Starting on September 18, Gmail and Inbox by Gmail on Android, iOS, and the web will begin converting text to interactive hyperlinks whenever they detect phone numbers, addresses, and email addresses in emails.
Clicking an address link will take the user to Google Maps. Clicking an email address will compose a new email, using the user’s default email client.
Finally, when using a mobile device, clicking a phone number will start a call request using the default phone app.
Launch Details >>
Available to all G Suite editions
Synology® Inc. announced the official launch of new product lineup featuring:
To allow for ultra-high performance using SSD cache without occupying internal drive bays, DS3018xs features a PCIe slot, which can be installed with a dual M.2 SATA SSD adapter card (M2D17). DS918+ comes with dedicated dual M.2 NVMe slots at the bottom where you can directly install M.2 NVMe SSDs. DS418 features 10-bit H.265 4K video transcoding.
DS3018xs, Synology's first 6-bay tower NAS, is compact but powerful as it features the advanced processor Intel Pentium D1508 dual-core 2.2GHz (Turbo Boost up to 2.6GHz) with AES-NI encryption engine, offering scalability of RAM up to 32 GB and of storage capacity up to 30 drives with two Synology DX1215.
In addition to four Gigabit LAN ports, DS3018xs takes advantage of boosting maximum throughput with an optional 10GbE network interface card, delivering stunning performance at over 2,230 MB/s sequential reading and 265,000 sequential read IOPS.
DS918+ and DS718+ are powered by Intel® Celeron® J3455 quad-core processor. DS218+ is powered by Intel® Celeron® J3355 dual core processor. All these models are equipped with AES-NI hardware encryption engine. Powered by transcoding engine, these Plus-series NAS servers support up to two channels of H.265/H.264 4K video transcoding. The RAM can be scaled up to 8 GB for DS918+, and up to 6 GB for the other two products, allowing you to operate more intensive tasks at once. DS918+ and DS718+ are equipped with two LAN ports, and their storage capacity can be scaled up to 9 and 7 drives respectively with Synology DX517.
"Responding to the demands from our customers, DS3018xs is built as a comprehensive business-ready desktop NAS. Running mission-critical applications or planning virtualization deployment with DS3018xs has never been easier." said Vic Hsu, CEO of Synology Inc. "The new DS918+, DS718+, and DS218+ are optimized to be your digital video libraries, and will bring you excellent experiences with high definition live video transcoding anywhere you go."
DS418 is equipped with a 1.4GHz quad-core processor with hardware encryption engine, 2 GB RAM, and two LAN ports. Powered by the hardware transcoding engine, DS418 supports H.265 4K transcoding to serve as your media library. DS418 is ideal for offices and home users to manage, protect, and share the critical data efficiently.
DS3018xs, DS918+, DS718+, DS218+, and DS418 run with DiskStation Manager (DSM) 6.1, one of the most advanced and intuitive operating systems for network-attached storage devices which offers a wide range of applications to bring better productivity at work. Synology has received numerous media accolades, such as topping the mid-range NAS category in TechTarget's storage solution survey and PC Mag Readers' Choice for seven years in a row.
For more information>>
ESET announced that GREYCORTEX, a network security provider joins the ESET Technology Alliance, expanding its scope with the advanced network security, visibility, and performance monitoring solution: MENDEL. The solution creates an advanced layer of protection for organizations, governments, and the critical infrastructure sector, while also providing rapid detection and response to security breaches and other incident types.
Nowadays, businesses face much more sophisticated threats than in years prior. Just a brief look back at 2017’s massive malware campaigns shows just how quickly we can be deprived of control over the most valuable resource of all - data. The critical importance of cybersecurity was recently highlighted, first by the outbreak of the WannaCry ransomware; which left many in the healthcare sector paralyzed, then subsequently Petya ransomware; a targeted supply-chain attack that appeared to spread out of control.
