ITEN WIRED technology conference returns to Pensacola Beach

Pine Forest High School students Anthony Chaney, from left, Stephen Sonderegger, Trinity Massengale, and Annessa Williams work during ITEN Wired Cyber Competition at the Hilton in Pensacola Beach on Monday, October 1, 2018.
Gregg Pachkowski/

Most folks know Pensacola Beach for its beauty, but a conference this week is proving it’s got brains to go with its good looks.

Monday marked the beginning of 10th ITEN WIRED conference, an annual summit that provides networking and learning opportunities for executives, entrepreneurs, technology professionals and academics.

Scott Luth, CEO of the FloridaWest Economic Development Alliance, said the two-day event focuses on innovation, and invites local, national and global industry leaders to share knowledge on everything from cybersecurity, to artificial intelligence, to leadership, to improving the culture of a community.

More: Escambia County commits to funding FloridaWest for three years

“Over the past four years, we’re continuing to see the event get bigger and bigger,” Luth said, noting that this year’s event at the Pensacola Beach Hilton drew 350-400 attendees and involvement from firms like General Dynamics, IBM, Bank of America, Navy Federal Credit Union, Gulf Power, the University of Florida and many, many more.

The event is open to everyone from executives, to entrepreneurs, to information technology professionals, to students, to folks who are just looking for insights into the current issues that concern information technology.

UWF students Justin Fruitticher, from left, John Chambler, and Jordyn Morris work during ITEN Wired Cyber Competition at the Hilton in Pensacola Beach on Monday, October 1, 2018.
Gregg Pachkowski/

The summit, which continues Tuesday, features a variety of speakers, presentations, roundtables and training sessions. Experts will address topics that vary from deep dives into cloud storage infrastructure, to the importance of video and social media in brand awareness, to more general treatises on nurturing a career in cybersecurity.

Operation Poseidon’s Trident challenges cyber students to defend against virtual cyber attacks. A new “Industry Day” invites entrepreneurs to share information about their business and hopefully find mentors, collaborators and customers.

ITEN stands for innovation, technology, entrepreneurship and networking. The conference is hosted by IT Gulf Coast and Florida West Economic Development Alliance.

For more information about the event, visit

Kevin Robinson can be reached at and 850-435-8527.

Voice Phishing Scams Are Getting More Clever

Most of us have been trained to be wary of clicking on links and attachments that arrive in emails unexpected, but it’s easy to forget scam artists are constantly dreaming up innovations that put a new shine on old-fashioned telephone-based phishing scams. Think you’re too smart to fall for one? Think again: Even technology experts are getting taken in by some of the more recent schemes (or very nearly).

Matt Haughey is the creator of the community Weblog MetaFilter and a writer at Slack. Haughey banks at a small Portland credit union, and last week he got a call on his mobile phone from an 800-number that matched the number his credit union uses.

Actually, he got three calls from the same number in rapid succession. He ignored the first two, letting them both go to voicemail. But he picked up on the third call, thinking it must be something urgent and important. After all, his credit union had rarely ever called him.

Haughey said he was greeted by a female voice who explained that the credit union had blocked two phony-looking charges in Ohio made to his debit/ATM card. She proceeded to then read him the last four digits of the card that was currently in his wallet. It checked out.

Haughey told the lady that he would need a replacement card immediately because he was about to travel out of state to California. Without missing a beat, the caller said he could keep his card and that the credit union would simply block any future charges that weren’t made in either Oregon or California.

This struck Haughey as a bit off. Why would the bank say they were freezing his card but then say they could keep it open for his upcoming trip? It was the first time the voice inside his head spoke up and said, “Something isn’t right, Matt.” But, he figured, the customer service person at the credit union was trying to be helpful: She was doing him a favor, he reasoned.

The caller then read his entire home address to double check it was the correct destination to send a new card at the conclusion of his trip. Then the caller said she needed to verify his mother’s maiden name. The voice in his head spoke out in protest again, but then banks had asked for this in the past. He provided it.

Next she asked him to verify the three digit security code printed on the back of his card. Once more, the voice of caution in his brain was silenced: He’d given this code out previously in the few times he’d used his card to pay for something over the phone.

Then she asked him for his current card PIN, just so she could apply that same PIN to the new card being mailed out, she assured him. Ding, ding, ding went the alarm bells in his head. Haughey hesitated, then asked the lady to repeat the question. When she did, he gave her the PIN, and she assured him she’d make sure his existing PIN also served as the PIN for his new card.

