Archive for September 29, 2011

Detroit Netizens Vulnerable to Online Threats

Detroit Netizens Vulnerable to Online ThreatsDetroit Internet users rank seventh among 35 U.S. cities for being most at risk for online threats and being “digitally duped,” according to an AVG Technologies survey of online behavior. Of the more than 8,000 Americans with home Internet surveyed, AVG says many consumers are unknowingly putting themselves at risk of falling victim to identity thieves, viruses and malware with bad PC habits and a lack of comprehensive protection:

Malware

  • 75% don’t back up their phone’s data – many rely on their provider to restore their contacts should an accident occur.
  • 67% don’t use an identity monitoring service.
  • 41% never run a manual antivirus scan to make sure the computer is virus-free
  • 40% don’t use a password on their mobile device and of those that do, another 34% have not changed the password in the past year.
  • 38% admit to sharing online passwords with at least one other person
  • 23% don’t back up the data on their PC

U.S. cities at highest risk

AVG says that the top 10 U.S. cities at highest risk are:

1. San Antonio
2. Tampa, Fla.
3. Atlanta
4. Dallas
5. Oklahoma City
6. Charlotte, N.C.
7. Detroit
8. Denver
9. Washington D.C.
10. Sacramento, CA

rb-

The rules of the road still apply to online activities:

  • Patch your system
  • Use current anti-malware software
  • Change passwords regularly, use variations for each online account, and never, ever share them with others
  • Use one credit card with a low spending limit for all online purchases. Monitor this account regularly, and flag any inappropriate activity to the bank.
  • Back up your data
  • Don’t share your personal data on Facebook
  • Be wary of phishing scams. Never click on links in emails
Related articles
  • 5 Essential Mobile Security Tips (informationweek.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablets Info

Tablets Info Morgan Stanley predicts (PDF) that by the end of 2020 10 billion mobile internet devices will be in use, up from 2 billion today. They also say that enterprise adoption is more widespread than expected. Two-thirds of the CIOs surveyed expect either to buy tablets for some of their employees or allow employee-owned tablets on their networks within one year. The investment house also says that tablets will be viewed as content creation devices. They found 20% of tablet owners use the device to create or edit files regularly. and believe the rate of introduction of new mobile applications and faster processors could increase these figures over time.

People Have No Clue How To Use iPad Apps

ConfusediPad readers are skimming and can’t remember what they’ve read according to Nielsen Norman Group, BussinessInsider points out the report which finds that many big-name iPad apps are too difficult to use, and should abide by one standard for gestures, tapping, etc.

Nielsen gave 16 study participants access to the NPR app, the Flipboard app, The Daily app, and the Amazon app, among others for two months, to see how they reacted and what they attempted to swipe, pinch, and tap.

According to Nielsen, most consumers are confused because every app has a different navigation scheme, and looks different than their website counterparts. People had a lot of trouble in specific situations, because from one app to another, performing simple tasks like search, scrolling, or shopping, can be completely different.

In the midst of all their hard findings, Nielsen makes suggestions for app-makers to make their apps more intuitive and ergonomic for users. Nielsen suggests:

  • Always have a back button.
  • Content should look the same in portrait or landscape navigation.
  • Apps should take less than 20 seconds to download initial content.
  • Stick to a solid format for your website and tablet app.

Fring 4-way Group Video Chat Lands on iPad 2

fringThere is now a good reason for iPad 2 owners to use their front and rear cameras. AppScout says that Fring is the first app that brings group video chat to the Apple (AAPL) iPad 2.

Fring is a competitor to Skype and Qik that offers free 1-1 video chat over smartphones, but with the added bonus of free cross-platform 4-way live video chat. You can chat over Wi-Fi, 3G or 4G. AppScout predicts this feature makes Fring a force to be reckoned with. Instead of waiting on its competitors to bring video chat to the iPad, Fring stepped up to deliver group video chat to the iPad. AppScout states that for now is the ONLY iPad-specific video chat app.

All the same, features that are available for iPhone, iPod Touch, Google’s (GOOG) Android, and Nokia (NOK) devices are available on the iPad as well. Additional features include FringOut that lets you call ANY phone number using low-cost Fring credits.

USB Hub Allows Simultaneous Syncing of 49 iPads

Datamation Systems has released a desktop station that allows simultaneous syncing for up to 49 Apple (AAPL) iPads or other USB devices. The DS-IP-49-SYNC changes the way information is managed and distributed. The device acts as a fully powered USB hub for 49 devices. Using a Mac, it can sync with iTunes or other software capable of addressing USB devices. The system will work with Microsoft (MSFT) Windows, Linux, and Mac computers but could have some software limitations with a non-Mac host.