Built on a decade of extensive industry and academic experience, GREYCORTEX uses advanced machine learning and data analysis to help protect sensitive data, networks, trade secrets, and reputations, which might be left unknowingly unprotected.
“In order to protect their IT networks, organizations need to be able to react quickly and effectively,” said Petr Chaloupka, CEO, GREYCORTEX. “MENDEL is built around specialized algorithms and extensive academic research providing deep insight into network traffic in order to make the detection of advanced threats such as WannaCry or other behavioral anomalies more sensitive and reliable, while simultaneously decreasing the costs of operation.”
As a solution, GREYCORTEX MENDEL is able to detect known and unknown malware, ransomware, RATs, Trojans, Zero-day attacks, etc., as well as targeted threats to infrastructure – all of which are able to dwell for long periods within a network, undetected by other network security solutions. Moreover, MENDEL is able to identify insider threats, network performance issues, and provide full visibility of every device on the network, up to, and including the application layer. For IT security teams, this means not only greatly improved threat detection, but full network visibility for incident investigation.
“There are never enough layers of security for one’s network infrastructure,” said Jeronimo Varela, Director of Global Sales at ESET. “The GREYCORTEX solution provides an analysis of any behavioral anomalies that may go unnoticed. Moreover, the solution is easily integrated into the infrastructure of businesses of any size and can work not only as a detection or monitoring tool, but also to provide visibility into the functionality of additional security components.”
Launched in 2013, the ESET Technology Alliance is an integration partnership that aims to better protect businesses by offering a range of complementary IT security solutions. All members of the ESET Technology Alliance are carefully vetted against a set of established criteria to extend “best-in-class” business protection across IT environments.
REDWOOD SHORES, Calif., Aug. 17, 2017 (GLOBE NEWSWIRE) — Securonix, the market leader in big data security analytics and advanced threat detection has been recognized by the Software & Information Industry Association’s (SIIA) prestigious 2017 CODiE Award for Best Big Data Reporting and Analytics Solution.
Securonix SNYPR is a big data security analytics platform that leverages machine learning based techniques to power the next generation of advanced threat detection. The SNYPR platform empowers alert fatigued security operations center (SOC) and security incident response analysts, helping predict, detect and respond to advanced insider and cyber security threats that legacy SIEM and log management tools are unable to find.
“We are particularly honored to be recognized by a body of highly selective peers in the software industry for our innovation and leadership in big data security analytics”, said Sachin Nayyar, Securonix CEO. “Securonix SNYPR was also placed as a “Strong Performer” earlier this year in the “Forrester Wave: Security Analytics Platforms”. This acknowledgment from SIIA further validates our efforts aimed at re-defining cyber threat detection by leveraging the power of entity context, machine learning, and big data.”
The SIIA CODiE Awards are unique in that they are the only peer-recognized program in the content, information, education, and software technology industries so each CODiE Award win serves as incredible market validation for a product’s innovation, vision, and overall industry impact.
Securonix SNYPR has won several awards for its product leadership as security teams struggle with their legacy SIEM deployments’ increasing lack of effectiveness against advanced hackers and insider threats, while simultaneously seeing the cost of their deployment balloon out of control. SNYPR, built on an open Hadoop data store and a full stack big data architecture provides the bleeding edge in security analytics, increasing threat detection accuracy, reducing false positives and giving cyber security personnel the information they need to respond to modern threats facing their organizations. The open data model enables organizations to ingest data once and analyze it many times using your own custom or third-party applications.
Securonix radically transforms enterprise security with actionable intelligence. Our purpose-built security analytics platforms mine, enrich, analyze, score and visualize data into actionable intelligence on the highest risk threats to organizations. Using signature-less anomaly detection techniques, Securonix detects data security, insider threat, and fraud attacks automatically and accurately.
Chaos Group’s Hybrid Rendering Technology is now available in V-Ray 3.6 for Maya. Now, you can render on NVIDIA CUDA GPUs, CPUs — or a combination of both.
