(The Hosting News) – Serotek Corporation, the leading provider of accessible multi platform and cloud-based solutions accessible from anywhere, is proud to announce the release of DocuScan Plus™. This innovative software requires no drivers and allows anyone to scan and read documents in an accessible format from any computer. Serotek will be demonstrating DocuScan Plus at the 2011 International Consumer Electronics Show (CES) in Las Vegas, Nevada, January 6 – 9.

DocuScan Plus offers high-quality optical character recognition (OCR), to convert the printed page to text. This self-voicing application can read both printed pages from a Twain-compliant scanner, as well as many types of PDF files, including those containing text or those containing only images. It also supports scanners with duplex and automatic document feeder (ADF) capabilities.

The software converts scanned documents to MP3 audio files for playback on many portable devices, and can even convert scanned materials into the popular DAISY format.

For low vision users, DocuScan Plus allows full screen magnification for the reading of scanned text. This magnification option, when combined with the self-voicing features of DocuScan Plus, allows documents to be comfortably read from the screen as well as via text-to-speech. Materials can also be saved in large print format so documents can be scanned, printed, and shared with friends or viewed offline under a Video magnifier.

“With this software, Serotek has created an affordable application that takes into account the way people access the printed word in the 21st century,” said Mike Calvo, CEO, Serotek Corporation, “People don’t spend all their time on one computer, or even one device anymore, so why use software based on that model? DocuScan Plus has a feature set that is useful to everyone, including people who are dyslexic, blind, have low vision or limited mobility, and is just as easy to use from the classroom computer as it is from home; that opens a lot of doors that have been closed until now.”

The DocuScan Plus software can be used as an installed program from your personal computer, or it can be accessed from any computer by visiting http://www.DocuScanPlus.com. The program may be purchased for less than one third the cost of previous scanning solutions.

Other features included are:

  • Save to Kindle™: Wirelessly Transfer scanned documents to the Amazon Kindle for reading on the go using the Kindle’s built in text-to-speech function.
  • Braille Conversion: DocuScan Plus contains Braille translation options, allowing you to convert your scanned pages and PDF files into a variety of different Braille formats based on the translation table of your choice.
  • Export Scanned Text: Save documents and materials to a computer or portable DAISY player for offline reading.
  • Encrypted Online Storage: Save documents securely to the cloud and retrieve them from anywhere.
  • Additional Synthesizer Support: Choose from a variety of synthesizers for use with this self-voicing application.
  • Additional Support for Mobile Platforms: DocuScan Plus will support some external camera and mobile phone platforms. This functionality comes free with DocuScan Plus and it is currently scheduled for release in the first quarter of 2011.

DocuScan Plus may be used independently of any other Serotek software. The application can allow persons to read the printed page with any Windows-based computer, regardless of whether any access technology has been installed or is currently running.

For more information, visit booth number 35955 on the second floor of the south hall at CES 2011, or contact Serotek Corporation at (612) 246-4818, sales(at)serotek(dot)com or visit http://www.docuscanplus.com.

Serotek Corporation

Serotek Corporation is a leading technology company that develops software and manufactures accessibility solutions under the System Access brand. Committed to the mission of providing accessibility anywhere, Serotek began with the launch of the first online community specifically designed to meet the needs of people with visual impairment. Since then, Serotek has introduced several powerful, affordable solutions that require minimal training and investment. For more information, visit http://www.serotek.com.

Source: Serotek Releases DocuScan Plus Software

 

(The Hosting News) – Cloud computing services are finally coming down to earth for small businesses thanks to Microsoft and IT support partners like eMazzanti Technologies in the New York City area. A new video featuring, Microsoft’s Stijn Hendrikse, Director SMB, emphasizes the concierges-level service eMazzanti delivers to a wide variety customers locally and globally.

“Cloud computing delivers the promise of enterprise-level features at a small-business price point,” said Hendrikse. “And we rely on partners like eMazzanti to make cloud computing capabilities a reality for small companies. We simply can’t do it without them.”

