Archive for January 2008

SaberLogic Releases Logicity Crystal Reports Viewer and Management Software

SaberLogic releases Logicity, a Crystal Reports viewer and management application. With both free and professional versions available, Logicity provides affordable report management and distribution capabilities normally only found on other high-end report management applications.

Wadsworth, OH (PRWEB) January 29, 2008 — SaberLogic has announced the release of Logicity, a Crystal Reports viewer and management application. In addition to providing the ability to view and refresh the data on pre-developed Crystal Reports, the free version of Logicity allow users to print, save, email, and export reports. The Professional version of Logicity allows users to schedule reports, password protect reports, use run-time variables, and even pass parameters via command-line. It also offers end users a streamlined, workspace interface from which to organize and execute reports.

News Image

Logicity utilizes a special file called an RRD (report runtime definition) to control the performance of Crystal Reports for end users. RRD files can be set-up to replicate the functionality of many high-end report management applications. Logicity can be used to save report instances, schedule the delivery of reports, log the execution of reports by end users for compliance requirements, and even Crystal Reports bursting.

Logicity is a ground-up re-write and re-branding of SaberLogic RPT Tool, which had been available for free since 2002. Logicity was developed with .NET architecture and was built using the Business Objects toolkit. It is compatible with Crystal Reports versions 8.5, 9, 10 and XI. Crystal Reports 2008 compatibility will be available by the second quarter of 2008.

Logicity can be downloaded for free at The website also includes documentation and an online forum for free support. Logicity Professional is available for $45 per user or $4,500 for a site license. Installation support is available and technical support incidents can be purchased. Organizations that wish to resell Logicity should contact SaberLogic for more information.

For more information on Logicity and Logicity Professional, please contact Eli J Remington or visit

About SaberLogic:
SaberLogic is a Crystal Reports consulting and custom programming firm located in Wadsworth, Ohio. Started in 2002, SaberLogic now serves hundreds of clients from SMB to Fortune 500. SaberLogic is a Business Objects bronze partner.

ChicagoCon 2008s – World Class Security Training & Ethical Hacking Conference

ChicagoCon 2008s from May 12 – 18, 2008 features all new keynoters, additional security boot camps, exams on-site followed by two days of ethical hacking presentations and breakout sessions. And without an exhibit hall full of sales pitches, you're free to learn from the pros, network with peers and advance your infosec career.


Westchester, IL (PRWEB) January 29, 2008 — Presented by the Ethical Hacker Network (EH-Net) and its parent company, The Digital Construction Company (TDCC), ChicagoCon is positioned to become the premier security event in the industry by bringing together the biggest names in education and certification under one roof for a week of security training like no other. With boot-camp style, hands-on classroom training, the (s)pring edition of ChicagoCon will host 13 courses from May 12 – 16 featuring a cross-section of the security landscape. We will also showcase researchers and InfoSec professionals during the conference portion of the event from May 16 – 17. From the novice, to the ultimate techie to those reaching for the CISO chair… everyone interested in a career in security will find something at ChicagoCon, your one-stop shop for security training and certification.

News Image

But ChicagoCon is not just another boot camp, security conference or hacker con. It's all of those wrapped into one. By providing top instructors, well known certifications, and 2 days of presentations, this unique event adds plenty of additional value to already strained training budgets. As a bonus, daily keynote addresses by industry experts Special Agent Patrick M. Geahan (FBI Cyber Crimes Division), Ralph R. Echemendia (world renowned hacking instructor), Mike Murray (Director Neohapsis Labs) and James Shewmaker (SANS GIAC Advisory Board) will be presented only to the training students. Luke McOmie of TruTV's Tiger Team will provide the opening keynote for the conference on Friday afternoon for all to enjoy.

"With the support shown during the first ChicagoCon last September, the Chicagoland area has not only shown the capacity to host a world-class security event but also the desire to have it thrive for years to come," says TDCC CEO, Deana L. Donzal. Wider educational support continues to grow as well with the addition of Microsoft, Offensive Security, the SANS Institute, and the Security Certified Program (SCP). They join current educational sponsors CompTIA, EC-Council, IACRB, (ISC)2, LearnSecurityOnline and the SOX Institute.

