Harmonize Your Business

Posts by wbralick

MemWars KickStarter

By on Mar 9, 2017 in Blog, MemWars | 0 comments

What kind of technology company invents a new board game? The cool kind. Paladin Logic just (on March 8th) launched the KickStarter campaign for MemWars. MemWars is a new memory game for ages 11+.  MemWars is derived from an innovation – the Macunx structure – developed by Dr. Aaron Ralby of Linguisticator and an old game – “Mark Twain’s Memory Builder Game” – developed and patented by Mark Twain in 1885. KickStarter is a crowdfunding platform that funds creative projects (like a new board game).  Per KickStarter’s website: “… can be anything that you want to create and share with others. It could be a book, a film, a piece of hardware… pretty much anything you dream up can find a home on Kickstarter.” We will blog about this currently on-going experience through the website.  We have 30 days (i.e. until April 7, 2017 to complete the KickStarter. The gamification of the Macunx makes improving memory enjoyable.  And once the memory techniques and the Macunx structure itself are mastered, memorization becomes easier and quicker as does recall, recollection and remembering.  ...

Read More

Paladin Rule-Based Configurator Rev. 1.1

By on Jun 3, 2015 in Harmonize Your Business | 0 comments

The moment you have all been waiting for has arrived!  The newest version of the Configurator – PRBC 1.1 – is now available!  Not to go all “features and benefits” on you, but the new stuff is: Added the ability to specify an option as the default option in the category for the purposes of ordering. Added the ability to specify the order in which options appear on the quote and sales order screens. Added support for MSRP. Added a new method for calculating option prices as a pricing schedule discount from the MSRP. Added new display features on the quote/sales order screen: Single or two-column layout Settings to show/hide the option Cost, MSRP, and Price of each option while ordering. Setting to display the option description in place of the option name while ordering. Setting to display options on the side of the quote/sales order screen rather than in a tab. Setting to modify the appearance of the option widget using CSS. Added a setting to determine whether option adjustments should create child work orders by default. Wow!  With interest in the PRBC at an all-time high, you might be wondering what we were going to do to celebrate this most auspicious event.  For a limited time … very limited time … the month of June, actually, we will be offering PRBC 1.1 at an introductory discount of 20%.  So, if we receive your PO by June 12th, you will only pay $10,000 for PRBC 1.1 plus the usual $1,250 for maintenance. Act now, while supplies last! Info,...

Read More

Madrigal xTuple / PostBooks Mobile Client Update

By on Jun 24, 2014 in Blog, Uncategorized | 0 comments

Paladin Logic is pleased to announce a Madrigal xTuple / PostBooks mobile client update for the Android platform.  Recently, several security flaws were discovered in OpenSSL.  The community responded quickly and fixed, tested, and deployed the fixes to OpenSSL. The new OpenSSL 1.0.1h release fixes seven different security defects in the popular security software.  According to the OpenSSL Security Advisory – and taken straight from the referenced web page – they are: SSL/TLS MITM vulnerability (CVE-2014-0224) An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. DTLS recursion flaw (CVE-2014-0221) By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack. DTLS invalid fragment vulnerability (CVE-2014-0195) A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Only applications using OpenSSL as a DTLS client or server affected. SSL_MODE_RELEASE_BUFFERS NULL pointer dereference (CVE-2014-0198) A flaw in the do_ssl3_write function can allow remote attackers to cause a denial of service via a NULL pointer dereference. This flaw only affects OpenSSL 1.0.0 and 1.0.1 where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common. SSL_MODE_RELEASE_BUFFERS session injection or denial of service (CVE-2010-5298) A race condition in the ssl3_read_bytes function can allow remote attackers to inject data across sessions or cause a denial of service. This flaw only affects multithreaded applications using OpenSSL 1.0.0 and 1.0.1, where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common. Anonymous ECDH denial of service (CVE-2014-3470) OpenSSL TLS clients enabling anonymous ECDH ciphersuites are subject to a denial of service attack.   References:  This Security Advisory: secadv_20140605.txt If you have already purchased the Madrigal xTuple / PostBooks Mobile Client – thank you – and you will receive notice that it is time to update your app. If you have not yet purchased Madrigal then you ought to hurry.  Only 1 month remains in our introductory offer of half price for the first 60...

Read More