January 09, 2012

Ottawa tech acceletor stumbled on early-stage financing – OCRI chief

If a company
needs $25,000, it’s pretty hard to get. That’s something we’re going to try and figure out.



Bookmark php iPad Month: FBI to Investigate iPad Hack? HUH?

Posted by: blogtest123 at 06:22 PM | No Comments | Add Comment
Post contains 39 words, total size 1 kb.

January 06, 2012

Small business confidence deserves closer analysis

Small business confidence deserves closer analysis

When things look bleak, we tend to say that “no news is good news.” When things start looking up, on the other hand, good news is sometimes treated as if it’s not news at all.

Consider the spate of perfunctory coverage devoted to the, which showed more small businesses expressing confidence about their prospects in the months ahead. After some downward trending due to worries about foreign markets, the CFIB reported a return to “near normal” levels, meaning that overall, SMBs expect to see stronger performance for 2012. The mainstream media regurgitated the bare bones of the story, but it’s worth taking a closer look at where the confidence is coming from, and what the remaining challenges are.

The CFIB actually offers for free on its Web site, and the numbers are interesting. While 45 per cent of SMBs described the state of their business as “satisfactory” and another 41 per cent said “Good,” the biggest business constraint cited was insufficient domestic demand. This has been a complaint we’ve heard multiple times from GTA tech startups at over the last two years. It’s also an area where technology can help: while , it’s a great medium to connect more intimately with local prospects, while investments in customer relationship management (CRM) suites for SMBs may help nurture new business leads.

Sometimes technology investment seems like a necessary evil to SMBs, but the CFIB Business Barometer Index indicates that’s not the case in 2012. Projected capital spending in computers and technology is stable at about 35 per cent, and only 19 per cent of SMBs cited technology as a major cost concern. That could reflect a deepening maturity in how to allocate technology resources effectively. When you look at the biggest cost concern – fuel and energy – technology may play a role here too, with the advent of smart metering systems and other so-called green IT.

 

SMBs should look at these kind of research snapshots as a sort of mirror to their everyday business reality. If what the CFIB is showing doesn’t reflect what’s going on in their organization, it’s worth thinking about why, and what role IT might play. In some cases – taxation, baking fees – there may be nothing. In others, technology could be a differentiator. One possible SMB goal for the new year? Be the organization whose performance skews the numbers in the next Business Barometer Index – but in a way that demonstrates success.

January 05, 2012

6 things RIM needs to do to turn its fortune around

6 things RIM needs to do to turn its fortune around

by Kye Husbands

Seems like every blog we do of late is about RIM, because it’s difficult to watch a giant go down without a real fight.   We have long communicated that BlackBerry desirability – ideal phone choices by customers at  when creating a proposal – has been steadily declining to .

The Financial Post is reporting that RIM lost more marketshare in the US, going from 7.1 per cent to 6.5 per cent.  Why this really sucks, is that the smartphone market is still growing by leaps and bounds, so losing market share in a growing market is a real sign of trouble, but trouble has been brewing for over a year, as we watched the desirability fall to all time lows of under 10 per cent on our network.

The solution seems so simple however, rally all of your staff to get get some new phones out to market and as soon as possible.  For RIM getting ahead of the curve in the smartphone space would be ideal, but the challenge with waiting for the right pitch to hit a home run is that you miss out on all the RBI opportunities.  It’s a gamble and a big one to wait for perfection in an ever changing space and some things are a must have, but let’s hypothesize for a sec.

What does RIM have to do with the BlackBerry to get ahead of the curve:

  • Quad-core phones would be nice
  • 18MP Camera or something crazy like that (front and rear facing)
  • HDMI output or something of the sort
  • New Operating System (BlackBerry 10K) with improved usability all the way around and snappy. (i.e. Not like OS 6.0 which freezes all the time)
  • Improved virtual keyboard – (BTW – Please move the world icon from where it is, somehow I always found a way of switching to chinese when sending an email)
  • Some real wow factor (ex. like a Virtual Assistant, A few killer apps, bigger screen phones)

 

I don’t have all the answers and neither does RIM, so let’s hope that they do the right thing and get a few phones out to market that are good enough to lay a solid foundation and build on that.  Clearly we can’t expect everything at once like a vibrant developer community and thousands of apps, but we need to see some evidence of work being done to spark confidence.





