASE - The Web Marketing Association announces the winners of its annual Internet Advertising Competition (IAC) Awards, an effort to honor excellence in online advertising and to recognize the individuals and organizations responsible for the best in Internet marketing. The IAC Awards are the first and only industry-based advertising award competition dedicated exclusively to online advertising. The Competition web site with a complete list of winners is located at www.advertisingcompetition.org
"Online advertising is finally getting the recognition it deserves and The Web Marketing Association is pleased to help set the standard for Internet excellence," said William Rice, president of the Web Marketing Association, Inc. "Spending for online advertising continues to grow rapidly and the IAC Awards highlight the best in this unique advertising medium by industry."
2005 Best of Show Awards were awarded in each of the online medium categories. This year's winners include:
EVB, Inc. for Redwood Creek (Best of Show Online ad)
TMX Communications for Endo_Lidoderm Campaign (Best of Show Email Message Campaign)
she communications (Hong Kong) for Heineken Pulse (Best of Show Online Campaign)
Power Design for Wanda Sykes Cotton T-shirt Tour (Best of Show Email Message)
Organic, Inc. for Jeep Brand Web Site (Best of Show Integrated ad campaign), Jeep Trail Rated Challenge (Best of Show Interactive application) and ROBOTS - CONQUEST AD (Best of Show Rich Media Online Ad)
i33 Communications for Buick Email Re-contact Program (Best of Show Online Newsletter Campaign)
Agency.com for Someone To Turn To (Best of Show Rich Media Online Campaign) and Where Did The Time Go? (Best of Show Microsite/Landing Page)
Two agencies tied for the 2005 Top Agency Award, each winning 21 IAC Awards.
Organic, Inc. of Bloomfield Hills, MI received 21 IAC Awards, including Best of Show Integrated ad campaign for Jeep Brand Web Site, Best of Show Interactive application for Jeep Trail Rated Challenge and Best of Show Rich media Online ad for ROBOTS - CONQUEST AD.
TMX Communications of Conshohocken, PA for recognition of winning the most awards in the competition. TMX Communications took home 21 IAC Awards including Best of Show Email message campaign for Endo_Lidoderm Campaign.
Other IAC Award winners who received multiple awards included:
AGENCY (number of awards) JWT (11)
USDM.net (10)
Marketel-McCann Erickson (9)
Agency.com (6)
Beyond Interactive (6)
BLITZ (6)
Wunderman (6)
Nurun/Ant Farm Interactive (5)
Avenue A | Razorfish (4)
Bridge Worldwide (4)
Bronwyn Communications (4)
GREY Direct Oy (4)
Internet Strategy Group (4)
Team One (4)
VML (4)
The Competition web site with a complete list of winners is located at www.advertisingcompetition.org
The 2005 Internet Advertising Competition is sponsored by, BURST! Media, Small Army Creative Services, AdTools, ExactTarget, OddCast, Line56 Media, and PRWeb.
About the Web Marketing Association
The Web Marketing Association is an organization working to create a high standard of excellence for Web site development and marketing on the Internet. Staffed by volunteers, it is made up of Internet marketing, advertising, PR and design professionals who share an interest in improving the quality of advertising, marketing and promotion used to attract visitors to Web sites. Since 1997, the Web Marketing Associations annual WebAward Competition has been helping interactive professionals promote themselves, their companies, and their best work to the outside world. Now in its ninth year, the WebAward Competitions have become the premier event for Web developers and marketers worldwide.
The Web Marketing Association is currently accepting entries for the ninth annual WebAward Competition for Web site development at www.2005webaward.org . Deadline for entry is June 1th.
FOR IMMEDIATE RELEASE - The Web Marketing Association announces the winners of its annual Internet Advertising Competition (IAC) Awards, an effort to honor excellence in online advertising and to recognize the individuals and organizations responsible for the best in Internet marketing. The IAC Awards are the first and only industry-based advertising award competition dedicated exclusively to online advertising. The Competition web site with a complete list of winners is located at www.advertisingcompetition.org
"Online advertising is finally getting the recognition it deserves and The Web Marketing Association is pleased to help set the standard for Internet excellence," said William Rice, president of the Web Marketing Association, Inc. "Spending for online advertising continues to grow rapidly and the IAC Awards highlight the best in this unique advertising medium by industry."
