Tag Archive for AAPL

BYOD Notes

90% of Employees Use Personal Devices for Work

90% of Employees Use Personal Devices for WorkA survey by DELL Kace (DELL) found IT managers feel they lack the necessary tools to properly manage BTOD personal devices. In the study, IT managers revealed they are unable to effectively protect corporate data and intellectual property as well as ensure compliance. Help Net Security says key survey findings include:

  • 87% of companies have employees that use a personal device for work including laptops, smartphones and tablet computers.
  • 82% citing their concerns about the use of personal devices for business use
  • 64% revealed they are not confident that they know of all personal devices being used for business purposes
  • 62% specifically concerned about network security breaches
  • 60% reported a greater demand for support of Mac OS X since the introduction of the Apple (AAPL) iPad and iPhone
  • 59% reported their personal devices have created the need to support multiple operating systems (OS’s).
  • 32% revealed employees use unauthorized personal devices and applications to connect to their network

On the governance side:

  • 88% said they believe it is important to have a policy in place to support personal devices, and another 62 percent revealed their organization lacks the necessary tools to manage personal devices.

It’s absolutely essential that IT teams deploy a strategy that provides end-to-end management capabilities on a variety of operating systems to effectively protect networks and address the consumerization and personalization of IT,” said Rob Meinhardt, general manager and co-founder for Dell KACE.

Related articles

Security Monitoring for BYOD Environments

Security Monitoring for BYOD EnvironmentsUnlike other BYOD security solutions that force organizations to install software on every new device, Lancope’s StealthWatch System provides security for any device entering the network, without having to install more software on the device or deploy expensive probes. Help Net Security reports that StealthWatch performs behavioral analysis on flow data from existing infrastructure to deliver end-to-end visibility and security across an organization’s entire network.

Net flow data already exists in network infrastructure devices to monitor network and host activity. Since net flow is already in most network equipment, it provides a cost-effective tool for monitoring mobile devices. The article says flow-based monitoring can uncover external attacks like botnets, worms, viruses or APTs, as well as internal risks such as network misuse, policy violations and data leakage. It can also be leveraged for other efforts including regulatory compliance and capacity planning, and for ensuring high levels of network and mobile device performance.

Related articles

IT is Embracing BYOD

IT is Embracing BYODIT is Embracing BYODCisco says that IT is accepting, and in some cases embracing, “bring your own device” (BYOD). Help Net Security reports that the networking giant found that some of the pros and cons associated with allowing employees to use their own mobile devices on their employers’ networks has become a reality in the enterprise.

The Cisco (CSCO) study BYOD and Virtualization (PDF) found most enterprises are now enabling BYOD.

  • 95% of responding firms permit employee-owned devices in some way in the workplace.
  • The average number of connected devices per knowledge worker will grow from 2.8 in 2012 to 3.3 by 2014.
  • 76% of IT leaders surveyed categorized BYOD as a positive for their companies and challenging for IT.

The survey says employees are turning to BYOD because they want more control of their work experience:

  • 40% of respondents cited “device choice” as employees’ top BYOD priority (the ability to use their favorite device anywhere).
  • Employees’ second BYOD priority is the wish to do personal activities at work, and work activities during personal time.
  • Staff wants to bring their own applications to work: 69% of respondents said that unapproved applications, especially social networks, cloud-based email, and instant messaging, are more prevalent today than two years ago.
  • Employees are willing to invest to improve their work experience. Cisco employees pay an average of $600 out-of-pocket for devices that will give them more control over their work experience the report says.

The article says these findings underscore that BYOD is here to stay, and managers are now acknowledging the need for a more holistic approach, one that is scalable and addresses mobility, security, virtualization, and network policy management, to keep management costs in line while simultaneously providing optimal experiences where savings can be realized.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Credit Agency Trawls Facebook

GigaOm has an article that documents the efforts by Schufa, the largest credit rating firm in Germany to mine data from the Facebook (FB), LinkedIn (LNKD), and Twitter accounts of its customers. David Meyer cites documents leaked to German media, that the firm whose slogan is “We Build Confidence” would use the information “to identify and evaluate opportunities for and threats to the company.

“It cannot be that social networks are systematically scoured for sensitive data, resulting in credit ratings of customers,” said consumer protection minister Ilse Aigner.

rb-

Get over it.

