Tag Archive for Apple

Top Wireless Predictions for 2012

Top 10 Wireless Predictions for '12 from Juniper ResearchUK-based Juniper Research published a year-end list of predictions for the mobile and wireless industry for 2012. A copy of the report can be downloaded from Juniper Research, with registration here. Are they on-target or off-the-wall?

Recession Likely to Hit Smart Device SalesRecession Likely to Hit Smart Device Sales. Juniper Research says the continued recession will hurt smartphone and tablet sales. They believe tablet sales will be hurt more than “must-have” smartphones.

They say cash-strapped consumers may opt for the lower-priced tablets. This could benefit players such as Amazon (AMZN) Kindle Fire or ARCHOS (ALJXR) ARNOVA branded devices rather than an Apple (AAPL) iPad. eReaders are most likely to be the hardest hit according to the report.

The Year of the Quad-Core Processor2012 – The Year of the Quad-Core Processor. ASUS (2357) was the first to release Quad-Core Processor. The new chip appeared n November 2011, It ran on the Eee Pad Transformer Prime with the newly launched NVidia (NVDA) Tegra 3 chip. Qualcomm (QCOM) has also added a quad-core chip to their Snapdragon line. Juniper Research expects more to come.

Quad-core processors offer improved performance and increased battery life. The performance boost comes from being able to multi-task more efficiently. It ensures that music will keep playing smoothly while the user is playing games or taking pictures. The power savings come from being able to keep those cores at a relatively low clock speed.

Quad-core processors will allow developers to add more realistic effects, getting ever closer to the elusive console-quality experience. The Tegra 3 even allows for controller support and mirroring to a 3D TV. Javascript and Flash will also run faster allowing web developers to create more graphics and script-heavy apps and pages.

Windows 8 OS to Fuel Nokia RevivalWindows 8 OS to Fuel Nokia Revival Disrupt Tablet Market.  Microsoft’s (MSFT) next OS will be compatible with both Intel and ARM architectures.  Windows 8 will run on both PC and mobile devices. The research firm believes Windows 8 will create a huge ecosystem of devices from smartphones to desktops for app developers to target. Juniper Research expects Microsoft to gain market share in the tablet space, as it replaces the non-tablet-optimized Windows 7. And, with Nokia (NOK) transitioning its existing (smartphone) and new products (likely to include a tablet) to Microsoft’s platform, the Finnish giant will be fighting back after spending several years losing market share to Google (GOOG) Android and Apple iOS devices.

High Profile Malware Attacks on Mobile Devices2012 to see High Profile Malware Attacks on Mobile Devices. There have been many malware attacks targeted at mobile devices. However, these attacks have been relatively small-scale. This is unlikely to continue. Cyber-criminals will not be able to pass up the opportunity that consumer smartphones and tablets will present. Juniper Research anticipates that 2012 will see several high-profile, international attacks on various mobile OSs. Consumers at large must bed aware of the pressing need to protect their smart devices by installing security software.

Cloud Mobility to Drive Collaborative CommunicationsCloud Mobility to Drive Collaborative Communications – The BYOD trend driven by the consumerization of enterprise IT will increase according to the research firm. Specifically, Juniper Research believes that 2012 will see a substantial increase in the number of enterprises moving to develop and deploy mobile-centric, social business strategies.

Other predictions from Juniper Research include:

  • The London 2012 Olympics will boost mobile advertising and M-Gambling, and kickstart NFC.
  • Mobile Coupons to drive the mCommerce market despite economic stagnation.
  • MEMsaccelerometers and gyroscopes to transform the sensor market for mobile devices.
  • Social Gaming will become a major mobile play with the introduction of synchronous gaming.
  • Online, Mobile and Physical will begin to fuse into one retail market.

 rb-

I’ll come back to these predictions at the end of the year and see which predictions were on target or off in space somewhere.