Learn more >>.
New and improved features include:
Adobe (Nasdaq:ADBE) and Microsoft Corp. (Nasdaq:MSFT) recently delivered their first set of joint solutions to help enterprises transform their customer experience with Adobe Experience Cloud, Microsoft Azure and Microsoft Dynamics. The companies are now expanding their strategic alliance to increase workforce productivity and drive more efficient business processes. Beginning today, Adobe Sign, the market-leading e-signature service in Adobe Document Cloud, is now Microsoft’s preferred e-signature solution across the company’s portfolio, including the 100 million monthly commercial active users of Microsoft Office 365. In addition, Microsoft Teams, the new chat-based workspace in Microsoft Office 365, is now the preferred collaboration service for Adobe Creative Cloud, Document Cloud and Experience Cloud. In addition to product integrations, Adobe will make Microsoft Azure its preferred cloud platform for Adobe Sign.
Together, Adobe and Microsoft will ensure individuals and teams can efficiently collaborate, communicate and drive decision-making across devices.
Adobe and Microsoft are the leaders in document and productivity software, with a rich heritage of innovating to deliver ubiquitous solutions that touch hundreds of millions of customers through integrated desktop tools, innovative mobile apps and cloud-based services. In addition to the partnership announced today, the companies will explore opportunities to continue collaborating on artificial intelligence, analytics and intelligent document automation, taking productivity in the cloud to the next level.
“Adobe and Microsoft are working together to redefine what the modern enterprise experience looks like with collaboration, identity, data and intelligence at the core,” said Abhay Parasnis, chief technology officer, Adobe. “Together we will develop integrated cloud services with best-in-class solutions like Adobe Sign and Office 365 that help businesses digitally transform while delivering great experiences to their customers.”
“Together with Adobe, we’re committed to fostering creativity and a culture of teamwork for our shared customers, so they can unlock the opportunities of today’s rapidly evolving workplace,” said Peggy Johnson, executive vice president, Business Development, Microsoft. “We’re thrilled that our partnership with Adobe has now grown to span our three clouds —Microsoft Azure, Office 365 and Dynamics 365 — providing customers with the powerful integrations they need to navigate digital transformation.”
“When Adobe and Microsoft team up to innovate, their customers win,” said Jamie McLellan, chief technology officer, J. Walter Thompson Worldwide. “As power users of Microsoft Teams, Adobe Sign and Adobe Creative Cloud, we’re excited to realize the immediate impact delivered by these integrations that will enhance creativity, teamwork and overall productivity across our agency.”
“The most successful companies today are relentlessly focused on helping employees be more effective. Productivity suffers when work requires multiple applications that don’t interact,” said Alan Lepofsky, VP and principal analyst at Constellation Research. “The integration of team collaboration, electronic signatures and creative content provides customers with huge efficiency gains, and paves the way for how people will get work done in the future.”
Adobe Sign for Microsoft Dynamics and Microsoft SharePoint is already available. New Adobe Sign integrations for Microsoft Teams, Microsoft Flow, Microsoft Word, Microsoft PowerPoint and Microsoft Outlook are expected to be available in the coming weeks. Adobe Creative Cloud integration with Microsoft Teams is also expected to be available in the coming weeks with Experience Cloud integrations to follow.
Autodesk and GE Appliances® are looking for a few innovative robots before 2025 that will help run a modern home. Design the robot of the future today in the Autodesk Design for Robotics Challenge. Entrants have the chance to win a new Apple MacBook Pro, a VEX Robotics kit, or a SpaceMouse Pro - all tools to help you advance your 3D modeling skills!
Winning entries will be chosen by engineers and designers from GE Appliances, and the top three designers will also receive virtual mentoring sessions and a design review session with a judge from GE Appliances.
Create an original design with your CAD tool of choice, or quick-start your robotics design with an Autodesk Fusion 360 start file. Fusion 360 is free for students and works on both Mac and PC.