Facebook logoI wrote about firms like RapLeaf mining social networks for employers and banks back in 2010. What is surprising to me and Mr. Meyer is that this latest social network mining operation comes out of Europe and especially Germany, a country where most people are very conscious of data protection concerns.

This goes back to the internet-age-old issue of privacy. Where is the line between public and private is it different for some groups than others? Do the NSA, CIA, MI5, and whoever else is listening get different access to data than Rapleaf, Apple (AAPL), Facebook, Twitter?

Just because the info is out there, public by default do they have the right to use it?

Get over itOn the other hand users of Facebook and Foursquare happily tie their credit cards to these accounts, post status updates, and check in to places for the world to see.  

Maybe we are just getting what we deserve.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.

‘Personal Cloud’ to Replace PC by 2014, Says Gartner

‘Personal Cloud’ to Replace PC by 2014, Says GartnerMike Barton wrote on Wired’s Cloudline that there’s no doubting the cloud invasion. But the research firm Gartner (IT) believes the personal cloud will replace the PC as the center of our digital lives as soon as 2014.

Gartner logoSteve Kleynhans, research vice president at Gartner, said in a statement, “Major trends in client computing have shifted the market away from a focus on personal computers to a broader device perspective that includes smartphones, tablets, and other consumer devices.” He continues, “Emerging cloud services will become the glue that connects the web of devices that users choose to access during the different aspects of their daily life.”

cloud-happy futureIn the article, Mr. Burton writes that Google plans a cloud-centered future with Google (GOOG) Play and Android mobile OS. But the personal computer will also not miss out on the cloud, as Microsoft (MSFT) and Apple (AAPL) are planning to weave the cloud into the next generation of their desktop operating systems, Windows 8, and OS X Mountain Lion.

But a cloud-happy future will not be as easy as that, because Gartner says, “it will require enterprises to fundamentally rethink how they deliver applications and services to users.” Gartner sees a number of factors are converging to make for a perfect personal cloud storm by 2014.

Megatrend No. 1: Consumerization— Gartner says what corporate IT has seen so far been a precursor to the major wave that is starting to take hold across all aspects of IT as several key factors come together:

  • ConsumerizationUsers are more technologically savvy
  • The internet and social media have empowered and emboldened users.
  • The rise of powerful, affordable mobile devices changes the equation for users.
  • Through the democratization of technology, users of all types and statuses within organizations can now have similar technology available to them.

Megatrend No. 2: Virtualization — Virtualization has improved flexibility and increased the options for how IT organizations can set up client environments.

App-ificationMegatrend No. 3: “App-ification” — Apps change the way applications are designed, delivered, and consumed by users and it has a dramatic impact on all other aspects of the market.

Megatrend No. 4: The Ever-Available Self-Service Cloud
– The cloud opens a whole new level of opportunity for self-servicing users. Every user can now have a scalable and nearly infinite set of resources available for whatever they need to do.

Megatrend No. 5: The Mobility Shift — Wherever and Whenever You Want Today, mobile devices combined with the cloud can fulfill most computing tasks, and any tradeoffs are outweighed in the minds of the user by the convenience and flexibility provided by the mobile devices.

The Mobility ShiftGartner’s Kleynhans said. “In this new world, the specifics of devices will become less important for the organization to worry about. Users will use a collection of devices, with the PC remaining one of many options, but no one device will be the primary hub. Rather, the personal cloud will take on that role. Access to the cloud and the content stored or shared in the cloud will be managed and secured, rather than solely focusing on the device itself.”

Wired says that former Microsoft chief software architect Ray Ozzie made the same point recently, “People argue about, ‘Are we in a post-PC world?’. Why are we arguing? Of course, we are in a post-PC world.” Ozzie reportedly told a conference,  ”That doesn’t mean the PC dies; that just means that the scenarios that we use them in, we stop referring to them as PCs, we refer to them as other things.”

rb-

Goodie for Gartner, they get paid for codifying the obvious. Consumers are moving to the personal cloud. DVDs vs.Netflix streams. Files on your hard drives vs. some distant data center run by Dropbox. Photo albums vs. Flickr. Books vs. Kindles and Nooks.

