Simple Steps to Avoid Phishing..

Phishing is an increasingly common type of spam that can lead to theft of your personal details such as credit card numbers or online banking passwords.

Phishing attacks work by the scam artist sending “spoofed” emails that appear to come from a legitimate website that you have online dealings with such as a bank, credit card company or ISP — any site which requires users to have a personal identity or account. The email may ask you to reply with your account details in order to “update security” or for some other reason.

The phishing email may also direct you to a spoofed website or pop-up window which looks exactly like the real site, but has been set up for the sole purpose of stealing personal information. Unsuspecting people are then often fooled into handing over credit card numbers, passwords or other details.

According to the Anti-Phishing Working Group, Phishers are able to convince up to five percent of recipients to respond.

How to protect yourself:

  • Never respond to emails that request personal financial information

Banks or e-commerce companies generally personalize emails, while phishers do not. Phishers often include false but sensational messages (“urgent – your account details may have been stolen”) in order to get an immediate reaction. Reputable companies don’t ask their customers for passwords or account details in an email. Even if you think the email may be legitimate, don’t respond – contact the company by phone or by visiting their website. Be cautious about opening attachments and downloading files from emails, no matter who they are from. Sophos uses SPF (Sender Policy Framework). This is an anti-forgery solution which involves publishing a list detailing which servers are allowed to send Sophos emails.
·Visit banks’ websites by typing the URL into the address bar
Phishers often use links within emails to direct their victims to a spoofed site, usually to a similar address such as mybankonline.com instead of mybank.com. When clicked on, the URL shown in the address bar may look genuine, but there are several ways it can be faked, taking you to the spoofed site. If you suspect an email from your bank or online company is false, do not follow any links embedded within it.
·Keep a regular check on your accounts
Regularly log into your online accounts, and check your statements. If you see any suspicious transactions report them to your bank or credit card provider.
·Check the website you are visiting is secure
Before submitting your bank details or other sensitive information there are a couple of checks you can do to help ensure the site uses encryption to protect your personal data:
Check the web address in the address bar. If the website you are visiting is on a secure server it should start with “https://” (“s” for security) rather than the usual “http://”.
Also look for a lock icon on the browser’s status bar. You can check the level of encryption, expressed in bits, by hovering over the icon with your cursor. Note that the fact that the website is using encryption doesn’t necessarily mean that the website is legitimate. It only tells you that data is being sent in encrypted form.

  • Be cautious with emails and personal data
    Most banks have a security page on their website with information on carrying out safe transactions, as well as the usual advice relating to personal data: never let anyone know your PINS or passwords, do not write them down, and do not use the same password for all your online accounts. Avoid opening or replying to spam emails as this will give the sender confirmation they have reached a live address. Use common sense when reading emails.
  • Keep your computer secure
    Some phishing emails or other spam may contain software that can record information on your internet activities (spyware) or open a ‘backdoor’ to allow hackers access to your computer (Trojans). Installing anti-virus software and keeping it up to date will help detect and disable malicious software, while using anti-spam software will stop phishing emails from reaching you. It is also important, particularly for users with a broadband connection, to install a firewall. This will help keep the information on your computer secure while blocking communication from unwanted sources. Make sure you keep up to date and download the latest security patches for your browser. If you don’t have any patches installed, visit your browser’s website, for example users of Internet Explorer should go to the Microsoft website.
  • Always report suspicious activity
    If you receive a suspicious email, forward it to the Concerned department.

 

What is SAP Fiori?

SAP Fiori is accumulation of applications with basic and simple involvement for comprehensively utilized SAP programming capacities that work consistently crosswise over gadgets – desktop, tablet, or cell phone.

The primary arrival of SAP Fiori incorporates 25 applications for the most widely recognized business capacities, for example, work process endorsements, data queries, and self-benefit undertakings.

SAP clients can begin with SAP Fiori quickly and convey moment incentive to every one of their representatives.The primary adaptation of SAP Fiori (accessible in May 2013) incorporates the accompanying applications.

Examples of APP :

Manager Apps – Approve Leave Request,Approve Time sheets

Employee Apps – My Leave Request,My Time sheet

With this you can Customize and make easy  the client experience (UX) for your SAP applications. Utilizing present day UX plan standards, SAP Fiori conveys a part based, shopper review client encounter over all lines of business, assignments, and gadgets.

Utilize SAP Fiori applications, or exploit new arrangements that locally consolidate the UX – for example SAP S/4 HANA, Ariba Portable, and SAP Hybrid Cloud for Client.

Fiori is a package with collection of standard business applications for common business activities. Sap Fiori apps supports multiple languages for accessing apps(Internationalization).

SAP fiori

Fiori apps supports all types of data services (odata ABAP service, Odata HANA Service, Odata External service).

For customizing and enhancing front end fiori apps the recommended tool is “SAP WEB IDE”. Both sap fiori standard and SapUI5 custom apps integrated in “SAP FIORI LAUNCHPAD”.

Fiori apps will access using,

  • Browser Via Launchpad (Mobiles/Tablet/Desktop/Laptop)
  • MobileClient via Lauchpad (Mobiles)

Fiori apps we can import fiori app from ECC ABAP UI5 Repository (server) to SAP WEB IDE TOOL. And Fiori apps are developed using sap.m Library for screen designing.

http://www.metaphornetworks.com/

SAP & Alibaba team up on cloud services

SAP SE, the German based multinational software company, stated on Wednesday that it was teaming up with Alibaba, the Chinese multinational company to offer its flagship products on the Alibaba’s cloud infrastructure.