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Better Mobile Security

Better Mobile SecuritySmartphone users should be concerned about mobile security. This is more true if the mobile device is used for work and has your employer’s email or messaging server. IT staff can take steps to protect the data on the mobile. Eric Geier, the founder of NoWiresSecurity writes provided CIO Update with 6 tips for better mobile device security.

Choose encryption and use itTip No. 1 – Choose a mobile OS that supports encryption and use it: Mr. Greer says to make sure the mobile operating system (OS) and device support hardware-based encryption. The article says Apple’s (AAPL) iOS and Research In Motion’s (RIMM) BlackBerry support encryption for both internal and external storage. Without encryption, it’s possible that someone could recover the data on the device even without your lock PIN or password.

Full device encryption is limited and varies on current Android device manufactures. Mr. Greer writes that Motorola Mobility’s (MSI) business-oriented smartphones offer encryption capabilities on Android 2.3. Android 3.x includes an API to help developers offer encryption on tablets. Android 4.x tablets and smartphones should support encryption sometime in 2012. WhisperCore is a third-party encryption solution that is in beta for Nexus S and Nexus One.

Set a lock PIN or password:Tip No. 2 – Set a lock PIN or password: The article says that enabling a password, whether it’s called a PIN, passcode, or passphrase, is the first line of defense in maintaining privacy and security. It helps prevent others from picking up your phone or device and snooping around if it becomes lost, stolen, or just left unattended. It’s also usually required if encryption is enabled on the device writes the author. A PIN will protect data and privacy from causal snoopers.

Tip No. 3 – Enable auto-wiping of data: Most mobile OSes support automatic wiping of the device’s data after a certain number of incorrect passwords attempts. Mr. Greer says auto-wiping is natively supported by iOS, Windows Phone 7, and BlackBerry. Android requires a third-party app, such as Autowipe.

It is important to keep all your data regularly backed up so the data can be restored to a new mobile after it is wiped.

Setup remote trackingTip No. 4 – Setup remote tracking and management: Before your phone or device gets misplaced or stolen the blog recommends that a remote tracking and management system should be set up. Most let you see the device’s GPS location on a map, send audible alerts to help you find it, and display a visual message to tell others how to return it. They typically also let you remotely lock and/or wipe it before someone else gets their hands on it. According to Mr. Greer:

  • For iOS 4.2 or later, Apple provides a free service.
  • For earlier iOS versions there’s the MobileMe service from Apple at $99 a year after the 60-day free trial.
  • For Android, you have to use a third-party app.
  • For Windows Phone 7 Microsoft provides the free Windows Live for Mobile service.
  • For BlackBerry, RIM provides the free BlackBerry Protect service.

Limit Wi-Fi hotspot usageTip No. 5 – Limit Wi-Fi hotspot usage: When you use public Wi-Fi hotspots that aren’t encrypted, all your Internet traffic is transmitted through the air and can be easily intercepted. The most important sites and services, such as banking websites, usually implement their own (HTTPS/SSL) encryption that protects their individual traffic. But most email providers and many social networking sites don’t; thus eavesdroppers can likely capture their passwords and traffic.

On the other hand, most 3G, 4G, and other cellular data connections are usually encrypted by the carriers. Plus eavesdropping on these types of connections isn’t as popular. Therefore, when you’re out and about you should try to use the data connection rather than unsecured Wi-Fi hotspots.

If you insist on using Wi-Fi hotspots, use those that offer enterprise encryption and 802.1X authentication, such as from T-Mobile and iBahn. Alternatively, consider using a VPN connection to secure your traffic from local eavesdroppers.

Use an antivirus or security app:Tip No. 6 – Use an antivirus or security app: Viruses, malware, and hacking on mobile devices is a growing problem. The author recommends installing a security app to help prevent infections and intrusions. Most AV solutions also offer other features, such as remote wiping, backup, and locating.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Never Check Email First Thing In The Morning

– Updated 03-18-12 – Science writer David Bradley on his blog ScienceText also recommends, “Avoid social networking and email first thing.” I know it works for me, I walk around and talk to staff before I get tangled up in the work everybody else wants me to do.

