Tag Archive for Apple

Tablet Info

iPad thefts from Cleveland Heights-University Heights middle school students prompt community soul searching

iPad thefts from Cleveland Heights-University Heights middle school students prompt community soul searchingCleveland.com reports that iPad thefts from middle school students in the Cleveland Heights-University Heights school district is causing an iPad re-think.

The school district gave 1,300 Apple (AAPL) iPad tablets to middle school students at the start of the school year. The report says students were permitted to take the iPads home as a continuing educational tool.

The experiment lasted less than three weeks because the students became targets for thieves. Between Sept. 26 and Oct. 13, a dozen middle school students had their iPads stolen while on their way to and from school, Cleveland Heights police chief Jeff Richardson said.

Since mid-October, the district has collected the tablets at the end of the school day and students no longer could take them home.

More than 130 people attended a meeting seeking answers about how to go ahead and whether crime will win out over education. The reporter writes that the meeting was meant as an information-gathering session. Police, principals, and other officials wanted to decide if the district could safely revive the “Take home iPad Plan” sometime in the near future.  The crowd reaction was mixed about how to proceed.

Related article
Superintendent John Deasy’s $17.5M request for computer tablet funds nixed

Superintendent John Deasy's $17.5M request for computer tablet funds nixed

The Los Angles Daily News reports that the panel that oversees the spending of Los Angeles Unified’s bond revenue refused Superintendent John Deasy’s request for nearly $17.5 million to jump-start the purchase of computer tablets for every student. The Bond Oversight Committee voted 7-3 for the plan, but that was one vote short of the eight needed for passage, officials said.

The $17.5 million would have funded the first phase of his long-range technology program. The plan included the tablet pilot project at 14 secondary schools. Mr. Deasy said the tablets are needed for the district to start the new curriculum known as Common Core State Standards taking effect in 2014.

Ultimately, he wants to buy tablets for all 650,000 LAUSD students, a project estimated to cost upwards of $400 million.

Related article
  • LAUSD Superintendent Warns Of Shorter School Year Due To Budget Crisis (losangeles.cbslocal.com)
IDC Figures Show Samsung and ASUS Challenging Apple’s Grip on the Tablet Computing Market

http://www.stripersonline.com/t/628984/check-out-what-im-doing-tonightMIT’s Technology Review pointed out new data from IDC suggest that Apple’s dominance of the global tablet computer market may be giving way. Competing tablet makers, led by Samsung (005930), gained substantial ground during the third quarter of 2012.

Apple‘s (AAPL) market share dropped from 65 percent in the second quarter to just over 50% in the third quarter. Meanwhile, Samsung’s share doubled to 18%, and Amazon (AMZN) and ASUS (2357) each saw their share rise from under five percent to around nine percent.

2012 3Q Worldwide tablet shipments

As is clear from the graph above, TR concludes that it’s too early to tell how quickly the market is diversifying. Apple’s lag was at least partly due to rumors about its plans to release the iPad Mini, which led some consumers to hold off on buying a new iPad, according to IDC. Now that the Mini is out, analysts expect Apple to have a strong fourth quarter.

The iPad Mini’s $329 starting price, however, is well above that of many Google (GOOG) Android tablets, which is why IDC’s analysts believe there is “plenty of room for Android vendors to build upon the success they achieved in the third quarter.”

Android-powered smartphones are already more popular than Apple’s iPhone in the U.S. as well as in other countries, like China

Related article
Tablet Makers Pursue Public Schools

Tablet Makers Pursue Public SchoolsSchools are a large and growing market for Apple’s iPad. Teachers claim that tablets help students with lessons, improve memory and language skills, and cause them to act more independently. The excitement among tablet makers is almost as great. Tablet makers like Apple are pursuing public schools for more sales.

MIT’s Technology Review brings us data from IDC which says global shipments of tablets will reach 177 million this year, and 11 million of them were purchased by businesses or government of those, IDC analyst Tom Mainelli says, the “vast majority” were sold to schools.