All entries must contain a 3D model file plus a render of the file. Additionally, you have the option to submit a description or a YouTube video about your design.
To participate you must be at least 13 years old and a student. See [ Official Rules ] for details.
TrapX has earned the Innovative Product of the Year – Threat Detection award at the Cyber Security Awards for its TrapX DeceptionGrid™.
TrapX DeceptionGrid™ provides a multi-tier deception architecture that is designed to match attackers’ techniques and deceive them at every step. This includes deception Tokens (lures) and medium and high-interaction Traps (decoys). DeceptionGrid baits, traps and engages attackers by deploying camouflaged Traps and Tokens among organisations’ actual IT resources.
Judge Karla Jobling said “The competition this year was really exciting, as innovation and changes in the industry really shone through. There were so many fresh ideas and success stories, it has been challenging to pick the best. There were also a record number of applicants, making the competition in many categories, even tougher.”
“It’s wonderful to be named as winner for the Cyber Security Awards and gain added recognition for our hard work and success,” said Eran Barkat, CEO of TrapX Security. “Having been the first to market with a solution in the deception space, we are proud not only to have won the award but also, to see, for the first time, other deception vendors qualifying to compete. This reaffirms the growth of the deception space in which we continue to lead the market.”
The Cyber Security Awards were established in 2014, to reward the best individuals, teams and companies within the cyber security industry. Excellence and innovation are core themes, throughout all categories.
Corona is fast, it’s easy to use, and renders beautifully. From the beginning, our mission has been to help all artists and designers visualize anything they can imagine, and to push the boundaries of what rendering can do. Render Legion shares this same vision and together we believe that great visualization benefits us all.
The first thing you should know is both Corona and V-Ray are here to stay. Both products will continue to be developed independently by the same teams that you’ve come to trust, with the same level of innovation that you’ve come to expect. Now we can share ideas, research and technology to make both renderers as powerful as possible. One advantage of being an independent company is you get to choose your own path. What’s exciting about Render Legion is they come from that same mindset, which makes it easy for us to work towards the same vision. Together, we’ll continue our commitment to the industry and to our communities.
What just happened?
The entire Render Legion team, and the Corona Renderer, are now a part of Chaos Group.
Why did Chaos Group acquire Render Legion?
Render Legion is a brilliant team, and we share the same passion and vision. By working together, we can make both V-Ray and Corona better — in ways we couldn’t do alone.
Will Render Legion continue to develop the Corona Renderer?
Yes. The core Render Legion team will continue to develop the Corona Renderer with our full support. It’s an excellent product, and we’re committed to its success. In fact, we plan to expand its development team even more.
Will Chaos Group continue to develop V-Ray?
Yes. V-Ray will continue to be a core component of Chaos Group.
We are already working with the Render Legion team to make Corona and V-Ray even better. For example, our DMC sampler will be in Corona 1.7, and we’re already optimizing V-Ray’s dome light with the help of the Render Legion team. And that’s just the beginning.
In general, it’s still business as usual. You still buy both products from the same places; you still talk to the same people; the only update is now everything is under one roof.
August 24, 2017 — Synology® Inc. announced the official release of Surveillance Station 8.1, which boasts faster performance and provides a more complete surveillance solution than previous versions with the introduction of the remote recording archiving feature, the integration with transaction devices and intercom cameras, and the ability to intelligently switch between different security levels.
In this new release, we focused on enhancing performance and providing a complete surveillance solution for homes and retail businesses." said Ruby Lin, Product Manager at Synology Inc., "The integration of POS systems with surveillance videos, and the capability to archive recordings remotely from branch offices to headquarters, provide users a more complete retail solution. With new features that enable automatic switching between different security levels according to the location of the mobile device, and the integration with intercom systems, Surveillance Station 8.1 strives to deliver the most convenient and safe monitoring experience to home users. Additionally, the GPU decoder lets users use built-in graphic cards from the CPU to achieve blazing fast performance on Surveillance Station Client.