How Cloud Computing Can Reduce Costs
Most small and medium size businesses are very interested in reducing costs where ever possible. Public or private cloud computing solutions are worth investigating. Broadly speaking, Cloud Computing can benefit your company in the following ways:

  • Lower up-front investment
  • Dynamic scalability
  • Enrich experiences across PCs, phones and browser
  • Rapid deployment
  • Distributed disaster recovery scenarios
  • Reputation-based technologies (technologies that come from major providers)

More specifically, public or private-based Cloud Computing can, for example, help reduce IT costs. Below are five additional ways of doing so. The public cloud model often has the potential to deliver the most dramatic cost savings:

  • Pay as you go. This is perhaps the most compelling of any cloud value message. By moving applications and workloads to a public cloud platform, internal IT staff can instantly adjust resources up or down, depending on the immediate needs of any particular workload.
  • Control server proliferation. Placing workloads in the cloud means those workloads no longer require dedicated server capital investments. While the cloud isn’t free, running applications cloud-based servers allows the possibility of reducing or eliminating that cost.
  • Data center cost reductions. Fewer servers mean a smaller data center footprint. That translates to direct savings on real estate, power, and cooling. It also translates to indirect savings on business continuity and facilities maintenance. Even though these savings extend to the private cloud model, the public cloud model offers small and medium-size businesses the possibility of eliminating the need for a data center.

But as the new shift in cloud computing expands, businesses will likely see a combination of private and public cloud models become the most popular implementation. This combination provides the most flexible IT infrastructure and has compelling costs savings of its own:

  • Virtualization Decreases IT Costs. Scaling infrastructure to meet new workload demands, maintaining physical security, and software deployment and patching are just a few examples of costly IT management tasks that are decreased significantly by running a virtualized infrastructure.
  • IT as a Service Decreases IT Costs. Private or hosted private clouds allow users to provision many IT services on their own through self-service portals. Significant savings can result on common help desk calls and other IT management tasks like procurement and server configuration.

Getting Started

Accurately forecasting potential savings from cloud computing means a careful accounting of current and future IT expenditures then working with experienced IT support and cloud computing providers to determine the optimum solution for a particular business.

“Most companies are naturally uncomfortable with new technology,” said Hendrikse. “But Microsoft Gold Partners like eMazzanti invest a tremendous amount of effort to make sure their customers are trained to rapidly see significant productivity gains-especially with cloud-based services.”

A new publication from eMazzanti entitled: How Does Cloud Computing Work? is a snapshot of what cloud computing is and how it can make a difference for small or medium sized businesses. A free copy can be downloaded at: http://www.emazzanti.net/how-does-cloud-computing-work.

About eMazzanti Technologies

With a company name that sounds more like a purebred, high-performance sports car than a IT support and consulting firm, eMazzanti Technologies is all about delivering powerful solutions such as computer network management, network troubleshooting, business continuity and disaster recovery, green computing, mobile workforce technology, cloud computing, cloud computing services, and business information optimization in the most efficient manner possible. The Hoboken, N.J., firm is located in one of the most densely populated – and competitive – regions in the U.S. It provides business technology consulting services for companies ranging from home offices to multinational corporations throughout the New York metropolitan area and in three countries. For more information contact: Carl Mazzanti 201-360-4400 or emazzanti.net

Source: Microsoft Praises eMazzanti for Small Business Cloud Computing

 

(The Hosting News) – Under this promotion a web master can transfer any number of .COM, .NET, .ORG, .INFO, .EU, and .US domains by paying a mere sum of $0.99. Under this promotion, Gossimer will be adding one year to the domain registration of every domain transferred in from other domain registrar. The promotion will start on 00:01 hrs. (EST), December 31, 2010 and run till the midnight 00:00 hrs. (EST), January 01, 2011. The special pricing will be applicable to the first 10,000 transferred-in domains only, once the 10,000 mark is reached the promotion will end even if it is within the first few hours of the promotion.

“We are quite happy with the way Gossimer has evolved in 2010. Throughout the year we helped our customers save hundreds of dollars through numerous domain name and web hosting promotions. We decided to close this year with a bang,” said Marvin Dreyer, CEO of Gossimer, “The $0.99 domain transfer in promotion will help web masters pocket hundreds of dollars, which they can use to grow their businesses online. This promotion could be seen as an indication to the hottest domain name and web hosting promotion Gossimer has to offer in 2011.”

To be eligible for the special pricing a web master need not complete the transfer on December 31, 2010. All he has to do is to order the transfer and pay the invoice during the promotion period stated above. Orders with unpaid invoices will not be eligible for the promotion.

