TechJournal South Header

Posts Tagged ‘Adobe’

Digital marketing budgets on the upswing

Friday, March 8th, 2013

SoDADigital marketing budgets and client investments will grow at a more intense pace from 2013-2014, according to the latest SoDA Report, one of the most widely read publications in the digital marketing world.

Its Digital Marketing Outlook survey found that:

  • More clients are “insourcing” the set-up and maintenance of currently existing digital services, while “outsourcing” their innovation needs to digital agencies. Accordingly, an impressive 40% of agency respondents have established in-house innovation labs/incubators.
  • Agencies are increasing client education and training offerings, as well as embedding specialized resources at clients’ offices.
  • Digital marketing budgets and client investments will grow at a more intense pace in 2013- 2014.
  • Most clients are migrating toward utilizing highly specialized digital agencies.
  • Agencies see significant skill gaps among clients on user experience and analytics.
  • Agencies are working harder to keep great talent and money isn’t always decisive.

In addition to the dozens of thought-provoking and cutting-edge pieces authored by SoDA members, an array of guest contributors, CMOs, editors, and other senior executives from distinguished organizations– General Mills, AdobeDollar Shave ClubMarketing WeekContagiousThe DrumThe Art Directors ClubIIT Institute of Design and Econsultancy, among others– offer insight and expertise.

Case studies showcase SoDA members’ innovative work on behalf of international brands such as GoogleAvisCoca-ColaBarneysNikeFoxSamsungIcon FitnessUnileverIntel, and Cisco.

free iPad version of The SoDA Report is currently available for download from iTunes and a free PDF copy is also available for download. Additional tablet and web-browser versions will be available shortly. Tablet editions are powered by Adobe® Digital Publishing Suite.

Java, Adobe vulnerabilities top targets for cyber crooks in 2013

Thursday, December 20th, 2012

AdobeSoftware vulnerabilities will be the main target of cyber-criminals next year, according to a list of security trends that will dominate in 2013, by PandaLabsPanda Security’s malware laboratory.

“It is undoubtedly the preferred method of infection for compromising systems transparently, used by both cyber-criminals and intelligence agencies in countries around the world,” said Luis Corrons , technical director of PandaLabs.

In 2012, Java, which is installed on hundreds of millions of devices, was repeatedly compromised and used to actively infect millions of users. Adobe, given the popularity of its applications (Acrobat Reader, Flash, etc.) and its multiple security flaws, was also one of the favorite tools for massively infecting users as well as for targeted attacks.

“Although it is assumed that home users are exposed to the highest risk, updating applications, which is essential for protecting against these types of attacks, is a very complex process for corporations who must coordinate the update among all workstations,” explained Luis Corrons . “At the same time, all the applications used in a company must work correctly. This makes the update processes slow, which opens a window that is exploited to steal information in general and launch targeted attacks in search of confidential data.”

PandaLabs predicts that other areas that will emerge in 2013 as dominant security issues are:

  • Social networks: The second most widely used technique is social engineering. Tricking users into collaborating to infect their computers and steal their data is an easy task, as there are no security applications to protect users from themselves. In this context, use of social networks (Facebook, Twitter, etc.), places where hundreds of millions of users exchange personal information, makes them the preferred hunting ground for tricking users.

Particular attention should be paid to Skype, which after replacing Messenger, could become a target for cyber-criminals.

  • Malware for mobile devices: Android has become the dominant mobile operating system. In September 2012, Google announced that it had reached 700 million Android activations. Although it is mainly used on smartphones and tablets, its flexibility and the fact that you do not have to buy a license to use it are going to result in new devices opting to use Google’s operating system. Its use is going to become increasingly widespread, from televisions to all types of home appliances, which opens up a world of possible attacks as yet unknown.
  • Cyber-warfare / Cyber-espionage: Throughout 2012, different types of attacks have been launched against nations. The Middle East is worth mentioning, where the conflict is also present in cyber-space. In fact, many of these attacks are not even carried out by national governments but by citizens, who feel that they should defend their nation by attacking their neighbors using any means available.

Furthermore, the governments of the world’s leading nations are creating cyber commandos to prepare both defense and attack and therefore, the cyber-arms race will escalate.

