Archive for RB

Geek Day

Geek DayToday is Geek Day! According to NerdcMay 25th is Geek Pride Day in homage to “Towel Day” for fans of Douglas Adams‘ “The Hitchhiker’s Guide to the Galaxy” and the May 25th, 1977 release of “Star Wars.” Wired reported on a 2012 survey by IT recruitment agency Modis commissioned on Americans around the term geek, and Wired says that Geeks are becoming even more acceptable.

Hat DayCosmo even says that geeks are great relationship fodder as well (Yes a Cosmo link on Bach Seat). Remember to remind your users of all of this geek love next week, when they are screaming at you about another SPAM message getting through or when they need a file restored yesterday because they deleted it.

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Internet of Things Comic Book

Internet of Things Comic BookSymplio is a firm that focuses on the merger of social networks and the Internet of Things. They point out the comic book “Inspire the Internet of Things” (PDF). The comic book is from Mirko Presser, a member of Alexandra Institute. It explains the concept of IoT, challenges, problems, and benefits. It also encourages people to think of new scenarios for this technology. The author considers it essential to involve the public and businesses with the issue of developing the Internet of Things.

Mr. Presser says, the IoT comic book is aimed at everyone. The idea is that anyone can read the stories presented in the book and form an opinion. In addition to using it as a basis for deeper discussions or simply as inspiration to think about the Internet of Things.

The comic book has an introduction by Gerald Santucci. It has 15 scenarios where technology can be applied to the Internet of Things.  There are alsomore than 25 concepts of IoT and four interviews with experts in this field.

Related articles
  • What is the Internet of Things (IoT)? (c24.co.uk)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Hotmail is Dead

Hotmail is DeadHotmail is deadMicrosoft (MSFT) has completed the transition from Hotmail to the new Outlook.com. The Hotmail replacement has more than 400 million accounts. According to a blog entry at Office.com most Hotmail users will not notice much difference. They can continue to use those accounts as long as they choose and can claim an Outlook email address whenever they like.

HotmailWriting in the company blog, Dick Craddock, Outlook.com’s group program manager said that Hotmail had more than 300 million active accounts that had to be moved. MSFT completed the epic live upgrade in only six weeks. The upgrade from Hotmail to Outlook.com required communicating with hundreds of millions of people, upgrading all their mailboxes, and making sure they preserved every email, calendar, contacts, folders, and personal preference.

The new Outlook email client has several different features from Hotmail, such as two-factor authentication, an updated calendar, and app as well as integration with cloud service Skydrive and Skype. it allowed users to connect easily with Facebook (FB), Twitter, and LinkedIn (LNKD).

GigaOm reports that MSFT will even allow collaboration with Google users. They report that:

.Outlook.com logo.. if you’re reading an email from a Gmail user, you can reply with a chat icon from your Outlook.com inbox. Or, if you and your Google-oriented buddy are collaborating on a document in Microsoft Skydrive (as opposed to, say, Google Drive), you can send an instant message to your Google contact with the click of a button. Microsoft is also rolling out Google Chat integration.

All of these new features haven’t thrilled everyone, Mr. Craddock is quoted in the IBT, “Of course, whenever a widely used consumer service makes any substantial change, there will always be some folks that don’t like it, and that shows up in the feedback…”

Microsoft logoHotmail was one of the first web-based email services. Founded by Sabeer Bhatia and Jack Smith it was launched on July 4 1996 as “HoTMaiL”. Microsoft bought the web email service in 1997 for an estimated $400 million, and it was rebranded as “MSN Hotmail”.

Outlook.com was launched in February 2013.  It’s based around Microsoft’s Metro design language, and closely mimics the user interface of Microsoft Outlook.

rb-

AmazedFor anyone who has ever had to be involved in a hot email upgrade, you should recognize the technical feat moving Hotmail to Outlook.com really was despite occasional problems. During most email system upgrades, anything that can go wrong will go wrong. There will be power or network issues that will interrupt the mailbox transfer across the wire, there will be users with 32 Gb of email messages, there will be people who file their active messages in the trash can (yes, I’ve seen it) there will be strange shared calendars and accounts that just won’t transfer unless you move them item by item to find the corruption.

Kudos to MSFT for migrating Hotmail to Outlook.com, lets see if it matters in the face of Google’s (GOOG) Gmail and Doc’s.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Is Windows an Olds?

Is Windows an Olds?Do you remember Oldsmobile? The BusinessInsider documented what I have sensed for a while. Windows is playing less of a role at Microsoft (MSFT). When was the last time something came out of the Windows camp that fired us up? BI notes that for a long time, Microsoft was a company whose success or failure was built around Windows. While Windows is still the heart and soul of Microsoft, it’s becoming a smaller part of its earnings.

This chart from BI shows Windows operating income as a percentage of its overall operating income versus its overall operating income. The total operating income is slowly growing, while the Windows percentage of the total is slowly decreasing.