Never Check Email First Thing In The MorningSid Savara a widely regarded personal development trainer published 7 Reasons You Should Never Check Email First Thing In The Morning at his site sidsavara.com.

#1 – Ignorance Is Bliss … fully Productive – When it comes to email, ignorance is bliss. That’s why if you’ve got something important you want to make progress on, the author offers these four words for success:

SPAM computerDon’t check your email – As soon as you get in, work on something important for 30-45 minutes, and only then check your email. If you can stand it, wait even longer. The article suggests that as long as you’re ignorant of everything else that’s going on outside, you can concentrate on what you want to work on.

Any new information you get can cause you to get distracted.

#2 – It’s Not Your Todo ListMr. Savara you know what is most important for you to work on the first thing in the morning you should go ahead and do it! By checking email, you risk doing what someone else wants you to do. Or more bluntly, when you check your inbox, the emails you get are a to-do list someone else makes for you.

Who is in charge of your time – you, or the person emailing you?

Lack of Direction#3 – It’s An Excuse To Lack Direction – The author says that checking email is a low-priority activity and that you may be checking email first thing in the morning because your to-do list has gotten off track somewhere. He argues that when you don’t have a clear list of priorities, checking email becomes an urgent activity that you do at the expense of your important ones.

#4 – Reaction vs “Proaction” – When you check your email, you end up with more work to do – and because we’re in “check email” mode, we start replying to them at the expense of the task we were just working on. Rather than actively setting an agenda, email forces you to react to items as they come in – regardless of their true priority.

Mr. Savara says he prefers taking proactive actions. Work on the things that are important to you, regardless of whether they’re urgent or simply at the top of your inbox. Stop wasteful actions, and focus on productive actions instead.

social networking#5 – Searching For Excuses Blindly checking email (or Twitter, or Facebook, or any number iTime wasters) is usually just searching for an excuse to not do the work that must be done according to the author. Don’t fall into that trap. Don’t give yourself an out by checking your email for an excuse to fail. He urges, don’t check your email  – acknowledge the task you need to get done and do it.

Cross that bridge – it’s not going away.

#6 – There’s No Set Time Limit – Meetings get a bad rap for being a waste of time – but at least you usually know how long a meeting will last. But do you know how long you’re going to spend on email once you open your inbox, odds are you don’t know – or you’ll underestimate it.

The problem is, checking email only takes a minute but you can get sucked into follow-up activities that result from opening your email, and there’s no way of knowing how much time these will take. You have a set time limit for how many productive hours you have in a day don’t let email suck you in and cause you to devote more time to it than you can afford.

#7 – It Builds Expectation – A lot of people say, “But I have to check my email! People expect a response from me in the morning!” The author believes that there are some requests that need immediate responses, but they’re much less frequent than you might think.

TimeHe argues that people expect a response from you in the morning because you’ve always responded first thing in the morning and you’ve built that expectation. The more often you check email, the more often people will expect you to check it. Just stop checking it first thing in the morning, and people won’t expect it anymore.

Mr. Savara recommends the following email rules:

  • Only check if there is something specific you are looking for. Most important – don’t go fishing around. Check it with a specific plan, a specific email you’re looking for from a specific person.
  • Separate low-value emails via filters (“rules” in outlook) or separate email addresses so you don’t even see them in your inbox when you check
  • Set a time limit. Commit to checking for 5 minutes, just to look for that one piece of information – and have your exit strategy ready. Before you open your inbox, decide what you’ll do if 1) the email is there 2) the email isn’t there 3) the email is incomplete. Don’t be reactionary – proactively decide what action you will take based on the outcomes you expect.
Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Your Dog Can Run, But He Can’t Hide

Your Dog Can Run, But He Can't HideThere is a new pet-oriented Global Positioning Systems (GPS) on the market. The new GPS system now makes it possible to constantly track your best friend according to a report in MIT’s Technology Review. The GPS devices made just for pets are generally small enough to be attached to a dog or cat collar which allows Owners to track their furry companion’s every paw print in real-time.

