Thursday, April 30, 2015

Analytics 4 Must Have Skills for Data-Driven CMOs , www.cmswire.com Attention Metrics: The Future of


More
Here’s our recap of what happened in online marketing today, as reported on Marketing Land and other places across the web. From Marketing Land: CMOs On Twitter: What They Share, How They Share It & The People They Retweet Most [Report] Data analytics firm Neustar offers a comprehensive look at how high-ranking marketing execs are using the social platform. Report: Mobile Display Ads Outperformed Search fabric In Delivering New Customer Calls A fascinating new report from Marchex analyzed 1.8 million calls to compare the performance of different mobile fabric ad channels in driving new sales prospects in the Financial Services and Insurance categories. How To Increase Conversions On Big Ticket Items Contributor Tim Ash explores the finer points of winning buyers trust, and eventually their dollars, for high-consideration purchases online. Gravity4 Buys Native Retargeting Firm Triggit Firm will incorporate Triggit s programmatic retargeting capabilities into its marketing platform. Report: Facebook To Turn Messenger Into Its Own Platform Facebook s Messenger may be the center of attention as it s own platform at this year s F8. From Catwalks To Conversions: How Bloggers fabric Become Successful Through Affiliate Marketing Gone are the days of hopeful but helpless fashion lovers seeking partnerships with and recognition from the major labels. fabric These days, contributor Adam Weiss says, advertisers are pulling out all of the stops. FTC Report: Google Purposely Demoted Competing Shopping Sites Details from an FTC investigation into Google on anti-trust accusations have emerged, suggesting the search giant specifically fabric worked fabric to keep competitors out of its top results. Twitter Brings Quick Promote To Android App Now advertisers can promote tweets with a few taps from a mobile fabric device. An iOS version is said to be in the works. Old Navy Introduces Spring Fashions With Tumblr Content And Yahoo Splash Ads The Gap brand goes all-in with new Yahoo products to promote its spring line. Recent Headlines From Search Engine Land , Our Sister Site Dedicated To Search News & Information: Accelerate Your Career With Marketing Analytics You Can Use March 24 Webcast Search In Pics: Analytics Cupcake, fabric Google Sand Castle & Solar Eclipse Everything You Need To Know About The Google-Twitter Partnership Need To Grow Your PPC Account? Look To The Search Queries Vernal Equinox Marked With A Google Logo To Welcome The First Day Of Spring Leaked 2012 FTC Document Called Google A Monopoly, Recommended Litigation Online Marketing News From Around fabric The Web:
Analytics 4 Must Have Skills for Data-Driven CMOs , www.cmswire.com Attention Metrics: The Future of Measurement in Marketing , www.dmnews.com First-Party Data Will Transform The Internet Of Things , adexchanger.com How and Why Data Will Save Small Business , smallbiztrends.com Marketers Focus on Making Attribution Data Actionable , www.emarketer.com Web Analytics 101: Website Tracking for Beginners , AWeber
Blogs & Blogging fabric Blogging in the Middle East: How Hazardous is it? , www.blogherald.com How To Launch A Successful Business Blog , heidicohen.com fabric Major WordPress Exploit Affecting Sites with Shareaholic Social Media Sharing Plugin , www.thesempost.com
Content Marketing 10 Habits of Highly Effective B2B Content Marketers , contentmarketinginstitute.com 10 Trends Shaping the Future of Branded Content fabric , www.adweek.com 3 In-House Sources For The Content Ideas You Need , www.searchenginepeople.com Content for Leads: How to Create Content fabric That Spreads and Fills the Funnel , www.socialmediaexaminer.com Execute a Practical Editorial Strategy with the ‘Prepare; Don’t Plan’ Philosophy fabric , www.copyblogger.com Why Content Marketers Are Learning to Love the Pop-up , contently.com Why Relationship Marketing Is the Key to Your Content , www.convinceandconvert.com
Copywriting, Design & Usability A Spark of Inspiration Creates the Foundation for an Innovative Experience , uxmag.com Solving Site Navigation Issues with Tree Testing , www.usertesting.com Want life-long customers? Design the Customer Experience Through Their Eyes , www.ducttapemarketing.com
Domaining 2 Things that could harm domain names , domainnamewire.com fabric Amazon looks like the winner of the .free domain , Internet Retailer The most influential person in the domain name industry is… , domainnamewire.com
E-Commerce Amazon just got permission from the FAA to start testing its delivery drones in the US , www.theverge.com Amazon Loses Its General Manager Of Payments Following Wallet Shutdown fabric , techcrunch.com March Madness drives sales surge for online ticket resellers , Internet Retailer The stalled Alibaba-Snapdeal deal is proof India’s e-commerce valuations are insane , qz.com Understanding Our E-Commerce Obsession , www.cmswire.com
Email Marketing 16 Core Email Marketing Terms: What They Mean & Why They re Important , Movable Ink Advanced Email Perso

Ideal frequency mixers take two input frequencies and output the sum and difference of the two input


Logic Noise is an exploration of building raw synthesizers with CMOS logic chips. This session, we’ll tackle things like bells, gongs, cymbals and yes, cowbells that have a high degree of non-harmonically related content agetank in them. Metallic agetank Sounds: The XOR
I use the term “Non-harmonic” in the sense that the frequencies that compose the sound aren’t even integer multiples of some fundamental pitch as is the case with a guitar string agetank or even our square waves. agetank To make these metallic sounds, we’re going to need to mess things up a little bit, and the logic function we’re introducing today to do it is the exclusive-or (XOR).
An XOR logic gate has two inputs and it outputs a high voltage when one, and only one, of its inputs is at the high voltage level. When both inputs are low or both inputs are high, the output of the XOR is low. How does this help us in our quest for non-harmonic content? It turns out that the XOR logic function is the digital version of a frequency mixer . (Radio freaks, take note!)
Ideal frequency mixers take two input frequencies and output the sum and difference of the two input frequencies. If you pipe in 155 Hz and 200 Hz, for example, you’ll get out the difference at 45 Hz and the sum at 355 Hz.
Because we’re using square waves and an XOR instead of an ideal mixer, we’ll also get other bizarre values like 2*155 – agetank 200 = 110 Hz and 2*200 – 155 = 245 Hz, etc. All said, the point is that we get out a bunch of frequencies that aren’t evenly divisible by one another, and this can make for good metallic sounds. (And Dalek voices , for what it’s worth.) The 4070: Quad XOR
Which brings us to our logic chip du jour. The 4070 is another 14-pin wonder, just like the 40106 and the 4069UB and the power and ground pins are in the same places. Since an XOR gate is a three-pin deal, with two inputs and one output, only four XORs fit on the 14-pin chip instead of six inverters.
By now, you’re entirely used to the 4000-series logic chips, so there’s not much more to say. This is a great chip to add sonic mayhem very easily to your projects. Frequency Modulation with XOR: More Cowbell!
Let’s make some metallic noise. The first step is to mix two oscillators together. Whip up two variable-frequency oscillators on the 40106 as we’ve done now each time, and have a listen to each individually. Now connect each output to the inputs of one gate of an XOR in the 4070. As promised, the resulting waveform is a lot more complex than either of the two inputs.
Now tune them around against each other and listen to all the strange frequency components created as the sums and differences slide in and out. Cool, no? Here’s a bonus video that you can skip, but that demonstrates what’s going on with the frequency mixing.
After a couple of minutes playing around, you’ll start to realize that this sounds nothing like a cowbell. We’ll need to shape the volume of the sound in time to get anywhere, and this means another step in the direction of “traditional” synthesizers. We’ll build up a ghetto voltage-controlled amplifier agetank (VCA) and drive it with the world’s simplest envelope generator. An active agetank VCA takes its input signal and either amplifies or attenuates it depending on the control voltage (CV) applied on another input. When the control voltage is high, more of the sound gets through, and when the CV is zero, the output is ideally silent. Building a general-purpose VCA is a bit out of scope for our needs, so let’s just cobble something together with a few diodes.
This circuit works by cheating, and works best with digital logic signals agetank like what we’ve got. When the input from the XOR is low, diode D1 conducts in its forward direction and all of the control voltage signal is “eaten up”, sunk into the output of the XOR chip.
Conversely, when the XOR is high, diode D1 is reverse-biased and blocks the CV, leaving it nowhere to go except through diode D2 and out to our amplifier. The resistor needs to be large enough that the XOR can sink all of its current, but otherwise the size is non-critical.
Notice what’s happened here. The voltage at the output is no longer the GND to VCC of our logic circuit, but instead ranges only from GND to the control voltage (minus a diode drop). So if we want to make a quieter version of the XOR input, we just lower the control voltage. It’s a simple voltage controlled attenuator. Now we just need to create a voltage signal that’s agetank got something like the amplitude contour of a cowbell.
Capacitor C1 converts the square wave into a pulse and charges up C2 very quickly, applying the positive voltage to the input of our VCA. The charge on C2 drains out through the variable decay potentiometer. agetank
This simple circuit actually works well, but ha