2010 has been a particularly happening year for Gossimer. In the very beginning, the company has moved its base from New Jersey to Melbourne, Florida. Working on 3S principle (Secure, Stable, and Swift) of web hosting, of late, the company has installed a seven-layer security system on its servers to protect all the web hosting accounts and domain names from malicious attacks. Gossimer has fortified its datacenter, network, host, software, application, personal, and audit processes. While devising the security system, the company has also factored in human errors.

2010 was quite an exciting year for the web hosting and domain name registration industry. Seeing the developing train, it does not take a genius to understand where it will head in 2011. Gossimer seems quite geared up for the challenge. Its good bye for 2010 and welcome to the bright and sunny 2011. Gossimer wishes a Happy New Year to you all!

About Gossimer, LLC

Gossimer is a full-feature, fastest growing domain name registration and webhosting company. Since 2001, Gossimer is providing web hosting, email hosting, and domain registration services from New Jersey. The company is well known for its exceptionally responsive customer support, knowledgeable technical support, server uptime, and attractive web hosting packages.

For more information, please visit: http://www.gossimer.com/domain.php?action=domain_transfer

Source: Gossimer Welcomes 2011 With Domain Transfer-In Promotion

 

IDS Logic continues to deliver what it promised a few years before at the time of its inception. The motto of doing every website with ethical white hat SEO Services has stayed with the firm and is completely engrossed in every piece of it. Companies associated with IDS Logic receive this service to see their websites floating atop the search engine rankings with time with a prolonged stay up there. This is a result of the earnest effort the company puts it without resorting to malicious and illegitimate methods that promise a good opening but eventually do the site in badly. 

IDS Logic is a firm believer in Ethical White Hat SEO Services and the sentiment reflects in the service it caters with. Websites are not just websites but become sustainable growth machines once done by IDS. With all the appropriate optimization work done on them slowly with time, they grow to become a very strong force that are tough to compete with and outdo. Moreover, they establish a high level of compatibility with the search engines. This makes it next to impossible to dethrone them from the top and inflict bad reputation on them, until something really bad happens. 

Clients coming to IDS Logic are already aware of its reputation as a very suave and easy-to-work-with company. They know the company performs and delivers what is asked of it. They come with the conviction their website will only and only be done with Ethical White Hat SEO Services. They take pride in the fact their site stays clean of malicious content which could potentially bring it disrepute later on. 

As a credible service provider surviving in the industry for a long time now, IDS Logic has established itself as a pioneer championing the cause of Ethical White hat SEO Service. Not only does it practice it personally, it also propagates the same to fellow competitors. The site brings the client business and the worse to happen to it would be a harsh shove from the door towards isolation, in the form of a black listing. IDS Logic ensures this never happens to its clients by giving their site the revamp of a lifetime, a fresh lease of life along the way. 
http://www.gawkwire.com/seo_sem/ethical_white_hat_seo_services_by_ids_logic.html

 
(The Hosting News) – On December 17th, Mozilla received an email from a third party notifying the company of a file that contained user records that was posted to a public web server. The information in this file listed users email, addressses, first and last names, and MD5 password hashes.
The Company relied through an email stating “We immediately took the file off the server and investigated all downloads. We have identified all the downloads and with the exception of the thrid party who reported the issue, the file has been downloaded only by Mozilla staff.”
Since the the company has removed the passwords from their site and are asking users to reset their passwords for all content used through Mozilla. “We have identidied the process which allowed this file to be posted publicly and have taken steps to prevent this in the future. We are also evaluation pther processes to ensure your information is safe and secure” the email also declared.
Chris Lyon, directore of infrastructure security at Mozilla, said on Decemeber 27th through a blog post, that the file included 44,000 inactive accounts using older, MD5 pasword hashes. The company erased the MD5 passwords, leaving the accounts inactive. Lyon also stressed that current users employ a more secure SHA-512 password hash with per-user salts and therefore are “not at risk.”
Chester Wisniewski, senior security advisor at Sophos Canada, addresses the problems with MD5 passwprd hashes” “MD5 has cryptographic weaknesses that permit creation of the same hash from multiple strings. This permit securty experts to compute all the possible hashes and determine either your password or another string that will work even if it is not your password.” Chester commened Mozilla’s response to the incident but questions how the company accidentall published this information to begin with and why MD5 password hashes were still in the system.
“If you are a web site administrator or developer, are you still storing passwords using methods like Gawkwer(DES) or Mozilla(MD5)? We know they are broken, and it is important to migrate away from these algorithms in case you have a database accidentally make its way outside of your orginization,” Wisniewski summarized.