  • Growth of malware: For two decades, the amount of malware has been growing dramatically. The figures are stratospheric, with tens of thousands of new malware strains appearing every day. This sustained growth seems very far from coming to an end.

Despite security forces being better prepared to combat this type of crime, they are still handicapped by the absence of borders on the Internet. A police force can only act within its jurisdiction, whereas a cyber-crook can launch an attack from country A, steal data from citizens of country B, send the stolen data to a server situated in country C and could be living in country D. This can be done in just a few clicks, whereas coordinated action of security forces across various countries could take months. For this reason, cyber-criminals are still living their own golden era.

  • Malware for Mac: Cases like Flashback, which occurred in 2012, have demonstrated that not only is Mac susceptible to malware attacks but that there are also massive infections affecting hundreds of thousands of users. Although the number of malware strains for Mac is still relatively low compared to malware for PCs, we expect it to continue rising. A growing number of users added to security flaws and lack of user awareness (due to over-confidence), mean that the attraction of this platform for cyber-crooks will continue to increase next year.
  • Windows 8: Microsoft’s latest operating system, along with all of its predecessors, will also suffer attacks. Cyber-criminals are not going to focus on this operating system only but they will also make sure that their creations work equally well on Windows XP to Windows 8, through Windows 7.

One of the attractions of Microsoft’s new operating system is that it runs on PCs, as well as on tablets and smartphones. For this reason, if functional malware strains that allow information to be stolen regardless of the type of device used are developed, we could see a specific development of malware for Windows 8 that could take attacks to a new level.

More information at PandaLabs blog.


Dropbox, Blizzzard, Adobe suffered security breaches last quarter

Tuesday, December 4th, 2012

Panda SecurityThe file sharing service Dropbox, video game developer Blizzard, and Adobe all suffered security breaches in the last quarter, says PandaLabs, the antimalware laboratory of Panda Security in its quarterly report.

It reports that Dropbox suffered a huge security breach that led to theft of usernames and passwords from thousands of users.

American video game developer Blizzard confirmed in August that it had suffered a security breach where hackers were able to obtain users’ email addresses and encrypted passwords. The company urged users to change the login credentials to its online gaming service

In September, it was revealed that Adobe had also been attacked by hackers. In this case, the attackers accessed one of Adobe’s internal servers to be able to sign their malware with a valid digital certificate from the company.

Most infections are from Trojans

New malware graphicTrojans continued to account for most of the new threats created this quarter, by far. Trojans constituted 72.58 percent of all new malware, while viruses constituted 14.47 percent and worms 10.53 percent. When it comes to the number of infections caused by each malware category, the ranking supports the hierarchy of new samples in circulation, with Trojans accounting for three out of every four infections, followed by worms and viruses.

“It is obvious that malware writers have standardized their infection techniques, since what we have seen in Q3 is a continuation of the trends we saw over the first half of the year,” said Luis Corrons, technical director of PandaLabs. “Trojans once again have accounted for almost 80 percent of infections, and continue to be the preferred category for cyber-criminals to carry out information theft. All this confirms cyber-crooks’ first objective: to make money from their creations.”

China Tops List of Infections per Country
countries infected graphicThe average number of infected PCs across the globe stands at 30.68 percent. China once again takes the top spot of most infections per country (53.17 percent of infected PCs), followed by South Korea (52.77 percent), comprising the only nations with more than 50 percent of computers infected.

The list of top ten most infected countries is made up of nations from almost every part of the world: Asia, Europe, South America, and Africa. Here’s a graph representing the countries with most malware-infected computers:

Anyone fighting off bot attacks, as we have here at the TechJournal, has noted the attacks use infected machines globally. We see them from common sources: China, Russia, Ukraine, but also every European nation.

he quarterly report can be downloaded from:

Schools and colleges are turning to the cloud for convenience and IT cost-cutting (infographic)

Thursday, August 30th, 2012

cloudOne place where cloud computing applications are getting a foothold is in education.

The benefits  – access to applications anywhere and on any device and lower IT costs – appeal to many colleges and school districts.

But while IBM, Microsoft, Adobe are offering cloud based products to the education market, there is plenty of room for growth. Only about a third of higher education institutions and just over a quarter of K-12 districts were in the cloud as of May last year.

