Tuesday, 5 November 2013

Search Engine Optimization

Search Engine Optimization otherwise known as SEO is a science and an art.  There are some clear initiatives in creating and maintaining a web site that is truly SEO friendly.  At PolarData we like to proceed with a calculated plan of action and clearly document your websites current position so we can measure and identify progress moving forward.  By following strategic steps we are able to assist companies in improving their search engine positioning and ultimately achieve their goals.               


If you are interested in increasing the visibility of your website while getting clear results then contact us today.  Our goal is simple, provide our clients with improved conversion rates with better results while directly improving the long term growth and goals of our clients website.

Thursday, 9 May 2013

Ice Cream Anyone?

Android 4.0 (Ice Cream Sandwich) is one of the latest and greatest versions of the Android platform for phones, tablets, and more. It provides ease in multitasking, notifications, and customization.  Most importantly it provides new methods of communicating and sharing data. 
Why is this important?  What does this have to do with business?
Well, the Operating System is used as mentioned above with devices that enable users to have power and portability.  Tablets and smart phones now have almost endless capabilities through the various applications available.  Ultimately tablets and smart phone devices represent the present and future in unified communication and data sharing.
In my experience with this type of technology I am seeing massive improvements to the capabilities and usage of portable devices.  I was extremely interested in comparing the Mac iPad to the Android Tablets.
Here is some of the data I have found provided by an article in Technologizer.
Then there’s Comscore’s MobiLens study, which attempts to measure the smartphone platforms used by everyone in the U.S. over the age of 13 — not just ones sold recently, but everything. The numbers it released this month are pretty similar to Kantar’s.


That’s the U.S. — how about everywhere?
Worldwide, all those companies making Android phones sell a lot more units than Apple sells of the iPhone, says IDC. In the fourth quarter of 2012, Android had more than 70 percent share, vs. 21 percent for the iPhone.

And tablets?
Tablet shipment data is harder to come by than data for phones, and the most recent specific numbers by platform I could find were IDC’s full-year estimates for 2012, which it released on December 5 of last year. They had demand for 7″ Android tablets adding up to a decrease in the iPad’s dominance — but iOS still remained the most popular tablet operating system.

Either way whether you are a Mac person or an Android person you can definitely see the benefit in using these devices.  More and more businesses are using these devices to provide flexibility and advantage in organization, efficiency and data sharing and management. 
The reason I started this blog off with “Ice Cream Anyone” is because I am trialing the Samsung Note 8 and using that operating system, and I am truly enjoying the use of this product. 
Please let me know your thoughts.

Friday, 26 April 2013

How would a security breach affect your business?

Statistics and internet data show that only a small portion of security incidents occur as a result of planned and targeted attacks, while most service outages are due to a lack of effective security and control measures. Now more than ever keeping your data safe has become mission critical. Data such as business communications, product inventory, billing, sales, and internal process and procedure.
Here are some critical questions that require honest answers:
1.            Do you have an acceptable usage policy in your office?
2.            Do you have email, antivirus, user, password, remote access policies?
3.            Do you have a reputable firewall, remote access appliance?
4.            Do you monitor intrusion detection?
5.            Do you have a secure wireless solution?
6.            Do you have content control and security?
The last question is where we started.  How would a security breach impact your way of life and your business?  What would you do if all your client data was lost, stolen or advertised on the internet?  Make the right choice and consider your future security requirements today.
Call us to schedule a meeting to discuss how to address your network security.

Monday, 15 April 2013

Growing Pains?

Two sources of massive consumption.  Two areas of continued growth.
Your data, your power.

1980 – The world's first gigabyte-capacity disk drive, the IBM 3380, was the size of a refrigerator, weighed 550 pounds (about 250 kg), and had a price tag of $40,000( $111 thousand in present day terms), 2.52 GB

2005 – First 500 GB hard drive shipping

2011 – First 4.0 terabyte hard drive shipping

I think we can all agree with the growing requirement to process and store data so also is our need to provide power to the various devices we use.  As an example, in a medium sized business alone we need power for our modem, firewall, switches, wireless access point, server, and monitor.  Power is not only used to provide the ability for our devices to function but it is also used in an emergency capacity with UPS systems.  Prevention of power surges, data corruption and the problems that go with “dirty power” can result in big losses.  At PolarData we are working closely with our business partners to not only find solutions that are applicable today but long term solutions that make technical and financial sense.
We recommend several solutions for data storage, backup, recovery and protection.  Contact us today to discuss.


Thursday, 11 April 2013

Taking Secuirty To The Next Level

As you can see from the article below you can never be too safe.  Most people wonder why did they attack me or why is someone trying to access my data.  Hacking sometimes has no rhyme nor reason.  However, in some cases it is organized and directly planned to cause loss of business, productivity and embarrassment. 
Contact PolarData Computing Services today to discuss measures in protecting your data.


North Korea re-used old malware code in March cyberattack against South

 'Reconnaissance General Bureau' cyberwarfare unit blamed

By John E Dunn | Techworld | Published: 14:29, 10 April 2013

The North Korean military was not only behind last month’s unprecedented cyber-assault on South Korean TV stations and banks, it left behind enough evidence of its involvement to make attributing blame an open and shut case, officials have alleged.

Ever since the 20 March attacks, their highly targeted nature has made North Korea suspect number one, but the detailed evidence presented in a Seoul news conference is still noteworthy.

Investigators alleged that the North had used six PCs to launch the remote attacks, attempting to hide their origin behind up to 1,000 foreign IP addresses. Thirteen of these probes were directly traced to North Korea.

The key piece of evidence was that of 76 samples of malware code used in the attacks, 18 had been used by the North Koreans in previous attacks, as had a further 22 IP addresses that were part of a 2009 attack.

Lee Seung-won, an official at the Ministry of Science responsible for ICT, was even able to name the notorious department of the North Korean military that planned the attacks from their alleged inception in June 2012.

"An analysis of cyber terror access logs, malicious code and North Korean intelligence showed that the attack methods were similar to those used by the North's Reconnaissance General Bureau, which has led hacking attacks against South Korea," he was quoted as saying by local news agencies.

The scale of the attacks deserves its 'unusual' rating  even in an era that is becoming more familiar with the reallity of cyberwar.

Officials said that nearly 49,000 South Korean PCs were affected across a range of financial and media firms, with the malware setting out to destroy data by making hard drives unbootable.

A key giveaway for South Korean investigators was that 14 anti-Pyongyang websites were also attacked, a targeting unlikely by any other agency.

According to investigators, no data was stolen during the attacks.

The attacks were clearly planned well in advance. A key piece of evidence for this is that patch management systems in a number of the victim companies were hijacked to distribute at least some of the malware, something that would have taken considerable effort and time.

That is probably what was being referred to in another Ministry of Science comment.

“After maintaining monitoring activities, [the attackers] sent out the command to delete data stored in the server, and distributed malware to individual computers through the central server.”

South Korea officials have yet to explain how a coordinated takeover of separate patch management systems happened without that being detected.

Rumours have suggested that moles inside the companies must have been sued to facilitate some parts of the attack plan.

The Ministry has said it will issue a more detailed report at a later date. Whatever its conclusions, if the North Koreans were behind the attacks, they have demonstrated a high degree of the lateral thinking necessary for well-executed cybercrime.

Two years ago reports emerged that North Korea had sent its best and brightest hackers for training at foreign colleges.