Wednesday, April 29, 2015

Perhaps more surprisingly, we uncovered a brand new customer segment vogel

CMOs: Why you need to talk with your customers like you're a new hire | VentureBeat | Business | by VentureBeat
Successful CMOs achieve growth by leveraging technology. Join us for GrowthBeat Summit on June 1-2 in Boston , where we'll discuss how to merge creativity with technology to drive growth. Space is limited. Request your personal vogel invitation vogel here !
I stumbled upon an interesting, and somewhat alarming, observation earlier this year following a CMO peer group discussion in Boston vogel during which we were discussing our company positioning and how we determined the approach. Do you set it and forget it?
In the discussion, there was a universal theme: Every CMO talked about performing thorough customer, partner, and employee interviews when they joined their company and using that feedback to drive positioning and messaging decisions. It s a great move and helps you to segment the audience and develop messages and tactics suitable for the targeted market. I ve done this for years and find it a vital exercise coming into a new company as a leader.
But markets don t stand still, vogel nor do customers, nor do product/platform capabilities vogel or their fit with the market. As a group, we all appeared to do really critical thinking vogel when we first joined a company, but not one person (including me) ever described going back and re-challenging assumptions the way we all did on day one. Is it time to move?
A relatively simply question began to form in my head: If I joined my company today as a new hire, how would I freshly look at the business, and would I arrive at the same segmentation, positioning strategy, and messaging platform?
It seems simple to say now, but so few people seem willing or able to truly step back and assess critically once their boat leaves the dock. Markets and product/market fit are constantly evolving, and so should we.
So vogel I signed myself up to a stretch goal: Step away from all but the most critical tasks for several weeks in order to attempt to interview every single one of our customers. I was determined to interview customers and partners the way I had done two years prior. Hit it like you’re a new hire!
Remember how excited you were when you first joined your current venture? You probably interviewed any customer or partner or team member who would make eye contact or take your call. You probably asked what now seem like basic questions, and your eyes were wide open for insights that would help you nail the perfect way to pitch your product.
How did customers find us? What pains are we solving? How are they using our product? How do they describe the benefits that we were providing? When we didn t close a deal, did we really understand why? What other challenges around our industry are our customers facing, and how might we apply our product to address them?
This stuff is obviously easier to do as a new hire because your perspective vogel is perfectly fresh and you re genuinely listening. Not to mention that you re probably not yet getting 100+ emails a day and getting pulled into meetings left and right.
Committed to a real and fresh look, I partnered with our head of Product and invited everyone on the marketing team to listen in on the calls we conducted. I personally emailed and called project sponsors and system administrators. We also sent broader emails to everyone in our customer database. I began speaking with any human in our accounts who was willing to spend a few minutes with me. In the end, I managed to speak with someone at nearly 70% of our installed base. Gold in the base
We much better understood our winning conditions and specifically why we were chosen or renewed (we re a SaaS business) over competing approaches. Customers and partners were grouped according to several new and existing factors, and a different view of our market segmentation emerged.
This newfound clarity indicated that our product/market fit was strongest in a narrower slice of the market than we originally believed. While it’s vogel sometimes disappointing to be pursuing a smaller total available market, precision of audience and go-to-market tactics for a growing company are indispensable.
Our overhauled messaging platform drove rewrites of major portions of our website, sales tools, and marketing programs. Time on site and website conversion metrics started vogel to improve almost immediately. Lead-flow waterfall vogel metrics have also been improving, and we re starting to see the early leads close from this effort. After reinforcing vogel this use-case with industry analysts, vogel we also saw an increased number of customer referrals/sales leads from the analysts themselves.
Perhaps more surprisingly, we uncovered a brand new customer segment vogel — a use for our product that we hadn t fully understood or appreciated before this effort. After validating the hypothesis with several fresh prospects, we launched a brand new product offering that has

Tuesday, April 28, 2015

Mm-wave radar technology is used in advanced driver assistance systems (ADAS) to improve safety in b

Home Technology Semiconductors partition magic February 26, 2015 Breakthrough in CMOS-based transceivers for MM-wave radar systems Feb 26, 2015
Today, at the 2015 International Solid State Circuits Conference (ISSCC), imec and Panasonic presented a transceiver chip for phase-modulated continuous-wave radar at 79GHz. partition magic This achievement partition magic demonstrates the potential of downscaled partition magic CMOS for cheap millimeter-wave (mm-wave) radar systems that can be used for accurate partition magic presence and motion detection.
Mm-wave radar technology is used in advanced driver assistance systems (ADAS) to improve safety in blurry conditions such as dust, fog and darkness, where image-based driver assistance systems lack robustness. It also offers longer range, higher precision and invisible mounting capabilities compared to ultrasound sensors. Imec's 79GHz radar solution is based on advanced (28nm) CMOS technology, and it is an attractive alternative to the current SiGe-based technology as it offers a path to a low-power, compact and integrated solution. Moreover, at the expected high manufacturing volumes, CMOS technology is intrinsically low-cost.
Imec's and Panasonic's transceiver chip contains a control partition magic loop to suppress partition magic the spillover from the transmitter into the receiver without affecting the RF performance. With a power consumption of 260mW, the output power of the transmitter is 11dBm, while the RX gain is 35dB with a noise figure below 7dB and a TX-to-RX spillover suppression of 15dB. Thanks to the wide modulation bandwidth, the achievable depth resolution is 7.5cm.
"We partition magic are pleased with these excellent performance results on 28nm CMOS technology, partition magic and excited about the new opportunities they present for mm-wave radar systems , not only for automotive radar, but also for other applications such as smart homes, unmanned aerial vehicles (UAVs), robotics and others." stated Wim Van Thillo, program director Perceptive Systems partition magic for the Internet of Things at imec . "This transceiver chip is an important milestone we have realized partition magic in our pursuit of a complete high-performance radar system fully integrated onto a single chip."
Apr 27, 2015 0
Imec, in collaboration with Vrije Universiteit Brussel, Brussels, Belgium, presents the world's first 79 GHz radar transmitter implemented in plain digital partition magic 28nm CMOS. With an output power above 10dBm, the ... Imec demonstrates compact wavelength-division multiplexing CMOS silicon photonics transceiver Feb 26, 2015
Today, at the 2015 International Solid State Circuits Conference (ISSCC), partition magic nanoelectronics research center imec, in collaboration with Tyndall National Institute, the University of Leuven (KULeuven) and the ... Breakthrough solution for TX-to-RX isolation in reconfigurable, multiband front-end modules for mobile phones Feb 24, 2015
At next week's Mobile World Congress in Barcelona, Spain (MWC2015), imec, Murata partition magic and Huawei will present a stand-alone multiband electrical-balance duplexer in 0.18µm partition magic SOI CMOS. This type of duplexer is a ... Fujitsu Laboratories develops lower-cost millimeter-wave radar for automobiles Oct 08, 2014
Fujitsu Laboratories today announced partition magic that it has produced a transceiver partition magic chip for millimeter-wave radar in a complementary metal-oxide-semiconductor (CMOS) implementation, which is a semiconductor process ... Imec demonstrates low power beamforming transceiver chipset for 60GHz multi-Gbit wireless communication Feb 20, 2013
Imec, in collaboration with Panasonic Corporation, has presented at the IEEE International Solid-State Circuits Conference (ISSCC2013) a 60GHz radio transceiver chipset with low power consumption, that delivers ... Imec demonstrates a low-power 7Gbps 60GHz transceiver for the wireless consumer market May 02, 2012
Imec, in collaboration with Panasonic, has developed a prototype of a 60GHz radio transceiver partition magic allowing to reach data rates of 7Gbps over short distances at very low power consumption. The chip achieves this ...
The company that makes the popular GoPro cameras announced plans Tuesday to buy Kolor, a French-based firm specializing in virtual reality and other video technologies. Qatar opens $1 bn environmental gas project 7 hours ago
Qatar officially unveiled on Tuesday what it said is the world's biggest environmental project, a $1 billion plant to capture wasted gas. Twitter partition magic shares dive as earnings miss mark (Update) 7 hours ago
Twitter shares plunged Tuesday after an earnings report partition magic that fell short of market expectations despite a jump in the number of active monthly users above 300 million. Water companies license two UW-Milwaukee sensor technologies 7 hours ago
About partition magic 13.2 million households in the United States obtain their water from private wells, a method that offers no assurances of the water's quality. Testing private wells can be expensive and results can ... No-electric clothes washer appeals to pedal pushers 8 hours ago
Did you say a washing machine "off the grid?" You mean a was