Remote recording archiving:
Designed to help chain stores when individual branches have limited storage space, Surveillance Station now lets users customize the recording time and event type which will be archived to a remote location, such as the company's headquarters. Users will also have the ability to setup the execution time for archiving tasks and implement bandwidth control to prevent archiving tasks from affecting usual network activity.
Stores can now monitor every transaction with corresponding videos, and quickly resolve disputes by searching historical records via an intuitive interface. Users can also choose to receive notifications whenever there are abnormal transactions, or customize their notifications with the Action Rule application.
Intercom camera* integration:
With the integration of intercom cameras, users now have the ability to interact with visitors like never before. With functions such as video surveillance, doorbell, door lock operation, and two-way audio, intercom cameras provide users a new level of flexibility. In addition, users also have the ability to search through historical records in Surveillance Station, correspond with visitors via two-way audio and even enter the surveillance area with one-time manual access via DS cam.
For home security, Surveillance Station 8.1 provides two different security settings depending on whether the user is at home or away. Users can switch between different security modes manually, via a schedule, or automatically by Geofence. When switching to a different security setting, the system will adjust to different recording schedules, notification settings, stream profiles, and activate specific action rules.
With support for HTML5, users are no longer required to use Surveillance Station Client or install plugins on Internet Explorer and Safari to manage Surveillance Station. On Surveillance Station 8.1, users can now view videos directly in Chrome.
GPU acceleration is now supported in the Windows version of Surveillance Station Client. After upgrading to Surveillance Station 8.1 and enabling the GPU acceleration option, users can now enjoy smoother performance by leveraging the built-in graphics card. This eliminates the need to buy additional graphic cards and significantly reduces CPU usage while providing a much smoother video display.
To learn more about Surveillance Station 8.1, please visit https://www.synology.com/surveillance.
Surveillance Station 8.1 is available for free download on DiskStation Manager in Package Center, and is compatible with Synology DiskStation, RackStation, and NVR models running DSM 6.0 and above.
Citrix announced it has been named as a leader in the IDC MarketScape: Worldwide Enterprise Mobility Management Software 2017 Vendor Assessment.
The IDC MarketScape highlighted XenMobile integration capabilities along with strong remote access control, VPN and granular inspection and security of mobile traffic as key differentiators.
According to the report, “For all-in Citrix environments, XenMobile is the most logical choice of EMM platform to integrate with a larger Citrix Xen-based application and desktop delivery architecture. Even for customers not going all the way with Citrix Workspace concept, having these products together is an advantage from a cost and overall management perspective.”.
Citrix has been relentlessly focused on making XenMobile deliver more than traditional EMM solutions as we recognize that customers need a complete digital workspace. This recognition from IDC illustrates the value of this investment and our commitment to making XenMobile help our customers embrace the future of work.
VP of Product Marketing, Apps Delivery
Manufacturers want a simpler software experience.
They want one set of tools that talk to each other, so that product designers can easily pass 3D models to Engineering to simulate and test designs, and Engineering can in turn pass final designs to the production team to set up machining.
In recognition of this clear desire from manufacturers, Autodesk making a pretty big change to what we called our Product Design Collection.
Autodesk adds simulation and CAM tools to the very rich set of design and engineering tools already included. As such, Autodesk rechristening it as the Product Design & Manufacturing Collection.
By Stephen Hooper, Sr. Director, Manufacturing Business Strategy & Marketing
With these changes available starting this week, the Product Design & Manufacturing Collection has all the professional-grade tools needed by any product development team to go from design and engineering all the way through production. It’s a set of integrated 2D and 3D CAD, CAE and CAM applications for product development and manufacturing planning.
