Tag Archive for Apple

iPad Users Likely to Transfer Sensitive Data

iPad Users Likely to Transfer Sensitive Data

Tablets, mostly Apple (AAPL) iPad is organizations into the consumerization of IT.  Tablets are forcing IT managers to accept the idea of supporting employee-owned devices. Many organizations are struggling with how to secure the data on these consumer devices. eWeek recently pointed out data from Harris Interactive and Fuzebox which says that tablet users are transferring sensitive information at a greater rate than even smartphone owners.

Harris Interactive polled 2,300-plus adults polled in late January 2011. Almost half (48%) of tablet owners in the survey admitted to using their tablets to transfer sensitive data.

  • 42% of the surveyed said they transfer sensitive personal data on their tablets
  • 20% of tablet owners said they transfer sensitive data for business use,

According to Harris, the survey found that confidence in the security of the data transferred over their mobile devices is skewed according to age and gender.

  • 47% of men are confident
  • 34% of are women are confident

Younger adults are more likely to transfer sensitive data via a tablet:

  • Apple logo61% of respondents 18-34 transfer sensitive data on their tablet;
  • 56% of those surveyed ages 35-44;
  • 33% of those surveyed ages 45-5 4;
  • 20% of those 55+ (20%) to use it to transfer sensitive data.

Not many users are confident in mobile security

  • 18% are extremely/very confident in the security of the data transferred over their device(s).
  • 15% are not at all confident in the security of the data transferred over their device(s).

While the Apple iPad controls the bulk of the tablet market where security is a concern, the advantage may go to Research In Motion (RIMM) says eWeek. The article cites data from Technology Business Research which is also studying enterprise use of tablets, and some of the initial findings show that these users continue to believe that RIM devices are the most secure.

Research In Motion logoThe news could be a boon for RIM according to the author, at least in the short term. The BlackBerry maker is expected to release its PlayBook tablet by the summer and is aiming it at the enterprise. However, lurking in the background is Apple, which dominates the tablet space with its iPad and is growing its reputation for secure products.”IT departments like the ability to manage the devices and data on the devices remotely, including the ability to control access and to securely wipe the devices if they’re lost or stolen,” TBR analyst Ken Hyers told eWEEK. “RIM has succeeded in establishing a high threshold in what is expected from an enterprise-class device in terms of security.

Mr. Hyers added, “RIM’s reputation for security will give it a near-term advantage and help it sell more PlayBooks directly to the enterprise … But over time that advantage will steadily erode.”

From a smartphone vendor standpoint, Apple is establishing its own reputation as a secure device, though not up to the level of RIM,” Mr. Hyers told eWeek. “Apple (and Android mobile devices) also have a distinct edge in usability and appeal; they’re simply easier to use and more fun to use.” Where this becomes a problem for RIM is when businesses let their employees choose the mobile devices they use, as they tend to go for the “sexier” ones, he explained.

rb-

I have been a Blackberry user for 7+ years, but I have wonder if RIMM gets “it” anymore. Is RIMM going to turn into the Novell of the mobile market? A technically better product, but never able to close the deal, getting left in the wake of pretty shiny objects over substance. Given the increasingly crowded market RIMM operates in, the company is facing the same challenges as Novell.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

IPv4 Address Worth $11.25

IPv4 Address Worth $11.25Now that the last IPv4 addresses are gone, the Internet numbers are increasing in value. Microsoft is spending $7.5 million for 666,625 IPv4 addresses from Nortel (NRTLQ). As Google (GOOG) and Apple (AAPL) fight over Nortel’s 4G bones (which I noted earlier), DownloadSquad reports that Microsoft (MSFT) jumped all over Nortel’s stash of IPv4 addresses when they became available for purchase through bankruptcy proceedings.

NORTELMicrosoft ponied up $7.5 million for the Nortel pool, which works out to $11.25 per IP address. There were 13 other interested buyers, but only Microsoft and three others actually submitted bids according to DownloadSquad. With the last block of IPv4 addresses already issued (which I wrote about when it happened), snatching up over 666,000 IPv4 addresses in one fell swoop is a smart move by Microsoft.

rb-

Microsoft CEO Steve BallmerCould Ballmer‘s boys be planning a cloud-based IPv6 <–> IPv4 transition service?