When it comes to training and certification, instructors make all the difference in the world. For that reason, TDCC chose to partner with award winning training providers, Training Camp (Premier Partner), InfoSec Institute, Offensive Security and the SANS Institute and all are offering discounts to their normal prices for all ChicagoCon attendees. Together the assembled list of instructors is impressive, all of which are prominently displayed with full biographies to bring the following 5-Day classes:


– PMP/CAPM – Project Management
– SOX Compliance
– CISSP — Security Management (7-Day Course with exam on-site)


– Ethical Hacking Fundamentals with CompTIA's Network+ and Security+
– CCNA – Cisco Certified Network Associate (Covers New CCENT and CCNA Material)
– Microsoft ISA Server 2006 (70-351)


– CEH (CNDA) – Certified Ethical Hacker
– CHFI – Certified Hacking Forensics Investigator
– ECSA – EC-Council Certified Security Analyst

Advanced Hacking

– BackTrack to the Max (Exclusive First Run EVER)
– CEPT – Certified Expert Penetration Tester
– Web Application Hacking

Special 2-Day Workshop (Wednesday & Thursday)

SANS' Cutting-Edge Hacking Techniques – Hands On (Developed by Ed Skoudis and taught by keynoter James Shewmaker)

To register for a training course or see pricing information, please visit the ChicagoCon Web Site and click "Register Now!"

All students of ChicagoCon training get free admission to the "con" activities on May 16 – 17. Included are numerous hour-long presentations from top researchers and educators, extended breakout sessions (topics include penetration testing, SCADA security, Microsoft security technologies, and open source hacking tools) as well as hacking contests. Admission to the conference will only cost $100 for all others.

Learning and practical experience are the hallmarks of this event. With a plush 180-seat, stadium-style auditorium for the keynotes and presentations, the facilities also have separate classrooms with computers and the courseware provided for the students, whiteboards and projectors for the instructors, as well as meeting space and lounge areas for all to eat, study and network with colleagues. And with the exams being provided on site, there is every reason to believe that all students will go home with an industry recognized credential in hand. When all is said and done, the students will be exhausted not from simply sitting and listening but rather gaining real, hands-on skills. All participants will leave Chicago feeling fully satisfied with the investment made in themselves and their company.

Donald C. Donzal, Editor-In-Chief of EH-Net and organizer of ChicagoCon, states, "In order to get Chicago to be synonymous again with world-class technology events, it's going to take creativity to put a new spin on the 'events of old' and career advancement must be the focus. With the work ethic of a blue collar town, the best sports fans anywhere, even better food, throw in the brain power of the Chicago IT community, and there is no better host city in the world than the 3rd largest US and 24th largest global metropolis."

To reach this highly targeted market, review the extremely affordable sponsorship opportunities.

About Training Camp
Training Camp is the recognized leader for providing accelerated learning courses that offer information technology professionals rapid skills transfer and accelerated time to competency. Training Camp's programs cover the industry's most in-demand vendor and vendor-neutral certifications for information technology. Training Camp, founded in 1998, is a privately held company headquartered in Philadelphia, PA.

About The InfoSec Institute
InfoSec Institute was founded in 1998 by a group information security instructors that desired to build a business by offering the best possible training experience for students. Our wide range of security specific classes help a diverse group of customers get the training they deserve. Our satisfied customers include the CIA, NSA, FBI, US Army, Microsoft, HP, Verizon, Sprint, AT&T and many others.

About The Digital Construction Company
The Digital Construction Company is a Chicagoland business founded with a mission to educate and push the careers of information technology professionals through its many properties including online magazines, the Certified Security Professional and the Ethical Hacker Network, and our training event, ChicagoCon. ChicagoCon is a Service Mark of TDCC.