Haughey said after hanging up he felt fairly certain the entire transaction was legitimate, although the part about her requesting the PIN kept nagging at him.

“I balked at challenging her because everything lined up,” he said in an interview with KrebsOnSecurity. “But when I hung up the phone and told a friend about it, he was like, ‘Oh man, you just got scammed, there’s no way that’s real.’”

Now more concerned, Haughey visited his credit union to make sure his travel arrangements were set. When he began telling the bank employee what had transpired, he could tell by the look on her face that his friend was right.

A review of his account showed that there were indeed two fraudulent charges on his account from earlier that day totaling $3,400, but neither charge was from Ohio. Rather, someone used a counterfeit copy of his debit card to spend more than $2,900 at a Kroger near Atlanta, and to withdraw almost $500 from an ATM in the same area. After the unauthorized charges, he had just $300 remaining in his account.

“People I’ve talked to about this say there’s no way they’d fall for that, but when someone from a trustworthy number calls, says they’re from your small town bank, and sounds incredibly professional, you’d fall for it, too,” Haughey said.

Fraudsters can use a variety of open-source and free tools to fake or “spoof” the number displayed as the caller ID, lending legitimacy to phone phishing schemes. Often, just sprinkling in a little foreknowledge of the target’s personal details — SSNs, dates of birth, addresses and other information that can be purchased for a nominal fee from any one of several underground sites that sell such data — adds enough detail to the call to make it seem legitimate.


Cabel Sasser is founder of a Mac and iOS software company called Panic Inc. Sasser said he almost got scammed recently after receiving a call that appeared to be the same number as the one displayed on the back of his Wells Fargo ATM card.

“I answered, and a Fraud Department agent said my ATM card has just been used at a Target in Minnesota, was I on vacation?” Sasser recalled in a tweet about the experience.

What Sasser didn’t mention in his tweet was that his corporate debit card had just been hit with two instances of fraud: Someone had charged $10,000 worth of metal air ducts to his card. When he disputed the charge, his bank sent a replacement card.

“I used the new card at maybe four places and immediately another fraud charge popped up for like $20,000 in custom bathtubs,” Sasser recalled in an interview with KrebsOnSecurity. “The morning this scam call came in I was spending time trying to figure out who might have lost our card data and was already in that frame of mind when I got the call about fraud on my card.”

And so the card-replacement dance began.

“Is the card in your possession?,” the caller asked. It was. The agent then asked him to read the three-digit CVV code printed on the back of his card.

After verifying the CVV, the agent offered to expedite a replacement, Sasser said. “First he had to read some disclosures. Then he asked me to key in a new PIN. I picked a random PIN and entered it. Verified it again. Then he asked me to key in my current PIN.”

That made Sasser pause. Wouldn’t an actual representative from Wells Fargo’s fraud division already have access to his current PIN?

“It’s just to confirm the change,” the caller told him. “I can’t see what you enter.”

“But…you’re the bank,” he countered. “You have my PIN, and you can see what I enter…”

The caller had a snappy reply for this retort as well.

“Only the IVR [interactive voice response] system can see it,” the caller assured him. “Hey, if it helps, I have all of your account info up…to confirm, the last four digits of your Social Security number are XXXX, right?”

Sure enough, that was correct. But something still seemed off. At this point, Sasser said he told the agent he would call back by dialing the number printed on his ATM card — the same number his mobile phone was already displaying as the source of the call. After doing just that, the representative who answered said there had been no such fraud detected on his account.

“I was just four key presses away from having all my cash drained by someone at an ATM,” Sasser recalled. A visit to the local Wells Fargo branch before his trip confirmed that he’d dodged a bullet.

“The Wells person was super surprised that I bailed out when I did, and said most people are 100 percent taken by this scam,” Sasser said.


In Sasser’s case, the scammer was a live person, but some equally convincing voice phishing schemes — sometimes called “vishing” — use a combination of humans and automation. Consider the following vishing attempt, reported to KrebsOnSecurity in August by “Curt,” a longtime reader from Canada.

“I’m both a TD customer and Rogers phone subscriber and just experienced what I consider a very convincing and/or elaborate social engineering/vishing attempt,” Curt wrote. “At 7:46pm I received a call from (647-475-1636) purporting to be from Credit Alert ( on behalf of TD Canada Trust offering me a free 30-day trial for a credit monitoring service.”