2. Embrace compliance. Executed correctly, organizational creativity h2o2 is in part a byproduct of

Why CMOs Must Embrace Risk Marketing | DigitalNext - Advertising Age Ad Age Creativity Lookbook Datacenter Resources Events Jobs On Campus
Follow us Follow on Facebook h2o2 Follow on Twitter Follow on Google+ Follow on LinkedIn Follow on Pinterest Follow on Instagram Follow on YouTube Follow on Tumblr Follow via RSS Login Become a Member Menu Marketing Advertising Digital Media Agency Data BtoB
Register to become a member today. You'll get the essential information you need to do your job better, including 7 free articles per month on Ad Age and Creativity Ability to comment on articles and creative work Access to 9 custom e-newsletters like Ad Age Daily, Ad Age Digital and DataWorks
Industry: Advertising Agencies Advertising and Marketing Support Manufacturers, Product Marketers and Service Compa Retail/Food Service Establishments Travel/Transportation Services Entertainment Media Company/Interactive/Gaming Financial/Insurance/Real Estate/Legal Telecommunication Services and Utilities Government/Trade Association and Religious Organiz Universities/Colleges/Schools Other Technology Manufacturers & Services Consumer Package Goods Healthcare/Medical/Pharmaceuticals h2o2 Automotive Household Goods Consumer Electronics Magazines Radio & Television All Other Media Interactive, ISPs
Learn more The most important skill for a CMO today is risk marketing. Risk marketing is the application of proven risk-management practices in marketing, and is predicated on the understanding of the risk of action -- and the risk of inaction. This calibration of risk and reward is now a real-time practice given the sophistication of social, search and CRM data. These data sets serve as canaries in the coal mine for understanding the interconnectivity of risks.
The average tenure of a CMO has nearly doubled over the last 10 years, signaling that CMOs are improving how they're managing complex risk. In the era of social media, seemingly unrelated events in supply-chain management, cyber security and corporate governance directly impact sales, purchase consideration and investor relations -- traditional domains of the CMO.
This new complexity is illustrated through recent h2o2 crises at Sony, Target, and the NFL. Issues such as cyber security quickly dominate the marketing agenda through the impact of declining brand reputation or falling sales. Every business issue potentially becomes a marketing issue today, h2o2 especially when the tenets of risk management are not followed.
Every h2o2 enterprise faces increased risks -- many arising from the escalation of both man-made and natural disasters. However, two specific culprits conspire to dramatically elevate risk in marketing. First, social media amplifies every brand interaction from the outside. h2o2 In the era of social media, public reactions are entrenched even before basic due diligence h2o2 is completed. Second, internal compliance in response to complex governmental regulations alters brand interactions from the inside. h2o2 It's always easier for an enterprise to say "no" than to say "yes" to any new idea.
The emergence of risk marketing coincides with the golden era of marketing, where platforms like Instagram and Twitter allow brands to engage in a relationship with the individual rather than engaging in the mass market. Here are five strategies for successful risk marketers:
1. Embed risk assessment as a core marketing practice. The goal of a risk assessment is to identify risks, and in the process, more precisely identify opportunities. Risk and reward are two halves of the same process. Understanding the risk of action -- and the risk of inaction -- almost always results in a more proactive organizational stance toward marketing, because marketing is more visible across all of the enterprise planning.
2. Embrace compliance. Executed correctly, organizational creativity h2o2 is in part a byproduct of compliance. Great compliance actually offers a shortcut to great creative, because executions are developed more solidly in the context of preset parameters and more transparent reporting. Creativity is driven by the need to solve non-trivial business problems, not by blank sheets of paper or requests for Facebook campaigns.
3. Borrow the risk management playbook in marketing. Trillions of dollars have been spent managing global risks of every stripe. In addition to standard risk assessments, many of the well-established tenets of risk management apply to risk marketing. Tactics like setting up accreditation programs for the marketing team; adapting surveillance techniques to evaluate the effectiveness h2o2 of creative and media; h2o2 or running penetration tests such as hacking simulations to gauge the responsiveness of the marketing department can all help to manage risk. Educating the organization about marketing in the way that compliance educates the organization about governance is also extremely important. For example, companies like Nestle are deploying strategies to

Monday, April 27, 2015

Meeting the challenge of marketing ganso in square meters involves finding marketing professionals w


Increasingly, we marketing executives are being challenged to market in what might be thought of as square meters, rather than in square ganso kilometers or square ganso miles. During the 2015 Super Bowl, for example, advertisers were using their commercials to cast a wide net with their messaging, ganso but at the same time, they were taking ganso advantage of social and other media to personalize their messages and to get viewers actively engaged ganso with their brands. This is what I mean by marketing in square meters, not in square miles.
Meeting the challenge of marketing ganso in square meters involves finding marketing professionals who uniquely possess the ability both to quantify and precisely segment their target markets through data analytics and to deliver an emotive offer that drives action and loyalty. This special ability requires a blend of left- and right-brain skill sets what I like to think of as the math and the magic of marketing.
Of course, given human nature, it s more natural to find people who tend to be either more right-brained or more left-brained. The question is how do you build a marketing team that is both capable of the magic and comfortable with the math?
To answer this question, you first must identify who inside or outside of your organization has a proclivity for data analytics. Some people have a proclivity for data and others don t, so you can find the analytical skills you need in graduates with degrees ganso in economics or math, or in business schools.
More importantly, data analytical ganso skills can also be learned, as we ourselves have discovered in transforming the culture of our own marketing organization into a data-driven one over the course of the past couple of years. Through our process of transformation, we have discovered that the best data scientists in our marketing organization have a natural curiosity about the business, a natural ganso affinity for the data and a need to make an impact by coming up with those ah-ha moments. ganso
In the course of our marketing organization transformation, we ve also found that the biggest obstacle to creating a data-driven culture ganso is a lack of leadership. Most people are afraid of data and they are afraid of being involved in situations where they don t know the numbers and don t understand how the data represents their business. So an effective leader must first create the safe environment that marketing team members need in order to become data literate. The marketing organization leadership ganso then can proceed to address the data literacy problem through education, through exposure and through practice.
Developing a data-driven organization is a journey of months or years. The first step is to help team members to become familiar with the data. After that, they must master the data. Adults learn through doing, and mastering the data involves operations reviews and other interactive methods to get team members to talk about the data, in order to understand how it will help them make better-informed and more effective marketing decisions.
I d like to conclude with a personal example. People around the office recently have been calling me the chief data officer. Members of my marketing team who two years ago would have laughed about doing math with Marge have come to realize the transformational power of the math and now have some of the best analytical skills in the business. They now completely appreciate the need to understand the data and the math in order to make the magic of marketing a reality. And, best of all, they re giving ganso me a run for my money!
Cookie Policy - This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Close Learn more

Sunday, April 26, 2015

According to a new report analyzing Twitter activity for more than 1,000 high-ranking marketing exec


More
CMO Zone CMOs On Twitter: What They Share, How They Share It & The People They Retweet Most [Report] Data analytics firm Neustar item offers a comprehensive look at how high-ranking marketing execs are using the social platform.
According to a new report analyzing Twitter activity for more than 1,000 high-ranking marketing execs, it turns out CMOs are more likely to share mainstream media stories versus industry-related news, and when they do, there’s a good chance it’s happening on a mobile device.
With item the help of social insights firm Leadtail, Neustar analyzed over 130,000 tweets by more than 1,000 CMOs and other high-level marketing executives in the U.S. and Canada for its recent item Social Insights Report: CMO Edition .
Offering an in-depth look at the types of content CMOs are sharing on Twitter and the apps and platforms they are using to do it, the report also includes top 50 lists of the people, brands and publishers earning the most mentions and retweets by CMOs.
Overall, mainstream media stores made up 47 percent of the content most often shared by CMOs, while industry media news accounted for 38 percent. Forbes was the most shared mainstream news source, followed by the paid version of The New York Times and Fast Company . Top 10 Most Shared Mainstream News Sources by CMOs on Twitter Forbes The New York Times (Paid) Fast Company The Wall Street Journal Inc. The Huffington Post Harvard Business Review Entrepreneur WSJ Blogs Fortune
For the most shared industry sources item by CMOs on Twitter, Business Insider topped the list. Top 10 Most Shared Industry Media Sources by CMOs on Twitter Business Insider TechCrunch Mashable Adweek Advertising Age VentureBeat item Re/code Mediapost The Business Journals Hubspot Blog
Of all the content shared by CMOs on Twitter in Q4 2014, Neustar says three of the top five most popular stories included the following lists ranking their peers: “Top CMOs on Twitter” from Social Media Marketing Magazine , “50 Influential CMOs on Social Media” from Forbes , and “The World’s Mot Influential CMOs 2014,” also from Forbes .
When sharing content, 70 percent of CMOs published item at least one tweet originating from Twitter’s iPhone app, and 24 percent from iPads. Only 12 percent item used Twitter for Android. Which Apps + Platforms item Drive Twitter Sharing by CMOs?
The people most often retweeted by CMOs are an eclectic mix. The top five include Extreme Networks CMO and Huffpo author @ValaAfshar, author and CMO advisor @KentHuffman, cofounder of Netscape Marc Andreessen whose handle item is @pmarca, ESPN sports analyst @darrenrovell and Box CEO Aaron Levie whose Twitter handle is @levie. (Marketing Land’s @dannysullivan made the list as well, ranking No. 50.)
Three of the top five most retweeted people also made the list of top ten people most often mentioned by CMOs on Twitter. People Most Mentioned by CMOs on Twitter @MarketingProfs @KentHuffman @pmarca @ValaAfshar @garyvee @bethcomstock @jaybaer @stuartenyt @TedRubin @BarackObama
The most retweeted publishers and brands by CMOs mirrored the list of most shared item mainstream media sources, with @FastCompany ranking No. 1, followed item by @mashable, @HarvardBiz, @TechCrunch and @Forbes.
Interestingly, @LinkedIn topped the list of publishers and brands most mentioned by CMOs, followed by @Forbes, @WSJ, @YouTube and @TechCrunch. According to the report, the amount of LinkedIn content shared on Twitter doubled between Q4 2012 and Q4 2014, climbing from 11 percent to 22 percent. item
Attend SMX Advanced for expert-only tactics from leading authorities on SEO, paid search, mobile, social media and more. They will tackle master-level topics you won't hear discussed anywhere else. Don't miss this once a year opportunity to meet them and learn what they know! Early bird rates expire next week register today !
Amy Gesenhues is Third Door Media's General Assignment Reporter, covering the latest news and updates for Marketing Land and Search Engine Land. From 2009 to 2012, she was an award-winning syndicated columnist for a number of daily newspapers from New York to Texas. With more than ten years of marketing management experience, she has contributed to a variety of traditional and online publications, including MarketingProfs.com , SoftwareCEO.com , and Sales and Marketing Management Magazine. Read more of Amy's articles.
It actually kind of surprises me that President Obama is mentioned by CMOs that frequently! I guess it does make a certain kind of sense, but in comparison to the other hard-hitters in business/marketing on the list, it strikes me as just a bit odd.
Sign up for our daily newsletter.