Clouds of confusion

Posted by: blogtest123 at 03:52 PM | No Comments | Add Comment
Post contains 423 words, total size 3 kb.

January 04, 2012

New chief of Ottawa tech accelerator reveals plans for 2012

New Ottawa
Centre for Regional Innovation CEO Bruce Lanzenby says the tech startup accelerator will move towards greater coordination with other business development organizations.



Canadian copyright bill digitally locked and loaded

Posted by: blogtest123 at 05:52 PM | No Comments | Add Comment
Post contains 41 words, total size 1 kb.

January 03, 2012

3 awesome security tips for 2012

3 awesome security tips for 2012

by Claudiu Popa

Everything I’m reading these days indicates that hacking and malware infections are going to increase in 2012. I don’t need to provide references here because everything you’re reading does too. Yet all the software you need to secure computers, both corporate and personal, is available for free. There’s everything from scanning and blocking to diagnosing and disinfecting the computing devices you depend on.

Claudiu Popa

 

So how come we’re poised for continued growth in data theft and general cyber-mischief?

 

In short, you’re the weakest link. If it weren’t for you, your computer would have a much higher chance of leading an infection-free existence, gracefully growing old and slowly descending into obsolescence. Instead, you may hear yourself thinking out loud: “it was fast at the beginning, but now it’s so slow I’m thinking of getting a new one”. This platform-independent mantra is no doubt very depressing for laptops and smartphones to overhear and even the shiny new tablets, smug in their reliance on a firmware-based operating system, aren’t .

 

What are your options? Panic? Trade in your new tablet for a ? Pester the one social recluse in your family with open-ended questions?

 

The latter is always a good idea (although you can’t go wrong with the first two either). Make sure you corner him (it’s always a ‘he’ at the family party this holiday season and don’t let him take another sip of the  until he makes an effort to put his answers into plain English. Pull up a chair, make him feel special, for once!

Stone Tablet

 

In the failing case, here are three (because no one can really retain more than that anyway) tips for you to better understand computing security in general, and in particular over the next few months, as the reliance on technical attacks on all platforms (not just on mobile devices, PCs, or ‘in the cloud’ gives way to plain old abuses of trust). At the very least, you’ll sound smarter about this stuff, so here’s some sage advice:

 

1. Sometimes things that increase convenience may increase your security risk

 

Just one example: . These handy little tools (aside from the fact that they build ) may send you to malicious destinations and may contribute to the security problems that plague social networking sites. So click wisely.

 

2. Sometimes it’s better to focus on the things that go out of your computer

 

We’re on the Internet for a reason: to explore and access information. Each click is a request, an a consensual invitation, an implied permission and an open door to receiving information. So when that response happens to be malicious, it’s difficult to see exactly what it’s doing inside your computer, but it’s relatively easy to block unauthorized software from ‘calling home’ and initiating outbound connections of its own. So look for personal firewalls with  and be cautious about approving connection requests.

 

3. Sometimes things that protect your privacy may decrease your security

 

You know that little ‘lock’ icon everyone tells you to look for when completing online purchases? And the ‘secure tunnel’ your IT guy tells you about when installing your remote access VPN into the office (so you can be ‘ productive‘ from home, naturally)? Those are great things. They protect the confidentiality of the data that you exchange with the big bad Internet, and also serve to protect your privacy.  But they also make it next to impossible for security tools to inspect data traffic, see malicious code and the details of hacking attacks as they come and go. So use with caution, and appreciate that once encrypted, both good and bad data is protected from prying eyes (and be sure to have a memory resident scanner to detect the latter just before or immediately after scrambling).

 

Enjoy 2012 and if you know someone who could use the information, don’t hesitate to .

<< Page 2 of 2 >>
23kb generated in CPU 0.0086, elapsed 0.0392 seconds.
32 queries taking 0.0329 seconds, 79 records returned.
Powered by Minx 1.1.6c-pink.