The caller said her name was Jen Hansen, and began the call with what Curt described as “over-the-top courtesy.”

“It sounded like a very well-scripted Customer Service call, where they seem to be trying so hard to please that it seems disingenuous,” Curt recalled. “But honestly it still sounded very much like a real person, not like a text to speech voice which sounds robotic. This sounded VERY natural.”

Ms. Hansen proceeded to tell Curt that TD Bank was offering a credit monitoring service free for one month, and that he could cancel at any time. To enroll, he only needed to confirm his home mailing address.

“I’m mega paranoid (I read daily) and asked her to tell me what address I had on their file, knowing full well my home address can be found in a variety of ways,” Curt wrote in an email to this author. “She said, ‘One moment while I access that information.’”

After a short pause, a new voice came on the line.

“And here’s where I realized I was finally talking to a real human — a female with a slight French accent — who read me my correct address,” Curt recalled.

After another pause, Ms. Hansen’s voice came back on the line. While she was explaining that part of the package included free antivirus and anti-keylogging software, Curt asked her if he could opt-in to receive his credit reports while opting-out of installing the software.

“I’m sorry, can you repeat that?” the voice identifying itself as Ms. Hansen replied. Curt repeated himself. After another, “I’m sorry, can you repeat that,” Curt asked Ms. Hansen where she was from.

The voice confirmed what was indicated by the number displayed on his caller ID: That she was calling from Barrie, Ontario. Trying to throw the robot voice further off-script, Curt asked what the weather was like in Barrie, Ontario. Another Long pause. The voice continued describing the offered service.

“I asked again about the weather, and she said, ‘I’m sorry, I don’t have that information. Would you like me to transfer you to someone that does?’ I said yes and again the real person with a French accent started speaking, ignoring my question about the weather and saying that if I’d like to continue with the offer I needed to provide my date of birth. This is when I hung up and immediately called TD Bank.” No one from TD had called him, they assured him.


And then there are the fully-automated voice phishing scams, which can be be equally convincing. Last week I heard from “Jon,” a cybersecurity professional with more than 30 years of experience under his belt (Jon asked to leave his last name out of this story).

Answering a call on his mobile device from a phone number in Missouri, Jon was greeted with the familiar four-note AT&T jingle, followed by a recorded voice saying AT&T was calling to prevent his phone service from being suspended for non-payment.

“It then prompted me to enter my security PIN to be connected to a billing department representative,” Jon said. “My number was originally an AT&T number (it reports as Cingular Wireless) but I have been on T-Mobile for several years, so clearly a scam if I had any doubt. However, I suspect that the average Joe would fall for it.”


Just as you would never give out personal information if asked to do so via email, never give out any information about yourself in response to an unsolicited phone call.

Like email scams, phone phishing usually invokes an element of urgency in a bid to get people to let their guard down. If a call has you worried that there might be something wrong and you wish to call them back, don’t call the number offered to you by the caller. If you want to reach your bank, call the number on the back of your card. If it’s another company you do business with, go to the company’s site and look up their main customer support number.

Unfortunately, this may take a little work. It’s not just banks and phone companies that are being impersonated by fraudsters. Reports on social media suggest many consumers also are receiving voice phishing scams that spoof customer support numbers at Apple, Amazon and other big-name tech companies. In many cases, the scammers are polluting top search engine results with phony 800-numbers for customer support lines that lead directly to fraudsters.

These days, scam calls happen on my mobile so often that I almost never answer my phone unless it appears to come from someone in my contacts list. The Federal Trade Commission’s do-not-call list does not appear to have done anything to block scam callers, and the major wireless carriers seem to be pretty useless in blocking incessant robocalls, even when the scammers are impersonating the carriers themselves, as in Jon’s case above.

I suspect people my age (mid-40s) and younger also generally let most unrecognized calls go to voicemail. It seems to be a very different reality for folks from an older generation, many of whom still primarily call friends and family using land lines, and who will always answer a ringing phone whenever it is humanly possible to do so.

It’s a good idea to advise your loved ones to ignore calls unless they appear to come from a friend or family member, and to just hang up the moment the caller starts asking for personal information.