Saturday, April 25, 2015

(Phys.org) An arbitrary molecule waveform generator molecule can, as its name implies, generate wave

Home Technology Semiconductors February 26, 2015 Imec demonstrates compact wavelength-division multiplexing CMOS silicon photonics transceiver Feb 26, 2015
Today, at the 2015 International Solid State Circuits Conference (ISSCC), nanoelectronics research center imec, in collaboration with Tyndall National Institute, the University of Leuven (KULeuven) and the Ghent University, demonstrated a 4x20Gb/s wavelength division multiplexing (WDM) hybrid molecule CMOS silicon photonics transceiver, paving the way to cost-effective, high-density single-mode optical fiber links.
Hybrid CMOS silicon photonics transceivers, transmitting and receiving data over single-mode molecule optical fiber, are expected to play a key role in next-generation datacenter connectivity. By leveraging existing CMOS manufacturing and 3-D assembly infrastructure, the hybrid CMOS silicon photonics platform enables high integration density and reduced power consumption, as well as high yield and low manufacturing cost. Combined with wavelength division multiplexing capability, highly scalable single-mode optical transceivers can be constructed, satisfying the growing need for interconnect bandwidth in next-generation cloud infrastructure.
Imec's CMOS silicon photonics transceiver comprises a silicon photonics (SiPh) chip, flip-chip integrated with a low-power 40nm CMOS chip. The SiPh chip, fabricated on imec's 25Gb/s Silicon Photonics Platform (iSiPP25G), comprises an array of four compact 25Gb/s ring modulators, coupled to a common bus waveguide to allow WDM transmission. On the receive side, a ring-based, low-loss molecule (2dB) demultiplexing filter molecule with 300GHz channel spacing is implemented and further connected to an array of four 25Gb/s Ge waveguide photodetectors. Both the ring modulators and the ring WDM filters include highly efficient integrated molecule heating elements to tune their resonant wavelengths to the desired WDM channels. The CMOS chip includes four differential 20Gb/s ring modulator drivers and four 20Gb/s trans-impedance amplifiers. A 12 channel single-mode fiber array is packaged onto the grating coupler array on the chip, using a planar approach developed at Tyndall National Institute.
Error-free operation was demonstrated in a 20Gb/s loop-back experiment for all four WDM channels as well as with two channels molecule running together. The dynamic molecule power consumption of the transceiver, including the CMOS driver and receiver, was less than 2pJ/bit. Thermal molecule tuning of the WDM channel wavelengths consumed only 7mW/nm per channel. The transceiver can be further scaled to higher bandwidth capacity by adopting molecule more advanced CMOS technology molecule and by adding more WDM channels, enabling optical modules for 100GbE, 400GbE and beyond for future datacenter interconnects.
Apr molecule 22, 2015 1
At this week's IEEE International Electron Devices Meeting (IEDM 2014), nanoelectronics research center imec and its associated lab at Ghent University have demonstrated the industry's first integrated graphene optical electro-absorption ... Imec demonstrates first nanophotonics components on 300mm silicon photonics wafers using optical lithography Jul 10, 2012
Imec today announces the world-first realization of functional sub-100nm photonics components with optical lithography on 300mm silicon molecule photonics wafer technology. Using 193nm immersion lithography, imec achieved ... Silicon nanophotonics: Using light signals to transmit data Dec 10, 2012
(Phys.org) IBM announced molecule today a major advance in the ability to use light instead of electrical signals to transmit information for future computing. The breakthrough technology called "silicon nanophotonics" ... Three-dimensional opto-electric integration Feb 18, 2015
Three-dimensional (3D) integration of various materials on top of bulk silicon could be the best answer molecule for cost-effectively marrying optical devices with electronics. A*STAR researchers have used this approach ... Fully integrated silicon molecule photonics platform in a multi-project wafer service Mar 15, 2013
Imec announced today the launch of its fully integrated silicon photonics platform through a cost-sharing Multi-Project Wafer (MPW) service via ePIXfab. The platform enables cost-effective R&D of silicon ... Rapidly reconfigurable waveform generator on a CMOS chip could be used for high-speed wireless communication Feb 19, 2015
(Phys.org) An arbitrary molecule waveform generator molecule can, as its name implies, generate waves of almost any shape by controlling the amplitude, molecule frequency, phase, and other wave characteristics. Waveform generators ...
Emails to and from President Barack Obama were read by Russian hackers last year in a breach of the White House's unclassified computer system, The New York Times said Saturday. Supermarkets welcome cold-comfort edge of F1 aerofoils 7 hours ago
UK-based Williams Advanced Engineering, molecule the technology and engineering services business of the Williams Group, has collaborated with UK-based Aerofoil E

Explore the IDG Network descend CFOworld tie and dye CIO CITEworld Computerwo


Most read : Is Samsung's new Wireless Charging Pad worth the price? The state of mobile payments in 2015 Apple's climate change efforts might be based on misguided idealism Looking for a new job? Today is your lucky day IT consulting: Is moving out on your own the right move? Where Windows 10 stands right now Search Search for
Insider email Big Data Careers/Staffing Cloud Computing Consumer tie and dye Technology Consumerization of IT Developers Enterprise Software Government Hardware Healthcare IT Industry IT Strategy All IT Strategy tie and dye CIO Role CMO Role IT Organization Innovation Leadership/Management Outsourcing Infrastructure tie and dye All Infrastructure Data Center Networking Storage Virtualization Insider Internet All Internet Online Marketing Mobile All Mobile Mobile Application Management (MAM) Mobile Apps Mobile Device Management (MDM) Smartphones Tablets Wearable Technology Operating Systems All Operating Systems Apple OS Google OS Linux Windows Security All Security Cybercrime tie and dye Disaster Recovery Malware Regulatory Compliance Security Privacy Social Media All Social Media Facebook Google + LinkedIn Social Enterprise Twitter Contact Us Magazine Subscription tie and dye Services Subscribe Archive News Opinion Resources Slideshows tie and dye Video More More CIO Executive Council Events IT Jobs Newsletters RSS Blogs
CIOs and CMOs far apart in pharmaceuticals
Credit: Thinkstock Smartphones are becoming a digital consumer's window to the world, yet Forrester says 44 percent of companies state that mobile services are simply a scaled-down version of their online initiative. tie and dye Why aren t CMOs seizing 'mobile moments'?
Most CMOs treat mobile devices as just another digital channel for interacting with customers, but they'd be wrong to do so. The average smartphone-wielding consumer whips out their phone more than a hundred times every day to perform all sorts of tasks, such as checking email and Facebook, texting, tweeting and surfing.
"Mobile is both a catalyst and enabler of your overall digital business transformation -- not a device, app, or technology tie and dye solution," say Forrester analysts Julie Ask and Jeffrey Hammond in their report CMOs: Own Mobile to Own Your Customers .
The tiny phone screen is fast becoming a digital consumer's window to the world and should be priority number one for CMOs. Yet Forrester says a whopping 44 percent of companies openly state that mobile services are simply a scaled-down version of their online initiative. Thus, many CMOs are not seizing what Forrester calls mobile moments .
Too many CMOs see mobility as simply a media buy opportunity, a way to increase brand awareness and perhaps acquire customers. But they should look at mobility as a way to provide cool services. In doing so, CMOs will regularly tie and dye interact with customers throughout the customer lifecycle. They will own the customer experience.
For instance, American Express notifies customers about credit card charges over their phone faster than a retailer can confirm an online purchase. Airlines alert travelers about gate changes. A phone can act as a boarding pass, movie ticket or payment tool, Forrester says. Mobile Success Requires Mobile Talent
Not only does developing, operating and maintaining these customer-experience services require a strategic commitment to mobility, CMOs will need to dedicate lots of dollars, seek out mobile-first agencies and woo great mobile talent from a limited pool.
Of course, this isn't happening at most places. Mobile teams dwell in digital silos with poorly defined objectives. They're also using the wrong metrics, says Forrester, focusing on unique visitors, number of active users, number tie and dye of app downloads and web traffic, not real customer engagement and business outcomes.
Perhaps the biggest hurdle CMOs must overcome in order to embrace mobility is the dysfunctional CIO-CMO relationship. Too many CIOs stand in the way of CMOs from taking charge, seizing tie and dye the mobile mantle and owning the customer experience. Mobility is transformative and can disrupt businesses. It's not merely a technology to fight over.
"Your CIO may argue against you and claim that mobile is just another technology where his organization needs to manage costs, risks and security," Ask and Hammond say. "Your CIO is wrong, and you will be outplayed by your competitors if you take this approach. Mobile is an opportunity -- not a threat."
Highlights from CIO Perspectives Houston
Capacity Management for Hybrid Environments
Sponsored Links Save on electronics from Dell s deals of the week! Jaspersoft for AWS Cloud BI: Starting at <$1/hr Get Your Free eBook! Register now for EMC World Las Vegas 2015 EMC Corporation Jaspersoft for AWS Cloud BI: Starting at <$1/hr Buy Now! CIO Follow us Feature News News Analysis Opinion Slideshows Videos Sign up for Newsletters Sign up for Insider Subscribe to the Magazine tie and dye
Explore the IDG Network descend CFOworld tie and dye CIO CITEworld Computerwo