Related articles:
  • Supermodels, Megatrends, and Ultra Big Paradigm Shifts to the Cloud

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Bad Day at LinkedIn

Bad Day at LinkedInIt’s been a bad day for LinkedIn (LNKD). LinkedIn users have been the victim of two security and privacy blunders on the same day. First, the LinkedIn mobile app for iOS devices is sending potentially confidential private and business information to the company servers without the users’ knowledge.

LinkedIn logoHelp Net Security reports that security researchers Yair Amit and Adi Sharabani at Skycure Security identified the security hole. According to the researchers, the security flaw involves calendar syncing which collects data from all the calendars (private and corporate) on the iOS device.

“The app doesn’t only send the participant lists of meetings; it also sends out the subject, location, time of meeting and more importantly personal meeting notes, which tend to contain highly sensitive information such as conference call details and passcodes,” the researchers point out in the article. “…this information is collected and transmitted to LinkedIn’s servers; moreover, this action is currently performed without a clear indication from the app to the user, thus possibly violating Apple’s privacy guidelines.”

The first response from LinkedIn‘s spokeswoman Nicole Perlroth appears to minimize the issue and blame the users for the privacy breach when she told Help Net Security that the feature is opt-in, and said nothing about whether the company will update the app that would stop this privacy snafu from happening in the future. (Looks like LinkedIn updated the App and broke it according to reviews in the Apple AppStore) This was reinforced by Joff Redfern, Mobile Product Head at LinkedIn on the LinkedIn blog where he also pointed out the information harvesting app is an opt-in feature. He claims that the information collected is not stored or shared. LinkedIn did change the LinkedIn app for Google (GOOG) Android so it no longer sends data from Droids to LinkedIn. There was no information in the article if LinkedIn plans to change the Apple iOS app.

But wait it gets worse…

LinkedIn also lost 6.5 million accounts today. They were however found on a Russian forum. LinkedIn has confirmed on their blog that there are “compromised accounts.” Cameron Camp, Security Researcher at ESET, commented on the leak for Help Net Security:

“The difference with this hack … is that people put their REAL information about themselves professionally on the site not just what party they plan on attending, ala Facebook and others …  mess with somebody’s professional profile, and you’re messing with their life, and their contacts know about it.”

rb-

I wrote about the value of different credentials here and here.

I am wondering about the timing of the two security problems for LinkedIn. Could they be related? Were attackers using the Apple iOS app as an attack vector? After all, we know that Apple loves to collect personal info on its customers.

Mitt Romney

What happened here?

Action Items:

  • Toggle off the “Add Your Calendar” option in the Sync Calendar feature of the LinkedIn app on your Apple iOS devices
  • Immediately change your LinkedIn password and any accounts that share the same password.
  • Be on the lookout for phishing campaigns that might leverage the incident.
Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablet Notes

Tablet computer ownership will lead the industry over the coming 12 months as all-in-one devices continue to grow in popularity according to the CEA.

Windows 8 Tablets in November

Windows 8 Tablets in NovemberExpect the first wave of Windows 8 tablets to land in retail stores in November, according to CNET. A secret source deep within Intel (INTC) says the Intel-based Microsoft (MSFT) Windows 8 tablets will use Intel’s upcoming Clover Trail Atom chip. DailyWirless says that Clover Trail is Intel’s first dual-core Atom design based on its 32-nanometer process technology.

The author says the tablets will fall into two basic sizes: pure 10-inch tablets and hybrid 11-inch designs with physical keyboards. Windows 8, like Windows 7 before it, will be powered by chips from Intel and AMD (AMD) and will be able to run older, so-called “legacy” applications.

A separate release from Microsoft, Windows RT, will land on devices powered by ARM (ARMH) chip suppliers NVidia (NVDA), Qualcomm (QCOM), and Texas Instruments (TXN). RT will not run older Windows applications.

Chinese Tablet PCs Peel Away at Apple

Chinese Tablet PCs Peel Away at AppleApple Inc may find it harder to keep market share in China because homegrown tablet PC brands will win over more customers says a report on China Daily.com. Sun Peilin with Analysys International, told China Daily, Apple’s (AAPL) market share will shrink to about 70 percent, “Chinese tablet PC makers are trying to form a stronger echelon behind Apple by taking over the market share that belonged to small copycat manufacturers.

