Tag Archive for 2015

Cisco Loves Apple

Cisco Loves AppleApple has announced a new partnership with network giant Cisco. If you believe Fortune, the goal is to sell more iPhones and iPads to business customers. The move is intended to make it easier for businesses to use Cisco products like its video, chat, and web conferencing services on Apple‘s (AAPL) mobile devices. Fortune says that no new products have been announced under the partnership.

New partnership between Apple and CiscoIn fact, this collaboration seems to be a deal looking for a plan. Rowan Trollope, Cisco’s senior vice president and general manager of Cisco’s collaboration technology group, told the author that both Cisco (CSCO) and Apple sales teams would soon meet with business leaders at other companies to discuss their technology needs. The conversations are intended to help give Cisco and Apple ideas about the products they will develop together. He also declined to confirm if any Cisco or Apple engineers are engaged or any timeline for when the new products will hit the market.

Even though there are no plans, the Cisco VP claimed that customers will be able to prioritize mobile traffic on their networks so that workers watching YouTube videos on their iPhones won’t hog all of a company’s bandwidth. Apparently, Cisco and Apple engineers will work on updating iOS Apple’s mobile operating system, to prioritize network traffic from Apple devices, which “would be difficult without a joint engineering project,” according to the article.

Prioritization would be a good start, iOS updates have crushed networks in the past. The number of hoops you have to jump through to make AppleTV’s Bonjour work on an enterprise network is stupid. Just proof that Apple is not ready for the enterprise.

TelepresenceCisco has tried to create new product lines outside of its core networking and switching businesses to help boost its sales. Sales of its collaboration products are so stagnant that the firm has resorted to 85% discounts on telepresence gear.

Cisco has a history of buying consumer-orientated businesses like Apple, destroying the business, and then jettisoning the remains. Linksys and Flip Video come to mind.

Apple has also buddied up to IBM (IBM). The plan seems to be to add an IBM markup to overpriced Apple mobile devices. And then sell them to firms that have too much money. The combination has developed pushed-based apps that target specific industries, like healthcare or law enforcement.

rb-

add an IBM markup to overpriced Apple mobile devicesThe fanboyz are drooling over this deal – Apple Will Change the World (again?) – Maybe if they clean up their proprietary non-routable protocols.

It has been a while since Cisco has done something notable. Maybe new CIO Chuck Robbins will shake things up at Cisco now that King Chambers has mostly moved on.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Back to School Cybersafety Resources

Back to School Cybersafety ResourcesThe new school year is here. If cybersafety is not on your “back to school” checklist, it should be. SecureWorld offered up a list of resources to help parents have a meaningful conversation about “cyber-safety” with their children. Parents need to talk with their kids about what they can do to protect themselves from the threats that are lurking online.

There are a variety of resources available that can help parents teach their children about the importance of Internet safety and privacy. Here are some recommended in the article.

threats lurking onlineIn 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help Americans understand the dangers that come with being online. The program stresses that cybersecurity is a shared responsibility. Parents can download a Cybersecurity for Kids tip card (PDF) that offers helpful hints and advice designed specifically for children.

ConnectSafely.org is a nonprofit organization dedicated to educating users of connected technology about safety, privacy and security. The website offers a number of Parent Guides, written by parents for parents, including:

Back to school

The National Cybersecurity Alliance is an industry-led group, founded by the likes of Symantec (SYMC), Cisco (CSCO), Microsoft (MSFT), and EMC (EMC), whose mission is to educate and therefore empower a digital society to use (rb- their products) the Internet safely and securely at home, work and school.

Parents and teachers can download tips and resources from their website StaySafeOnline.org. The tip sheets are created specifically for different age groups ranging from kindergarten to college students. This site offers resources like:

Free Security Check-Up and Tools – Which has download locations for tools from A to W – Avast to Webroot. (as always use at your own risk).

Tip Sheets for:

The author states that industry professionals are also placing a high priority on preparing children for life in cyberspace. For instance, the (ISC)2 Foundation’s Safe and Secure Online program was introduced in 2006 in conjunction with Childnet International. They offer resources for parents which include Top 10 Tips for Parents (PDF) and the Parent-Child Commitment to Safety Agreement (PDF).

The Business Insider polled and a bunch of industry cyber security experts about what they teach their kids about the internet. The experts working in the field recommend you:

  • Start discussing online safety at an early age.
  • If you wouldn’t do it face to face – Don’t do it online.
  • Once you’ve written something you can’t delete it.
  • Not just to tell them the rules but also to spend the time/

You can read the rest of the tips at Business Insider here.

rb-

Good luck, you will need it.

Talk to your students about cyber safety – Staysafe.org’s guide on Internet Safety for Teens: https://www.staysafe.org/teens/

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Data Never Sleeps

Domo has created this infographic which shows just how fast data proliferates. The amount of data that can be produced in a single minute is mind-numbing and shows no sign of slowing down. CEO and chairman of the Domo board Josh James blogged; “Since 2013, the global internet population grew nearly 20 percent – from 2.4 billion to 3.2 billion people“. These new users are using new services in an unprecedented number. Domo says that every minute on the web, users:

  • Vine users play 1,041,666 six second videos.
  • Snapchat users share 284,722 Snaps
  • Buzzfeed users view 34,150 videos
  • Uber passengers take 694 rides.

rb-

Who is storing all of this information and how are they storing it and the metadata that surrounds it? What kind of information are TLA’s, Marketers, and credit card companies culling out of this data? 