Mr. Mainelli thinks that within a few years all U.S. students will have some access to a tablet at school. With 55 million students in the country’s schools, that’s a lot of potential sales. The article says it’s not just a one-time product push: beyond selling tablets to schools and districts, tablet makers see a chance to set up future sales by establishing brand loyalty with young users. “All these guys see huge opportunities here,” he says.

The most successful tablet maker in the education market is Apple (AAPL). In its July 2012 quarterly report, the company said it sold one million iPads to schools. TR notes that Apple hasn’t reported education numbers since then, but it did unveil a smaller, cheaper model that it expects will also appeal to students and educators: the $329 iPad Mini.

Amazon (AMZN) also highlighted its interest in the education market with the debut of Whispercast, a service to manage its Kindle e-readers en masse. Jay Marine, vice president of product management for the Kindle, the company sees the education market as “a meaningful business opportunity.

Smaller companies are making tablets aimed specifically at the education market. Two firms are CurriculumLoft, which makes the Kuno tablet, and Brainchild, which sells the Kineo.

Brainchild CEO Jeff Cameron claims his company’s $299 tablet, which runs on Google‘s (GOOG) Android software is better than mass-market devices because it was built for educational use. TR says that, unlike most tablets, the Kineo has a replaceable battery, resulting in a longer lifespan. Its touch screen is meant to withstand spills, and it has more physical buttons than an iPad.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Is Cloud-Based Anti-Virus Ready?

Is Cloud-Based Anti-Virus Ready?Cloud computing technology is one of the most disruptive technologies in recent history. Xath Cruz at CloudTimes argues in a recent article that cloud computing is also disrupting security software such as anti-virus and he asks how effective are cloud-based anti-viruses?

malwareThe article, How Effective are Cloud-Based Anti-Viruses? claims the demand for cloud-based anti-virus software has gone up steadily as more cloud-dependent computing devices have invaded the market. Cloud-dependent computing devices like iPads, Nooks, iPhones, and Galaxy’s are as susceptible to malware as their big desktop brethren.

In order to fight the malware threats to cloud-dependent computing devices, cloud-based anti-virus has evolved.  Cloud based anti-virus works differently than popular cloud-based document editors like Google Docs, where you only need a web browser and internet access. The blog post explains that cloud-based anti-virus software can’t function if it’s only in the cloud, since your PC won’t easily give the right kind of administrative access needed by antivirus software to programs hosted remotely, as that would leave your PC at risk of being intruded upon by other programs.

small native app that runs on the deviceIn order to protect a PC, tablet, or smartphone, a cloud-based anti-virus software requires a small native app to run on the device. When downloaded, the app acts as the anti-virus, with its database and heuristics data being hosted on the cloud. There is also cloud-based anti-virus software that use web browser extensions or Active X and Java to gain proper access to your PC.

Like any technology, cloud-based antivirus software has specific pros and cons when compared to native anti-virus suites, Mr. Cruz lays out some of the pros and cons of cloud-based anti-virus:

Cloud advantages

cloud based anti-virus1. No Installation Required – The first advantage of cloud-based anti-virus is that there’s no need to install them on your PC. Cloud-based anti-virus does not eat up hard disk space, with its storage and memory footprint being a fraction of what local anti-virus need. Additionally, you can get them up and running immediately, and there’s no likelihood of messing up the installation (which usually results in a non-working antivirus or corrupted file volume).

2. No Updating Necessary –  With cloud-based anti-virus, there is no need to update data files, since it’s hosted on the cloud, and will automatically be patched or updated by the provider. This will offer the latest in protection when it becomes available.

3. Double Security Layer – With cloud-based anti-virus software, it is possible to run a locally installed anti-malware app and run another different cloud-based antivirus without worrying about conflicts or PC slowdown. Different anti-virus software are better able to catch or inoculate different viruses.

collective intelligence4. An advantage of cloud-based anti-virus software the author missed is collective or community intelligence. SearchSecurity reports that when a system identifies malware, it’s able to give feedback to the cloud anti-malware provider, thus providing a wider surface area for rapidly detecting 0-day attacks.