Are they trying to jump-start an IPv4 address space underground economy?

As the authors say, we’ll just have to wait and see.

What do you think?

What is Redmond up to?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

iPad Notes

Researchers Outline iOS Attack to Access Stored Passwords in Six Minutes

Researchers Outline iOS Attack to Access Stored Passwords in Six MinutesFierceCIO reports that researchers from Germany’s Fraunhofer Institute for Secure Information Technology say (PDF) they can break into an Apple (AAPL) iOS device (iPhone or iPad) to extract stored passwords in just six minutes. The attack requires physical access to the iOS device. Once boosted, large swaths of the iOS file system could be swiftly pried open by hackers.

Data that can be exploited include account passwords for MS Exchange ActiveSync, LDAP, VPN, and Wi-Fi. A successful attack starts with a jailbreak, followed by installing an SSH server to load a script to get access to the keychain entries which contain the passwords.

Based on this weakness, the author says that iOS needs work, “… a proper implementation of security using best practices could require a rewriting of key security components in Apple’s iOS.” He concludes that “… organizations deploying the iOS hardware at the moment might find it prudent to perform encryption at the app level instead of relying on the iPhone’s or iPad’s broken passphrase system.”

iPhone Password Hack Shows Flawed Security Model

iPhone Password Hack Shows Flawed Security ModelArs Technica has a different article on the latest iOS vulnerability. Ars argues that the attack isn’t entirely new, and is actually a product of Apple’s “DRM approach” to security. Forensics expert Jonathan Zdziarski told Ars that similar exploits have been around since Apple introduced the iPhone 3G. According to Mr. Zdziarski,

The real problem is that Apple hasn’t yet fully implemented a truly secure environment for iOS. Apple has … been relying on their DRM know-how, and just erasing the label that says ‘DRM’ and calling it ‘security. The problem with this is that DRM only makes things a little more difficult for hackers.”

“Real security relies on the strength of the key, and the secrecy of the key,” Mr. Zdziarski continued. “And as long as the keys are all stored on the iPhone and don’t rely on a user password, they can easily be compromised.”

The Ars article says that while Apple has continually improved the iDevices information security, they all have the same flaws. Mr. Zdziarski told Ars he believes Apple is pushing to make iOS devices compliant with the FIPS 140-2 (PDF) security standards. However, he warns that. “… at the end of the day … Apple will need to abandon their DRM approach if they want true security, as opposed to just some fancy marketing strategies.”

VMware Unleashes Virtual Desktops for Apple iPad

VMware Unleashes Virtual Desktops for Apple iPadNetwork World is reporting that VMware (VMW) has released VMware View Client for iPad to the Apple App Store. “We’ve been working on it since the middle of last year,” says Pat Lee, director of end-user computing clients at VMware.

VMware said it had trouble making Windows work as a virtual desktop on the iPad. “Windows really isn’t touch-savvy,” Lee says. VMware tried to adapt the iPad experience to Windows. “We spent a lot of time building custom gestures to make sure it blends into the iOS experience,” Lee says.

VMware created a virtual trackpad that can appear on the screen. “We want it to be as logical as possible,” Lee says. VMware promised “instant-on” access to Windows desktops from the iPad, as well as support for Bluetooth keyboards. VMware is using  PCoIP to deliver the remote desktops and says the client will offer a secure connection to server-hosted desktops.  The View client for iPad will be free for existing users, who are charged either $150 or $250 per seat.

The VMware announcement comes after Citrix (CTXS)  released Receiver for iPad, and Parallels developed Parallel’s Mobile, an iPad desktop application.

Contracts HD for iPad: Give Contracts the Finger

Contracts HD for iPad: Give Contracts the FingerHat tip to AppScout for finding Contracts HD for iPad. They say that it is one of those apps that is breathing life into the existence and usefulness of the tablet device. Contracts HD is designed to allow any Apple (AAPL) iPad user to create, collaborate, sign, and email completed contracts using iPad’s dynamic touch-screen interface. The app also provides a database of contract templates for which anyone can add an addendum to all existing contracts, auto-fill appropriate fields within the contract with your exact information, and allows both parties to sign contracts safely and securely by using a fingertip.