Another way to look at the updated Collection is that it delivers the best Inventor experience we’ve ever offered. The professional-grade modeling and design automation tools of Inventor Professional are now paired with simulation, 5-axis CAM, and factory planning and optimization tools – all completely integrated into the Inventor experience.
Customers who subscribe to the Collection also get the benefit of a future-proofed toolset. While all updates for subscribers may not be as big as this one, we are committed to delivering continual enhancements to the included software, incorporating disruptive tools like our cloud-based Fusion 360 product innovation platform, and adding new technologies like generative design.
You also still get AutoCAD and you still get Navisworks, Vault, ReCap Pro, 3ds Max, Factory Design Utilities and more.
In short, the sum is greater than the parts, but the parts are pretty great too.
These workflows extend Inventor far behind its traditional design-focus and into the world of manufacturing and help customers accomplish more.
The Product Design & Manufacturing Collection is available globally and the software included is available in more than eight languages including English, German, Japanese, French, Chinese and others
Organizing an event with a lot of attendees can be complicated. It’s critical that you allocate the right space for the event, understand how many people will attend, and even check if some specific people, like executives or important clients, will be there.
That’s why Google making it easier to effectively manage events of any size in Google Calendar.
Use Google Sheets to more easily see who is attending:
With this launch, organizers of large events can now use Calendar on the web to export guest lists to Google Sheets, and can also view the total number of attendees.
Invite large group mailing lists reliably:
Previously, invites that included large group mailing lists wouldn’t update if membership in those groups changed. Going forward, if a group mailing list has been invited to a newly-created event, Calendar will automatically invite any new group members who join after the invite was sent and automatically remove members who leave.
Available to all G Suite editions
Synology Inc. today launched the new DiskStation DS418j, a budget-friendly 4-bay NAS server designed to help home and individual users to manage, protect and share data effectively.
DiskStation DS418j is powered by a brand-new 64-bit dual-core CPU and delivers an outstanding encrypted file transfer performance at over 112 MB/s reading and 87 MB/s writing under a RAID 5 configuration in a Windows® environment.
"In the digital era, photos, videos, and digital assets are being generated faster than ever. For home and individual users, it is essential to have a private storage solution that can satisfy the needs for both large storage capacity and secure data sharing," said Michael Wang, Product Manager at Synology® Inc. "Combining hardware innovations and rich applications, the 4-bay DS418j allows users to enjoy cloud synchronization and multimedia streaming at a competitive price."
Designed with user experience and energy efficiency in mind, DS418j is equipped with adjustable front LED indicators, allowing users to precisely control and schedule the brightness in four levels. In addition, the model consumes only 21.22 watts in full operation and as little as 8.97 watts in HDD hibernation.
DS418j runs on DiskStation Manager (DSM), one of the most advanced and intuitive operating systems for network-attached storage devices which offers a wide range of applications from backup to multimedia for home and personal use.
With DSM, Synology® has received numerous media accolades, including the PC Mag Readers' Choice for seven years in a row.
Take your photos and graphic design projects to the next level
Subscription-free, professional photo editing family
PaintShop Pro 2018 is your affordable photo editing and graphic design software—without the restrictions of a subscription. Enhance your photos with professional image editing tools, or create impactful designs using layers, text, brushes, gradients, drawing and painting tools.
Get the full photo-editing power of PaintShop Pro 2018 Ultimate — plus an exclusive bonus collection of premium photo software that offers incredible value.
Includes PaintShop Pro + these bonus photo extras:
Only in Ultimate: Bonus premium photo extras
Enjoy an exclusive bonus collection of premium photo software that you won't get with Photoshop. Painter Essentials 5, Perfectly Clear 3 SE, Corel AfterShot 3, and our Creative Collection make up the Bonus Pack, bringing you photo-painting, automatic image corrections, RAW photo editing, powerful batch processing, and more—in one complete photo collection.
