|
The PHP development team announces the immediate availability of PHP 5.3.29. This release marks the end of life of the PHP 5.3 series. Future releases of this series are not planned. All PHP 5.3 users are encouraged to upgrade to the current stable version of PHP 5.5 or previous stable version of PHP 5.4, which are supported till at least 2016 and 2015 respectively.PHP 5.3.29 contains about 25 potentially security related fixes backported from PHP 5.4 and 5.5.For source downloads of PHP 5.3.29, please visit our downloads page. Windows binaries can be found on windows.php.net/download/. The list of changes is recorded in the ChangeLog.For helping your migration to newer versions please refer to our migration guides for updates from PHP 5.3 to 5.4 and from PHP 5.4 to 5.5.
|
|
|
Full View / NID: 50958 / Submitted by: The Zilla of Zuron
|
|
The world’s biggest gaming show is bigger than ever. Gamescom’s organizers estimate the show will draw more than 375,000 this year. That’s well over the 350,000 who trekked to Cologne, Germany for last year’s show. And our booth is right in the middle of the madness. Our new SHIELD Tablet — which goes on sale… Read More
|
|
|
Full View / NID: 50951 / Submitted by: The Zilla of Zuron
|
|
The PHP development team announces the immediate availability of PHP 5.3.29. This release marks the end of life of the PHP 5.3 series. Future releases of this series are not planned. All PHP 5.3 users are encouraged to upgrade to the current stable version of PHP 5.5 or previous stable version of PHP 5.4, which are supported till at least 2016 and 2015 respectively.PHP 5.3.29 contains about 25 potentially security related fixes backported from PHP 5.4 and 5.5.For source downloads of PHP 5.3.29, please visit our downloads page. Windows binaries can be found on windows.php.net/download/. The list of changes is recorded in the ChangeLog.For helping your migration to newer versions please refer to our migration guides for updates from PHP 5.3 to 5.4 and from PHP 5.4 to 5.5.
|
|
|
Full View / NID: 50950 / Submitted by: The Zilla of Zuron
|
|
Virus definition, or DAT, files contain up-to-date virus signatures and other information that our anti-virus products use to protect your computer against thousands of computer viruses and other potentially harmful software in circulation. Hundreds of new threats appear each month. Every week, we release new DAT files. We also release new DAT files when any threat is assessed by AVERT to have a medium or higher risk.
|
|
|
Full View / NID: 50948 / Submitted by: The Zilla of Zuron
|
|
Exquisite craftsmanship. Insanely small tolerances. Beautiful materials. Whoever says art is dead has never worn a luxury watch. The challenge: showing all these details to potential buyers from the inside out. The answer: a virtual reality experience that lets users play with a watch – inside and out – as if they were holding it… Read More
|
|
|
Full View / NID: 50947 / Submitted by: The Zilla of Zuron
|
|
Imagine a filmmaker, tablet in hand, walking through a live-action set and recording actors as they perform, while simultaneously seeing fluid updates of computer-generated elements within the shot. Imagine no more. At SIGGRAPH this week, we’re demonstrating virtual camera technology that does just that. Virtual camera technology is powerful stuff, but until recently was primarily… Read More
|
|
|
Full View / NID: 50946 / Submitted by: The Zilla of Zuron
|
|
With the help of NVIDIA engineers, Dolby has put Epic’s “Elemental,” Unreal Engine 4 demo on its new “extended dynamic range,” or EDR, display. The result is stunning.
|
|
|
Full View / NID: 50945 / Submitted by: The Zilla of Zuron
|
|
REDMOND, Wash.
—
August 14
, 2014 —
Saudi Airlines
, among the largest airlines in the Middle East, has implemented a business intelligence (BI) solution with Microsoft Corp. that includes Microsoft SQL Server 2012, Power BI for Office 365, Windows Server 2012 and Microsoft SharePoint Server 2013 to analyze, visualize and share data in a unified way, which allows the company to have better business visibility, more engaged employees, and projected savings of millions of dollars per year in the process. This deployment is helping the company gain insight to better manage different aspects of the global aviation operations, and once totally completed, it will also provide management with the necessary consolidated insights into subsidiaries such as Saudi Cargo, Saudi Catering and Saudi Ground Services, and is uniting business information spanning across multiple systems at the airline.
“Before we worked with Microsoft, we had scattered information everywhere. We had many different business intelligence and incentive solutions, separate training and no standard platform to run all the environments,” said Muhammad Albakri, executive vice president of Finance, Saudi Airlines. “The new BI solution from Microsoft maximizes the value of information coming from multiple systems. We’ve started to run analyses and provide results to executives to help them track trends and react quickly and proactively.”
