Tag Archive for 2014

Tablet Trouble

Tablet TroubleThere has been a shocking long-term trend in Apple (AAPL) iPad tablet sales. Despite the much bally hoed launch of the new iPad Air 2 and iPad mini 3, sales of Apple’s iPad have sunk to their lowest level since the 2011 introduction of the iDevice.This chart from Business Insider shows the decline of iPad sales.

Apple CEO Tim Cook was unfazed about the iPad’s plunging sales. During Apple’s latest earnings call Apple’s Cook said, “I’m very bullish on where we can take iPad over time.”Apple Quarterly Revenue

Users don’t want a tablet

Despite CEO Cook’s optimism, research from Kantar Worldpanel Comtech is not so sure. In an analysis of the tablet market, they found that consumers believe that they need the latest iPad. Or any tablet for that matter.

Their conclusion is based on research which found:

  • A majority of U.S. non-tablet owners said they would not buy a tablet in the next 12 months.
  • Of those who will not buy a tablet, 725 said that their PC or laptop was “good enough” as the reason why they are not buying a tablet in the next year.
  • Tablets are not seen as an alternative to smartphones.

Carolina Milanesi, chief of research at Kantar Worldpanel laid out four reasons why tablets sales are not growing at the rate many had expected.

  1. current tablet owners plan to keep their tablets even after upgrading to a new oneReplacement cycles are longer for tablets than smartphones. Ms. Milanesi explains,”Software upgrades help refresh the devices, and carriers do not provide incentives/subsidies to encourage replacements every two years, as they do with smartphones.
  2. Tablets are not as personal as smartphones.While there is no question that tablets are more personal than PCs, if less personal than smartphones, they still land in between the two,” the Kantar chief of research says.
  3. Tablet owners hang on to their old tablet when they get a new one. Smartphone users tend to turn in their old smartphone when they upgrade to a newer one according to Kantar Worldpanel data:
    • 36% of current tablet owners plan to keep their tablets even after upgrading to a new one.
    • 18% plan to pass their old ones on to a friend or relative, according to Kantar Worldpanel data.
  4. Finally, the value proposition of tablets remains weak.They report that only 3% of U.S. non-tablet owners said they will definitely buy a tablet in the next 12 months.

rb-

I thought that tablets were going to take over the world.

So what is the use case for tablets?

If the Apple fanboyz and gurls aren’t buying new iPads why should anyone else?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Veterans Day

Thanks

Veterans Day

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Email Etiquette is Good For You

Email Etiquette is Good For YouWho remembers when email was a new and exciting technology that the Intertubes brought us? Did AOL’s You’ve Got Mail! Make you giddy? They made a whole chick-flick about it starring Tom Hanks and Meg Ryan. I am pretty sure that thrill has worn off by now. According to marketing researchers, the Radicati Group predicts that by 2015 the average email user will send or receive 125 emails a day. Many of the emails are loaded with threats as I have pointed out here again and again. The ubiquity of email has caused some users to take email for granted and let their guard down.

2015 the average email user will send or receive 125 emails a dayRelaxed vigilance has led to some high-profile incidents where sensitive business information was exposed via email. Research indicates that at least 22% of companies have experienced an accidental or malicious leak of sensitive or confidential information by employees through email in the past 12 months. While it is may be bad for the firm, it could cost you your job. Here are some tips which will make your emails more effective and more secure:

Treat emails like business letters

It’s better to be more formal than too casual when you want to make a good impression. For example, use a person’s surname until they respond by signing their email with their first name. Never write anything in an email message that you wouldn’t want both your boss and your mom to read!

Company email is never private

If you want to Treat emails like business letterssend someone confidential or time-sensitive information, use the phone or meet in person. Emails can be duplicated, forwarded, and printed; anything unfortunate you write could come back to haunt you or your employer. Never use your employer’s email system to look for your new job. That move could cost your current job and the next one too.

Be cautious about the “reply all” feature

If you receive an email that was sent to a multitude of people, including yourself, reply only to those who need a response. Hit “reply all” only if it is crucial that every person on the distribution list see your response. In many cases, the sender is the only person who requires a response. Misuse of “reply all” is a key way in which sensitive business data slips outside the network.

Take care with email attachments

Never open attachments from unknown sourcesNever open attachments from unknown sources. And before sending attachments yourself, find out if the recipient wants them. Bogus attachments remain one of the most popular ways for cyber-attackers to gain a foothold in business networks, and it’s very easy for hackers to imitate legitimate email addresses.