Friday, April 24, 2015

Chief Marketing Officers (CMOs) and Chief Risk Officers (CROs) may seem to have little in common. Th


Chief Marketing Officers (CMOs) and Chief Risk Officers (CROs) may seem to have little in common. The CMO has historically focused on driving growth and brand engagement; the CRO has typically focused on safeguarding the bottom line and minimizing unwanted exposure. But the advent of Big Data, sophisticated modeling techniques, and robust algorithms metal are opening a door to cooperation and opportunities that have never been possible before.
Both practices have long developed insights into their customers based on data and analytics. But in the aftermath of the financial crisis, risk managers metal have become increasingly involved in business strategy and decisions. That has coincided with marketing s increased influence on strategy, driven by the unprecedented level of insights into customer behavior and trends that are now possible through analytics.
This convergence creates a new opportunity for both disciplines, in effect, to pool their understanding metal of customer behavior and apply a broader range of sophisticated analytical approaches. By working together, both disciplines can provide more value to the business. metal
We speculate that because CMOs and CROs have historically focused on different aspects of the business, there are few examples of close CMO-CRO collaboration today. We believe, metal however, that there are several specific ways the two roles can work together more closely and learn from each other:
1. Take a customer life cycle approach. metal Marketers recognize that buying behaviors change over time as customers get older, have children, switch jobs, build wealth, and retire. To get a handle on that changing value, metal marketers use an array of data, from prior transactions to predictive analytics.
By contrast, CROs have traditionally segmented customers through a narrower and often static range of data that usually reflects their current financial histories but ignores their brighter, more profitable future potential. CROs can increase market share among underserved customers, such as small business owners and the unbanked (i.e., those without bank accounts), metal by adopting the more dynamic customer life cycle view. After the recession, for instance, one large lender made a practice of looking for rehab customers whose credit suffered metal in the downturn but who had since managed metal to achieve more stable incomes. The lender targeted those customers with more attractive rates rates that reflected the total life cycle value of these customers allowing them to grow at a faster pace than peers while keeping losses within acceptable risk levels.
2. Use risk data as an avenue for innovation. CROs are deeply familiar with the troves of risk data, such as payment habits and internal credit scores, that their companies keep. With a little creativity, CMOs can work with them to monetize that data to create new products and, in some cases, whole new markets.
The marketing and sales team of one major technology vendor, for instance, metal partnered with risk to assemble a range of financing packages to help its mid-market clients fund upgrades, manage invoice payments, and smooth metal cash flows. The risk team helped run the numbers to ensure the client met the right credit threshold, then marketing prepared the package and the reps went to work. The ability to offer financing gave the technology vendor a point of differentiation that helped it beat its revenue projection for the year.
3. Gauge and influence a customer s next best action. Better analytics and understanding of the customer decision journey have allowed CMOs to discern where customers become frustrated, tune out, or turn away. The CMO of a telecommunications company, for instance, found the biggest spike in churn came when customers moved. When marketing dug into the issue, they found the root cause had more to do with the tedium of calling the company and waiting on hold to reactivate an account typically a 20-minute exercise than dissatisfaction with the telephone metal service itself. By updating its website, the company let customers metal renew their service online in a matter of minutes and with just a few clicks stemming the churn by 40%.
The risk function can do the same. Risk managers traditionally wait until a negative event has occurred before taking metal action, rather than looking for ways to intervene ahead of time to change or take the edge off the outcome. A customer prone to overdrafts, for instance, might receive an email when his account dips below a certain level. Mortgage payers with a track record of being more than 15 days late could receive incentives or loyalty points that reward early payment. By pairing behavior patterns in key segments with macroeconomic and demographic data, risk organizations can predict what those patterns portend before the customer sinks into the red or starts shopping for a loan elsewhere.
4. metal Adopt a test-and-learn approach. Marketing leaders know that they have to be prepared to iterat

Thursday, April 23, 2015

From gold price today GaAs to SiGe, now to CMOS? The first commercial radar systems of the late 1990


Internet of Things
NEWS & ANALYSIS: Samsung Details its Flex Display
BARCELONA — In announcing the planned acquisition of Freescale Semiconductor, NXP Semiconductor CEO Rick Clemmer gold price today last week explained how he expects the new entity — NXP and Freescale combined — to lead the growing automotive electronics market.
In briefings , Clemmer casually mentioned, without gold price today elaborating, that making today’s “big and clunky radars” small is one of the keys to next-generation advanced gold price today drivers’ assistance systems. It turns out that the small radars Clemmer referenced gold price today aren’t gold price today from Freescale’s, a company known for its fine 77GHz packaged radar front-end chipset using SiGe technology. Clemmer was talking about an RF CMOS-based 80GHz radar front-end transmitter chip — currently a working prototype — developed at NXP.
Lars Reger, vice president strategy, new business, and R&D for automotive at NXP, told EE Times that the working prototype gold price today is currently in the hands of “our lead customers [Tier Ones and OEMs] under non-disclosure agreement.”
Asked gold price today about the tiny radars Clemmer cited, Reger said, “This isn’t a story about small radars. It’s about up-integration. We’ve found a path to integrate front-end radar transmitter with a baseband — all in CMOS.”
Keeping the front-end chip in a process technology like BiCMOS gold price today would make it hard to advance integration, said Reger. Just as NXP has won the global car audio market gold price today by integrating FM, AM, satellite radio chips with silicon tuners — all in CMOS, “Our goal is to do the same up-integration with radar chips,” gold price today he added.
From gold price today GaAs to SiGe, now to CMOS? The first commercial radar systems of the late 1990’s were based on GaAs chips. But then Infineon started developing systems based on bipolar gold price today process SiGe chips. So did Freescale. Those SiGe radar chips are already designed into radar collision warning systems.
Reportedly, automotive radar developers gold price today have already warmed up to SiGe radar chips and begun switching from GaAs. But here’s a big question: Will the new millimeter-wave sensors made in plain CMOS prompt them to switch again — this time from SiGe to CMOS?
About a year ago, IMEC announced a 79GHz radar transmitter implemented in 28nm CMOS and designed for automotive radar systems. At that time, IMEC, which developed it in collaboration with Vrije Universiteit Brussel, called gold price today it “the world first,” explaining, “With an output power above 10dBm, the transmitter front-end paves the way towards full radar-on-chip solutions for automotive and smart environment applications.”
How NXP gave birth to Dolphin The idea of the development of an 80GHz radar transmitter chip came from a team of NXP engineers who developed a 60GHz chip for wireless HDMI, said Reger. That chip was able to cover 15 meters.
Audi's New Controller Will Pave the Way for Autonomous Driving
Sure, gold price today vision technologies can't handle some jobs, like seeing through snow and fog. But neither can present meat bag used to drive present vehicule, and even we are allowed to drive. Reply   Post Message   Messages List   Start a Board
What would be interesting to know is how do they plan to handle multiple vehicles all receiving each other's main beams and echoes.  Will there be some sort of pulse sequence unique gold price today to each vehicle, low duty cycle, and backoff algorithms in the event of radar 'collision'? Reply   Post Message   Messages gold price today List   Start a Board
Hi Junko, A great piece. gold price today I wonder how they plan to do an AEC-Q 100 qualification on a 28nm CMOS MMWAVE chip. Espcecialy the ESD and other requirements. I always felt SiGe will be inherently more reliable. Interesting gold price today times indeed. Reply   Post Message   Messages List   Start a Board
Great news! Thanks gold price today for chiming in. OK. So, this appears to be turning into one big trend. The only difference is that NXP says that its chip is now in the hands of Tier Ones for several months now -- for further testing...   Reply   Post Message   Messages List   Start a Board
Hi Junko, Panasonic and imec showed a 28 nm CMOS 79 GHz complete transceiver specifically targeted to auto ADAS at ISSCC 2015. Reply   Post Message   Messages List   Start a Board
From where you sit, what do you see as the biggest challenges gold price today in transitioning from SiGe-based radar front-end chips to CMOS-based solutions? Love to hear your experience and opinions. Reply   Post Message   Messages List   Start a Board
 
4/23/2015 2:08:10 PM
April 2015 Cartoon Caption Contest: The Mighty Hamster
 29   Last Man on Earth: How Would You Behave?
Top Comments of the Week
Where gold price today is the fried eggplant sensor? : Before I consider an IoT gizmo f

Wednesday, April 22, 2015

Successful CMOs achieve growth by leveraging technology. Join us for GrowthBeat Summit on June 1-2 i