On December 17th, Mozilla received an email from a third party notifying the company of a file that contained user records that was posted to a public web server. The information in this file listed users email, addressses, first and last names, and MD5 password hashes.

The Company relied through an email stating “We immediately took the file off the server and investigated all downloads. We have identified all the downloads and with the exception of the thrid party who reported the issue, the file has been downloaded only by Mozilla staff.”

Since the the company has removed the passwords from their site and are asking users to reset their passwords for all content used through Mozilla. “We have identidied the process which allowed this file to be posted publicly and have taken steps to prevent this in the future. We are also evaluation pther processes to ensure your information is safe and secure” the email also declared.
Chris Lyon, directore of infrastructure security at Mozilla, said on Decemeber 27th through a blog post, that the file included 44,000 inactive accounts using older, MD5 pasword hashes. The company erased the MD5 passwords, leaving the accounts inactive. Lyon also stressed that current users employ a more secure SHA-512 password hash with per-user salts and therefore are “not at risk.”

Chester Wisniewski, senior security advisor at Sophos Canada, addresses the problems with MD5 passwprd hashes” “MD5 has cryptographic weaknesses that permit creation of the same hash from multiple strings. This permit securty experts to compute all the possible hashes and determine either your password or another string that will work even if it is not your password.” Chester commened Mozilla’s response to the incident but questions how the company accidentall published this information to begin with and why MD5 password hashes were still in the system.

“If you are a web site administrator or developer, are you still storing passwords using methods like Gawkwer(DES) or Mozilla(MD5)? We know they are broken, and it is important to migrate away from these algorithms in case you have a database accidentally make its way outside of your orginization,” Wisniewski summarized.

Source: Mozilla Addresses The Leak Of User Information

 
(The Hosting News) – On December 17th, Mozilla received an email from a third party notifying the company of a file that contained user records that was posted to a public web server. The information in this file listed users email, addressses, first and last names, and MD5 password hashes.
The Company relied through an email stating “We immediately took the file off the server and investigated all downloads. We have identified all the downloads and with the exception of the thrid party who reported the issue, the file has been downloaded only by Mozilla staff.”
Since the the company has removed the passwords from their site and are asking users to reset their passwords for all content used through Mozilla. “We have identidied the process which allowed this file to be posted publicly and have taken steps to prevent this in the future. We are also evaluation pther processes to ensure your information is safe and secure” the email also declared.
Chris Lyon, directore of infrastructure security at Mozilla, said on Decemeber 27th through a blog post, that the file included 44,000 inactive accounts using older, MD5 pasword hashes. The company erased the MD5 passwords, leaving the accounts inactive. Lyon also stressed that current users employ a more secure SHA-512 password hash with per-user salts and therefore are “not at risk.”
Chester Wisniewski, senior security advisor at Sophos Canada, addresses the problems with MD5 passwprd hashes” “MD5 has cryptographic weaknesses that permit creation of the same hash from multiple strings. This permit securty experts to compute all the possible hashes and determine either your password or another string that will work even if it is not your password.” Chester commened Mozilla’s response to the incident but questions how the company accidentall published this information to begin with and why MD5 password hashes were still in the system.
“If you are a web site administrator or developer, are you still storing passwords using methods like Gawkwer(DES) or Mozilla(MD5)? We know they are broken, and it is important to migrate away from these algorithms in case you have a database accidentally make its way outside of your orginization,” Wisniewski summarized.

On December 17th, Mozilla received an email from a third party notifying the company of a file that contained user records that was posted to a public web server. The information in this file listed users email, addressses, first and last names, and MD5 password hashes.

The Company relied through an email stating “We immediately took the file off the server and investigated all downloads. We have identified all the downloads and with the exception of the thrid party who reported the issue, the file has been downloaded only by Mozilla staff.”