This infographic includes some pretty amazing stats about email. Did you know?

  • The average user creates 5,000 email attachments every year?
  • There are 6 copies of each attachment made?
  • The government reads over 250 million emails annually?

That is why email etiquette is important.

Data Running Wild Infographic

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

What is Ransomware?

What is Ransomware?Ransomware is a nasty form of malware. It is also known as data kidnapping. It locks up your computer by encrypting your data and then demanding you pay a fee to unlock them. The fee is usually in Bitcoins. The decryption key may or may not unlock your files. Ransomware can be terrifying. We rely so completely these days on our PCs that to stare helplessly at yours—often with a racy image on the screen—is frustrating and crippling to your productivity. Cybercriminals may use one of several tactics to extort money from their victims.

Tactics to extort money

1. After a victim discovers he cannot open a file, he receives an email ransom note demanding a relatively small amount of money in exchange for a private key. The attacker warns that if the ransom is not paid by a certain date, the private key will be destroyed and the data will be lost forever.

2. The victim is duped into believing he is the subject of a police inquiry. After being informed that unlicensed software or illegal web content has been found on his computer, the victim is given instructions for how to pay an electronic fine.

Avoid sketchy websites3. The attackers sneak malware onto a computer, usually by a drive-by download, which encrypts the victim’s data but does nothing else. In this approach, the data kidnapper anticipates that the victim will look on the Internet for how to fix the problem and makes money by selling anti-ransomware software on legitimate websites.

Cut your ransomware risks

Here are tips that cut your risk of becoming a victim.

1. Avoid sketchy websites, searches, and downloads. You know the old expression “You can’t cheat an honest man”? Well, many (though not all) ransomware infections begin when a user surfs to pornographic or gambling websites, while others start with a click on a suspicious link. Steer clear of sites known to house malware, and never click a link in an email unless you know it is legit.

2. Back up your data. Experts stress that the single biggest thing that will defeat ransomware is having a regularly updated backup. That way, if you are beset by ransomware, you can restore your system while losing relatively little work.

3. Update your software regularly. Ransomware, like most malware threats, may sneak onto your PC through a known flaw in your operating system or other software programs. And hackers often rely on people running outdated software with those known vulnerabilities. You can definitely decrease the potential for ransomware if you make a practice of updating your software often.

4. Use a reputable security suite. It is always a good idea to have both anti-malware software and a firewall to help you identify threats or suspicious behavior. Malware authors often send out new variants, to try to avoid detection, which is why it’s important to have both layers of protection.

Anti-malware vendor Webroot provided this infographic that shows the prevalence of ransomware and the methods IT professionals use to deal with it.

Webroot Ransomwear infographic

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tech Giant Lobbying

Tech Giant LobbyingIn honor of election day, here is some unsettling info from IDG. The research firm reports that 2013 was a record year for computer and internet company spending on lobbying in the U.S., and 2014 is looking set to continue that trend. They presented an infographic that tracks information technology firms’ money spent buying, corrupting, lobbying politicians.

record year for computer and internet company spending on lobbying in the U.S.The article says that advertising, privacy, cybersecurity, patents & IP, tax, immigration, energy, drones, and mobile payments are all issues the tech industry wants to control, dominate influence on Capitol Hill. IDG’s research says that Google was the biggest spender; the search giant spent $3.94M in Q3, an increase from this time last year.

IDG reports that many well-known tech firms have increased their political spending when compared to last year. They report that social networking giant Facebook (FB) has already surpassed its lobbying spend compared to all of last year. Other tech mega-firms that have increased their attempts to buy political power lobbying include:

tech mega-firms have increased their lobbyingMicrosoft (MSFT), historically one of the biggest spenders in this area, was one of the few companies to actually decrease its spending from this time last year, down by a quarter to $1.66M according to the report. It seems a lot of the other legacy enterprise companies are also cutting back. Other companies reducing lobbying spend compared to this time last year are:

Don’t worry about the fat-cats, IDG says there are plenty of other companies also lining politicians pockets spending +/- $1M each on lobbying including the likes of:

2014 Tecch Lobby Spending - IDG

rb-

No wonder Washington is broken, how much of this money goes into the stupid TV ads you can’t escape. Maybe if these firms paid their proper taxes they would not have so much cash to spend buying congress. Oh right – IBM is a person who has rights.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.