2005 Best of Show Awards were awarded in each of the online medium categories. This year's winners include:
EVB, Inc. for Redwood Creek (Best of Show Online ad)
TMX Communications for Endo_Lidoderm Campaign (Best of Show Email Message Campaign)
she communications (Hong Kong) for Heineken Pulse (Best of Show Online Campaign)
Power Design for Wanda Sykes Cotton T-shirt Tour (Best of Show Email Message)
Organic, Inc. for Jeep Brand Web Site (Best of Show Integrated ad campaign), Jeep Trail Rated Challenge (Best of Show Interactive application) and ROBOTS - CONQUEST AD (Best of Show Rich Media Online Ad)
i33 Communications for Buick Email Re-contact Program (Best of Show Online Newsletter Campaign)
Agency.com for Someone To Turn To (Best of Show Rich Media Online Campaign) and Where Did The Time Go? (Best of Show Microsite/Landing Page)
Two agencies tied for the 2005 Top Agency Award, each winning 21 IAC Awards.
Organic, Inc. of Bloomfield Hills, MI received 21 IAC Awards, including Best of Show Integrated ad campaign for Jeep Brand Web Site, Best of Show Interactive application for Jeep Trail Rated Challenge and Best of Show Rich media Online ad for ROBOTS - CONQUEST AD.
TMX Communications of Conshohocken, PA for recognition of winning the most awards in the competition. TMX Communications took home 21 IAC Awards including Best of Show Email message campaign for Endo_Lidoderm Campaign.
Other IAC Award winners who received multiple awards included:
AGENCY (number of awards) JWT (11)
USDM.net (10)
Marketel-McCann Erickson (9)
Agency.com (6)
Beyond Interactive (6)
BLITZ (6)
Wunderman (6)
Nurun/Ant Farm Interactive (5)
Avenue A | Razorfish (4)
Bridge Worldwide (4)
Bronwyn Communications (4)
GREY Direct Oy (4)
Internet Strategy Group (4)
Team One (4)
VML (4)
The Competition web site with a complete list of winners is located at www.advertisingcompetition.org
The 2005 Internet Advertising Competition is sponsored by, BURST! Media, Small Army Creative Services, AdTools, ExactTarget, OddCast, Line56 Media, and PRWeb.
About the Web Marketing Association
The Web Marketing Association is an organization working to create a high standard of excellence for Web site development and marketing on the Internet. Staffed by volunteers, it is made up of Internet marketing, advertising, PR and design professionals who share an interest in improving the quality of advertising, marketing and promotion used to attract visitors to Web sites. Since 1997, the Web Marketing Associations annual WebAward Competition has been helping interactive professionals promote themselves, their companies, and their best work to the outside world. Now in its ninth year, the WebAward Competitions have become the premier event for Web developers and marketers worldwide.
The Web Marketing Association is currently accepting entries for the ninth annual WebAward Competition for Web site development at www.2005webaward.org . Deadline for entry is June 1th.
Wednesday, May 04, 2005
Dallas Ad League - Spring Happy Hour 5/19 at Little Havana
Dallas Ad League - Spring Happy Hour 5/19 at Little Havana: "The Dallas Ad League is hosting a Spring Happy Hour, and we have specials for all attendees!
Location: Little Havana on 3520 Greenville Avenue, next to the Granada Theater.
Date/Time: Thursday, May 19, 5:30pm-7:30pm
Drinks: $2 any beer, $3 Mojitos, $1.00 off of everything else!
Parking: Plenty! Two lots to choose from.
Prize Drawing: $25 food gift certificate and much more! "
Location: Little Havana on 3520 Greenville Avenue, next to the Granada Theater.
Date/Time: Thursday, May 19, 5:30pm-7:30pm
Drinks: $2 any beer, $3 Mojitos, $1.00 off of everything else!