Tags: , , , , , , ,

NACHA Acquires Business Payments Directory Association

HERNDON, Va., Oct. 1, 2018 /PRNewswire/ — Today, NACHA announced that the Business Payments Directory Association (BPDA) will become an independent, member-led, self-governed group under the NACHA organization. The union will strategically align the efforts of the two organizations to facilitate business-to-business (B2B) payments through development and deployment of a B2B Payments and Remittance Directory. In August 2018, BPDA, in partnership with Discover Financial Services, began work on a proof-of-concept platform for a B2B Directory built on blockchain technology. The alliance will also help support and advance the proof-of-concept effort to ensure rapid delivery to the industry.

“Historically, B2B payments have been a challenge for the financial services industry,” said Jane Larimer, chief operating officer of NACHA. “Businesses are often consumed with onboarding vendors, obtaining and maintaining accurate payment information and ensuring the proper remittance is included for cash application. As a strategic initiative, NACHA works to enable solutions that will support the easy routing, posting, and application of ACH and other payments, particularly in the B2B environment. Aligning with BPDA will allow us to develop and deliver such a solution, leveraging the recognized work and expertise of BPDA.”

“BPDA was formed to bring to market the B2B Directory,” said Lawrence Buettner, BPDA Chairman. “And by combining resources with NACHA, today we are even closer to making this a reality.”

The B2B Directory will be structured as a network of credentialed service provider “sub-directories,” in which trusted and validated payee information will be stored. Credentialed service providers will allow access to the stored electronic payment information, including ACH payment details and other payment methods. Payers can query the Directory to obtain information of a single payee or multiple payees, and payees can manage their information in real time to ensure payment details are current. To support the robust capabilities of the Directory, the platform will leverage open source technologies, blockchain/distributed ledger technology and standardized Application Programming Interfaces (APIs) developed by the member-led organization Afinis Interoperability Standards (formerly the API Standardization Industry Group).


NACHA is a nonprofit organization that convenes hundreds of diverse organizations to enhance and enable electronic payments and financial data exchange within the U.S. and across geographies. Through development of rules, standards, governance, education, advocacy, and in support of innovation, NACHA’s efforts benefit the providers and users of those systems. NACHA leads groups focused on API standardization, authors the Quest Operating Rules for EBT, and is the steward of the ACH Network, a payment system that universally connects all U.S. bank accounts and facilitates the movement of money and information. In 2017, there was a total of nearly 26 billion ACH transactions. Of these, 21.5 billion ACH payments valued at $47 trillion moved across the ACH Network, and more than 4 billion were on-us transactions within financial institutions. Visit for more information, and connect with us on LinkedIn, Twitter,Facebook and YouTube.

About the Business Payments Directory Association

Established in 2016, the Business Payments Directory Association (BPDA) is the nonprofit organization that governs and operates the payments industry’s Business-to-Business (B2B) Directory. Designed in collaboration with industry leaders, including standards organizations, financial institutions, service providers and corporates, the B2B Directory will serve as the standardized, market-driven solution that will facilitate the seamless exchange of business electronic payments enabling greater U.S. digital commerce. For more information about BPDA and the status of the B2B Directory, visit

About Afinis

Afinis Interoperability Standards is a membership-based standards organization that brings together diverse collaborators – through innovative and agile processes – to develop implementable, interoperable and portable standards across operating environments and platforms.

Afinis furthers the work of NACHA’s Payments Innovation Alliance Application Programming Interface (API) Standardization Industry Group (ASIG) to now advance API standardization efforts across the financial services ecosystem through formal governance, and includes the work of the Interactive Financial eXchange Forum (IFX). Afinis provides a community for thought leadership on the shared goals of expanding efficiency, surety, safety and interoperability within the financial services industry.

Afinis collaborates openly and globally, working with groups around the world to share learning, reduce duplicative efforts, and create standards that lessen friction and improve the ability of diverse stakeholders to partner in bringing innovations more quickly to market. Visit for more information or to join.


Related Links

He’s the Red Sox’s IT MVP

Professional baseball has long used data and analytics to evaluate players’ skills, with advanced metrics such as wOBA (weighted On-base Average) and LIPS (Late-Inning Pressure Situation) playing ever more important roles in recent years. But there’s been less emphasis on technology when it comes to understanding fans and revenue streams.

That’s changing.

Being on the cutting edge of IT is a “requirement now for a sports franchise to remain competitive, drive revenue and ultimately make the ownership group more successful,” says Brian Shield ’85, the vice president of information technology for the Boston Red Sox, who begin the Major League Baseball playoffs this week. Shield notes that baseball had historically lagged behind other industries in its use of technology, but a lot of that has changed over the last five years.