Here’s an infographic on cloud use by schools:

Going to the Cloud

Early registration for Atlanta Digital Summit ends this week

Wednesday, April 11th, 2012

Digital Summit 2012The upcoming  Digital Summit in Atlanta May 9-10 offers two jam-packed days with more than 75 speakers from  Google, Twitter, Pandora, Mashable, Huffington Post, Klout, StumbleUpon, Gilt Groupe, Adobe, The Onion, YouTube, Discovery Channel and many more. You can still grab an early registration rate to the Digital Summit but only until Friday, April 13.

What will I take away? How does my company benefit?

  • With over 50 presentations and panels to choose from you’ll be up to date with the latest digital trends & best practices.
  • More than 75 speakers from brands you know & trust provide real world scenarios and solutions to the issues you face.
  • Over 7 hours of networking makes Digital Summit a excellent and effective way to connect and make important contacts with 1,500 peers & professionals.
  • 3 hours of open bar!!! (okay, perhaps your company won’t benefit… but hey, it’s a great way to break the ice).

 Check out the ROI on how Digital Summit stacks up against other conferences and see who else might be attending.

Confirmed Speakers Include:

  • Alexis Maybank – Co-founder, Gilt Groupe
  • Joel Lunenfeld – Director of Global Brand Strategy, Twitter
  • Frederick Townes – Sr Technical Advisor, Mashable
  • Tim Mahlman – Chief Revenue Officer, Klout
  • Loni Kao Stark – Group Solutions Manager, Digital Marketing, Adobe
  • John Trimble – Chief Revenue Officer, Pandora
  • Michael Greer – Chief Product Officer, The Onion
  • Simon Heseltine – Director of SEO, AOL/Huffington Post
  • Catherine Cook – Co-founder, myYearbook
  • David Perry – Business Development, Software & Services, Google
  • Jack Krawczyk – Senior Product Marketing Manager, StumbleUpon 
  • Prerna Gupta – CEO, Khush
  • Chidi Afulezi – Product Director, Turner
  • Ro Choy – COO, Formspring
  • Tom Lowry – Director of Technology, YouTube
  • Michael Bayle – Senior Vice President, ESPN Mobile
  • Amanda Steinberg – Founder & CEO, DailyWorth
  • Ian Wolfman – Principal & CMO, imc²
  • Jeff Ragovin – Co-Founder & Chief Strategy Officer, Buddy Media
  • Matt Crenshaw – VP of Marketing & Analytics, Discovery Channel
  • Matt Peters – Co-Founder & Creative Director, Pandemic Labs
  • Laurie Hood – Vice President of Product Marketing, Silverpop
  • Bryon Morrison – President, Mobile Marketing, The Marketing Arm
  • Tony Haile – CEO, Chartbeat
  • Eric Orme – Chief Technology Officer, Remark Media
  • Kurt Krejny – Director of Online Marketing, Fathom
  • Sean Cook – CEO, ShopVisible
  • Jordan Franklin – Director of Social Strategy, Clickable
  • Grey Garner – Market Strategist, Emma
  • Barry Nelson – Social Media Analyst, Microstrategy
  • John Lawson – Founder,
  • Todd Sawicki – Chief Marketing Officer, Cheezburger Network
  • Adam Harrell – Founder & President, nebo
  • Brianne Keating Forst – Director of Ecommerce, Plow & Hearth
  • Gavin Finn – President & CEO, Kaon Interactive
  • Amy Ellis – Head of Integrations & Partnerships, MailChimp
  • Kevin Lee – CEO, Didit
  • Michael Loban – CMO, InfoTrust
  • Joey Sargent – Principal, BrandSprout
  • Mick Winters – SVP, E-commerce, National Builder Supply
  • Kelly Quattlebaum – Social Media Trainer & President, Global Marcoms
  • Jenny Schmitt – President & Senior Spark, CloudSpark
  • Joseph Dickerson – User Experience Architect, Fiserv
  • Efi Rodik – Co-Founder & CEO, Relevantor
  • Richard White – Creative Director, Sojo
  • Maria Peagler – Founder,
  • J Cornelius – VP Operations, CoffeeCup Software
  • Garrett Kuk – Social Media Strategy Partner, Speakeasy Media
  • Anthony Franco – President & Co-founder, EffectiveUI

Digital Summit 2012 is presented by TechMedia, the Southeast and Mid-Atlantic’s Leader in Digital and Entrepreneurial Conferences. The TechJournal is a TechMedia division.