The D-process, as it is called, begins in the firm’s East London studio. Just as with many architects, designers using building information modeling (BIM) software create a 3D digital model of the home according to the customer’s budget, site specifications, and design preferences. At Facit, though, the homes are made not from 2x4s and other standard parts, but from a system of precisely designed components that the firm itself makes using the latest fabrication tools.
Construction gets underway after a shipping container with a CNC router—a computer-controlled cutting machine—arrives at the site. The design is downloaded to the router, and the machine mills raw wood panels into modular building blocks for the frame, roof, and other components. (Metal stairs and some other complex pieces are manufactured at Facit and brought to the site.) The router etches a part number into each modular block to guide builders as they assemble the pieces, Lego-like, using large rubber mallets to connect the joints and nail modules into place. In a final step, windows and kitchen and bathroom fixtures are added. Everything fits snugly into place because the router has accurately carved out the right locations for sockets, ducts, light switches, and electric cables.
D-Process resembles the assembly line of a contemporary manufacturing facility in which everything is derived from a single digital model. Like an iPhone, BMW, or jetliner, each Facit home is bolted together in a highly controlled, fluid system. “We believe in manufacturing, and so does the customer because they want the reassurance that every part will be perfect,” says Bruce Bell, who cofounded Facit Homes in 2009 and is an industrial designer by training. “That is what contemporary manufacturing does; we applied that to building homes.”
Did you know about Forcepoint's webcast?
Here is perfect possibility to learn more about methods that enterprises can deploy to lower the risks of non-compliance worldwide.
Failure to do so will not only torpedo your enterprise's reputation, it exposes you to fines, lawsuits, negative publicity and regulatory investigations. Regulators are calling for greater control over personal information, especially at a time when so much public attention is focused on data breaches.
Citrix Systems, Inc. (NASDAQ:CTXS) today reported financial results for the second quarter of fiscal year 2017 ended June 30, 2017.
For the second quarter of fiscal year 2017, Citrix achieved revenue from continuing operations of $693 million, compared to $674 million in the second quarter of fiscal year 2016, representing 3 percent revenue growth.
Net income from continuing operations for the second quarter of fiscal year 2017 was $109 million, or $0.70 per diluted share, compared to $106 million, or $0.68 per diluted share, for the second quarter of fiscal year 2016. Net income for the second quarter of fiscal year 2017 includes a net international tax benefit of approximately $10 million, or $0.06 per diluted share, primarily related to an international statutory tax transaction.
Non-GAAP net income from continuing operations for the second quarter of fiscal year 2017 was $158 million, or $1.03 per diluted share, compared to $157 million, or $1.00 per diluted share for the second quarter of fiscal year 2016. Non-GAAP net income from continuing operations for the second quarter of fiscal year 2017 and 2016 excludes the effects of stock-based compensation expense, amortization of acquired intangible assets, amortization of debt discount, restructuring charges, separation costs, and the tax effects related to these items. Non-GAAP net income per diluted share also reflects the anti-dilutive impact of the company’s convertible note hedges.
Q2 demonstrated a clear acceleration in the momentum of our cloud transformation, with a strong demand for Citrix Cloud and our subscription-based solutions,” said David Henshall, president and CEO of Citrix. “As a result, we are seeing double-digit growth in deferred revenue and an acceleration in overall billings, which proves the value of the innovation that we are delivering to customers and partners and the success we can expect in the future.
Q2 Financial Summary
In reviewing the results from continuing operations for the second quarter of fiscal year 2017 compared to the second quarter of fiscal year 2016:
During the second quarter of fiscal year 2017:
Citrix management expects to achieve the following results for the third quarter of fiscal year 2017 ending September 30, 2017:
Citrix management expects to achieve the following results from continuing operations for the fiscal year ending December 31, 2017:
The above statements are based on current targets. These statements are forward-looking, and actual results may differ materially.