Workbook Empowers Entrepreneurs to Overcome Expectations of Failure

Statistics indicate that most entrepreneurs who create their own business fail to achieve long-term success, prompting many people to think twice about pursuing this career path. A new workbook from JIST Publishing offers insight into why entrepreneurs fail to achieve success and provides step-by-step strategies for developing a healthy and profitable business.

Indianapolis, IN (PRWEB) January 27, 2008 — Despite little business experience and even less money, aspiring entrepreneurs can still successfully start their own business, according to Linda Gilkerson and Theresia Paauwe, co-authors of the newly-released Self-Employment: From Dream to Reality, Third Edition workbook.

"Successful entrepreneurs come from all sorts of backgrounds and experiences. Age, gender, marital status, and education levels do not seem to be significant factors for success," says Gilkerson.

Nevertheless, many people think twice about making the leap to self-employment and ultimately abandon their aspirations for fear of failure. Considering some statistics, it's easy to understand why people hesitate to begin their own business. For example, one in three new businesses fail within six months and three of four start ups shut down within five years, state Gilkerson and Pauuwe.

Although the statistics appear discouraging, they don't necessarily tell the whole story. "Many of the 'failures' are more accurately called 'career changes,' as no money was lost and the closure of the company was voluntary. In fact, many owners of the closed business considered their business successful but decided to cease operation for many reasons. The hours were too long, the market changed, or the owners could make more money working for someone else," says Paauwe.

It can be difficult for aspiring entrepreneurs to forecast the success of their business six months in advance, let alone five years down the road. A well-crafted business plan, however, is a person's best chance at achieving long-term success with their business, says Gilkerson and Paauwe. Their workbook Self Employment: From Dream to Reality, Third Edition, teaches people how to develop a smart business plan. According to Gilkerson and Pauuwe, the following are a few ways a strong plan can play a significant role in a business's survival and success, including:

  • A business plan can give you the confidence to start your business, or it can help you realize that your business idea is not a good one. Before making the final decision, think through the answers to many questions about the product or service, customers, pricing, marketing, and potential cash flow. Business plans provide a process for answering those questions in an organized and logical way.
  • A business plan is a small business's best tool for raising money. Most financial institutions will insist on a business plan to evaluate the idea. This gives the loan officer information about the potential business and allows him or her to evaluate the business's creditworthiness.
  • A business plan can be a marketing tool. A written plan creates a clearer picture of the business. This will help explain what services or products the business will provide, who the customers will be, and what the goals are for the business. Have employees read the business plan so they understand what should be accomplished.

Self Employment: From Dream to Reality is available from the publisher ( or 1.800.648.JIST). For a free media copy or to speak with the authors, contact Natalie Ostrom.

JIST, America's Career Publisher, is a division of EMC/Paradigm Publishing and is the leading publisher of job search, career, occupational information, life skills and character education books, workbooks, assessments, videos and software.

Backups in a Linux Environment

Backups are an important task within any environment. While there are multiple options for performing backups on a Windows network, you may not be aware of the  options available for a Linux environment. Given the fact that I work strictly in the Linux world, both at home and at the office, I can offer some suggestions as to what options are available. We’ll stick with open source (free) solutions here, although there are many commercial products available.

             Bacula ( is the big player in the enterprise level network backup game. Setup and configuration of Bacula is a job for intermediate/advanced Linux users, although once installed and configured there is a very easy-to-use web GUI for administration.

             Another good product is Mondo Rescue ( While this application can be used for backup, it is designed more as a disaster recovery tool. Mondo Rescue creates bootable CD/DVD’s that contain snapshots of a complete system (ala Ghost or True Image) which can be used to restore a system from bare metal.  It’s administered from a simple text-based GUI and packages are available for most Linux distributions. Installation and use is simple enough for the average Linux user.

             Next up is Amanda ( The source code is available at the Amanda web site, but a quick Google search will net you a package in the proper format for your particular flavor of Linux. This is strictly a command line tool, so it’s best left to those power users that are comfortable working without a GUI. This is a very powerful and flexible backup application.