Domo infographic

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Sweating the Oldies

Sweating the OldiesIf you’re “sweating assets” and holding off on making major network upgrades, you’re not alone. No Jitter brings our attention to Dimension Data’s annual Network Barometer Report. The report surveyed the system integrator’s worldwide clients and found that the percentage of aging and obsolete devices in today’s corporate networks around the globe is at its highest in six years signaling that the recent global financial crisis may still have a lingering effect today.

 

More than half of devices are aging

RecessionAccording to the article, more than 51% of all devices assessed are now aging (3-5 years old) or obsolete (5 years or older). In addition, 27% of all devices are now ‘later’ in their product life-cycle and at the point where the vendor begins to cut support.

The aging was highest in Asia-Pac and the lowest in the Americas. The survey found equipment in the Americas, was considerably lower at 44%. Dimension Data ascribed this variation to regional macroeconomic conditions.

The oldest equipment

The “sweatiest” companies were in the travel/transportation vertical which had more than 50% aging/obsolete devices according to the study. Other verticals were “sweaty as well:

  • BaystacksConsumer/retail and utilities/energy, all of which had more than 50% aging/obsolete devices.
  • Automotive/manufacturing had an aging/obsolete base of 41%
  • Technology industries had a 37% aging/obsolete gear 37%
  • Construction/real estate was most up to date with 28% aging or obsolete.

The level of aging/obsolete networks hit 45% in 2012 without triggering a refresh and climbed to 48% in 2013 and reached 51% in 2014. That author suggests that either we’re long overdue for another refresh, or else we’re moving to an environment where aging network gear is the rule.

He goes on to speculate that as the BYOD/BYOEverything trend grew over the last 3 years and enterprises diverted technology spending to ad hoc device/cloud purchases, we’re looking at a fundamentally new buying environment.

Obsolete devices fail less

The survey results suggest that “sweating” network assets may be a smart strategy. They analyzed 91,000 trouble tickets from its own practices and found that “Obsolete devices fail less often than current devices. And, when they do fail, problems are quicker to resolve.” Specifically, the survey found that:

  • Obsolete devices had the lowest failure rates (compared with new and aging),
  • Aging devices had the lowest mean-time-to-repair rates among the three classes.

Old equipmentOld hands might be tempted to greet these findings with some variation of the old lament, “They don’t build ’em like they used to,” but the truth might actually be even more flattering to the organization.

Dimension Data suggests that gear that’s been in place while is supported by more mature processes, hence the decreased likelihood of breaking, and faster ability to fix when they do break. Of course, an asset-sweating strategy should have some rationale behind it–it’s’ not about just clinging to old stuff so you don’t have to deal with replacing it.

How to keep the old stuff going

Dimension Data “Tips for Sweating Assets” that included:

  • Have an accurate inventory of your entire network estate.
  • Understand the function of each device and how critical it is to the network’s uptime.
  • Know at which stage in their life cycles these devices are.
  • Have the right operational support strategy in place to resolve any performance issues or outages that may occur, as vendor support will be either limited or unavailable during later life cycle stages.
  • Ensure that the device’s capabilities are not constraining architectural changes, which have driven upgrades in other areas of the network.

rb-

The aging of network gear is not unique. Many firms are still reeling from efforts to survive the depression, recession, economic downturn. In some places, they don’t pick up the trash regularly or replace stained ceiling tiles. The Business Insider says the average age of private fixed assets is at a 50-year high. and here a chart to prove it.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Prevent Pervy Pics

Prevent Pervy PicsFrom the world of unintended consequences, iPhone users have become the victims of a new phenomenon known as cyber-flashing. Reports out of London state that Apple iPhone users are being sent pervy pics. The pervy pics are unsolicited and indecent photographs. The pics are being sent over a new Apple feature in iOS called AirDrop.

BluetoothAirDrop is a feature on the iPhone, iPad, and Mac computers. AirDrop allows users to send files, such as images, to each other at a close range. The pics can be sent up to 33 feet (10 m) via a Bluetooth connection. Apparently, even if the receiver rejects the photo, they are still shown an uncensored preview of the image.

AirDrop initially establishes a connection over Bluetooth. It then uses a direct Wi-Fi connection between the two iPhones to send files. This makes the transfer much quicker.  It’s supported by devices from the iPhone 5 onwards with iOS 7 released back in 2013.

How to prevent the pervy pics

Pervy pics appearing on your iDeviceTo prevent the pervy pics from appearing on your iDevice, you need to take action. Mark James, a security specialist at ESET UK, explains. You have to set your AirDrop settings to “Contacts Only” which will only permit AirDrop file transfers from people in your address book or disable AirDrop entirely. He explains that AirDrop is not turned on by default, but it’s easy to set AirDrop to receive from Everyone, and then forget all about it.

ESET explains how to prevent cyber flashing:

  1. On the home screen of your iPhone, swipe up to open the Control Center.
  2. Tap on AirDrop, below the media playback and volume controls.
  3. Tap ‘Off’ or ‘Contacts Only’ to prevent files from being sent from strangers.

Apple Airdrop settings

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers and anything else that catches his attention since 2005. You can follow him at LinkedInFacebook and Twitter. Email the Bach Seat here.