Intel, Apple, Cisco, provide top tech experience & products, report says

Tuesday, March 6th, 2012

IntelIntel, Apple, and Cisco, provide the best product and relationship experience in the tech industry, according to a  new research report published by Temkin Group, Tech Vendors: Benchmarking Product and Relationship Satisfaction of IT Clients, rates the experiences delivered by 60 large technology providers.

The research, which is based on a survey of 800 IT professionals from companies with at least $500 million in annual sales, examines how large enterprises rate IT vendors’ products and relationships.

Looking across the two key areas, products and relationships, Intel, Apple, and Cisco earned the highest average ratings. While the average rating across all 60 tech vendors was 50%, eight vendors fell below 40%: Compuware, Wipro, Capgemini, Tata Consulting Services, Unisys, Novell, Qualcomm, and SunGard.

The research uncovered a wide range of experience delivered by tech vendors when it comes to both products and relationships,” states Bruce Temkin, author of the report and Managing Partner of Temkin Group.

To evaluate the relationship experience provided by tech vendors, Temkin Group asked IT professionals to rate the companies in four areas: cost of ownership, innovation, account team support, and technical support.

CiscoThe vendors with the highest relationship ratings are Intel, Apple, Cisco, Google, Microsoft servers, and IBM IT services. The tech vendors that received the lowest relationship ratings are Compuware, Wipro, and Unisys.

To evaluate the product experience provided by tech vendors, Temkin Group asked IT professionals to rate the companies in four areas: ease of use, features, flexibility, and quality.

The vendors with the highest product ratings are Intel, Apple, Cisco, Microsoft business applications, Microsoft desktop software, Microsoft servers, Google, Oracle database software, Oracle business applications, and VMWare.


The tech vendors that received the lowest product ratings are Compuware, Capgemini, and Wipro.

Highlights from the eight evaluation criteria:

  • GoogleCost of ownership: Two tech vendors received ratings of 60% or higher – Google and Intel.
  • Innovation: 16 tech vendors received ratings of 60% or higher, while four were above 70% – Apple, Intel, Cisco, andGoogle.
  • Account team support: Seven tech vendors received ratings of 60% or higher, led by Apple, Intel, and Cisco.
  • Technical support: Nine tech vendors received ratings of 60% or higher and only Intel is above 70%.
  • Product ease-of-use: 13 tech vendors received ratings of 60% or higher and two are above 70% – Intel and Apple.
  • Product features: 17 tech vendors received ratings of 60% or higher and two are above 70% – Cisco and Intel.
  • Product flexibility: 12 tech vendors received ratings of 60% or higher and only Intel is above 70%.
  • Product quality: 17 tech vendors received ratings of 60% or higher and four are above 70% – Intel, Apple, Cisco, andAdobe.

This report can be accessed from the Temkin Group website at or from the blog, Customer Experience Matters, at

Which device users spent the most online over the holidays?

Friday, January 20th, 2012
Apple iPad3s

Apple iPad3s

During the 2011 holiday season and throughout 2011, tablet visitors spent more per purchase than visitors using smartphones or traditional desktops and laptops, according to inaugural Adobe® Digital Marketing Insights report, designed to provide marketing, e-commerce, and retail executives with critical intelligence about digital marketing.

The results suggesting that tablet visitors were the most valuable online customers in 2011.“This study shows the importance of optimizing your 2012 e-tail strategy for tablet visitors to avoid the risk of underserving a highly-profitable, fast-growing customer segment.”

Key Report Findings Included

  • Tablet visitors spent 54 percent more than smartphone visitors and 21 percent more per purchase than desktop/laptop visitors.
  • Tablet visitors were nearly three times more likely to buy products and services online than smartphone visitors and were nearly as likely to purchase as desktop/laptop visitors.

“Adobe has long championed the need for retailers to optimize their sites for mobile visitors, and the results of this study indicate that tablet devices have become an absolutely critical new sales channel that marketers must address head-on,” said Brad Rencher, senior vice president and general manager, Adobe Digital Marketing Business.