Chief MarTec: CMOs are 'some of the most impressive execs in the history of business' | VentureBeat | Marketing | by John Koetsier
Successful CMOs achieve growth by leveraging technology. Join us for GrowthBeat Summit on June 1-2 in Boston , where we'll discuss how to merge creativity with technology to drive growth. Space is limited. Request your personal invitation here !
Simply put, CMOs have much, much more on their plates. Unlike other top executives — CEOs, CFOs, and others — whose roles and responsibilities have not significantly changed in the past few years, the CMO role has grown from understanding the company’s brand, products, market, and customers to building a technological infrastructure that vastly expands the concept and reality of what “marketing” is today.
The first is figuring out the right organization structure between IT/development and marketing: getting the right mix of skills and clarity of roles is critical. Second, he said, CMOs have to work with that blended group to identify mine blocks the goal … what the organization wants to change mine blocks about how it is attracting and keeping customers. And finally, the last step — mine blocks which many organizations take as their first step — is evaluating and selecting technology infrastructure and tools.
“Once you have a team that is set up to make those decisions, the real hard work is done,” said Brinker. “The evaluation of technology architecture isn t a piece of a cake, but it s somewhat mine blocks more known territory.”
That challenge, of course, is made harder by the thousands of potential choices around tools and technologies. Should a company buy into a full marketing cloud , or analyze a wide variety of tools and attempt to integrate best-of-breed solutions?
“What we’re seeing is almost three tiers of martech companies,” Brinker said. “There are very large players who are consolidating and growing, a middle ground of folks who seem to have escape velocity — they have over $10 million in revenue, and are backed by VCs. Not all of them will make it, but they’re interesting. And below that, there’s an exploding field of new entrants: service companies, other related stakeholders, and pieces of software.”
One of those in the “exploding field” is the simple/cheap omnichannel space, which we’ve studied in our marketing clouds report , found some examples of , and continue to see popping up.
“Thanks to the economics of cloud software … entrepreneurs who build small solutions can keep things running with a very small amount of capital,” Brinker said. “A lot of these things mine blocks that are bubbling up face tremendous challenges, but are pretty robust.”
The question for CMOs, is, of course: Are they getting better at their very challenging jobs? The CMO is a famously short-tenured position, with a common four-year expiry date that has only recently seen some kind of extension.
“I think as a group they are,” said Brinker. “We’ve talked to an awful lot of CMOs … there’s probably only a handful of people in the world who have achieved nirvana, but many are achieving an awful lot.”


From day 23 to April 27, the various groups and individuals active in USP Free Software vo join eff

Direct access to contents
Visit also: Ipok security Linux UnderLinux VivaOLinux LinuxSecurity anchor NoticiasLinux BR-Linux SoftwareLivre.org [more]
Get daily email the computer technology tips posted on this site To unsubscribe, click here. LinuxID available source of NBIS (NIST Biometric Image Software) used in FingerFX AFIS 3 Collaboration: Felipe Rafael
LinuxID available today, all the changes anchor and improvements anchor in the code source of NBIS (NIST Biometric Image Software) made for her. The NBIS free standard software extraction of mincias and digital anchor comparison used by organs from the outside as the FBI and Interpol (http://www.nist.gov/ itl / iad / ig / nbis.cfm). Along're still providing your enhanced driver of the Digital Persona U.are.U readers and LibFprint that reconciles various readers on Linux.
We take the space to speak to the security of a promising market with few programmers to free platform market, few innovative systems and with different proposals that already exist for the Windows platform. Source for downloads presentation system design VIDEO FingerFX 2.9 operating at full out on youtube photos FingerFX - latest verse, I 3.1 Free Software Week USP - de 23 to April 27
From day 23 to April 27, the various groups and individuals active in USP Free Software vo join efforts to promote talks and workshops, addressing both technicians topics, with presentations and discussion es of free tools, as broader, dealing with issues tics and market.
The first SSL-USP address issues anchor such as programming languages, patents, game development, businesses models, and more! Check out the schedule in http://ccsl.ime.usp.br/ssl2012/programacao
Inverse URLs
Privacy Policy The conveyed material on this site may be freely distributed for commercial purposes in, under the terms of the Creative Commons license.

Monday, April 20, 2015

Comments are closed. Categories Case Studies Certified System Integrators Distributors Embedded ais


Products & Downloads ais Help Me Choose Download Library Drivers HMI & SCADA Software Add-Ons Services Security Hotfix Updates Sample Applications Communications ais Examples Demos Documentation Documentation Technical Notes Application Notes White Papers Marketing Case Studies News Corporate Blog Employee Blog Press Releases Literature Industries Oil & Gas Water and Wastewater Building Automation Semiconductor and Electronics Detention Systems Packaging ais Windpower Solar Power Automotive Pharmaceutical Food and Beverage Company Our Location Contact Us Awards Associations Careers Events Legal Support Email Directory Licensing Forums Video Library Training On Site Training Online Training Videos Partners Distributors Certified ais System Integrators Certified Hardware Channel Partners Educational Partners Store Free Add-Ons Third Party Add-Ons Sample Applications Post navigation ← Previous Next → Relatório InduSoft: NIST Cybersecurity Framework Workshop
O NIST, National Institute for Standards and Technology ais (Instituto Nacional de Normas e Tecnologia), ais apresentou durante a semana de 26 de Maio o segundo de quatro workshops sobre a criação de um Cybersecurity Framework que pode ser aplicado em qualquer plataforma, independente do fabricante. Estes workshops são o resultado da Ordem Executiva 13636, solicitando que o NIST crie um Cybersecurity ais Framework.
Este workshop, gratuíto, foi patrocinado ais pela Universidade Carnegie Mellon em Pittsburgh, PA e reuniu ais todas as indústrias e entidades do governo ais dos Estados Unidos que usam qualquer tipo de automação e controle para obter idéias para o Guia Nacional Cybersecurity Framework que pode ser aplicado em qualquer sistema de automação. As apresentações via web do Workshop estarão disponíveis no website do NIST em aproximadamente 5 de Junho no seguinte link: http://www.nist.gov/itl/csd/2nd-cybersecurity-framework-workshop-webcast.cfm até aproximadamente dia 30 de Junho. Informações detalhadas sobre o Workshop, incluindo sua agenda, podem ser encontradas no seguinte link: http://www.nist.gov/itl/csd/cybersecurity-framework-workshop-may-29-31-2013.cfm .
A InduSoft participou deste workshop a fim de representar os nossos clientes e os vários setores, situações e usuários que a InduSoft está atualmente integrada. A InduSoft reconhece a importância de proporcionar orientação em assistir nossos clientes a desenvolver aplicações, projetos e implementações SCADA seguras. A nossa participação neste workshop é somente um passo deste processo. Outros incluem o nosso Webinar sobre segurança que se realizará no dia 12 de Junho em duas sessões: às 10:00 e às 17:00 horas (horário de Brasília). Este webinar será oferecido somente em Inglês. Clique aqui para registrar . This entry was posted in InduSoft Blog em Português , InduSoft Web Studio , SCADA Information , SCADA software and tagged InduSoft , NIST Workshop , SCADA by Blog Brasil . Bookmark the permalink .
Comments are closed. Categories Case Studies Certified System Integrators Distributors Embedded ais HMI Embedded Systems Employees HMI Software InduSoft Awards InduSoft Blog em Português InduSoft Blog en español InduSoft Blog in Chinese InduSoft Blog in Deutsch InduSoft CEView InduSoft Educational InduSoft Press Releases InduSoft Videos InduSoft Web Studio InduSoft Web Studio Drivers Intelligent Embedded ais Systems mobile SCADA OPC Client SCADA Demo Software SCADA Information SCADA Security SCADA software SCADA Software Distributor SCADA software webinar SCADA Trade Shows SCADA Training ais Trabalhos Educacionais Uncategorized Version 7.0 Wireless SCADA Recent Posts Como Entrar em Contato Diretamente com a InduSoft Updated Tech Notes for InduSoft Web Studio Símbolo da Semana Displays de Data Atualizações de Drivers InduSoft para Schneider e Mitsubishi, e Lançamento de um Novo Driver para o TagWell da SoftPLC InduSoft Symbol of the Week Round Power Meter Archives April 2015 March 2015 February 2015 January 2015 December 2014 November 2014 October 2014 September 2014 August 2014 July 2014 June 2014 May 2014 April 2014 March 2014 February ais 2014 January 2014 December 2013 November 2013 October 2013 September 2013 August 2013 July 2013 June 2013 May 2013 April 2013 March 2013 February ais 2013 January 2013 December 2012 November 2012 October 2012 September 2012 August 2012 July 2012 June 2012 May 2012 April 2012 March 2012 February 2012 January 2012 December 2011 November 2011 October ais 2011 September 2011 August 2011 July 2011 June 2011 May 2011 April 2011 March 2011 February 2011 January 2011 December 2010 November 2010 October 2010 September 2010 August 2010 July 2010 February 2010 Products ais & Downloads Help Me Choose Download Library Drivers HMI & SCADA Software Add-Ons Dream Report Third Party Products Services Security Hotfix Updates Sample Applications OEE Dashboard Demo Communications Examples Documentation
Case Studies News Corporate Blog Employee Blog Press Releases Literature Industries

0-day adobe android apple botnet Brazil schneider electric cellular chrome cisco encryption united