The Chief Executive of SAP AG Bill McDermott said the group would offer its SAP Cloud and S/4 HANA Cloud Platform products via Alibaba, enabling companies in China run their business processes using an Infrastructure as a Service (IaaS model).

SAP, Europe’s most valuable technology company, also cooperates with U.S. cloud providers as it encourages clients to make a transition away from running its software on on-site servers to remote data centres.

It recently launched a new marketing suite, called C/4 HANA, which competes directly with cloud-based U.S. rival Salesforce.

NASA’s New Planet Hunter Telescope

NASA’s newest planet hunter telescope, the Transiting Exoplanet Survey Satellite (TESS), has now shared the first science image that it captured as part of its initial round of data collection. Part of the data from TESS’ initial science orbit includes a detailed picture of the southern sky taken with all four of the spacecraft’s wide-field cameras, NASA said in a statement on Monday. This image captures a wealth of stars and other objects, including systems previously known to have exoplanets.

 

“In a sea of stars brimming with new worlds, TESS is casting a wide net and will haul in a bounty of promising planets for further study,” said Paul Hertz, Astrophysics Division Director at NASA headquarters in Washington. “This first light science image shows the capabilities of TESS’ cameras, and shows that the mission will realize its incredible potential in our search for another Earth,” Hertz said.

 

TESS acquired the image using all four cameras during a 30-minute period on August 7, NASA said. The images include parts of a dozen constellations, from Capricornus to Pictor, and both the Large and Small Magellanic Clouds, the galaxies nearest to our own.

 

This swath of the sky’s southern hemisphere includes more than a dozen stars we know have transiting planets based on previous studies from ground observatories,” said George Ricker, TESS principal investigator at the Massachusetts Institute of Technology’s (MIT) Kavli Institute for Astrophysics and Space Research in Cambridge.

 

TESS’s cameras monitor large swathes of the sky to look for transits. Transits occur when a planet passes in front of its star as viewed from the satellite’s perspective, causing a regular dip in the star’s brightness. TESS builds on the legacy of NASA’s Kepler spacecraft, which also uses transits to find exoplanets. Its target stars are 30 to 300 light-years away and about 30 to 100 times brighter than Kepler’s targets, which are 300 to 3,000 light-years away.

 

The spacecraft launched from NASA’s Kennedy Space Center in Cape Canaveral, Florida, on April 18 aboard a SpaceX Falcon 9 rocket and used a flyby of the Moon on May 17 to head toward its science orbit. It started collecting scientific data on July 25 after a period of extensive checks of its instruments, NASA said.

Information Technology Capsule

The technology implementation not only connects with IT infrastructure but also with the end users. Therefore, there has to be in sync with the implementation & message together. As we all know that we are migrating our existing messaging system to Google mail Apps, which is part of the cloud.

Cloud Base Technology :Cloud base technology is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). We can access the application Anywhere, Anytime, Anyplace (AAA) via Internet, for which we have preferred to implement.

What’s Google AppsGoogle Apps is a suite of web-based messaging and collaboration applications that Google hosts on their own servers. Google provides these applications as a “service,” rather than as software to download and install. To access these applications, you simply use a web browser on a computer that’s connected to the Internet.

Key Benefits of Google Apps :

  • Cost Effectiveness and Saving— All your email will be stored securely on Google’s servers, so we’ll no longer need to maintain Email servers/client on-site.
  • Ability to consolidate our platforms– Easy to migrate all our emails, contacts, calendar.
  • Access to services from anywhere, anytime— A key benefit of the Google-hosted solution is that we can access email, contacts, and calendar from any computer or mobile device with an Internet connection, anywhere in the world
  • Two Step Authentication– Two step verification adds an extra layer of security to your users’ Google Apps accounts by requiring them to enter a verification code provided to your mobile via SMS in addition to your username and password, when signing in to their account which protect a user’s account from unauthorized access should someone manage to obtain their password, even if a password is cracked, guessed, or otherwise stolen.

Gmail — Email with Google-powered search, 25GB of storage, offline support, custom email addresses, and much more.

  • Instant messaging— Because Google Apps includes Google Talk, we can now implement an instant messaging system for our company.

Gtalk — You can communicate instantly using chat with your co workers right from the Email interface.

Google Docs — Google docs which are like an online office suite allowing individual to use any and all documents online. There is access to these pages and data from anywhere in the world and at all times.

Calendar— Easily schedule meetings at times that work for everyone, get meeting reminders, and share calendars.

Google Drive — Google Drive allows you to store your files in the cloud, share them, and have access to them from anywhere.

Team Web Sites — With Google Sites, your team can quickly publish a robust internal web site on which to gather all sorts of shared information, such as documents, spreadsheets, presentations, files, and videos. You can even embed Google calendars and other gadgets on your site!

Powerful Video Sharing — Using Google Video for business, you can easily share videos with your team or throughout the company for a whole new level of communication and collaboration.

What SAP HANA is all about?

SAP HANA is developed in a way to process structured data from relational databases, be it SAP or non-SAP, and applications and other systems in fastest way. It is capable of using three styles of data replication based on the source of the data – Trigger based, ETL based & log-based. The repositioned data is stored directly in memory. Due to this, one can gain access to the data quickly in real time by the applications that use HANA.

SAP HANA supports various use cases for real-time analytics. Some examples include:

  • Fraud detection and security
  • Monitoring and optimization of telecommunications network
  • Energy use optimization and monitoring
  • Supply chain and retail optimization
  • Forecasting and profitability reporting