“There’s a renewed emphasis on leveraging technology as a competitive advantage,” he says.

Turning Data into Engagement

Though on-field players like Mookie Betts and J.D. Martinez get all the publicity, Shield and his team of IT all-stars are making significant changes off the field to help the team’s long-term success. The Red Sox have undertaken two big-data-driven initiatives under Shield. The first was building an enterprise data warehouse to track transactions from their primary sales channels as well as from secondary market sellers, loyalty programs, turnstile data, digital ticketing and surveys. The data have helped to project sales, set staffing levels, inform promotions and, Shield says, understand fan behavior to improve the fan experience at the Red Sox’s home stadium, Fenway Park.

The other big IT initiative on Shield’s watch implemented customer relationship management tools that allowed the Red Sox sales team to reach current and future fans more effectively. “We can now leverage data to make fans aware of ticket programs and events and to build a more holistic relationship with them,” Shield says.

Learn About Bentley’s Data Analytics Degree

Recently, Shield’s work has focused on the next generation of Red Sox fans. He oversees a digital strategy that has created a Bingo app to teach kids about baseball and a simulated virtual reality batting experience for kids at Fenway Park. Several more Red Sox apps are on the horizon.

An Enticing Offer

Shield didn’t start his career with the Red Sox. He joined the team by way of CIO and CTO roles in the investment industry, at the flower delivery company FTD and at the Weather Channel, as well as serving as a technology consultant to clients such as the Fenway Sports Group. The latter signed him for the vice president of information technology role – a position that had not existed before – in 2013.

“It was an opportunity to apply a lot of things I had learned over the years to one of my favorite pastimes,” he says. “It’s hard to refuse a chance to combine technology with something you’re passionate about.”

Shield credits Bentley, where he earned a bachelor’s degree in Computer Information Systems, for developing “the ability to combine solid technical knowledge problem-solving with good business acumen. The best technology leaders are business people first and technologists second, and Bentley did an exceptional job in preparing me for both.”

A version of this story first appeared in Bentley Magazine.

National symposium sheds light on benefits of open data

Muscat: The three-day National Open Data Symposium, organised by the National Centre for Statistics and Information (NCSI) in cooperation with Information Technology Authority (ITA), opened on Monday under the auspices of His Highness Sayyid Haitham bin Tariq Al Said, Minister of Heritage and Culture.

A number of their excellencies and open data professionals were present at the meeting being held at Kempinski Al Mouj Hotel.

The symposium aims to create a platform for dialogue between private and public sectors to expand such data. “The symposium will shed light on the open data in terms of concept, importance, uses and the effect of the same on the Sultanate’s ranking in the international indices systems.

“The symposium will present some successful applications in this field, said Dr. Khalifa bin Abdullah Al Barwani, Chairman of NCSI.

“The open data is one of the basics to provide the best services. Many of the decisions taken rely on the available data for such public and private organisations. The decisions taken are thus based on such data’, said Dr. Salim bin Sultan Al Ruzaiqi, Chairman of ITA’.

On his part, Arthur Mickoleit is a Principal Research analyst in Gartner’s CIO Research and Advisory group said that open data provides higher level of transparency, enhance citizen confidence, improve public services and helps in developing more effective


He highlighted the efforts made by many governments to get tangible benefits from these sectors and provide necessary reports

on them.

Dr. Ahmed bin Salim Al Hosani, CEO Takween Technology made a presentation on the open data in the Sultanate between reality and aspirations.

He pointed out that the data created by the different public organisations are the main source for the knowledge society and one of the key drivers for commercial and economic growth.

The first session of the symposium included a number of working papers on the ‘Concept and Benefits of Open Data’ and the ‘Open Data in International Reports’.

The second session titled ‘Experiences in Open Data ‘included two working papers on ‘Open Data in Health Sector’, ‘Open Data in Transport and Logistics Sector’, ‘Open Data in Labour Sector’ and ‘Open Data in Environment Sector.’

The third session titled ‘Policies, Frameworks and Laws Regulating Open Data’ included two working papers on ‘Measuring the Charter of Open Data and the Most Recent Trends and Effects in the Field of Open Data’.

The fourth working paper tilted ‘The National and International Impact of Open Data’ included two working papers on ‘How can Open Data Assist in Achieving the Sustainable Development Goals? and ‘Horizons of Partnership between the Public and Private Sectors in Respect to Open Data Initiatives.