             Of course if you are not looking for a network type solution and just want something to backup your own machine, almost all Linux distributions come prepackaged with some type of easy-to-use GUI based software. The KDat application included with the KDE desktop is one example. Several folks have written their own and made it freely available to us all. for example.

             While I am by no means a code-monkey, I have learned enough basic shell scripting to write my own backup software. It works equally well for stand alone machines or as a network solution. You can find it here (you’ll have to be a registered member):  

             My backup software consists of a simple script that runs as a scheduled job and uses ‘tar’ to create compressed backup files. The default is to backup the /home directory daily and perform a full backup weekly. A copy of the backup is stored on the local machine (so that you may manually burn it to CD/DVD, archive it to a tape drive, copy to a USB stick, FTP it somewhere, etc.). This software can optionally use ‘rsync’ to automatically push a copy of the backup to a network storage device. I use an old server with a multiple scsi disk array, but you could use an external enclosure with a large hard drive attached to another Linux machine or even push the backup across the WAN to an off-site storage device running Linux. Another option would be to automatically FTP the tar files to any local or remote FTP server (although you will have to learn a bit of shell scripting and write this code yourself).  *NOTE: If you choose the preceding FTP option, PLEASE consider security and use SFTP or tunnel through a VPN! Full restores can be done simply by partitioning and formatting a new hard drive and then extracting the compressed tar file onto the disk. If you delete something important from your home directory, you can simply extract the /home tar file stored on the local machine back into your existing /home directory. Basic instructions are in the README, and the scripts are liberally commented.

             As always, if you have any questions, comments, problems, or want to erect a statue in my likeness, please feel free to contact me at .


Copyright 2008 Todd Hughes

Domain ‘’ to be Auctioned

Domainion announced the proposed upcoming sale of the premium Internet domain "". The domain is expected to be offered in Moniker's Live Domain Auction at T.R.A.F.F.I.C. West 2008. sold for $2.1 million at the T.R.A.F.F.I.C. in October 2007. The auction will be held in Las Vegas from February 18-21, 2008. The minimum bid is expected to be set at $11,500.

Calgary, Alberta (PRWEB) January 25, 2008 — Domainion Administration Inc. announced today the proposed upcoming sale of the premium Internet domain The domain is expected to be offered in Moniker's Live Domain Auction at T.R.A.F.F.I.C. West 2008, a conference focused on using domain strategy to drive Internet traffic. T.R.A.F.F.I.C. West will be held in Las Vegas from February 18-21, 2008. It will be possible to submit bids to this auction online.

"There can hardly be a better or more memorable domain for marketing computers and related products than ''," said Andy Lemminger, Director of Domainion.

"Adding the domain '' to your online business strategy can enable a company to become more prominent in search engines, to channel international customers to a present site, and to cement its current position as a leading enterprise in the computer industry. Good domains are an investment, ultimately paying for themselves. They enable companies to attain better search engine rankings and sales. Their value appreciates over time so an initial investment will never be lost.

"Most companies are aware of this investment potential. We therefore expect a huge demand for ''. It speaks for itself that sold for $2.1 million at the T.R.A.F.F.I.C. in October 2007."

The minimum bid is expected to be set at $11,500. Information on participating is available at

The sale will be subject to the auction rules of, who is partnering with T.R.A.F.F.I.C. to produce the private auction. is the leading producer of Live Domain Auctions. In addition to running the auction, they serve as an independent brokerage agent for domain sales and will provide escrow services for all sales occurring in the auction. Moniker offers the industry's only true domain escrow service, where both the domain and purchase funds are secured in escrow. Much like escrow services for real estate, this ensures that both buyer and seller are protected, with change in ownership and payment to the seller occurring simultaneously.

About Domainion Administration Inc.:
Domainion Administration Inc. is a leading Canadian domain management company.

The company primarily secures promising domains and develops them by adding relevant content.

Domainion also offers valuable generic domains for sale. Many successful businesses have already bought a domain name from Domainion and thereby improved their presence on the Internet.