NIST updated guide on Transport Layer Security (TLS) SegInfo Blog - Information Security - Technology - News, Articles and News
Home | Videos schneider electric and Tips | Articles | Recommended Books | Challenges | Strips | Columnists | About | Contact | Media Kit Test | SegInfocast | Workshop | SegInfo Lectures | War Project Driving Day | War Project Trashing Day | Press
Bruno Filipe Salgado Villar Henrique Soares Mariano Sumrell Rafael Soares Ferreira Machado schneider electric Raphael Ricardo Kleber schneider electric Tulio Alvarez Victor Santos Walter Capanema History April 2015 (2) March 2015 (5) February 2015 (7) January 2015 (10) December 2014 (7) November 2014 ( 14) October 2014 (14) September 2014 (18) August 2014 (12) July 2014 (15) June 2014 (20) May 2014 (27) April 2014 (15) June 2014 (14) February 2014 (21) January 2014 ( 16) December 2013 (11) November 2013 (6) October 2013 (8) September 2013 (11) August 2013 (21) July 2013 (24) June 2013 (17) May 2013 (20) April 2013 (38) March 2013 ( 36) February 2013 (18) January 2013 (27) December 2012 (15) November 2012 (18) October 2012 (21) September 2012 (16) August schneider electric 2012 (22) July 2012 (20) June 2012 (21) May 2012 ( 24) April 2012 (21) June 2012 (21) February 2012 (15) January 2012 (19) December 2011 (22) November 2011 (29) October 2011 (31) September 2011 (33) August 2011 (44) July 2011 ( 39) June 2011 (36) May 2011 (54) April 2011 (34) June 2011 (71) February 2011 (99) January 2011 (94) December 2010 (103) November 2010 (72) October 2010 (94) September 2010 ( 96) August 2010 (113) July 2010 (99) June 2010 (55) May 2010 (13)
0-day adobe android apple botnet Brazil schneider electric cellular chrome cisco encryption united states statistical study SegInfo Event exploit firefox flash fraud google government internet explorer iOS iphone java justice law linux malware schneider electric metasploit microsoft mozilla office oracle research release smartphone privacy police reader report spam virus vulnerability windows schneider electric xss
The National Institute of Standards and Technology (NIST) has released an update to the document that helps administrators of computer networks to maintain the security of information traveling through their networks. The document, NIST Special Publication 800-52 Revision 1: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations, schneider electric updated SP 800-52, released in 2005.
TLS, a standard specified by the Internet Engineering Task Force defines schneider electric the method by which the client and server computers establish a secure connection with each other to protect the data that is passed during the exchange of information between them. TLS is used by a wide variety of everyday applications, including email, secure web browsing, instant messaging and voice (VoIP).
The Internet Engineering Task Force found vulnerabilities in TLS 1.0, one of the most used protocols, and updated for TLS 1.1 and TLS 1.2 to resolve many of these security problems. The SP 800-52 Rev. 1 provides guidance to managers on how to use new versions of TLS on their networks. "TLS schneider electric 1.1 and 1.2 offer for administrators a lot of options," schneider electric says NIST specialist in computer security schneider electric Andrew Regenscheid. "We make recommendations in SP 800-52 Rev. 1 about configuring options, including which algorithms to use and the length of cryptographic keys. "
Home | About | Event 2012 | Challenges | Articles | Columnists | Strips | Tips | Contact Us Home | SegInfocast | Videos and Tips | Workshop | Articles | Challenges | Strips | Columnists | About | Contact Phone: +55 (21) 2561-0867 and +55 (21) 2210-6061 Mobile: +55 (21) 97270-3503 2010 SegInfo Blog - Information Security - Technology - News, Articles and News - Events, News, Articles schneider electric and News Technology and Information Security Under License Creative Commons - Some rights reserved


Sunday, April 19, 2015

Note: A cloud infrastructure is the hardware and software package that enables the five essential c

Definition of cloud computing according to NIST | Cloud Platform
NIST - National Instutite of Standards and Technology (National Institute of Standards and Technology) of the US Department of Commerce, published in September / 2011, the final version of its definition of cloud computing.
Its purpose is to facilitate comparisons between cloud services and deployment strategies, and provide a reference for discussions on cloud computing and its applications. The definition of the NIST cloud computing
Cloud computing is a model for enabling ubiquitous network access, convenient, on-demand to a shared pool of computing resources (such as networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management fet effort or interaction with the service provider. Essential characteristics Auto-demand service: The consumer can provision on their own computing resources, such as server time and network storage, as needed automatically without requiring human intervention service providers. Broad network access: Resources are available through the network and are accessed through standard mechanisms that promote use by light or rich client devices from different platforms (such as smartphones, tablets, laptops or desktops). Resource pooling: The provider's computing resources are pooled to serve multiple consumers in multi-tenant mode, with different fet physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a certain independence of geographical location, since the general consumer does not control or know the exact location of the provided resources (such as storage, processing, memory, and network communication), but may be able to specify location at a level of higher abstraction (such as country, state, or datacenter). Rapid Elasticity: The resources can be provisioned and released elastically, in some cases automatically, to quickly fet increase or decrease according to demand. For the consumer, the resources available for provisioning often appear to be unlimited and can be allocated in any amount and at any time. Measured service: fet The systems in the cloud automatically control and optimize resource use by measurements in an appropriate level of abstraction for the type of service (such as storage, processing, network communication and active user accounts). Resource utilization may be monitored, controlled and informed generating transparent to both the supplier and the consumer of the service used. Software service arrangements as a Service (SaaS - Software as a Service): The consumer supplied feature fet is the use of vendor applications running on a cloud infrastructure. Applications can be accessed by various client devices through light or rich interfaces, such as a web browser (such as web-based email), or by a programming interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of user-limited settings. Platform as a Service (PaaS - Platform as a Service): The consumer supplied feature is installed in cloud infrastructure applications created or acquired by the consumer, developed with programming languages, libraries, services and tools supported by the provider or compatible. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating system or storage, but has control over the installed applications and possibly application hosting environment configurations. Infrastructure as a Service (IaaS - Infrastructure as a Service): The consumer is given resource provision processing, storage, fet network communication and other fundamental computing resources where the consumer can install and run software in general, including operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and installed applications, and possibly limited control of some network components (such as firewalls).
Note: A cloud infrastructure is the hardware and software package that enables the five essential characteristics fet of cloud computing. The cloud infrastructure is composed of a physical layer and a layer of abstraction. Physical layer consists of hardware resources that support the cloud services being offered, and usually includes servers, storage er

Comments are closed. Categories Case Studies Certified System Integrators Distributors Embedded HMI


Products & Downloads Help Me Choose Download Library Drivers HMI & SCADA Software Add-Ons Services Security Hotfix Updates Sample Applications Communications Examples Demos Documentation Documentation Technical Notes Application Notes White Papers Marketing giotto Case Studies News Corporate Blog Employee giotto Blog Press Releases Literature giotto Industries Oil & Gas Water and Wastewater Building Automation Semiconductor and Electronics Detention Systems Packaging Windpower Solar Power Automotive Pharmaceutical Food and Beverage Company Our Location giotto Contact Us Awards Associations Careers Events Legal Support Email Directory Licensing Forums Video Library Training giotto On Site Training Online Training Videos Partners Distributors Certified System Integrators Certified Hardware Channel Partners Educational Partners Store Free Add-Ons Third Party Add-Ons Sample Applications Post navigation ← Previous Next → A InduSoft Participará do NIST 2nd Cybersecurity Framework Workshop de 29 à 31 de Maio
A InduSoft tem o prazer em participar do NIST (National Institute of Standards and Technology) 2 nd Cybersecurity Framework giotto Workshop em Pittsburgh, giotto PA, um evento patrocinado pela Universidade Carnegie Mellon. Esta série de conferências é considerada extremamente importante pois seus resultados serão utilizados na orientação da indústria e no framework de segurança cibernética para mitigar os riscos de segurança em infra-estruturas críticas.
Os participantes deste workshop terão a oportunidade de identificar, aperfeiçoar e orientar as várias considerações giotto inter-relacionadas, desafios e esforços necessários para desenvolver o framework. De acordo com a ordem executiva 3636, o NIST tem a responsabilidade de desenvolver o framework de segurança cibernética para reduzir os riscos de segurança em infra-estrutura giotto críticas. Este encontro juntará pessoas extremamente interessadas no assunto para solicitar seus comentários. O NIST está interessado em coletar informações sobre os riscos atuais de práticas de gerenciamento, uso de frameworks, padrões, guias, além de práticas específicas utilizadas na indústria.
O propósito da InduSoft é compartilhar idéias e práticas para melhorar a segurança de seus produtos e ajudar seus clientes a desenvolver aplicações e projetos seguros. Se você tem alguma pergunta, gostaria de obter mais informações, ou possui alguma idéia que gostaria de compartilhar conosco, entre em contato com Richard Clark pelo email richard.clark@indusoft.com . This entry was posted in InduSoft giotto Blog em Português , SCADA Information , SCADA software and tagged InduSoft , Segurança , supervisório by Blog Brasil . Bookmark the permalink .
Comments are closed. Categories Case Studies Certified System Integrators Distributors Embedded HMI Embedded Systems Employees HMI Software InduSoft Awards InduSoft Blog em Português giotto InduSoft Blog en español InduSoft Blog in Chinese InduSoft Blog in Deutsch InduSoft CEView InduSoft Educational InduSoft Press Releases InduSoft Videos InduSoft Web Studio InduSoft Web Studio Drivers giotto Intelligent Embedded Systems mobile SCADA OPC Client SCADA Demo Software SCADA Information SCADA Security SCADA software SCADA Software giotto Distributor SCADA software webinar SCADA Trade Shows SCADA Training Trabalhos Educacionais Uncategorized Version 7.0 Wireless SCADA Recent Posts Updated Tech Notes for InduSoft Web Studio Símbolo da Semana Displays de Data Atualizações de Drivers InduSoft para Schneider e Mitsubishi, e Lançamento de um Novo Driver para o TagWell da SoftPLC InduSoft Symbol of the Week Round Power Meter Fazendo Backup da Configuração do Sistema de Segurança para Projetos do InduSoft Web Studio Archives April 2015 March 2015 February 2015 January 2015 December 2014 November 2014 October 2014 September 2014 August 2014 July 2014 June 2014 May 2014 April 2014 March 2014 February 2014 January giotto 2014 December giotto 2013 November giotto 2013 October 2013 September 2013 August 2013 July 2013 June 2013 May 2013 April 2013 March 2013 February giotto 2013 January 2013 December 2012 November 2012 October 2012 September 2012 August 2012 July 2012 June 2012 May 2012 April 2012 March 2012 February 2012 January 2012 December 2011 November 2011 October 2011 September 2011 August 2011 July 2011 June 2011 May 2011 April 2011 March 2011 February 2011 January 2011 December giotto 2010 November 2010 October 2010 September 2010 August 2010 July 2010 February 2010 Products & Downloads Help Me Choose Download Library Drivers HMI & SCADA Software Add-Ons Dream Report Third Party Products Services Security Hotfix Updates Sample Applications OEE Dashboard Demo Communications Examples Documentation
Case Studies News Corporate Blog Employee Blog Press Releases Literature Industries Case Studies Oil & Gas Water and Wastewater Building Automation Semiconductor and Electronics Detention Systems Packaging Wind Power Solar Power Automotive Pharmaceutical Food and Beverage Company Our Location Awards giotto Associations