MSFT Windows total operating income

rb-
I have covered the angst over MSFT’s profitability for a while here and here. There are those that think Redmond is a long-term play as a leader in the cloud market. I don’t see it. Calling MSFT a good play in the cloud is like asking General Motors to make money on building roads and not cars. MSFT’s latest products (Vista, Win8) are as memorable as the Olds Calias or the Achieva.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Did You Wipe Your Tablet?

Did You Wipe Your Tablet?Techno prognostication firm IDC says (I think they are right on this one) that worldwide sales of tablets will surpass desktop PCs and laptops by the end of 2014. This will result in a boomlet in the second-hand tablet market and a recent article on Infosecurity says that in response, firms will need to start data wipe their old tablets just as thoroughly as old hard disks to protect their data.

take responsibility for removing dataThe company is responsible for any company data held on the mobile device; no matter the flavor of BYOD practiced so it is the company that must take responsibility for removing data from the device before disposal. The Infosecurity article says that ensuring that mobile device solid-state memory is completely clean is technically difficult.

Solid-state memory

The article highlights BlackBelt, which has just enhanced its data wiping product to include Apple (AAPL) and Google (GOOG) Android tablets explained the difficulty to the author. “Solid-state memory uses a technique called wear leveling to maximize the life expectancy of the memory chips.” BlackBelt’s business development manager Ken Garner told Infosecurity,It works by spreading the binary information (0s and 1s) randomly across all the memory cells in the chip. This means that unlike on spinning disk memory, the location of the data on the user interface bears no relation to where it is stored on the drive, making traditional forms of deletion ineffective.

end users can't data wipe their mobile devicesBlackBelt says end-users can’t data wipe their phones, “it isn’t possible for an individual to perform a full removal of personal data from any smartphone or tablet using a device’s in-built factory reset or by re-flashing the operating system.” the vendor explains to Help Desk Security that wear leveling will, “over-rule instructions to permanently overwrite old data.

Solid-state memory wear leveling

Because of ‘wear leveling, neither remote wipes nor factory resets are guaranteed to remove all the data from solid-state memory. The blog points out that a low-cost product called Wondershare, can recover data from solid-state memory. Mr. Garner claims the software, “recovers just about everything after either a factory reset or a local (phone operating system) delete.

Many data wiping solutions don’t work on solid state memoryWhen a tablet is retired it is incumbent on the company to make sure that all data held on the device is adequately deleted. One problem, says Garner, is that “Many data wiping solutions, more often than not, have been “…re-purposed from data wiping solutions for traditional hard disk drives,” and that simply doesn’t work on solid-state memory.

Three-stage process to wipe SSM

DataWipe, uses a three-stage process: first writing 0s in every memory cell, secondly writing 1s in every cell, and thirdly writing random 0s and 1s across every memory cell. The result, he claims, is guaranteed data erasure that can also provide audit, compliance, and reporting data in an industry-standard XML format that is easily exchanged with all the major DLP, SIEM, policy management, and mobile device management solutions solving both the technical difficulties around tablet recycling.

difficulties around tablet recyclingWiping data from a PC or a first-generation Apple iPad that is being retired is important because of the enormous amount of data they can store. This makes the proper destruction of that data on the device essential before it leaves the organization. Unfortunately, IT asset disposition firm Retire-IT sees that many firms simply swap the devices with new ones or merely format the drives without securely wiping the data. The Columbus, OH-based firm says this leaves organizations vulnerable.  Kyle Marks, CEO of Retire-IT told Help Net Security that:

99% of problems happen before a disposal vendor touches equipment. No vendor can destroy data if they don’t receive an asset, which is why we strongly encourage clients to destroy data before any move. Better safe than sorry. Of course, disposal vendors should destroy data (again) regardless

Retire-IT looked at tracking data from 1,072 corporate disposal projects encompassing 233 different companies and reported some shocking figures:

  • 4 out of 5 projects (81.5%) had at least one missing asset.
  • 1 out of 8 (11.6%) had a negative variance. The devil is in the details, but nobody looks very closely.
  • Only 79% of the serial numbers were matched with subjective matching.
  • Without subjective matching, only 58% of serial numbers were matched.

Sanitize IT equipment

Help Net Security offers some suggestions to help sanitize IT equipment:

Computers – Derik Boot and Nuke Linux Live CD for full disk wiping. It supports many types of wiping, including the DoD 5220.22-M method with 3 passes.

sanitize IT equipmentStarting with Windows Vista (and Windows 2008 Server), the Microsoft OS overwrites the contents of each sector when you do a Slow Format on your media. They recommend Microsoft’s SDelete for wiping files on Windows.

For Apple OS X there’s the Disk Utility.

On Linux use the “wipe”, “srm” or “shred” commands to securely sanitize files on most distributions.

Printers and copiers – Consult the manual to find out how to clear the memory or use third-party software to wipe the hard drive. Which I covered here

Mobile devices – Wired recommends a hammer and don’t forget to remove the SIM card.

Related articles
  • BYOD: Preventing Breaches Can Be A Challenge (healthsecuritysolutions.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.