Cloud disadvantages

1. Won’t Run in the Background – Cloud-based anti-viruses are not effective against viruses that run on startup. Cloud-based anti-viruses are not TSR (terminate and stay resident) programs and only run on an as-needed basis.

2. Limited Scan – Cloud-based anti-viruses risk missing dormant viruses in unopened or archived files. Windows’ security protocols will prevent some cloud anti-viruses from scanning the computer. They will only be able to scan core windows files and what’s currently loaded in the memory.

Network connection3. It Requires an Internet Connection – Cloud-based anti-virus is useless without access to the Internet. This is a problem for portable device users who can’t be connected 24×7. Without an Internet connection viruses will be free to do whatever they want.

rb-

The author concludes for the best protection your PC can get, you need to use the services of both a locally installed anti-virus software and a cloud-based one.

The main concern I have about cloud-based anti-virus apps is downtime. Cloud providers like Microsoft, Amazon, and Amazon have had issues lately providing their services. Downtime at the upstream ISP on the LAN can also play havoc with cloud-based anti-malware apps.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Voice Mail Open to Hacking

Voice Mail Open to HackingMobile carriers ‘proven’ to be open to surveillance and customer ID theft. The New York Times reports on a study by Karsten Nohl, a Berlin hacker and mobile security specialist who found that many mobile operators provided poor protection of voice mail from hacks.

Original mobile phoneIn a study of 31 mobile operators in Europe, Morocco, and Thailand, Mr. Nohl, found that he could hack into mobile conversations and text messages. The NYT says he used an inexpensive, seven-year-old Motorola mobile phone and free decryption software available on the internet.

He tested each mobile operator more than 100 times and ranked the quality of their defenses. He presented the findings at a recent Chaos Computer Club convention. While his research focused mostly on Europe, Mr. Nohl, a German with a computer science doctorate from the University of Virginia, said the level of security provided by network operators in the US was on a par with that provided by European operators, meaning there was room for improvement.

Voice mailIn Asia, the Middle East, and Latin America, mobile security varies widely and can be much lower. Operators in India and China, Mr. Nohl said, encrypt digital traffic poorly or not at all, either to contain operating costs or to allow government censors unfettered access to communications.

In 2009 Mr. Nohl, who runs Security Research Labs in Berlin, published the algorithms used to encrypt voice and data conversations on GSM digital networks, used in Europe and elsewhere.

Cell phne towerAccording to the NYT article, Mr. Nohl focused on deciphering the predictable, standard electronic ”conversations” that take place between a mobile phone and a mobile network at the start of each call. Typically, Nohl said, as many as 40 packets of coded information are sent back and forth, many just simple commands like, ”I have a call for you,” or ”Wait.” Most operators vary little from this set-up procedure, which he said allowed him to use hacking software to make high-speed, educated guesses to decipher the complex algorithmic keys networks use to encrypt transmissions. (rb- seems like the same problem that WEP has)

Once he derived this key, he said, he could intercept voice and data conversations by impersonating another user to listen to the user’s voice-mail messages or make calls or send text messages on the user’s mobile accounts.

Software patchThe author claims operators could easily end this vulnerability in the GSM system, which is found in older 2G networks used by almost every cellphone, including smartphones, with a simple software patch. His research found that only two operators, T-Mobile in Germany and Swisscom in Switzerland, used this enhanced security measure, which involves adding a random digit to the end of each set-up command to thwart decoding. For example, ”I have a call for you 4.”

This is a major vulnerability in most networks we tested, and the irony is that it costs very little, if nothing, to repair,” he said.

really old mobile phonePhilip Lieberman, CEO of Lieberman Software, a LA company that sells identity management software to large businesses and the US government, said much of the digital technology that protects the privacy of mobile calls was developed in the 1980s and 1990s and is ripe for attack.

The researcher found that Telefonica’s O2 network in the Czech Republic, Belgacom Proximus in Belgium, and Orange Switzerland provided the least security preventing the impersonation and use of another’s mobile account details for calling, texting, or other purposes. T-Mobile Slovakia, T-Mobile Germany, and SFR in France had the best.

least effective in guarding against the trackingThe study reports that T-Mobile Slovakia and the Moroccan operators Wana and Medi Telecom were least effective in guarding against the tracking of a cellphone user’s geographic position through the Internet and global positioning satellites had the weakest safeguards; Vodafone Italy, T-Mobile Germany, and Vodafone Germany had the best.