The symposium included a documentary on open data. The video shed light on the importance of open data in daily lives and the benefits that will be reaped by every one for availing such data in easy to use and process formats.

Planning a Successful MES Deployment

While there are challenges in the deployment of a manufacturing execution system (MES) solution, they are proven to provide some of the best returns of any information technology system investment—when correctly implemented. An MES solution is unlike any other information technology system because it impacts so many areas of the business. This impact can be a great thing if it’s managed correctly but can lead to significant problems in deployment if it is mishandled.

Many of the problems associated with MES implementations are a result of businesses failing to do one or more of the following:

  • Take the time to understand the concept of a MES and how to successfully and efficiently leverage the technology within its manufacturing operation
  • Create a functional MES vision that serves as road map for a successful project implementation
  • Justify the project and understand the business case
  • Perform a detailed requirements analysis and a technology assessment to select the right MES software for the business needs.

Often, a failure to identify and recruit the appropriate resources with the required knowledge is the root cause of these problems. Organizations that are new to MES usually struggle not just on the deployment itself, but even more significantly, in the preparatory stages.

Planning a successful MES project

It may surprise some that when it comes to ensuring a successful MES project, most of the key elements occur even before the project begins. The first crucial phase occurs when an MES solution is being considered. When it comes to planning an MES project, business leaders first need to answer the following important questions:

  • Do I understand the capabilities of MES and how they relate to my business?
  • What do I want from an MES implementation?
  • What do I need from an MES implementation?
  • How am I going to measure success?

Answering these questions is vital, as the biggest cause of failure when it comes to MES implementations is a lack of understanding and foresight.

Once this initial consideration is complete, the formal planning process can begin. The process steps are as follows:

1. MES project justification. Businesses must justify the project by developing a comprehensive business case and performing a realistic return of investment (ROI) analysis. Often, there is a mismatch between expectations and what can be delivered if the business case and ROI are not fully understood. An additional benefit to this phase is that it asks businesses to analyze their manufacturing processes in depth, which can lead to the discovery of other potential efficiencies surplus to the MES effort.

2. Concept of operations (CONOPS). Once the project has been justified and there is an understanding of where the best returns lie, manufacturers must take the time to understand the concept of an MES and how to successfully and efficiently leverage the technology within their manufacturing operation. By developing a CONOPS document, manufacturers establish a vision of how operations will change with the MES implementation, while creating policies and providing a framework for project decisions. MES deployment impacts almost every area of a business, and one of the most crucial aspects to a successful deployment is change management. The CONOPS paints a clear picture of what the change will look like.

3. Information technology (IT)/operational technology (OT) strategy. Following the development of the CONOPS, manufacturers must:

  • Define the role of the MES system and correctly place ownership of the implementation project and the system within their organization’s structure
  • Define the MES integration strategy and how it relates to all other systems
  • Define the long-term rationalization and standardization objectives
  • Develop a detailed system user requirements specification.

4. Implementation planning. Once the more notional elements of the preparatory phase have been completed, manufacturers can create a more pragmatic plan. To begin planning the MES implementation, companies need to establish the overall scope of the project. The elements that should be covered in detail are as follows:

  • IT requirements
  • Paper record migration
  • Operator training
  • Data migration
  • External initiatives
  • Project constraints
  • Standard operating procedure updates.

Once the project scope has been defined, businesses can develop a deployment and validation strategy and create a schedule, which should include project milestones, and a budget estimate. It is imperative that planning in an MES project is done upfront. If the right steps are taken, and the effort is put in during the early planning phase, it will ensure that there are fewer surprises later. While there is an additional cost associated with this upfront analysis, it is far outweighed by the expenses associated with an MES project derailing closer to the go-live date.

About the author

James O’Brien is global MES business unit lead, Zenith Technologies.

Peugeot to Unveil Autonomous Electric Concept

Green Information Technology Services Market – Software Development and Optimization Propells Growth

Green information technology (IT) covers services related to environmentally sustainable computing and IT optimization. The technology aims at minimizing the negative impacts of IT operations by manufacturing, designing, and disposing of servers, computers, and other associated subsystems such as networking systems, communication systems, printers and monitors, and storage devices in an environmentally-friendly manner.

The motive behind deploying green IT practices is to reduce the dependence on hazardous materials, thus promoting biodegradability of outdated or unused products and maximizing the energy efficiency through a product’s lifetime.