GPSThe New Jersey Star-Ledger points out unlike microchips embedded in the skin of an animal which store identifying information, these devices aren’t invasive, and owners don’t have to wait for a stranger to find and bring their lost pet to an animal shelter to scan the chip.

“This could easily be a multi-million-dollar category,” David Lummis, a “pet market analyst,” at New York-based market research firm Packaged Facts, recently told the New Jersey Star-Ledger. Dog owners are now more “crazy” about their four-legged friends than ever. If the recession is any indication, Mr. Lummis told the paper that the $58 billion pet products industry has merely slowed a few percentage points during the recession.

tagg logoThat kind of consistent growth has attracted the attention of Qualcomm (QCOM) the biggest maker of mobile phone chips.  San Diego-based Snaptracs, a wholly-owned subsidiary of Qualcomm, has released Tagg the Pet Tracker.

The rechargeable Tagg device can be attached to a collar (provided it’s not a spiked or bejeweled one), plus a home base unit. Owners are able to set a virtual perimeter for the dog to wander. TR says a text message or email alert will be sent if Fido strays too far. The device has a battery life of some 30 days and is water-resistant; it’s intended for dogs (or cats) 10 pounds or heavier. The necessary hardware and one year of Verizon (VZ) service cost $200 according to Technology Review. The service costs $5 a month after that. It’s a small price to pay, Dave Vigil, president of Snaptracs told the paper, considering pets are becoming increasingly “like family members.” Users can also find their pets at any time through a computer or smartphone.

Jessie and WileyGPS giant Garmin (GRMN), has also entered the dog lo-jack market. The paper says the Olathe, Kansas-based company released the GTU 10 device, a 1.7-ounce gadget. Garmin users can also set up a perimeter and receive alerts, or track real-time from a mobile device or computer. The GTU 10 operates on AT&T‘s (T) wireless network and costs $200 for the first year and $50 a year after that.

Another competitor is Retriever. TR says Retriever has similar functions with virtual fences and alerts but adds a social networking element. Retriever will share Spot’s location with a friend, presumably so if your dog gets loose while you’re out-of-town, you can help steer the on-site rescue. To judge from its site, Retriever appears to not yet be on the market, nor is a projected price listed.

Technology Review also notes other products in this niche. Global Pet Finder, is not available any more on Amazon (AMZN) as of this article. The SpotLight device costs $169.99 and is limited to T-Mobile coverage. SpotLight costs $179.88 per year for a subscription. The Love My Pets device and 1-year subscription cost $189.95 use the Sprint (S) network. The Love My Pets system costs $14.95 per month for a subscription according to a CSR.

rb-

Qualcomm’s goal is to encourage new uses of its radio chips, not to make a hit product. These products are part of the Internet of Things. As the Apple (AAPL) iPod and iPhone have shown, people are willing to shell out a lot of cash for things, but it is in the services where the money is to be made on the Internet of Things. Content is still king.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablet Info

The Tablet PC has long been a pet project for Microsoft founder Bill Gates, who showed the first Tablet PC prototype in 2000 at Comdex. Mr. Gates described the device, which featured input via stylus only, as an evolutionary step in PC functionality and usability. For the next ten years leading up to CEO Steve Ballmer‘s introduction of the new “slates”, which support Windows 7 touchscreen features, the company has tried to make the Tablet catch on but with little success according to PCWorld.

MSFT Office Coming To iPad Next Year – Report

Microsoft Office for the MacMicrosoft may be bringing Office to the iPad next year, according to a report in The Daily. The report cites unnamed sources and says that Microsoft (MSFT) will also update its version of Office for the Mac next year.

