Posts Tagged ‘Adobe’
Friday, March 8th, 2013
Digital marketing budgets and client investments will grow at a more intense pace from 2013-2014, according to the latest SoDA Report, one of the most widely read publications in the digital marketing world.
Its Digital Marketing Outlook survey found that:
- More clients are “insourcing” the set-up and maintenance of currently existing digital services, while “outsourcing” their innovation needs to digital agencies. Accordingly, an impressive 40% of agency respondents have established in-house innovation labs/incubators.
- Agencies are increasing client education and training offerings, as well as embedding specialized resources at clients’ offices.
- Digital marketing budgets and client investments will grow at a more intense pace in 2013- 2014.
- Most clients are migrating toward utilizing highly specialized digital agencies.
- Agencies see significant skill gaps among clients on user experience and analytics.
- Agencies are working harder to keep great talent and money isn’t always decisive.
In addition to the dozens of thought-provoking and cutting-edge pieces authored by SoDA members, an array of guest contributors, CMOs, editors, and other senior executives from distinguished organizations– General Mills, Adobe, Dollar Shave Club, Marketing Week, Contagious, The Drum, The Art Directors Club, IIT Institute of Design and Econsultancy, among others– offer insight and expertise.
Case studies showcase SoDA members’ innovative work on behalf of international brands such as Google, Avis, Coca-Cola, Barneys, Nike, Fox, Samsung, Icon Fitness, Unilever, Intel, and Cisco.
A free iPad version of The SoDA Report is currently available for download from iTunes and a free PDF copy is also available for download. Additional tablet and web-browser versions will be available shortly. Tablet editions are powered by Adobe® Digital Publishing Suite.
Tuesday, December 4th, 2012
The file sharing service Dropbox, video game developer Blizzard, and Adobe all suffered security breaches in the last quarter, says PandaLabs, the antimalware laboratory of Panda Security in its quarterly report.
It reports that Dropbox suffered a huge security breach that led to theft of usernames and passwords from thousands of users.
American video game developer Blizzard confirmed in August that it had suffered a security breach where hackers were able to obtain users’ email addresses and encrypted passwords. The company urged users to change the login credentials to its online gaming service Battle.net.
In September, it was revealed that Adobe had also been attacked by hackers. In this case, the attackers accessed one of Adobe’s internal servers to be able to sign their malware with a valid digital certificate from the company.
Most infections are from Trojans
Trojans continued to account for most of the new threats created this quarter, by far. Trojans constituted 72.58 percent of all new malware, while viruses constituted 14.47 percent and worms 10.53 percent. When it comes to the number of infections caused by each malware category, the ranking supports the hierarchy of new samples in circulation, with Trojans accounting for three out of every four infections, followed by worms and viruses.
“It is obvious that malware writers have standardized their infection techniques, since what we have seen in Q3 is a continuation of the trends we saw over the first half of the year,” said Luis Corrons, technical director of PandaLabs. “Trojans once again have accounted for almost 80 percent of infections, and continue to be the preferred category for cyber-criminals to carry out information theft. All this confirms cyber-crooks’ first objective: to make money from their creations.”
China Tops List of Infections per Country
The average number of infected PCs across the globe stands at 30.68 percent. China once again takes the top spot of most infections per country (53.17 percent of infected PCs), followed by South Korea (52.77 percent), comprising the only nations with more than 50 percent of computers infected.
The list of top ten most infected countries is made up of nations from almost every part of the world: Asia, Europe, South America, and Africa. Here’s a graph representing the countries with most malware-infected computers:
Anyone fighting off bot attacks, as we have here at the TechJournal, has noted the attacks use infected machines globally. We see them from common sources: China, Russia, Ukraine, but also every European nation.
he quarterly report can be downloaded from: http://press.pandasecurity.com/press-room/reports/.
Thursday, August 30th, 2012
One place where cloud computing applications are getting a foothold is in education.
The benefits – access to applications anywhere and on any device and lower IT costs – appeal to many colleges and school districts.