The device is a syncing device that will provide a “trickle charge” for iPads, not as a fast-charge device. A single station in a tech center or IT department can quickly sync 49 devices which permit more practical centralized management control in technology deployments and maintenance. (rb- Something that Apple still does not get)

Foxconn Exported 48 Billion From Shenzhen In 2010

Foxconn Technology Group ChinaTechNews reports that Foxconn Technology Group (2038) says that in 2010, the company’s export value from its Shenzhen processing and trade enterprise reached $48 billion, a year-on-year increase of 50%.

According to ChinaTechNews nearly half of the world’s top branded computers are made by Foxconn. The company also makes the mobile phone for Nokia (NOK) and Motorola (GOOG); it makes PlayStations, laptops, and LCD TVs for Sony (SNE); and it makes iPods, iPhones, and iPads for Apple (AAPL).

The article goes on to say that the Foxconn Shenzhen Longhua campus has become the manufacturing base for the latest technology products, including smartphones and tablet computers; and the volume and speed of shipments from this plant influence the prices in the global IT market.

Foxconn boasted new technology breakthroughs during the past year. In 2010, Foxconn applied for 16,000 global patents and 7,000 were approved; and it applied for 6,000 patents on Chinese mainland and nearly 3,000 got approved. (rb- And still the idiots politicians in Washington are still messing around with another budget extension.)

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Heidi Klum Most Dangerous Celebrity in Cyberspace

Heidi Klum Most Dangerous Celebrity in CyberspaceGerman-born super-model, Spin City actress and hottie Heidi Klum is now the most dangerous celebrity on the Web according to anti-malware firm McAfee‘s fifth annual Most Dangerous Celebrities study. Heidi Klum replaced Cameron Diaz as the number one riskiest celebrity to search for on the web.

Heidi Klum 2011's Most Dangerous Celeb in CyberspaceMcAfee research found that searching for the latest Heidi Klum pictures and downloads almost a 1 in 10 chance of landing on a website that has tested positive for online threats, such as spyware, adware, spam, phishing, viruses and other malware.

Paula Greve director of Web security research at McAfee said:

Consumers should be particularly aware of malicious content hiding in ‘tiny’ places like shortened URLs that can spread virally in social networking sites, or through e-mails and text messages from friends.

Mila Kunis one of 2011's Most Dangerous Celeb in CyberspaceMcAfee says that cyber-criminals often use the names of popular celebrities to lure people to sites that are actually laden with malicious software. Anyone looking for the latest videos or pictures could end up with a malware-ridden computer instead of just trendy content.

Top 10 dangerous celebrity list

1 – Heidi Klum, The former Victoria’s Secret model and current producer of “Project Runway” moved up from No. 10 in 2010 to No. 1 for 2011. Searching for Ms. Klum results in nearly a one in ten chance of landing on a risky site.

2 – Cameron Diaz, 2010’s Most Dangerous Celebrity fell to second place, with searches resulting in slightly fewer risky sites this year.

3 – Piers Morgan is a new addition to the top ten list, Morgan is also the most dangerous male celebrity.

4 – Jessica Biel, 2009’s Most Dangerous Celebrity fell to fourth place this year with searches resulting in fewer risky sites.

5 – Katherine Heigl, the former “Grey’s Anatomy” star is new to the top ten in 2011.

6 – Mila Kunis, the former star of “That 70s Show” is also new to the top ten, bolstered by starring in “Friends with Benefits.”

7 – Anna Paquin, the “True Blood” star is as dangerous on the Web as she is on the screen. She moved up from No. 10 last year to No. 7 this year.

8 – Adriana Lima who is best known for being a Victoria’s Secret Angel since 2000 she has become slightly safer, moving her from No. 6 last year, to No. 8 this year.

9 – Scarlett Johansson, the 2010 GQ MagazineBabe of The Year” is new to the list this year.

10 – Brad Pitt, Emma Stone, and Rachel McAdams, Mr. Pitt has been on the list for the past four years. Ms. Stone and Ms. McAdams are new to the top ten.