Domainion enjoys very low domain registration costs because of its large domain portfolio. To give back to the Internet community the company passes these rates on to the public on its web site and on

Domainion has been in business since 2003.

Its headquarters are located in Calgary, Alberta.

Corporate Address
8908 Scurfield Dr. NW
Calgary, Alberta T3L 2A9

Web Address

About Moniker Online Services, LLC:
Moniker is the leading provider of Domain Asset Management™ services, a complete set of business services that provide companies a single-point-of-access to help manage and maximize the value of their domains. These services include name creation, registration, acquisition, portfolio management, appraisal and escrow services, traffic monetization and after-market sales — all backed by unsurpassed customer service and security.

With more than a decade of experience, Moniker is a top 10 domain registrar, holds the industry's highest customer retention rate and pioneered the industry's first domain appraisal formula. It is considered the industry's premier marketplace to buy and sell domain names.

The company is based in Pompano Beach, Florida.

Corporate Address
20 SW 27th Ave.
Suite 201
Pompano Beach, Florida 33069

Web Address

For further information regarding, please contact:

Andy Lemminger   
Domainion Administration Inc.   
Phone: +1 (403) 295 3864
Fax: +1 (403) 206 7808

Bari Meyerson
Moniker Online Services, LLC
Phone: +1 (954) 861 3539
Fax: +1 (954) 969 9155

Components of Random JavaScript Toolkit Identified

cPanel announced today that its security team has identified several key components of a hack known as the Random JavaScript Toolkit. The systems affected by this hack appear to be Linux® based and are running a number of different hosting platforms. While this compromise is not believed to be specific to systems running cPanel® software, cPanel has worked with a number of hosting providers and server owners to investigate this compromise.

Houston, TX (PRWEB) January 26, 2008 — cPanel announced today that itʼs security team has identified several key components of a hack known as the Random JavaScript Toolkit. The systems affected by this hack appear to be Linux® based and are running a number of different hosting platforms. While this compromise is not believed to be specific to systems running cPanel® software, cPanel has worked with a number of hosting providers and server owners to investigate this compromise.

The cPanel Security Team has recognized that the vast majority of affected systems are initially accessed using SSH with no indications of brute force or exploitation of the underlying service. Despite non-trivial passwords, intermediary users and nonstandard ports, the attacker is able to gain access to the affected servers with no password failures. The cPanel security team also recognized that a majority of the affected servers come from a single undisclosed data-center. All affected systems have password-based authentication enabled. Based upon these findings, the cPanel security team believes that the attacker has gained access to a database of root login credentials for a large group of Linux servers.

Once an attacker manually gains access to a system they can then perform various tasks. The hacker can download, compile, and execute a log cleaning script in order to hide their tracks. They also can download a customized root-kit based off of Boxer version 0.99 beta 3. Finally, the attacker searches for files containing credit card related phrases such as cvc, cvv, and authorize.

The actual root-kit has been the subject of much speculation. The cPanel security team asserts that the Boxer variant includes a small web-server which is how the Javascript is distributed to unsuspecting users of any website on the server. It is believed that the Javascript include is injected into the HTML code after Apache® has served the file but before it has traveled through the TCP transport back to the user of the website. The web-server is not loaded onto the hard drive directly but loaded directly into memory from the infected Boxer binaries. More information about the infected binaries can be found at:

The JavaScript being loaded by this web-server is directing users to another server that scans the website user for a number of known vulnerabilities. These vulnerabilities are then used to add the website user to a bot net. More information about the JavaScript hacks can be found at: Cleaning the Random JavaScript Toolkit requires the server to be booted into single user mode and the removal of all infected binaries. More details on how to do this can be found at: The cPanel security team believes that the hacker has access to the database of login credentials, the only way to prevent being hacked again is changing the password and not releasing it to anyone. The preferred method however is to move to SSH Keys and remove password authentication altogether.

About cPanel

cPanel was formed in 1997 and has since become a leading Web Hosting Control Panel Software provider supplying hosting automation tools to numerous data centers and customers around the world. cPanel offers web hosting software that automates the intricate workings of web hosting servers. cPanel products are used on tens of thousands of servers worldwide to equip server administrators with the tools they need to provide top notch hosting to their customers.