But while IBM, Microsoft, Adobe are offering cloud based products to the education market, there is plenty of room for growth. Only about a third of higher education institutions and just over a quarter of K-12 districts were in the cloud as of May last year.
Here’s an infographic on cloud use by schools:
Tuesday, March 6th, 2012
Intel, Apple, and Cisco, provide the best product and relationship experience in the tech industry, according to a new research report published by Temkin Group, Tech Vendors: Benchmarking Product and Relationship Satisfaction of IT Clients, rates the experiences delivered by 60 large technology providers.
The research, which is based on a survey of 800 IT professionals from companies with at least $500 million in annual sales, examines how large enterprises rate IT vendors’ products and relationships.
Looking across the two key areas, products and relationships, Intel, Apple, and Cisco earned the highest average ratings. While the average rating across all 60 tech vendors was 50%, eight vendors fell below 40%: Compuware, Wipro, Capgemini, Tata Consulting Services, Unisys, Novell, Qualcomm, and SunGard.
“The research uncovered a wide range of experience delivered by tech vendors when it comes to both products and relationships,” states Bruce Temkin, author of the report and Managing Partner of Temkin Group.
To evaluate the relationship experience provided by tech vendors, Temkin Group asked IT professionals to rate the companies in four areas: cost of ownership, innovation, account team support, and technical support.
The vendors with the highest relationship ratings are Intel, Apple, Cisco, Google, Microsoft servers, and IBM IT services. The tech vendors that received the lowest relationship ratings are Compuware, Wipro, and Unisys.
To evaluate the product experience provided by tech vendors, Temkin Group asked IT professionals to rate the companies in four areas: ease of use, features, flexibility, and quality.
The vendors with the highest product ratings are Intel, Apple, Cisco, Microsoft business applications, Microsoft desktop software, Microsoft servers, Google, Oracle database software, Oracle business applications, and VMWare.
The tech vendors that received the lowest product ratings are Compuware, Capgemini, and Wipro.
Highlights from the eight evaluation criteria:
- Cost of ownership: Two tech vendors received ratings of 60% or higher – Google and Intel.
- Innovation: 16 tech vendors received ratings of 60% or higher, while four were above 70% – Apple, Intel, Cisco, andGoogle.
- Account team support: Seven tech vendors received ratings of 60% or higher, led by Apple, Intel, and Cisco.
- Technical support: Nine tech vendors received ratings of 60% or higher and only Intel is above 70%.
- Product ease-of-use: 13 tech vendors received ratings of 60% or higher and two are above 70% – Intel and Apple.
- Product features: 17 tech vendors received ratings of 60% or higher and two are above 70% – Cisco and Intel.
- Product flexibility: 12 tech vendors received ratings of 60% or higher and only Intel is above 70%.
- Product quality: 17 tech vendors received ratings of 60% or higher and four are above 70% – Intel, Apple, Cisco, andAdobe.
This report can be accessed from the Temkin Group website at http://www.temkingroup.com or from the blog, Customer Experience Matters, at http://experiencematters.wordpress.com.
Friday, January 20th, 2012
During the 2011 holiday season and throughout 2011, tablet visitors spent more per purchase than visitors using smartphones or traditional desktops and laptops, according to inaugural Adobe® Digital Marketing Insights report, designed to provide marketing, e-commerce, and retail executives with critical intelligence about digital marketing.
The results suggesting that tablet visitors were the most valuable online customers in 2011.“This study shows the importance of optimizing your 2012 e-tail strategy for tablet visitors to avoid the risk of underserving a highly-profitable, fast-growing customer segment.”
Key Report Findings Included
- Tablet visitors spent 54 percent more than smartphone visitors and 21 percent more per purchase than desktop/laptop visitors.
- Tablet visitors were nearly three times more likely to buy products and services online than smartphone visitors and were nearly as likely to purchase as desktop/laptop visitors.
“Adobe has long championed the need for retailers to optimize their sites for mobile visitors, and the results of this study indicate that tablet devices have become an absolutely critical new sales channel that marketers must address head-on,” said Brad Rencher, senior vice president and general manager, Adobe Digital Marketing Business.