Parking: Plenty! Two lots to choose from.
Prize Drawing: $25 food gift certificate and much more! "
Sober.O virus
IOL: Computers / IT: "Johannesburg - A new computer virus that has infected scores of computers worldwide has been detected, the NOD32 company said on Wednesday.
NOD32's chief executive officer Justin Stanford said the virus, Sober.O, was first detected on Tuesday and that it had been spreading rapidly via email.
According to Stanford, the virus was detected through NOD32's Virus Radar System.
'Over 100 000 infected samples have been collected in the last 24 hours, marking this as the worst virus onslaught of the year, said Stanford.
'Sober.O uses its own SMTP (simple mail transfer protocol) engine to spread through email and create outgoing messages from a spoofed sender's address that may use the words 'admin', 'info', 'postmaster', and 'web master,' he added.
He said subject lines for these infected emails included a password, registration confirmation, blocked email, and mailing error.
The virus had rapidly risen to the number 2 spot in the top five, and continues to climb, he said.
Stanford said when the email attachment in the infected message was opened, Sober.O collected email addresses from local files and then used the addresses to send itself out to other computers.
'It will also attempt to delete many files on the system. Once a computer is infected, the virus locks the files in the system's memory so that they cannot be easily detected or removed by antivirus products,' he said.
For this reason it was important to detect the virus in a proactive way even before a signature update had been created, he adds.
He said Sober.O also sought and destroyed files in the registry that could potentially disable many anti-virus files and firewall programs. - Sapa "
NOD32's chief executive officer Justin Stanford said the virus, Sober.O, was first detected on Tuesday and that it had been spreading rapidly via email.
According to Stanford, the virus was detected through NOD32's Virus Radar System.
'Over 100 000 infected samples have been collected in the last 24 hours, marking this as the worst virus onslaught of the year, said Stanford.
'Sober.O uses its own SMTP (simple mail transfer protocol) engine to spread through email and create outgoing messages from a spoofed sender's address that may use the words 'admin', 'info', 'postmaster', and 'web master,' he added.
He said subject lines for these infected emails included a password, registration confirmation, blocked email, and mailing error.
The virus had rapidly risen to the number 2 spot in the top five, and continues to climb, he said.
Stanford said when the email attachment in the infected message was opened, Sober.O collected email addresses from local files and then used the addresses to send itself out to other computers.
'It will also attempt to delete many files on the system. Once a computer is infected, the virus locks the files in the system's memory so that they cannot be easily detected or removed by antivirus products,' he said.
For this reason it was important to detect the virus in a proactive way even before a signature update had been created, he adds.
He said Sober.O also sought and destroyed files in the registry that could potentially disable many anti-virus files and firewall programs. - Sapa "
Tuesday, May 03, 2005
The Cost of Securing the People's Privacy - Computerworld
The Cost of Securing the People's Privacy - Computerworld: "The Cost of Securing the People's Privacy
As a bill on consumer privacy heads to the legislature, our security manager has to do a fiscal impact analysis."
As a bill on consumer privacy heads to the legislature, our security manager has to do a fiscal impact analysis."
Genetic Engineering News - The Leading Publication in Biotechnology
Genetic Engineering News - The Leading Publication in Biotechnology: "LucidLink Makes HIPAA-Compliant Wireless Security Easy; Easy-to-Use Enterprise-Level Security Is Ideal for Healthcare Practices"
World Cup Virus
Internet security firms on Tuesday issued a high-level alert to computer users about the spread of the "Worms_Sober.S" virus, which makes recipients believe they have won tickets to the 2006 football World Cup.
Trend Micro placed the virus in its 'red alert' category, saying that "using social engineering techniques, it sends out an email supposedly sent by the soccer organization FIFA," offering tickets to the 2006 tournament in Germany.
US firm McAfee classified the virus as a "medium risk", saying the e-mail message, written in German, "specifically targets German users".
But Trend Micro and Panda Software said the virus could be spread in either English or German. Panda said it had attacked computers in Austria, Germany, Switzerland and the United States. The e-mail includes correct contact information for a FIFA official.