Synology Inc. is now authorized as a CNA (CVE Numbering Authority) by MITRE Corporation. Synology is the first vendor of Taiwan to participate in this program. There are 62 participating CNAs as of June 2017, all of them are the leading enterprises in the specific fields.
"It has always been our top priority to ensure the security of our products and services. Nowadays, we can see Synology users all around the world, the number of which has also been increasing dramatically. Synology is the first company of Taiwan that receives certification of CVE (Common Vulnerabilities and Exposures). It does not only demonstrate the extent to which we value Synology users, but also how far we have advanced in line with first-class major manufacturers in this field with our R&D resources," said Vic Hsu, the CEO of Synology Inc.
Designated as a CNA, we are capable of assigning the CVE IDs of our own Synology vulnerabilities. Synology provides enhanced and comprehensive security solutions, allowing your NAS to adapt more quickly to evolving technology, business needs, and sophisticated threats.
Businesses are challenged to offer secure access to a broader array of services and applications while guarding against increasingly sophisticated threats. Synology is committed to improving cyber security. Upon receiving a vulnerability submission, we will make a preliminary assessment within 8 hours, and fix any vulnerability within a day. A patch will be available within a short period of time after confirmation. We ensure the products you have is secure and reliable all the time.
Synology also holds bounty programs every year and invites top hackers to enhance the security of Synology products. Keeping user information safe and building a more secure product are our mission. We welcome the contribution of external security researchers and look forward to awarding them for their invaluable contribution to the security of all Synology users.
[i] Common Vulnerabilities and Exposures (CVE®) is a dictionary of common names (i.e., CVE Identifiers) for publicly known cybersecurity vulnerabilities. CVE's common identifiers make it easier to share data across separate network security databases and tools, and provide a baseline for evaluating the coverage of an organization's security tools. CVE is maintained by MITRE Corporation that is American not-for-profit organization based in Bedford, Massachusetts, and McLean, Virginia. It manages Federally Funded Research and Development Centers (FFRDCs) supporting several U.S. government agencies. For more information on MITRE Corporation, please visit the MITRE official web page.
Businesses today must quickly adapt to the demands of a global economy and workforce. Success is increasingly defined by the ability to optimize and protect the information surrounding people, organizations and devices. To help businesses tackle these challenges and fully embrace the benefits of flexibility and scale that cloud delivers, Citrix today announced extensions to its long-term strategic relationship with Google. Customers will be able to use Citrix Cloud to provision and manage secure digital workspaces, including Citrix Workspace Service, on Google Cloud Platform.
Citrix and Google are working together to bring cloud delivery of applications and desktops, and secure cloud-optimized endpoints to their enterprise customers who are increasingly looking to both public and hybrid clouds to solve their business requirements for secure digital workspaces.
Along with these new cloud solutions, Citrix and Google also announced new integrations, available today, between Citrix ShareFile and Google G Suite that enable follow-me-data when using Citrix workspace solutions. A new ShareFile plug-in that allows the secure sharing of files via Gmail and a ShareFile connector to Google Drive provides users with one place to find all their documents. In addition, Citrix NetScaler CPX is available now on Google Cloud and is targeted for availability in the Google Cloud Launcher marketplace by the end of the quarter. Google Cloud’s emphasis on containers and the Kubernetes orchestration system will allow the developer community to use NetScaler CPX to easily build and scale secure applications in the cloud.
With Citrix Cloud services integrated with Google Cloud, Google customers will have the ability to easily add virtual apps and desktops that run on Google Cloud and use them alongside the G Suite productivity suite.
Citrix and Google continue to work on delivering secure end point solutions for accessing digital workspaces with the recently announced Citrix Receiver for Chrome 2.4, which offers true multi-monitor support on Chromebooks. Google recently announced official Chrome Browser support for Citrix along with graphics optimizations available only on XenApp.
Google and Citrix product teams continue their collaboration to enhance and optimize XenApp delivery to Chrome OS based devices for enterprise customers with ongoing Receiver for Chrome updates.