“This study shows the importance of optimizing your 2012 e-tail strategy for tablet visitors to avoid the risk of underserving a highly-profitable, fast-growing customer segment.”
Optimizing websites for mobile devices, such as smartphones, is now becoming common practice. However, with the emergence of the iPad and Android tablets, companies now face additional mobile optimization requirements in order to provide enticing online shopping experiences.
If retailers treat mobile and tablet optimization strategies alike, they may fail to leverage the power of tablet visitors, which the study suggests, convert nearly three times more frequently than smartphone visitors.
Why Tablet Visitors Spend More
The Adobe study suggests that demographics of tablet visitors, as well as the flexibility of the overall tablet user experience, contribute to higher tablet visitor profitability. Tablet visitors are typically males between the ages of 18-34 years old and tend to be more affluent than other online shoppers. Higher income levels among tablet owners is just one part of the story. Tablet users also have higher usage rates over the weekend, when there is more time to shop online.
Download the full Adobe Digital Marketing Insights report here or at CMO.com.
Monday, October 17th, 2011
Adobe Systems Incorporated (Nasdaq:ADBE) today posted videos of the technology “sneak peeks” that were showcased recently at the company’s annual MAX user conference in Los Angeles.
Included in the videos is the image deblurring technology, demonstrated in an on-stage demo by Adobe senior research scientist Jue Wang, which has become an Internet sensation.
“We sneaked some early-stage technology from our labs during the recent Adobe MAX conference that exemplify the kind of technology innovation that is thriving across Adobe,” said Kevin Lynch, chief technology officer, Adobe. “Adobe’s technology leadership is ensuring that designers and developers have the tools they need to help shape the future of digital media.”
The sneaks are intended to give MAX attendees a look at future technologies. These technologies may, or may not, make it into future versions of Adobe products.
The demos are currently being hosted on AdobeTV, and include:
- Image Deblurring – removing blurriness from digital photos caused by camera shake while the pictures were being taken;
- Local Layer Ordering – a new way for graphic designers to create layered compositions that better reflect the way real world objects act;
- InDesign Liquid Layout – using InDesign to create high quality magazines that automatically adapt layouts across devices and screen orientation;
- Near Field Communications in Adobe AIR – using Adobe AIR to create applications that communicate with the physical world;
- Automatic Synchronization of Crowd Sourced Videos – synchronizing video clips taken with different cameras and from different vantage points into a single immersive video;
- Reverse Debugging in Flash Builder – the ability to step backwards in time while debugging a Flash application to better find the root cause of bugs;
- RubbaDub – automatically replacing the dialog of a video clip with separately recorded audio with perfect synchronization;
- Pixel Nuggets – searching through a large library of images by identifying images that contain the same people, backgrounds, landmarks, etc.;
- Monocle – a new visual tool to help developers find and fix performance problems in Flash applications;
- Video Meshes – an entirely new way to edit videos, including the ability to create 3D fly-throughs of 2D videos and change focus and depth of field;
- GPU Parallelism – using a device’s graphic processing unit (GPU) to accelerate performance of general purpose computing.
Monday, June 6th, 2011
Adobe has released an emergency security update for a security hole hackers are already exploiting. They use it to target attacks that trick a user into clicking on a malicious link delivered via email.
The vulnerability is a cross-site scripting bug. It can be used to act as the user on a Website or via a Webmail provider. Google has pushed an update out for Chrome to fix the flaw, but it also affects Windows, Mac, Linus and Solaris.
Adobe’s products have had an ongoing problem with security holes. We’re beginning to think Apple’s decision to keep iPad’s from using it wasn’t such a bad idea, after all, although it does leave holes in the web not to use it. Adobe says it is still investigating to see if the latest vulnerability also affects Adobe Reader and Acrobat for Windows.
Adobe says users should update to the latest patched version (10.3.181.23). For details, see Krebs on Security’s warning. Kreb’s helps keep us up to date on all the latest security alerts. It also includes links to update sources, finding out which version of flash you have and more.