Get More Information @

The concept of green IT services was first coined in 1992 when Energy Star was launched by the U.S. Environmental Protection Agency. Energy Star is a voluntary labeling program that helps enterprises save money and curb greenhouse gas emissions by identifying the products that offer energy efficiency. Apart from the aforementioned components, green IT also includes redesigning data centers. The market for green IT services has been gaining impetus from the growing popularity of virtualization, cloud computing, and green networking.

Software development and optimization are dependent on several factors such as algorithmic efficiency, virtualization, resource allocation, and terminal server’s optimization. Many enterprises are keen on adopting green technology and are looking for vendors who can help them in offering green IT services to their clients, subsequently assisting them in reducing costs incurred on data centers and other IT services.

Large-scale organizations around the world have already started deploying criteria or metrics on water use or power use. Apart from tracking their corporate carbon footprint, these companies are also ensuring optimal utilization of assets by promoting the reuse of IT components instead of investing in new ones. The IT services market therefore has been gaining significant momentum from the capital intensive approaches adopted by companies.

PDF Brochure For Future Advancements @

Apart from the ICT industry, the hospitality, banking and financial services, manufacturing, pharmaceuticals, and various other industries are joining the green IT and sustainability trend.

The global green IT services market is majorly driven by the increasing desire among the corporate and IT sector to improve efficiency and reduce costs. The market is also gaining from favorable government initiatives encouraging the implementing of green projects. Currently, green IT solutions are focusing on data centers, thus providing opportunities for leading vendors to expand their reach into other IT functionalities.

China is weaponizing online distraction

The new European data protection law requires us to inform you of the following before you use our website:

We use cookies and other technologies to customize your experience, perform analytics and deliver personalized advertising on our sites, apps and newsletters and across the Internet based on your interests. By clicking “I agree” below, you consent to the use by us and our third-party partners of cookies and data gathered from your use of our platforms. See our Privacy Policy and Third Party Partners to learn more about the use of data and your rights. You also agree to our Terms of Service.

I agree

Infostretch Wins IMPACT18 Marketing Award for DTV, The Digital Transformation Channel on YouTube

SANTA CLARA, Calif.–(BUSINESS WIRE)–A new, innovative use of YouTube, featuring technology leaders and how they are interpreting digital transformation and implementing it across their organizations, has earned the industry’s IMPACT marketing award. Infostretch, a leading enterprise digital solutions provider, launched “DTV: the Digital Transformation Channel” early this year, and the site was recognized as “The Best Use of YouTube.”

Presented by the Internet Marketing Association at the IMPACT18 conference, the annual IMPACT Awards exemplify “best-in-class creativity, expertise and results achieved by the top practitioners of Internet marketing across every business segment.”

DTV features firsthand accounts from Digital Transformation frontlines from Fortune 1000 companies and experts across the globe. Topics run the gamut of information technology’s most timely and business-critical trends including digital strategy, development, DevOps, quality engineering, cloud, IoT, data analytics and mobility.

“This is an era where every organization from every industry is tasked to digitally transform,” said Leila Modarres, Chief Marketing Officer, Infostretch. “We launched DTV to help demystify the concept of Digital Transformation by featuring experts from our ecosystem of customers, partners and industry leaders in short, easy-to-digest videos. DTV is an opportunity for innovators and thought leaders to communicate best practices and their vision of what the future holds for the next phase of this digital era.”

“With unbiased insight from a variety of industry experts captured in video and available in a podcast format, DTV can inform a wider audience than would not be possible through conventional marketing channels like e-books, whitepapers, or e-mail campaigns,” she added.

The Internet Marketing Association is one of the fastest growing professional organizations in the world. Its mission is to provide a unique knowledge-sharing platform where proven internet marketing strategies are demonstrated and shared to increase each member’s value to their industry and their organization.

About Infostretch

Infostretch is a digital-first professional services firm. By combining in-depth experience with ready-made tools, frameworks, technologies and partnerships, Infostretch helps enterprises get digital right, the first time. With an experienced team of digital technologists, Infostretch offers Digital Strategy, Digital Development, DevOps, Quality Engineering, Cloud, IoT, Data Analytics and Mobility services. The company is trusted by leading Fortune 100 companies as well as emerging innovators to deliver solutions that work seamlessly across channels, leverage predictive analytics to optimize the software lifecycle, and support continuous innovation. For more information on how solutions and services from Infostretch accelerate digital transformation, visit