Once the contract is signed, and all parties have received their PDF copies via email, you can save contracts to a secure archive for easy access later. Contracts HD also has a little brother app for iPhone that enables you to synchronize contracts between devices.  Contracts HD for iPad is $9.99 in the iTunes App Store ($4.99 for the iPhone version).

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Wireless Charging Amped Up

Wireless Charging Amped UpThose of us tired of dealing with tangled cord and bulky wall warts may get some relief in the near future. iSuppli Corp. is predicting that a flood of new electronic gizmos with wireless charging capabilities will be inundating the market. The market research firm believes that the global market for wireless charging devices for smartphones like the RIM (RIMM) Torch, tablet computers such as the Apple (AAPL) iPad2 media players like the Apple iPod Touch will drive the global market for wireless charging devices to 234.9 million units in 2014, up 65% from 3.6 million in 2010, according to iSuppli.

iSuppli table Tina Teng, senior analyst for wireless research at iSuppli told Itnewslink.com, “Over the next five years, wireless charging devices will find their way into an increasing number of applications, including mobile phones, portable media players, digital still cameras, and mobile PCs.”

Mobile phones will drive wireless charging acceptance according to Ms. Teng, ” …mobile phones will contribute the largest share of revenue to wireless charging-not only because of the large volume of mobile devices expected to benefit from the technology, but also because of participation by name brands in manufacturing the device, providing much-needed market recognition in the process.”

“Genius of Electricity,” 1915, Gilded Bronze, Bedminster, NJ. Photography Lee sandstead"Despite the optimism, iSuppli believes there are still barriers to the widespread adoption of wireless charging. Manufacturers will have to make wireless charging in their devices down to the circuit board level which will drive down costs. The wireless charging industry will need to adopt a common standard to ensure interoperability among products. Currently, all products are proprietary. Skins made by one company, will not work with the charger pad of another. “Until the industry finds a standard to follow, the wireless charging industry will be fragmented, and consumers will hesitate to adopt any solution that could be compromised by the rival companies,” Itnewslink.com quotes Ms. Teng, “However, an open, standardized system will create a healthier competitive environment and prompt manufacturers to join forces-which will enhance consumer awareness and lead to adoption in the markets.”

There are four wireless charging technologies. The wireless charging technologies include Near-field magnetic resistance, Far-field magnetic resistance, Conductive magnetic resistance, and Inductive magnetic resistance wireless charging systems.

  • Far-field magnetic resonance, a technology that has raised safety as well as health concerns and for which no commercial products are available for the time being.
  • Inductive wireless charging uses the principle of electromagnetic induction where current generated from the induced magnetic field in the receiver coil charges devices is the most widely wireless charging technology adopted by the value chain.  the technology enjoys wide support from semiconductor vendors, device manufacturers, accessories makers as well as retailers according to the Wireless Design and Development website. The most successful proponent of magnetic induction is Powermat, a Michigan-based company which I wrote about in 2010, that also owned 62 percent share of the wireless charging market as reported by Wireless Design and Development.

iSuppli notes that most companies are not ready with commercial products yet, several high-profile manufacturers are looking at producing wireless charging solutions. The companies include Texas Instruments (TXN) and ST-Ericsson from the semiconductor side; Nokia Corp (NOK) and Research In Motion Ltd. from the device manufacturer side; and Logitech (LOGI) and Case-Mate from the accessory manufacturer side.

Product-specific wireless charging systems consist of a charger as well as a so-called “skin” or receiver sold for specific devices. These product-specific devices contrast with aftermarket solutions, which are universal chargers and various skins that can be used with multiple consumer electronics. Growth is also projected for aftermarket wireless charging, with revenue rising at a massive five-year Compound Annual Growth Rate (CAGR) of 133.4 percent.

Rats nest of cablesrb-

I hate the cluttered cluster of cables on my desk. The wireless chargers should clean up that mess, but until the manufacturers get their act together and build in some interoperability from the factory, they still got a problem.

What do you think?

Is wireless charging a practical technology?

Do you have a wireless charging rig?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Foxconn – The Empire Apple Made

Foxconn - The Empire Apple MadeFoxconn is now the biggest exporter out of China. The firm churns out products like iPads, iPhones and PlayStations for Americans. Among its clients are Apple, Cisco (CSCO), Dell, HP, IBM, Microsoft (MSFT), Nokia (NOK) and Sony (SNE). Most American consumers never head of Foxconn, which is also known as Hon Hai Precision Industry, until employees began to commit suicide by leaping off its buildings. However, the firm has a long history.