A previous version of the "Sober" virus made users think that their private e-mails had gone to the wrong address, prompting them to open an infected attachment
Trend Micro placed the virus in its 'red alert' category, saying that "using social engineering techniques, it sends out an email supposedly sent by the soccer organization FIFA," offering tickets to the 2006 tournament in Germany.
US firm McAfee classified the virus as a "medium risk", saying the e-mail message, written in German, "specifically targets German users".
But Trend Micro and Panda Software said the virus could be spread in either English or German. Panda said it had attacked computers in Austria, Germany, Switzerland and the United States. The e-mail includes correct contact information for a FIFA official.
A previous version of the "Sober" virus made users think that their private e-mails had gone to the wrong address, prompting them to open an infected attachment
Monday, May 02, 2005
Ad Agents for the Search Engines: Organic Search Engine Optimization : website trouble shooting, websit
By BOB TEDESCHI
Published: May 2, 2005
CONSIDER this somewhat strange development: search engines like Google and
Yahoo have become so proficient at attracting advertising that even
competitors, like newspapers and yellow pages publishers, are now selling
ads on their behalf.
Newspapers like The Houston Chronicle, which is owned by the Hearst
Corporation, and yellow pages publishers like the BellSouth Corporation and
SBC Communications have recently turned themselves into de facto agents for
the search engines in the small-business market, where the Internet
companies have had limited success.
Businesses like yellow pages publishers, which exist solely to serve the
local advertiser that Google and Yahoo covet, may appear to be cutting their
own throats by passing those customers onto the search engines. But the
publishers argue that they are taking advantage of the chance to make
additional money, while also studying the search engines closely enough to
determine a long-term strategy to compete with them.
Stephen Weis, a vice president and general manager at Chron.com, the
Chronicle's Web site, said that selling ads on the big search engines would
give his company a "pretty decent opportunity" to understand what its
competition was doing. "Google and Yahoo are definitely a threat, just like
TV and radio, but we can also learn from them and get better."
Last month, the Chronicle's Web site began helping clients put text ads on
Google, Yahoo and other search engines whenever an Internet user searched
for words related to the clients' businesses (keywords, in industry
parlance). Mr. Weis said that over the past year, he saw yellow pages
publishers like BellSouth offer similar services, "and I said 'Wait a
minute. We're missing an opportunity here.' "
That opportunity is similar to one spawned by eBay, which created a cottage
industry of independent businesses that help buyers and sellers manage the
online auction process. Likewise, Google and Yahoo are now served by a
phalanx of search engine marketing firms that help businesses decide which
keywords to link their advertisements with, and how much to bid for the
right to have their ads appear most prominently.
Local advertising is among the most important business opportunities left to
be exploited online, analysts said. Roughly six million small businesses
spend about $30 billion on offline ads each year, according to the Kelsey
Group, a consulting firm that specializes in local advertising. They are
only now turning to Internet marketing - partly because many consumers are
just now beginning to look for such information online.
According to the Internet research firm comScore Media Metrix, the number of
times users conducted Web searches for local information more than doubled
from January 2004 to February 2005, the latest month for which data are
available. (More than 421 million local Web searches were conducted in
February.) Internet yellow pages sites have also experienced increased
demand, to 188 million searches in February 2005, from 87 million searches
in January 2004, according to comScore.
Mr. Weis said that Chron.com's search engine efforts were partly a defensive
measure against other local marketing companies and partly a way to help
seed its own online advertising programs. For instance, he said the Web site
recently introduced a service where advertisers can bid for the right to
have text ads appear near stories related to their products or services.
"As we as a newspaper industry continue to get up to speed on how to play in
this space better than we have in the past, I want to have a relationship
with my advertisers," Mr. Weis said. "So when the next great thing comes
around that we want to offer, I'm not just introducing myself. They'll say,
'You know what, why not? You've helped me in the past.' "
So far, Mr. Weis said the sales effort had yielded positive results.