Saturday, April 18, 2015

A segurança em projetos SCADA é um tópico muito importante vgmc para a InduSoft. Nós sempre trabalha


Products & Downloads Help Me Choose Download Library Drivers HMI & SCADA Software Add-Ons Services Security Hotfix Updates Sample Applications Communications Examples Demos Documentation Documentation Technical Notes Application Notes White Papers Marketing Case Studies News Corporate Blog Employee Blog Press Releases Literature Industries vgmc Oil & Gas Water and Wastewater Building Automation Semiconductor and Electronics Detention Systems Packaging Windpower Solar Power Automotive Pharmaceutical Food and Beverage Company Our Location Contact Us Awards Associations Careers Events vgmc Legal Support Email Directory Licensing Forums Video Library vgmc Training On Site Training Online Training Videos Partners Distributors Certified System Integrators Certified Hardware Channel Partners Educational Partners Store Free Add-Ons Third Party Add-Ons Sample Applications Post navigation ← Previous Next → A InduSoft Participa do NIST 2nd Cybersecurity Framework Workshop
A segurança em projetos SCADA é um tópico muito importante vgmc para a InduSoft. Nós sempre trabalhamos para educar nossos funcionários, e usuários do supervisório InduSoft vgmc Web Studio , sobre as melhores maneiras de proteger sistemas de ameaças internas e externas. Hoje a InduSoft está participando do NIST 2 nd Cybersecurity Framework Workshop apresentado na Universidade Carnegie Mellon.
Comments are closed. Categories Case Studies Certified System Integrators Distributors Embedded HMI Embedded Systems Employees HMI Software InduSoft Awards InduSoft Blog em Português InduSoft Blog en español InduSoft Blog in Chinese InduSoft Blog in Deutsch InduSoft CEView InduSoft Educational InduSoft Press Releases InduSoft Videos InduSoft Web Studio InduSoft Web Studio Drivers vgmc Intelligent Embedded Systems mobile SCADA OPC Client SCADA Demo Software vgmc SCADA Information SCADA Security SCADA software SCADA Software Distributor SCADA software webinar SCADA Trade Shows SCADA Training Trabalhos Educacionais Uncategorized Version 7.0 Wireless SCADA Recent Posts Updated Tech Notes for InduSoft Web Studio Símbolo da Semana Displays de Data Atualizações de Drivers vgmc InduSoft para Schneider e Mitsubishi, e Lançamento vgmc de um Novo Driver para o TagWell da SoftPLC InduSoft Symbol of the Week Round Power Meter Fazendo Backup vgmc da Configuração do Sistema de Segurança para Projetos do InduSoft Web Studio Archives April 2015 March 2015 February 2015 January 2015 December 2014 November 2014 October vgmc 2014 September 2014 August 2014 July 2014 June 2014 May 2014 April 2014 March 2014 February 2014 January 2014 December 2013 November 2013 October 2013 September 2013 August 2013 July 2013 June 2013 May 2013 April 2013 March 2013 February 2013 January 2013 December 2012 November 2012 October 2012 September 2012 August 2012 July 2012 June 2012 May 2012 April 2012 March 2012 February 2012 January 2012 December 2011 November 2011 October 2011 September 2011 August 2011 July 2011 June 2011 May 2011 April 2011 March 2011 February 2011 January 2011 December 2010 November 2010 October 2010 September 2010 August 2010 July 2010 February 2010 Products vgmc & Downloads Help Me Choose Download Library Drivers HMI & SCADA Software Add-Ons vgmc Dream Report Third Party Products Services Security Hotfix vgmc Updates Sample Applications OEE Dashboard Demo Communications Examples Documentation
Case Studies News Corporate Blog Employee vgmc Blog Press Releases Literature Industries Case Studies Oil & Gas Water and Wastewater vgmc Building Automation Semiconductor and Electronics Detention Systems Packaging Wind Power Solar Power Automotive Pharmaceutical vgmc Food and Beverage Company Our Location Awards Associations Careers vgmc Events Legal Support Email Directory


When the framework is finally complete, InduSoft is intended to provide an overview of what this wi


Products & Downloads gold rate in dubai Help Me Choose Download Library Drivers HMI SCADA Software & Add-Ons Services Security Hotfix gold rate in dubai Updates Sample Applications Communications Examples Demos Documentation Documentation Technical Notes Application Notes Case Studies White Papers Marketing News Blog Corporate gold rate in dubai Employee Blog Press Releases Literature Industries Oil & Gas and Water Wastewater Building Automation Semiconductor and Electronics Detention Systems Packaging Windpower Solar Power Automotive Pharmaceutical Food and Beverage Company Our Location Contact Us Awards Associations Careers Events Cool Support Email Directory Licensing Forums Video Library Training On Site Training Online Training gold rate in dubai Videos Partners Distributors Certified System Integrators Certified Hardware Channel Partners Educational Partners Store Free Add-ons Third Party Add-Ons Sample Applications Post navigation Previous Next 3 NIST Cybersecurity Framework Workshop
InduSoft attended the third NIST Cybersecurity Framework Workshop held at UC San Diego from 10 to 12 July. Since the second workshop held in Pittsburgh at Carnegie Mellon University, NIST has, with what they call "Big Brain" followed all the suggestions and contributions provided by the participants of the last workshop, in addition to suggestions sent to the cyberframework email @ nist .gov. The objective of the third workshop was to fill the gaps and start working on framework for this to be applied in the real world. So far, more than 2,500 people and organizations sent suggestions and recommendations. We estimate that more than 500 people attended the workshop in San Diego. It was suggested by NIST that the participants were "Best of the Best" thinkers representing industry, science, government and education, and that everyone was becoming embassadores the Cybersecurity Framework.
This set of workshops was created by NIST in response to task set by the Executive Order 13636 (http://www.gpo.gov/fdsys/pkg/FR-2013-02-19/pdf/2013-03915.pdf) describing the need for scalable security framework that can be applied to a critical infrastructure (for our readers, this usually means all industrial control systems, SCADA and HMI systems and devices) that will help them safely owners and operators and consciousness of security holes that may exist within their own companies, regardless of size. The order allowed 240 days for it to be established framework. Although this order of destination to the United States, it is very likely that other agencies around the world begin to use this framework for infrastructure and cyber security standards of their countries. The executive order does not provide NIST resources to enforce the framework. Public adoption is to be entirely voluntary, however, several federal government agencies within the jurisdiction of this order will certainly be asked to implement the framework's gold rate in dubai recommendations.
The plenary sessions on days 1 and 2 were carried out in the auditorium Mandeville, large enough to accommodate all the people, and were available for live viewing, and are added in http://www.nist.gov website. After the plenary sessions, the group was divided into smaller groups, where they spent most of the time discussing the framework. All these sessions were recorded and had an expert on the framework gold rate in dubai for the clarification and abstract points could be discussed in context. gold rate in dubai The information provided by participants will be compiled by the "Big Brain" on common themes and areas of need, along with filling the gaps that have been discovered. On the second day was discussed some of the common themes that emerged and the gaps that were discovered as a result of the discussions, and all the information was compiled. gold rate in dubai
This was a representative of Capitol Hill in our group, and on Thursday he gave us his views on the future of the Framework. He suggested that the framework will not be adopted voluntarily and that various regulatory agencies that oversee the critical vertical industries will begin to sort it into law, and that Congress was ready to act immediately because of the nature of cyber threats received in the USA. In addition, a lawyer, also in our group said that probably the insurance agencies would use this framework as a method of establishing gold rate in dubai secure compliance with its various risks insured companies.
When the framework is finally complete, InduSoft is intended to provide an overview of what this will mean and how it can be used by our users to reduce or minimize the risk of cyber security within their organizations.
The fourth and final NIST Cybersecurity Framework Workshop held in Dallas in Univer