Tech Insights
Feb. 20, 2013

Genband, Samsung form partnership
Dallas Business Journal
A pair of MTBC companies are joining forces to help enable large companies to provide a raft of secure telecommunications services for their employees to use on the go. One of the primary aims of the partnership between Frisco-based Genband and Richardson-based Samsung Telecommunications America LLC is to allow employees of big enterprises to use one secure device for their telecommunications needs, such as a Samsung tablet, rather than, say, a tablet along with a mobile phone and a landline phone.More

MTBC seeking innovative cloud and communications technology for Ericsson
Innovative companies have a unique opportunity to establish a relationship with telecom giant Ericsson, which is seeking innovative solutions involving cloud-based computing and communications. Ericsson is working with the MTBC TechQuest program to give small, innovative companies the opportunity to present their technologies to Ericsson executives. Applications are currently being accepted and are due by March 15 at

Education, infrastructure and economy take lead in Texas Legislature
As the 83rd legislative session gains momentum, it is important to stay informed about what is going on in Austin that can affect us here at home. The Metroplex Technology Business Council Public Affairs committee and staff are actively monitoring the legislature during the current session. We will be tracking any pending legislation that pertains to the MTBC's 2013 legislative agenda.More

Chairman's Circle profile: Symantec
Living in an information-driven world, information increases exponentially, becoming more and more challenging to manage and secure. Enter Symantec, a global leader in security, storage and systems management solutions. From consumers and small businesses to the largest global organizations, Symantec secures and manages information at more points and more completely than any other company.More

Survey: Cloud computing's ROI increasingly elusive
As cloud computing sweeps through organizations, executives' confidence that they can effectively deploy it and measure its results is waning. That's the finding of a new survey conducted by The Open Group, an industry consortium.More

10 tools to prevent cloud vendor lock-in
In enterprise computing, vendor lock-in is too often a fait accompli. Vendor lock-in happens when, for example, a particular company — such as IBM, Microsoft or Cisco Systems — becomes the dominant vendor behind a particular technology and develops products that capture the advance with proprietary elements. That prevents its customers from leaving and ensures that only proprietary vendors can continue to capitalize on the technology. Nobody wants to be caught in proprietary traps in the cloud. These tools can help you avoid being hemmed in by one vendor.More

The 5 biggest robotics trends to watch in 2013
When it comes to robots there are a lot of innovations to watch, a lot of new things to do see and many trends to watch. That is why InventorSpot editors took a look at some of the biggest trends in robotics that you should keep an eye on in 2013.More

SpaceJustin robot will fix your satellites, look cool doing it
IEEE Spectrum
To feel with your own hands what the robotic hand is touching. To see exactly what the robot's eyes are seeing. Researchers from the Robotics and Mechatronics Center at the DLR site in Oberpfaffenhofen, Germany, can now operate their SpaceJustin robot remotely; they not only control the robot, but receive feedback as well. In the future, this interactive service can be used when SpaceJustin is in space repairing satellites, operating switches or exchanging modules.More

The glass of the future will be made of solar panels
The humans of the clean and prosperous future will never build windows or walls with plain old glass. Not when they can use solar glass instead. There are already a wide array of projects, most of them still in the testing stages, that aim to transform windows into solar power generators. One researcher wants to fit windows with thin-film "luminescent solar concentrators"; red or gray ones would efficiently convert sunlight into electricity. Oxford Photovoltaics, however, wants to do one better — it wants to build the solar panel directly into the glass. The company, a spinoff from some famous British university or other, just announced a $3 million funding boost, which means we're getting closer to a world with buildings built out of solar glass.More

Study: Chinese army tied to overwhelming percentage of cyberattacks on US
The Globe and Mail
On the outskirts of Shanghai, in a run-down neighborhood dominated by a 12-story white office tower, sits a People's Liberation Army base for China's growing corps of cyberwarriors. The building is the headquarters of PLA Unit 61398. A growing body of digital forensic evidence — confirmed by U.S. intelligence officials who say they have tapped into the activity of the army unit for years — leaves little doubt that an overwhelming percentage of the attacks on U.S. corporations, organizations and government agencies originate in and around the white tower.More

Why Obama's executive order on cybersecurity doesn't satisfy most experts
The Christian Science Monitor
The Obama administration recently unveiled a long-awaited executive order intended to bolster cybersecurity by hardening the computer networks that control the nation's power grid, financial and transportation systems and other "critical infrastructure." But the order largely fell short of many experts' expectations for what could be done, even voluntarily. While some say it is better than nothing, others wonder why the Obama administration has not done more to stress how urgently some vital systems need to be upgraded.More

Burger King's Twitter hacked, companies fear for cybersecurity
Daily Herald
The recent appropriation of Burger King's Twitter account was a relatively mild example of cybersecurity problems, which are causing increasing concerns in Washington, D.C., and for the industry. Media outlets including The New York Times, The Wall Street Journal and The Washington Post have all said this year that their computer systems were breached, while several NBC websites were briefly hacked in November. White House officials and some lawmakers are pursuing legislation that would make it easier for the government and industry to share information on how to defend against hacking.More

The most effective persuasion technique you've never heard of
If we're all in sales, as the old saying goes, then we're all in the persuasion business. And this is particularly true for entrepreneurs. Whether you're asking investors to hand over their money, potential customers to try your product, or employees to give their best, much of your day is probably spent persuading people. So how do you do it well? Amid all this chatter about how to be more persuasive, one simple, practical, and well-tested technique had largely got lost in the shuffle. According to a recent post laying out the idea on PsyBlog, a whopping 42 studies with 22,000 participants have found the technique roughly doubles the chances of someone agreeing to a request.More

Gender pay gap widened in 2012, back to 2005 levels
The Huffington Post
New data from the Labor Department reveals that in 2012, women made only 81 percent as much as male workers, on average. Women made less than men in all but two occupations, according to the available data. The gender pay gap actually widened last year and now has returned to 2005 levels, according to the Labor Department. More