Other Press

This compromise has been in the media lately and discussions can be found at the following locations:,141358-c,techindustrytrends/article.html


Linux is a trademark of Linus Torvalds. Apache is a trademark of the Apache SoftwareFoundation. cPanel is a trademark of cPanel, Inc.

Service Currents Newsletter

Service Currents is a concise and informative free monthly newsletter that delivers tips, tricks and tools to help you build your business. Published by PC-Doctor .

FREE Subscription! — The Powerful Search Engine to Find the Right IT Service Provider

RequestFill Inc., the multi-dimensional and web 2.0 based lead-generation platform for IT service and outsourcing providers announced the launching of real-time best-practice and knowledge publishing for IT service providers. This new feature allows registered service providers to publish best-practice articles and knowledge on RequestFill platform. Each article published can be searched and viewed by millions of IT readers in our strategic partnership media network. In the near future, each article can also be rated by the readers. Top-rated articles will further promote service providers' ranking in related service categories and help improve their visibility among other vendors.

San Jose, CA (PRWEB) January 24, 2008 — RequestFill Inc., the multi-dimensional and web 2.0 based lead-generation platform for IT service and outsourcing providers announced the launching of real-time best-practice and knowledge publishing for IT service providers. This new feature allows registered service providers to publish best-practice articles and knowledge on RequestFill platform. Each article published can be searched and viewed by millions of IT readers in our strategic partnership media network. In the near future, each article can also be rated by the readers. Top-rated articles will further promote service providers' ranking in related service categories and help improve their visibility among other vendors.

RequestFill believes that the best matching service provider to buyer should have high-quality service and knowledge offering, as well as top client ratings. Taking all these criteria into account, RequestFill's proprietary search engine gives IT requesters unbiased and highly qualified service providers according to requester's criteria. RequestFill is the industry's first unbiased search platform delivering superior value to both IT service providers and requesters.

Launched on Nov 6, 2007, RequestFill currently has more than 300 qualified enterprise-level service providers covering more than 60 IT service areas. It is recognized as one of the fastest growing lead generation companies in business service sectors.

"RequestFill connects IT requesters to service providers by quality, service and knowledge offering. Leveraging the power of RequestFill's proprietary search engine, service providers get qualified leads that go beyond traditional cold-calling", said Jessica Ma, CEO and founder of RequestFill Inc.

About RequestFill Inc.

RequestFill Inc. is an effective lead-generation platform that supplies service providers with detailed and highly qualified leads on motivated and budgeted buyers. Powered by a proprietary multi-dimensional match engine, RequestFill revolutionizes how IT professionals research and locate IT service providers specific to their needs.

For more information, visit or
Phone: 408-551-2830

RequestFill, RequestFill logo and are trademarks of RequestFill, Inc. All other trademarks are the property of their respective owners.

Corporate Spending Goes Negative — Signs of a Recession in ChangeWave’s Latest Software Survey

ChangeWave's latest corporate software spending survey shows clear signs of a recession in business spending for the first quarter of 2008.

Rockville, MD (PRWEB) January 24, 2008 — For the first time in years, a ChangeWave corporate software spending survey is pointing to negative growth for the economy. The survey presents clear signs of a recession in business spending for the first quarter of 2008.

News Image

Better than one-in-five respondents (22%) now say their company will spend less for software over the next 90 days compared to the previous 90 days — 8 percentage points worse than our previous survey in October 2007.

Just 16% of respondents say their company will spend more — 2 points worse than previously.

A total of 1,802 respondents involved with software purchasing in their company participated in the January 9-16 survey.

"These latest software results — combined with our recent consumer spending survey – should end the 'are we or aren't we' in economic recession debate once and for all," said Tobin Smith, founder of ChangeWave Research and editor of ChangeWave Investing. "Now both businesses and consumers are singing from the same 'cut-thy-spending' hymnal."