On a business level, it might make sense the Apple (AAPL) iPad is making inroads into the enterprise, and having some sort of Office client available for it would let Microsoft earn at least some money from these Apple invaders. It would also help make sure that Office 365 the company’s cloud-based business services would work on the iPad according to the BusinessInsider,

Microsoft might even do this at the risk of driving some enterprise customers to stick with iPads instead of adopting Windows 8 tablets. After all, Office and related back-end products have been driving Microsoft’s growth for the last year, while Windows sales have been pretty stagnant (I wrote about Office’s profitability here).

The BusinessInsider points out that Microsoft has NEVER released Office for the Mac in the same year (or before) Office for Windows. Microsoft is building Office 15 for Windows. It’s going to be a ton of work to revamp it to work with the Windows 8 tablet interface, or risk having it relegated to traditional PCs only (and having one less reason for customers to choose Windows 8 tablets). The Mac version of Office almost always comes a year after the Windows version. It COULD be different this time, but that would require a diversion of resources to a minority platform (the Mac still has less than 5% market share for personal computers).

Microsoft said through a spokesperson: “We already deliver Office on multiple platforms and devices and are committed to expanding in the future, but have nothing further to share today.”

BI says that expanding Office to the iPad is not crazy.

Related articles

Dell Streak Discontinued

DellThe Dell Streak 7 tablet won’t even get to turn one year old. The BusinessInsider noted that Dell (DELL) is pulling the plug on its unremarkable tablet, as indicated on its site.

This is only shortly after discontinuing the Dell Streak 5 as well.

BI recalled Walt Mossberg‘s February 2011 AllThingsD review of the tablet, he sums it all up with one sentence: “I found the compromises Dell made to get to that low price make it impossible for me to recommend the Streak 7.

rb-

I wrote about hardware companies abandoning the tablet market in 2012 here. Does this move make Dell a market leader?

Related articles

Proof That The PC Is Dying

Proof That The PC Is DyingThe BusinessInsider noted this excellent chart from Horace Dediu @asymco as proof that the PC is dying a slow, painful death. Mr. Dediu’s chart shows PC sales, including Google (GOOG) Android and Apple (AAPL) iOS devices, from the dawn of time to today.

As you can see, PC sales have started to go flat. Based on recent numbers from last quarter, they may have already hit their peak.

proof that the PC is dyingMeanwhile, Macs are gaining steady momentum while Android and iOS tablet devices are blowing up.

One thing BI thinks could break the trend is all those fancy new Ultrabooks displayed at CES. Those could give PC sales a major boost considering how cheap and efficient they are.

Related articles

Apple Sues Chinese Outfit for Heresy

Apple Sues Chinese Outfit for HeresyApple (AAPL) is suing a Chinese company for making graven idols of its founder Steve Jobs reports TechEye. Chinese company In Icons created an “eerily realistic” 12-inch action figure of Steve Jobs. TechEye says the model comes with the clothes and accessories such as the black faux turtleneck, blue jeans and sneakers. It was being sold in a box that looks like Walter Isaacson‘s “Steve Jobs” biography cover and comes with a chair, a “One More Thing…” backdrop, as well as two red apples, including one with a bite in it.

Apple sees this as an affront and has told In Icons that using Apple’s logo or products, or Jobs’ name or appearance, is a “criminal offense.” The article points out that the Pope and Elvis have similar deals on their merchandise.

But it is clear that its threat is going nowhere In Icons is not giving up.

Tandy Cheung, the entrepreneur behind In Icons told TechEye said that he was an Apple fanboy, and a lot of people like him want to have Jobs’ action figure. Cheung spoke with several lawyers from Hong Kong who told him that he wasn’t in violation unless he decided to brand any of his designs with Apple products or logos. He told IB Times that Steve Jobs was not an actor, he’s just a celebrity. There is no copyright protection for a normal person. Steve Jobs is not a product.

BuzzFeed updates that the promo pics from toy company In Icons might suggest that the late Apple co-founder comes with cool accessories, like an iPad tablet, but alas. For $99 all you get is the black turtleneck-clad 12” action figure, no assembly required. Due to U.S. release in late February.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.