"A lot of clients are surprised we're offering this service - not in a
shocked way. They're saying 'Wow, this is cool.' "
The Chronicle splits the revenue it receives from search engine advertising
customers with TrafficLeader, a division of Marchex, a publicly held online
marketing company based in Seattle. TrafficLeader's technology analyzes the
Web sites of local advertisers, chooses which keyword advertisements to buy
on various search engines and manages the campaign until the advertiser has
received an agreed-upon number of clicks.
Last week, TrafficLeader announced that it had begun working with SBC to
sell search engine advertisements to clients of YellowPages.com, which SBC
operates in conjunction with BellSouth.
That initiative was prompted in part by BellSouth's already successful
search engine advertisement program, which the company introduced with
TrafficLeader a year ago. Ed Patterson, a BellSouth spokesman, declined to
say how many customers or how much money it had generated from the new
program, but he said it had shown "huge growth" in the last six months,
since BellSouth entered a formal partnership with Google.
Under that agreement, Google helped train BellSouth salespeople on how to
pitch Google's advertising services, among other things, and allowed
BellSouth to use Google's brand during the sales process. To date, it is the
only such agreement Google has announced with resellers of its advertising
services.
Other yellow pages publishers are piggybacking on the popularity of search
engines in other ways. Superpages.com, which is owned by Verizon
Communications, for instance, buys ads on Google and other sites on behalf
of groups of advertisers, like shoe stores in a particular city. A user who
clicks on the Google ad that Verizon has purchased is taken to a
Superpages.com page with several stores listed. When a customer clicks on a
particular store's site, Superpages.com collects a fee from the merchant.
Jim Larrison, an analyst with comScore, said the local online market was
ripe for both search engines and yellow pages advertisers. As more Internet
users subscribe to high-speed connections and leave them on continuously, he
said, more users are relying on the Web to get information about local
businesses. Yellow pages publishers have also stepped up efforts to attract
their print customers to online destinations, while Google and Yahoo have
also started local search services.
One nagging question, though, is whether small businesses will eventually
wean themselves from the yellow pages and newspaper publishers and work
directly with the search engines.
Greg Sterling, an analyst with the Kelsey Group, said such a change "could
happen in five or seven years. But with the current generation of
advertisers, the idea of self-service is a challenge."
Meanwhile, the search engines are understandably pleased with the help they
are getting.
"If an advertiser prefers to have a relationship with them, that's fine,"
said Gaude Paez, a Yahoo spokeswoman. "We don't really see them as
competitors."
Published: May 2, 2005
CONSIDER this somewhat strange development: search engines like Google and
Yahoo have become so proficient at attracting advertising that even
competitors, like newspapers and yellow pages publishers, are now selling
ads on their behalf.
Newspapers like The Houston Chronicle, which is owned by the Hearst
Corporation, and yellow pages publishers like the BellSouth Corporation and
SBC Communications have recently turned themselves into de facto agents for
the search engines in the small-business market, where the Internet
companies have had limited success.
Businesses like yellow pages publishers, which exist solely to serve the
local advertiser that Google and Yahoo covet, may appear to be cutting their
own throats by passing those customers onto the search engines. But the
publishers argue that they are taking advantage of the chance to make
additional money, while also studying the search engines closely enough to
determine a long-term strategy to compete with them.
Stephen Weis, a vice president and general manager at Chron.com, the
Chronicle's Web site, said that selling ads on the big search engines would
give his company a "pretty decent opportunity" to understand what its
competition was doing. "Google and Yahoo are definitely a threat, just like
TV and radio, but we can also learn from them and get better."
Last month, the Chronicle's Web site began helping clients put text ads on
Google, Yahoo and other search engines whenever an Internet user searched
for words related to the clients' businesses (keywords, in industry
parlance). Mr. Weis said that over the past year, he saw yellow pages
publishers like BellSouth offer similar services, "and I said 'Wait a
minute. We're missing an opportunity here.' "
That opportunity is similar to one spawned by eBay, which created a cottage
industry of independent businesses that help buyers and sellers manage the
online auction process. Likewise, Google and Yahoo are now served by a
phalanx of search engine marketing firms that help businesses decide which
keywords to link their advertisements with, and how much to bid for the
right to have their ads appear most prominently.