Julia Roberts not one of 2011's Most Dangerous Celeb in CyberspaceGisele Bündchen, Tom Cruise, Penelope Cruz, Jennifer Love Hewitt, Nicole Kidman, and Julia Roberts have all dropped out of this year’s top ten list. Noticeably missing from this years list is Charlie Sheen who made headlines with his highly public departure from “Two and a Half Men

rb-

But BitDefender called Jay Leno, the most dangerous celeb in cyberspace. It is good to see Intel McAfee wisely spending its marketing dollars on info like this when Microsoft (MSFT) is going to kill the anti-virus market by baking AV into Windows 8. Maybe I will get more hits after putting these pop names in here.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Super-Fi OK’d by IEEE

Super-Fi OK'd by IEEEI usually don’t have a problem getting a wireless signal where in my Bach Seat. However, there are some areas where I coordinate technical services that don’t get wired or wireless Internet. In these rural areas, where AT&T (T), Verizon (VZ), Sprint Nextel (S), and Comcast (CMCSA) and their fellow travelers fear to tread because they can’t make a buck in these areas, some help may be on the way from the IEEE.

IEEE logoIn 2009, the Institute of Electrical and Electronics Engineers (IEEE) started the development of IEEE standard 802.22, which addressed the need for broadband wireless access in rural areas, those where it is not economical to deploy a wired infrastructure. In July 2011, the IEEE announced that it has published the standard titled: “IEEE 802.22-2011 Standard for Wireless Regional Area Networks in TV Whitespaces” (PDF).

The IEEE press release states: “This new standard for Wireless Regional Area Networks (WRANs) takes advantage of the favorable transmission characteristics of the VHF and UHF TV bands to provide broadband wireless access over a large area up to 100 km (60 miles) from the transmitter. Each WRAN will deliver up to 22 Mbps per channel without interfering with reception of existing TV broadcast stations, using the so-called white spaces between the occupied TV channels.”That part of the spectrum, known as white spaces, sits between broadcast TV channels and will become available when broadcast TV stations switch from analog to digital in 2009.

VHF and UHF TV bands to provide broadband wireless accessThe White Space Coalition led by Microsoft (MSFT), Google (GOOG), Dell (DELL), and other tech titans strongly support the use of the white spaces in the U.S., going up against strong opposition lead by Michigan’s own John Dingell and big media like the NFL, MLB, NASCAR, NBA, NHL, NCAA, PGA Tour and ESPN who say unlicensed devices in the TV bands would interfere with their signals.IEEE 802.22 reportedly will not interfere with TV broadcasts, because it incorporates advanced cognitive radio capabilities including:

rb-

I met Mr. Dingell about a dozen years ago, at a school to encourage the politician to support schools when the USF started the eRate program for schools. I recall Mr. Dingell telling me he could not support eRate because he did not trust the FCC to get it right. At least he is consistent.

I believe there is a very good chance this technology will never be a commercial success. The wireless carriers will squash this technology like they have squashed municipal wi-fi and community fiber networks. The improved speeds and coverage areas are a threat to their limited 4G coverage and they would lose out on their monthly pound of flesh capped rate-limited data plan.

It will be up to us in the public sector to implement this technology for our clients.

What do you think?

Will Super-Fi ever see the light of day?

View Results

Loading ... Loading ...

Related articles:

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Wireless Charging for iPhone

Wireless Charging for iPhoneApple Computers (AAPL) has fired an opening shot in the wireless charging patent warfare. Patently Apple reports that the now Jobs-less firm has filed for patent protection on inductive wireless charging for iPhone, iPod, and iPad. The patent “Using an Audio Cable as an Inductive Charging Coil,” is available at the U.S. Patent Office website.

TApple logohe patent application in typical Apple style, calls for a “wireless” charging solution that uses wires. Apple wants to use headphone wires rather than supplying a power cable. The wired wireless charging system includes a tower that would sit atop your desk. According to MIT’s Technology Review, to charge an iPhone, specially designed earphones must be wrapped around the tower multiple times. Finally, the earbuds are to be placed on the device, where special conductive metal mesh would begin funneling electricity to your device.

Apple Inductive Charging Patent

TR says the charging tower is an eyesore, wrapping earphones around it would be a hassle and the whole thing is decidedly un-Apple-like in its unwieldy and cumbersome nature. Other opinions are “Incredibly impractical,” “ridiculous,” “like an iPhone scratching post,” “Tolkien-esque.”

WiTricity logoTR and Gizmodo believe this patent application is a “red herring” and Apple has other things in mind. Back in May 2011, MacRumors noted Apple’s interest in WiTricity, As MacRumors pointed out an international patent application filed by Apple which cites the original MIT paper as the foundation of WiTricity’s business plan.

rb-

I have already covered wireless electricity a couple of times. The obelisk charging patent is so out of character for Apple design that I believe it is a head-fake. With their closed eco-system, Apple can create a closed version of the WiTricity technology and charge a premium for it.

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.