Protect your voice mail

The author concludes that voice mail security does not seem to be a priority for mobile phone networks. Hence, users should be proactive about their privacy. Anyone’s phone can be hacked, if it was easy for Rupert Murdoch’s journalists, it would be easy for anyone to do…

In order to prevent your mobile voice mail from being hacked set an unlock password on your phone. Experts urge you to avoid the following  popular passwords on mobile phones:

  • 1234
  • 0000
  • 2580 (the middle column of numbers on a telephone keypad)
  • 1111
  • 5555Monkey typing
  • 5683 (Spells “LOVE”)
  • 0852 (the middle column of numbers on a telephone keypad in reverse)
  • 2222
  • 1212
  • 1998

Set a secure voice mail password. You shouldn’t need to memorize it as your phone will store the information. In most cases you should be able to do this manually, but if not contact your mobile network.

Maintaining completely different passwords for all of your various telephone and online accounts is vital, if slightly tricky to do.

Change your passwords regularly.

Hang on to your cell phone. Voice mail hacking can be done from your own phone if the device is left unsecured and there is no unlock PIN setup.

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Your Smartphone Can Kill

Your Smartphone Can KillWe all love our smartphones. But did you know that your phone can kill you? And not only texting while driving can kill you and other people. A man in Uganda reportedly contracted Ebola from a mobile phone. Reports say he stole the smartphone from a quarantined ward of a hospital, near the site of a recent Ebola outbreak.

Next time you come down with the flu or Ebola, blame your cell phone. According to the London DailyMail, researchers have discovered there are more bacteria on the average smartphone than you will find in a toilet.

Tests at the University of Arizona by microbiologist Charles Gerba found there was up to 10 times the amount of bugs that can cause nausea, stomach problems, or even death on cell phones than are present in a lavatory.

The expert explains that germs are spread by phones that are often passed between people but are never cleaned which allows the germs to keep on building up. The University of Arizona researcher says the bugs get on a phone because it is so close to our hands and mouths. When somebody lets a friend or a stranger use their smartphone their bacteria easily gets on the device too.

Add to this frenzy of activity that germs thrive in warm places. Not only does your smartphone generate its own heat, but it also gets some help from your own body heat by spending time in your hands and next to your mouth.

ProGerms on your cellfessor Gerba added that because mobile devices are electronic some people are reticent about cleaning them. He says that phones are just not part of our cleaning routine whereas we should think about giving them a wipe with an antibacterial substance now and then.

In order to clean your iPhone, Apple (AAPL) says:

  1. Unplug all cables and turn off iPhone (press and hold the Sleep/Wake button, and then slide the onscreen slider).
  2. Use a soft, slightly damp, lint-free cloth. Avoid getting moisture in openings.
  3. Don’t use window cleaners, household cleaners, aerosol sprays, solvents, alcohol, ammonia, or abrasives to clean your iPhone. The front and back glass surfaces have an oleophobic coating.
  4. To remove fingerprints, simply wipe these surfaces with a soft, lint-free cloth. The ability of this coating to repel oil will diminish over time with normal usage, and rubbing the screen with an abrasive material will further diminish its effect and may scratch the glass.

rb-

Yick… I also wrote about the filthiness of keyboards here. Clean your mobile phone before it kills you!

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablet Info

ComputerWorld defines post-PC devices like a tablet with four characteristics;
1. It’s an appliance.
2. It’s got a multi-touch UI,
3. It doesn’t have file management,
4. Apps function on the app-store model.

Big Drop in Tablet Average Selling Price

Big Drop In The Average Selling Price Of TabletsThe Business Insider has documented the average selling price (ASP) of tablets keeps falling. The ASP fell 17 percent from 2010—when it was pretty much just the Apple (AAPL) iPad—to 2011. Through the first six months of this year alone, the ASP has fallen another 17 percent.