Local advertising is among the most important business opportunities left to
be exploited online, analysts said. Roughly six million small businesses
spend about $30 billion on offline ads each year, according to the Kelsey
Group, a consulting firm that specializes in local advertising. They are
only now turning to Internet marketing - partly because many consumers are
just now beginning to look for such information online.
According to the Internet research firm comScore Media Metrix, the number of
times users conducted Web searches for local information more than doubled
from January 2004 to February 2005, the latest month for which data are
available. (More than 421 million local Web searches were conducted in
February.) Internet yellow pages sites have also experienced increased
demand, to 188 million searches in February 2005, from 87 million searches
in January 2004, according to comScore.
Mr. Weis said that Chron.com's search engine efforts were partly a defensive
measure against other local marketing companies and partly a way to help
seed its own online advertising programs. For instance, he said the Web site
recently introduced a service where advertisers can bid for the right to
have text ads appear near stories related to their products or services.
"As we as a newspaper industry continue to get up to speed on how to play in
this space better than we have in the past, I want to have a relationship
with my advertisers," Mr. Weis said. "So when the next great thing comes
around that we want to offer, I'm not just introducing myself. They'll say,
'You know what, why not? You've helped me in the past.' "
So far, Mr. Weis said the sales effort had yielded positive results.
"A lot of clients are surprised we're offering this service - not in a
shocked way. They're saying 'Wow, this is cool.' "
The Chronicle splits the revenue it receives from search engine advertising
customers with TrafficLeader, a division of Marchex, a publicly held online
marketing company based in Seattle. TrafficLeader's technology analyzes the
Web sites of local advertisers, chooses which keyword advertisements to buy
on various search engines and manages the campaign until the advertiser has
received an agreed-upon number of clicks.
Last week, TrafficLeader announced that it had begun working with SBC to
sell search engine advertisements to clients of YellowPages.com, which SBC
operates in conjunction with BellSouth.
That initiative was prompted in part by BellSouth's already successful
search engine advertisement program, which the company introduced with
TrafficLeader a year ago. Ed Patterson, a BellSouth spokesman, declined to
say how many customers or how much money it had generated from the new
program, but he said it had shown "huge growth" in the last six months,
since BellSouth entered a formal partnership with Google.
Under that agreement, Google helped train BellSouth salespeople on how to
pitch Google's advertising services, among other things, and allowed
BellSouth to use Google's brand during the sales process. To date, it is the
only such agreement Google has announced with resellers of its advertising
services.
Other yellow pages publishers are piggybacking on the popularity of search
engines in other ways. Superpages.com, which is owned by Verizon
Communications, for instance, buys ads on Google and other sites on behalf
of groups of advertisers, like shoe stores in a particular city. A user who
clicks on the Google ad that Verizon has purchased is taken to a
Superpages.com page with several stores listed. When a customer clicks on a
particular store's site, Superpages.com collects a fee from the merchant.
Jim Larrison, an analyst with comScore, said the local online market was
ripe for both search engines and yellow pages advertisers. As more Internet
users subscribe to high-speed connections and leave them on continuously, he
said, more users are relying on the Web to get information about local
businesses. Yellow pages publishers have also stepped up efforts to attract
their print customers to online destinations, while Google and Yahoo have
also started local search services.
One nagging question, though, is whether small businesses will eventually
wean themselves from the yellow pages and newspaper publishers and work
directly with the search engines.
Greg Sterling, an analyst with the Kelsey Group, said such a change "could
happen in five or seven years. But with the current generation of
advertisers, the idea of self-service is a challenge."
Meanwhile, the search engines are understandably pleased with the help they
are getting.
"If an advertiser prefers to have a relationship with them, that's fine,"
said Gaude Paez, a Yahoo spokeswoman. "We don't really see them as
competitors."
Subscribe to:
Posts (Atom)