Since the the company has removed the passwords from their site and are asking users to reset their passwords for all content used through Mozilla. “We have identidied the process which allowed this file to be posted publicly and have taken steps to prevent this in the future. We are also evaluation pther processes to ensure your information is safe and secure” the email also declared.
Chris Lyon, directore of infrastructure security at Mozilla, said on Decemeber 27th through a blog post, that the file included 44,000 inactive accounts using older, MD5 pasword hashes. The company erased the MD5 passwords, leaving the accounts inactive. Lyon also stressed that current users employ a more secure SHA-512 password hash with per-user salts and therefore are “not at risk.”

Chester Wisniewski, senior security advisor at Sophos Canada, addresses the problems with MD5 passwprd hashes” “MD5 has cryptographic weaknesses that permit creation of the same hash from multiple strings. This permit securty experts to compute all the possible hashes and determine either your password or another string that will work even if it is not your password.” Chester commened Mozilla’s response to the incident but questions how the company accidentall published this information to begin with and why MD5 password hashes were still in the system.

“If you are a web site administrator or developer, are you still storing passwords using methods like Gawkwer(DES) or Mozilla(MD5)? We know they are broken, and it is important to migrate away from these algorithms in case you have a database accidentally make its way outside of your orginization,” Wisniewski summarized.

Source: Mozilla Addresses The Leak Of User Information

 
(The Hosting News) – Microsoft co-founder Paul Allen refile a patent infringement lawsuit against several companies on Tuesday. This was just shy of the December 28th deadline for refiling the case given by the court. The original case had been thrown out of court in early december after U.S. District Court Judge Marsha Pechman declared that the complaint was too vague after stating “the allegations in the complaint are spartan.” The amended suit includes details that were not included into the original filing, and also hosts 40 displays showing the alleged patent infringement in action according to the Seattle Times. The companies named in the lawsuit among Apple are Google, Facebook, Office Depot, OfficeMax, Staples, Yahoo, Youtube, Netflix, and eBay.
Allen’s Interval Licensing filed the lawsuit on behalf of the Interval Research Coporation, a company Paul co-founded in 1992. Interval Research closed in 2000, but the patents are still active and under Paul Allen’s close scrutiny. The patents that Mr. Allen hope to protect outline “a broswer for use in navigating a body of information, with particular application to browsing information represented by audio visual data” an “attention manager for occupying the peripheral attention of a person in the vicinity of a display device” and a system for “alerting users to items of current interest.”

Source: Microsoft Co-founder Continues Lawsuit Against Top Tech Companies

 

Super Early Bird savings for HostingCon 2011 ends in just two days and you won’t find prices lower than this before the conference in August. Continue Reading

For all the latest HostingCon news and information, visit HostingCon – The Premier Conference and Trade Show for the Hosted Services Industry

http://www.gawkwire.com/events_html/final_days_to_save_big.html

 

Super Early Bird savings for HostingCon 2011 ends in just two days and you won’t find prices lower than this before the conference in August.

Register Today to take advantage of fantastic Super Early Bird savings before they disappear forever after 12/31/2010. How much can you save by acting now?

  • Full conference registration with lunch saves $260 on the regular registration rate. Price increases $100 on 1/1/2011!
  • Full conference registration without lunch also saves $260 on the regular registration rate. Price increases $110 on 1/1/2011!
  • Single day conference registration (either Monday, Tuesday, or Wednesday) saves $130 on the regular registration rate. Price increases $70 on 1/1/2011!
  • Exhibits only conference registration saves $40 on the regular registration rate. Price increases $20 on 1/1/2011!

You won’t find lower prices before the conference!
Register Now and Save $260 before it’s too late!

For all the latest HostingCon news and information, visit HostingCon – The Premier Conference and Trade Show for the Hosted Services Industry

 

(The Hosting News) – WikiLeaks founder Julian Assange has reportedly agreed to a deal to write his autobiography for $1.5 million.

Reports from cnet claim Assange told Britain’s Sunday Times yesterday, “I don’t want to write this book, but I have to. I have already spent 200,000 pounds for legal costs and I need to defend myself and to keep WikiLeaks afloat.”

Assange told the Sunday Times that he would land $796,654 from his U.S. publisher, Alfred A Knopf and 325,000 pounds ($501,000) from his British publisher. It is also expected that money from international sales and would bring up the total to at least $1.5 million.

Source: Assange to Write Autobiography to Help Pay Bills

© 2012 Webhosting news Suffusion theme by Sayontan Sinha