Apple’s iPad and iPad 2 took 78.3 percent of the market share in China in Q1 2012, distantly followed by Samsung’s (005930) 5.1% and ErenEben’s 4.5% according to the article. AI’s data indicates tablet PC sales in China are expected to break 4.5 million units. Companies including Lenovo (LNVGY), Acer (ACEIY) and home appliance giant Haier Group, are releasing their own tablet PCs.

Sun from Analysys states in the blog the biggest obstacle Chinese brands face is how to come up with a different marketing angle against Apple, to avoid head-on competition with the iPad. “There are two separate markets for tablets: You can either go entertainment or business. The iPad is a big competitor in terms of entertainment, so Chinese companies should be different from iPad,” Sun suggested. Some Chinese companies have already differentiated their tablets. Beijing ErenEben Information Technology Co, a business tablet PC maker, won a government contract to provide tablets to the police department in the Guangxi Zhuang autonomous region.

According to Fang Liyong, COO of ErenEben, the company sold nearly 150,000 units of its first two generations of products in 2010, making it the biggest homegrown tablet PC brand by sales volume. “We are now selling nearly 30,000 units every month in 2011,” he said.

With a touchscreen developed by Japanese graphics-tablets maker Wacom Co Ltd, the ErenEben tablets were designed to offer an experience similar to writing on real paper. The COO boosts, “ErenEben has great growth potential, because China’s tablet market is so big, and Apple cannot take it all.”

iPad Suit

iPad SuitMohan’s Custom Tailors of New York is taking the boring and basic out of the word “suit” by designing a new and improved version for the modern man. According to their website, as men are dressing up and going out to dinner dates, museum galleries, and lounges in fine style, Mohan’s is creating contemporary and handsome designs to fit their needs. Mohan’s has introduced the fashion of the future with their new tech offerings, including pockets for your Research In Motion (RIMM) Blackberry, Apple (AAPL) iPod, iScribe, Bluetooth, and more. Most recently, they have revealed the first-ever iPad pocket in menswear, creating a fashion rush for “techies” around the world.

iPad Bacon Case

iPad Bacon CaseAt Antje Schmitt’s storefront at Etsy, the famous handcrafted Bacon Case for the Apple (AAPL) iPad 3 is now available. The Bacon Case is also available for older iPads, MacBooks, Netbooks, and Notebooks.

ZD.net – “The undisputed king of the weird category however, is the iPad bacon case ($59, pictured), which I’m ordering immediately.”

Gizmodo – “It’s $59, but who cares? Bacon iPad cases are what money was invented for, people. Well, that, and both actual bacon and actual iPads.”

Gearfuse – “Bacon and Apple products go together like peas and carrots. Or lamb and tuna fish. They’re both the perfect byproducts of their respective categories. Pimp your iPad with pork with the custom-made Bacon iPad case. It might not be actual bacon, but it’s realistic design is enough to make you wish you had a side of eggs to go with your balanced breakfast of pork and tablet.”

Clueful Scans Your iOS Apps For Privacy Behavior

Clueful by BitdefenderSecurity firm Bitdefender has introduced Clueful, an app that scans your Apple (AAPL) iOS apps lets you see what information other applications installed on your iDevice might have access to. Once downloaded and installed (iTunes), the $3.99 app scans your iPad 3, iPhone 4s or other iOS Apple products to see what’s installed and puts it in a list that can be filtered based on the various kinds of behavior. This includes things like:

  • Apps that can track location
  • Apps that can read the address book
  • Apps that might drain battery
  • Apps that use iPhone’s unique ID
  • Apps that display ads
  • Apps that gather analytics

These behaviors are listed in the results and explained on each app’s detail page. However, Clueful doesn’t log how often these behaviors happen. Clueful also notes if your data is encrypted, and if app makers anonymize you as a user, CNET News.Com reported.

Besides scanning what you have downloaded, the article explains that the software is designed to let you research what kinds of information an application wants to use before you buy it from the App Store. However, the author says, ” this appeared to be a work in progress, it is slow and unable to pick up a handful of big name games and apps.”

Bitdefender maintains all the data behind the privacy analysis, and users can ask to have apps that are not a part of that system analyzed. CNet states that Clueful comes some three months after Apple came after fire for the fourth time over how iOS and apps log and send user information to third parties.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.