Beginning in 2007, Saudi Airlines spent five years on a major overhaul of its IT infrastructure to automate and integrate the airline’s core planning, scheduling, marketing and sales — including e-commerce, operations and back-office functions. It needed a business intelligence solution that could provide an integrated view of its data across its growing and expanding operations. By working with Microsoft Consulting Services, Saudi Airlines was able to implement the foundation of its business intelligence solution in just 90 days, which provided fast payback time to recoup the investment. The solution is able to pull disparate data together for multiple sources for analysis, and provides dynamic dashboards, enterprise reports and customer reports that allow executives to view any subset of information and any level of detail they require. In addition, the airline is using a Windows 8.1 app to give a consolidated view of the data for its highly mobile workforce.
Since the implementation, the airline is seeing improved operational functions, such as passengers sales, revenue accounting, customer service, marketing and fraud prevention, which has increased Saudi Airline’s overall efficiencies globally and saved millions of dollars annually.
With highly flexible, rich information now readily available through its business intelligence solution, Saudi Airlines has clear visibility into everything going on within its business, with its customers and in the marketplace, giving the airline a strong advantage over competitors.
“For us, the new BI solution is like turning on the headlights of a car on a curvy, dark road,” Albakri said. “Without it, it really would be a sort of guessing game for how to tone our marketing or determine our pricing strategy or our service offering. So for Saudi Airlines it is a competitive advantage; it is a valuable tool.”
More information about how organizations are turning to Microsoft technology is available on the Microsoft Customer Spotlight newsroom.
Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services, devices and solutions that help people and businesses realize their full potential. Note to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://www.microsoft.com/news. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://www.microsoft.com/news/contactpr.mspx.
|
|
|
Full View / NID: 50944 / Submitted by: The Zilla of Zuron
|
|
Quarterly highlights from Confirmit include successful Confirmit Community Conferences, ACE Award winners, industry recognition and new Market Research findingsLondon, UK and Oslo, Norway and New York, US: 14 August, 2014: Confirmit, the leading global solutions provider for Customer Experience, Employee Engagement and Market Research, today announced its Q2 2014 highlights. This quarter, Confirmit celebrated its customers' achievements through the 2014 Confirmit ACE Awards. Established in 2005, the ACE Awards recognise Confirmit clients who demonstrate excellence...
Source: RealWire
|
|
|
Full View / NID: 50943 / Submitted by: The Zilla of Zuron
|
|
The Official Pattern Release or OPR is Trend Micro's latest compilation of patterns for identified viruses. It is guaranteed to have passed a series of critical tests to ensure that customers get optimum protection from the latest virus threats.
|
|
|
Full View / NID: 50942 / Submitted by: The Zilla of Zuron
|
|
Virtual reality headsets. Huge high-definition displays. Exotic motion-capture systems. There’s nothing the graphics pros at the annual SIGGRAPH conference in Vancouver this week haven’t seen. So it was a bit of a surprise to find show attendees crowding around a demo of a tablet app. But this is no ordinary tablet – and no ordinary… Read More
|
|
|
Full View / NID: 50941 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important Revision Note: V1.1 (August 13, 2014): Revised bulletin to correct the Update FAQ that addresses the question, Will these security updates be offered to SQL Server clusters? Summary: This security update resolves two privately reported vulnerabilities in Microsoft SQL Server (one in SQL Server Master Data Services and the other in the SQL Server relational database management system). The more severe of these vulnerabilities, affecting SQL Server Master Data Services, could allow elevation of privilege if a user visits a specially crafted website that injects a client-side script into the user's instance of Internet Explorer. In all cases, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email.
|
|
|
Full View / NID: 50940 / Submitted by: The Zilla of Zuron
|
|
Virus definition, or DAT, files contain up-to-date virus signatures and other information that our anti-virus products use to protect your computer against thousands of computer viruses and other potentially harmful software in circulation. Hundreds of new threats appear each month. Every week, we release new DAT files. We also release new DAT files when any threat is assessed by AVERT to have a medium or higher risk.
|
|
|
Full View / NID: 50939 / Submitted by: The Zilla of Zuron
|
|
If you want to make a splash in the world of computer graphics, there’s no better place to do it than SIGGRAPH, where thousands of top artists and designers from more than 100 countries gather each year. This year, in Vancouver, they’re all getting the first chance to get their hands on a game-changer for… Read More
|
|
|
Full View / NID: 50938 / Submitted by: The Zilla of Zuron
|
|
Combination of leaders in cloud-based project collaboration and enterprise PPM fulfils "No Matter How You Work" vision and redefines portfolio and resource managementREADING - Aug 13, 2014 - Planview® has acquired project collaboration company Projectplace to significantly expand its offerings in the portfolio and resource management market. Based in Stockholm, Projectplace is a pioneer in cloud-based project collaboration, serving almost one million users during its 15 years in the market. The new Planview, combining for...
Source: RealWire
|
|
|
Full View / NID: 50937 / Submitted by: The Zilla of Zuron
|
|
13 August, 2014 - London - Secure I.T. Environments Ltd, one of the UK's leading designers and builders of modular data centres, has today announced that it has won the tender process for a new data centre at The Queen Elizabeth Hospital King's Lynn NHS Foundation Trust.The new data centre, which will have a footprint of 80 square metres, will support the hospital in the delivery of essential services to support patient care, and services...