(To download the chart along with the ChangeWave Corporate Software survey results, go to ChangeWave Software Spending Report).

Forces Driving the Slowdown:

Nearly one-in-10 respondents (9%) cite "a general slowdown in business conditions and capital budgets" as the foremost factor driving their companies purchasing decisions — a number that is up 3 points since October 2007 and triple the percentage of a year ago.

In a follow-up question, respondents were asked if there had been any adjustments made to their first quarter capital budgets over the past 90 days.

Twice as many said their capital budgets were adjusted lower (22%) than said they were increased (11%) — a powerful indicator of a very tough corporate spending environment.

The survey also looked at specific software categories and found Security Software (16%; down 7-pts) to have experienced the biggest slowdown since October 2007. Business Intelligence (8%; down 2-pts) and Document/Content Management (5%; down 2-pts) software also look softer.

On a somewhat brighter note, Virtualization (9%) and Enterprise Resource Planning (7%) spending appear similar to that of the previous survey.

But overall, the survey results show clear signs of a recession in business spending for the first quarter of 2008, and are a striking confirmation that we're now sailing through a period of heavy economic turbulence.

The ChangeWave Alliance is a network of 14,000 highly qualified business, technology, and medical professionals in leading companies of select industries — credentialed experts who spend their everyday lives working on the frontline of technological change. ChangeWave surveys its Alliance members on a range of business and investment research and intelligence topics, collects feedback from them electronically, and converts the information into proprietary quantitative and qualitative reports.

For a copy of the entire ChangeWave Research corporate software spending survey, please contact Darlene March, March Media Relations, (714) 514-3736.


CompTIA Board of Directors Establishes $1 Million Match Grant Challenge for Creating Futures Program

Cash, in-kind donations eligible for dollar-for-dollar match.


Oakbrook Terrace, Ill. (Vocus/PRWEB ) January 24, 2008 — The Computing Technology Industry Association (CompTIA) Educational Foundation announced today a $1 million challenge grant has been awarded to its Creating Futures program by the CompTIA Board of Directors.

News Image

The challenge grant will match on a dollar for dollar basis up to $1 million in cash and in-kind donations made to the Creating Futures program in 2008 by contributing matching funds to the program's endowment.

Creating Futures is an initiative of the CompTIA Education Foundation that is providing career opportunities to groups who have historically been under-represented in the IT workforce, including veterans transitioning out of the military; individuals with disabilities; at-risk youth; and dislocated workers. The program works with employers to identify their hiring needs, then tailors education and training programs to help individuals obtain the skills employers are looking for.

“The elected leadership of the Association is demonstrating its support and commitment to Creating Futures by funding this challenge,” said John Venator, president and chief executive officer, CompTIA. “Creating Futures has already brought into the IT industry workforce 130 individuals who may not have otherwise had the chance to embark on a career in technology. The $1 million challenge grant gives great impetus to our efforts to expand Creating Futures programs to reach 1,000 individuals in 2008.”

The announcement of the challenge grant was made at CompTIA Colloquium, an invitation-only symposium where industry, academic and government IT education executives and leaders come together to shape the future of global technology learning. The conference is being held this week at Loews Ventana Canyon Resort in Tucson, Ariz.

For more information on the CompTIA Educational Foundation and Creating Futures, visit

About the CompTIA Educational Foundation
Established in 1998, the CompTIA Educational Foundation’s mission is to develop qualified and productive entry level IT workers, with the hopes of eliminating the skill shortages within the industry. The Foundation receives support from individuals, industry leaders, companies and the government through contributions and grants. This support has helped more than 700 people to pursue careers in the IT industry. For more information, visit

About CompTIA
The Computing Technology Industry Association (CompTIA) is the voice of the world's $3 trillion information technology industry. CompTIA membership extends into more than 100 countries and includes companies at the forefront of innovation; the channel partners and solution providers they rely on to bring their products to market; and the professionals responsible for maximizing the benefits organizations receive from their technology investments. For more information, visit

Steven Ostrowski
Phone: 630-678-8468
Email: sostrowski @