“This study shows the importance of optimizing your 2012 e-tail strategy for tablet visitors to avoid the risk of underserving a highly-profitable, fast-growing customer segment.”

Optimizing websites for mobile devices, such as smartphones, is now becoming common practice. However, with the emergence of the iPad and Android tablets, companies now face additional mobile optimization requirements in order to provide enticing online shopping experiences.

If retailers treat mobile and tablet optimization strategies alike, they may fail to leverage the power of tablet visitors, which the study suggests, convert nearly three times more frequently than smartphone visitors.

Why Tablet Visitors Spend More

The Adobe study suggests that demographics of tablet visitors, as well as the flexibility of the overall tablet user experience, contribute to higher tablet visitor profitability. Tablet visitors are typically males between the ages of 18-34 years old and tend to be more affluent than other online shoppers. Higher income levels among tablet owners is just one part of the story. Tablet users also have higher usage rates over the weekend, when there is more time to shop online.

Download the full Adobe Digital Marketing Insights report here or at


Adobe offers “sneak peek” video demos of future technologies

Monday, October 17th, 2011

AdobeAdobe Systems Incorporated (Nasdaq:ADBE) today posted videos of the technology “sneak peeks” that were showcased recently at the company’s annual MAX user conference in Los Angeles.

Included in the videos is the image deblurring technology, demonstrated in an on-stage demo by Adobe senior research scientist Jue Wang, which has become an Internet sensation.

“We sneaked some early-stage technology from our labs during the recent Adobe MAX conference that exemplify the kind of technology innovation that is thriving across Adobe,” said Kevin Lynch, chief technology officer, Adobe. “Adobe’s technology leadership is ensuring that designers and developers have the tools they need to help shape the future of digital media.”

The sneaks are intended to give MAX attendees a look at future technologies. These technologies may, or may not, make it into future versions of Adobe products.

The demos are currently being hosted on AdobeTV, and include:

  • Image Deblurring – removing blurriness from digital photos caused by camera shake while the pictures were being taken;
  • Local Layer Ordering – a new way for graphic designers to create layered compositions that better reflect the way real world objects act;
  • InDesign Liquid Layout – using InDesign to create high quality magazines that automatically adapt layouts across devices and screen orientation;
  • Near Field Communications in Adobe AIR – using Adobe AIR to create applications that communicate with the physical world;
  • Automatic Synchronization of Crowd Sourced Videos – synchronizing video clips taken with different cameras and from different vantage points into a single immersive video;
  • Reverse Debugging in Flash Builder – the ability to step backwards in time while debugging a Flash application to better find the root cause of bugs;
  • RubbaDub – automatically replacing the dialog of a video clip with separately recorded audio with perfect synchronization;
  • Pixel Nuggets – searching through a large library of images by identifying images that contain the same people, backgrounds, landmarks, etc.;
  • Monocle – a new visual tool to help developers find and fix performance problems in Flash applications;
  • Video Meshes – an entirely new way to edit videos, including the ability to create 3D fly-throughs of 2D videos and change focus and depth of field;
  • GPU Parallelism – using a device’s graphic processing unit (GPU) to accelerate performance of general purpose computing.

Adobe rushes out emergency fix for Flash vulnerability

Monday, June 6th, 2011

AdobeAdobe has released an emergency security update for a security hole hackers are already exploiting. They use it to target attacks that trick a user into clicking on a malicious link delivered via email.

The vulnerability is a cross-site scripting bug. It can be used to act as the user on a  Website or via a Webmail provider. Google has pushed an update out for Chrome to fix the flaw, but it also affects Windows, Mac, Linus and Solaris.

Adobe’s products have had an ongoing problem with security holes. We’re beginning to think Apple’s decision to keep iPad’s from using it wasn’t such a bad idea, after all, although it does leave holes in the web not to use it. Adobe says it is still investigating to see if the latest vulnerability also affects Adobe Reader and Acrobat for Windows.

Adobe says users should update to the latest patched version ( For details, see Krebs on Security’s warning. Kreb’s helps keep us up to date on all the latest security alerts. It also includes links to update sources, finding out which version of flash you have and more.