Source: RealWire
|
|
|
Full View / NID: 50936 / Submitted by: The Zilla of Zuron
|
|
Silver Peak Unity shines light on shadow ITAug 13, 2014 - Silver Peak today unveiled Unity, a groundbreaking intelligent wide area network (WAN) fabric that unifies the enterprise network with the public cloud. Unlike traditional WAN optimisation solutions, Unity correlates information about cloud services and Internet "weather" to intelligently route traffic over a secure, optimal path. By keeping SaaS and IaaS traffic on the Unity fabric, IT gains an ability it's never had: the ability...
Source: RealWire
|
|
|
Full View / NID: 50935 / Submitted by: The Zilla of Zuron
|
|
Growth has been supported by investment in new sales, marketing and support staffSan Mateo - August 13, 2014 - Searchmetrics, the leading global enterprise search experience optimization platform, today announced that global orders for its software increased by more than 200% Year over Year in the first half of 2014 as business leadership becomes increasingly aware of the importance of having a strong presence in organic search. In the USA, the company has invested in...
Source: RealWire
|
|
|
Full View / NID: 50934 / Submitted by: The Zilla of Zuron
|
|
Partnership Enables Smaller Companies to Leverage Advanced BI Solutions Without Necessitating the Involvement of IT New York, NY - August 13, 2014 - Information Builders, a leader in business intelligence (BI) and analytics, information integrity and integration solutions, today announced its partnership with Arrow Enterprise Computing Solutions, a global provider of business computing solutions. The company will distribute Information Builders' WebFOCUS Express offering, a solution designed to deliver the advanced BI benefits enjoyed by large...
Source: RealWire
|
|
|
Full View / NID: 50933 / Submitted by: The Zilla of Zuron
|
|
The Official Pattern Release or OPR is Trend Micro's latest compilation of patterns for identified viruses. It is guaranteed to have passed a series of critical tests to ensure that customers get optimum protection from the latest virus threats.
|
|
|
Full View / NID: 50932 / Submitted by: The Zilla of Zuron
|
|
PerfectDisk® 13 provides Windows 8.1 support, up to 20% faster optimization for HDDs and SSDs, increased flexibility with customized scheduling, plus enhanced SSD recommendations and reporting.
|
|
|
Full View / NID: 95593 / Submitted by: TACKtech Team
|
|
Severity Rating: Important Revision Note: V1.0 (August 12, 2014): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft OneNote. The vulnerability could allow remote code execution if a specially crafted file is opened in an affected version of Microsoft OneNote. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
|
|
|
Full View / NID: 50955 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Critical Revision Note: V2.0 (August 12, 2014): Rereleased bulletin to announce the offering of update 2881071 to replace update 2767915 for systems running Microsoft Office 2010 Service Pack 1 or Microsoft Office 2010 Service Pack 2. See the Update FAQ for details. Summary: This security update resolves two privately reported vulnerabilities in Microsoft Windows, Microsoft Office, and Microsoft Lync. The vulnerabilities could allow remote code execution if a user opens a specially crafted file or webpage. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
|
|
|
Full View / NID: 50952 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important Revision Note: V1.0 (August 12, 2014): Bulletin published. Summary: This security update resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities.
|
|
|
Full View / NID: 50931 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Critical Revision Note: V1.0 (August 12, 2014): Bulletin published. Summary: This security update resolves one publicly disclosed and twenty-five privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
|
|
|
Full View / NID: 50930 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Critical Revision Note: V1.0 (August 12, 2014): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file that invokes Windows Media Center resources.
|
|
|
Full View / NID: 50929 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important Revision Note: V1.0 (August 12, 2014): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker uses the vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability, that takes advantage of the ASLR bypass to run arbitrary code.
|
|
|
Full View / NID: 50928 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important Revision Note: V1.0 (August 12, 2014): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow security feature bypass if a user visits a specially crafted website. In a web-browsing attack scenario, an attacker who successfully exploited this vulnerability could bypass the Address Space Layout Randomization (ASLR) security feature, which helps protect users from a broad class of vulnerabilities. The security feature bypass by itself does not allow arbitrary code execution. However, an attacker could use this ASLR bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability, that could take advantage of the ASLR bypass to run arbitrary code.
|
|
|
Full View / NID: 50927 / Submitted by: The Zilla of Zuron
|
|
Virus definition, or DAT, files contain up-to-date virus signatures and other information that our anti-virus products use to protect your computer against thousands of computer viruses and other potentially harmful software in circulation. Hundreds of new threats appear each month. Every week, we release new DAT files. We also release new DAT files when any threat is assessed by AVERT to have a medium or higher risk.
|
|
|
Full View / NID: 50926 / Submitted by: The Zilla of Zuron
|
|
Advanced Installer 11.4.1 was released on August 12th, 2014
|
|
|
Full View / NID: 50925 / Submitted by: The Zilla of Zuron
|