Tag: black

Dell EMC names WWT as its black knight

BlackknightDell EMC has announced WWT was a partner who would be heading to its new exclusive titanium black status.

The vendor had already revealed in October that there would be would have three main levels: titanium, platinum and gold, with something called titanium black.

Those who were platinum partners would be eligible to go for the Titanium Black level and it appears that World Wide Technology (WWT) has been given the chance to be the first.

Dell said that WWT was one of a select number of companies to be awarded Titanium Black status in the updated DellEMC partner programme.

“This new, highly exclusive status is an extension of the Titanium Tier within the Dell EMC Partner Program and will apply globally to all entities under the CDW banner.”

Needless to say, Bob Olwig, vice president of business development and innovation at WWT was chuffed.

“We established this strategic partnership to provide enterprise customers with hands-on access to Dell EMC technology for private and hybrid cloud, storage, data protection and availability, converged infrastructure, big data analytics, security and the Internet of Things,” Olwig said.

John Byrne, president, Dell EMC global channels, is hoping that the Titanium Black level was the best of the best. Partners with Titanium Black status had to place a big bet on Dell EMC.

“They’re going above and beyond. They’re investing heavily in us and we are returning the investment in them so they can continue to achieve the extraordinary,” he wrote in a pre-Christmas blog post.

“Titanium Black provides a rare and distinctive opportunity far and above what partners have experienced anywhere in the industry Together, through the Dell EMC Partner Program, Dell EMC and our partners will attack the market—with our Titanium Black partners leading the way. We’ll deliver incredible transformation for our customers. We’ll be the channel to watch,” Byrne said.

Blue screens hit Black Tuesday

Backstreet_Boys_-_Black_&_Blue_album_coverThree different patches from this week’s Black Tuesday crop are causing Blue Screens of Da’ath,   causing some users to plunge into the abyss.

MS14-045/KB 2984615 kernel-mode driver patches, KB2976897 and KB2982791, have been implicated in triggering Blue Screen Stop 0x50 messages since users starting updating their systems this week.

Most of the people suffering from most of the glitches say they are using 64-bit Windows 7 but the  Windows 8.1 “Update 2” fix that adds the ruble character as an official currency marker in Win 8.x and Win7, KB 2970228, also seems to be causing the problem, too.

There is no word from Microsoft on the problem yet, but it would appear that if you have not upgraded your system on Patch Tuesday it might be a good idea not to do so for little while.

You just knew that something was going to go wrong when you saw the number of patches that Microsoft was asking you to install.

Microsoft released 41 updates, including one that fixed an Internet Explorer vulnerability that may allows hackers to take control of a computer.

Included in the updates were two patches that were meant to fix “critical” problems. The first one, with the title “Cumulative Security Update for Internet Explorer,” addresses 26 vulnerabilities: one publicly disclosed and 25 that were privately reported. In the most severe cases, the vulnerability may allow attackers to have the same rights as the legitimate user. The security hole can be exploited when a user views a malicious website using Internet Explorer. Before the patch, users who had administrative rights on their computers were more susceptible to the security flaw.

Another critical patch, with the Bulletin ID MS14-043, is meant to fix a security flaw in Windows Media Centre that may also allow for remote code execution.

Aside from the critical patches, there were updates that have been labelled as “Important.” The software that have been tapped for the patches include OneNote, SQL Server, Microsoft SharePoint Server, .NET Framework and Microsoft Windows itself. The problems range from the remote code execution, elevation of privileges and security features bypass.