Apple Computers logoTerry Gou aka the ‘general’ founded Foxconn in 1974 with a $7,500 loan from his mother. According to a recent BusinessWeek article, his first world headquarters was a rented shed in a gritty Taipei suburb called Tucheng, which means Dirt City in Mandarin. Mr. Gou, then 23, had done three years of vocational training and served in the military. He then worked for two years as a shipping clerk, where he got a firsthand view of Taiwan’s booming export economy and figured he ought to stop pushing paper and get into the game. With the cash from his mother, he bought a couple of plastic molding machines and started making channel-changing knobs for black-and-white televisions. His first customer was Chicago-based Admiral TV, and he soon got deals to supply RCA, Zenith, and Philips (PHG).

Atari 2600Mr. Gou’s first step into American consumer electronics came in 1980 when he started supplying Atari with connectors that linked the joystick cable to its 2600 video-game console. At the height of the Atari craze, Hon Hai was producing connectors for the 15,000 video-game consoles that Atari’s Taiwanese plant made daily. BusinessWeek says Mr. Gou wasn’t content to be a mere supplier of dumb parts. He applied for patents on the technology his company developed, and he kept pressing into new areas.

In the early ’80s, Mr. Gou took an 11-month tour of the U.S. covering 32 states, during which he dropped in on companies unannounced. BuisnessWeek reports that during this trip, he spent three days in Raleigh, N.C., motel close to an IBM (IBM) facility to get an appointment after which he came away with a firm order for connectors. “He is really one of the top sales guys in the world,” Max Fang, the former head of procurement for Dell in Asia who did business with Mr. Gou and was his regular golf partner told BuisnessWeek. “He is very aggressive and always on your tail.”

IBM logoMr. Gou was early to recognize that China offered an almost limitless supply of cheap labor and was not deterred by the primitive infrastructure or the Communist government. He set up shop in a suburb of Shenzhen across the border from Hong Kong.  In 1991, Mr. Gou listed Hon Hai Precision on the Taiwan Stock Exchange to fund expansion, mostly into China. By 1996, Mr. Gou told BuisnessWeek, it was clear to him that China would become a manufacturing juggernaut, and he started investing heavily in his facilities at Longhua Science & Technology Park aka “Foxconn City.”

Compaq logoIn 1996, Mr. Gou offered to build the chassis for Compaq‘s desktop computers at a fraction of what it would cost Compaq to do the job itself.  “He had this vision and the guts to do anything in a big way,” Mr. Fang is quoted in BuisnessWeek. “When I first visited the factory, I saw the whole value chain nicely and effectively designed, starting from a big coil of sheet metal at one end that was cut, formed, welded, and stamped to make the top and bottom of the chassis. Then they did the in-line subassembly, adding a floppy drive, the power supply, and cables. It was all shipped to customers who only had to install the motherboard, CPU, memory, and hard drive. After this revolution by Terry, final computer assembly was easy.”

BuisnessWeek says that to sustain an efficient Chinese workforce, Mr. Gou quickly discovered that he had to offer housing, food, and health care, additional costs that kept most of his competitors out of the country. He had to do everything himself. Michael Marks, then chief executive officer of contract-manufacturing giant Flextronics (FLEX), saw Foxconn’s Shenzhen operations taking shape in the late 1990s, “They were making wire out of ingots of copper,” says Mr. Marks. “They had chicken farms to lay the eggs for the cafeteria. One building had 2,000 toolmakers. We had none at the time. But we did after that.”

Dell logoFoxconn was transforming the industry. It was shipping bare-bones computers to IBM, Hewlett-Packard (HPQ), and Apple (AAPL). In 1998, when Mr. Gou won his first order from Dell (DELL) to make the chassis for its desktops, Dell insisted he do it in the U.S., close to the final market. “I bought a company in Kansas City. We quickly needed tooling shops and stamping,” Mr. Gou told BuisnessWeek. “That factory was a money loser, but Terry had to build it to accommodate Dell against his own will,” recalls Mr. Fang. “For Foxconn, it bought a ticket into the Dell business.”

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.