The drop is driven partly by the introduction of $200 mini tablets like the Amazon (AMZN) Kindle Fire, but also a fall in the price of the dominant large-screen devices.

rb- No wonder Apple is suing everybody in sight to prevent competition. They need to protect their profit margins. Way to go USPTO.

Tablet Average Selling Price

Are We in the Post PC Era

Are We in the Post PC EraKevin C. Tofel at GigaOM recently wrote that by looking at the numbers, it’s difficult to argue that the Apple (AAPL) iPad is anything less than a success. The company sold more iPads — 15.4 million — than any traditional computer maker sold PCs in the last quarter of 2011. Mr. Tofel argues what is debatable, however, is whether the iPad will take us to the “post-PC” era, as Apple calls it. Former Apple director Michael Mace suggests that the PC isn’t going away, agreeing with Apple’s CEO, Tim Cook, who recently saidI don’t predict the demise of the PC industry, I don’t subscribe to that.

Michael Mace observed on his personal blog that. “I think the ‘PC era’ meme from Apple is self-serving hype. Of course, they want to convince you that the world is shifting away from a market where Apple has less than 10% worldwide share to a market where Apple has well over 50% share.

“... My thought is that PCs aren’t going to suddenly disappear, but people will continue to opt for capable tablets or hybrid devices in the place of future, new PC purchases. The mobile market is shifting traditional tasks away from PCs of old, and for people who need a PC occasionally, they will likely be able to access one remotely.

Apple is simply calling out the post-PC era because it has successfully transformed its business lines ahead of the curve and before its peers.

Mr. Tofel points out that when all is said and done, Mace makes one last salient point worth noting: How will Microsoft (MSFT) respond to the iPad? We know the answer is Windows 8, but there’s still an open question about how well the platform will do on tablets. Perhaps, Mace notes, we’re not exactly on the cusp of a post-PC age, but instead, a post-Microsoft era.

Related articles:

  • Amazing Stats from Apple Q3 Earnings Prove Yet Again We’re In A Post-PC Era

Magic Cable Trio All-in-One USB Simplicity

Magic Cable Trio All-in-One USB SimplicityTested.com points out the handy Innergie Magic Cable Trio which solves an age-old problem. You never have the right USB connector when you need it. The Magic Cable Trio combines mini USB, micro USB, and 40-pin dock tips into a single cable. The handy-dandy cable will play ball with your tablet, or just about any USB device you can get your hands on according to Tested. It won’t work with printers, but the Magic Cable Trio is meant for plug-and-play accessibility, not languishing behind a desk collecting dust.

The tips are all attached and fold out-of-the-way when not in use. Tested says the extra tips could be a bit of a nuisance, but you’ll never have to worry about losing the adapters in the bottom of a backpack. The Magic Cable Trio costs $20 at Innergie’s store.Innergie Magic Cable Trio

Related articles

Polycom on iPad

Polycom logoAnalysts are forecasting that the tablet market will grow five-fold by 2015 to 320 million units sold annually. The cumulative number of tablets in use by that point will be about 900 million. Many are predicting that the tablet will continue to gain in functionality and take over the laptop in the coming years.

Polycom is pioneering high-definition video collaboration for tablets called Polycom® RealPresence™ Mobile. Polycom RealPresence Mobile is the first enterprise tablet software that lets mobile users enjoy HD video collaboration from anywhere. It is available now on the Apple (AAPL) iPad 2, MotorolaXOOM, and Samsung (005930) Galaxy Tab 10.1—with more mobile devices to follow.

RealPresence Mobile extends Polycom’s HD video collaboration technology beyond the office and conference room. Iy bringing a high-quality, secure, reliable experience to tablets that is comparable to desktop and room systems.

RealPresence Mobile delivers enterprise video collaboration for the business tablet market and delivers provisioning, management, system interoperability, firewall traversal, and scalability that CIOs need, and the reliability, security, rich features, and lifelike quality that users demand.

RealPresence Mobile scales, supporting up to 75,000 devices and 25,000 concurrent calls.

You can find download a free end-user application from the Apple Store, Android Market, and Samsung Apps.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.