Tag Archive for Microsoft

Tablet Info

ComputerWorld defines post-PC devices like a tablet with four characteristics;
1. It’s an appliance.
2. It’s got a multi-touch UI,
3. It doesn’t have file management,
4. Apps function on the app-store model.

Big Drop in Tablet Average Selling Price

Big Drop In The Average Selling Price Of TabletsThe Business Insider has documented the average selling price (ASP) of tablets keeps falling. The ASP fell 17 percent from 2010—when it was pretty much just the Apple (AAPL) iPad—to 2011. Through the first six months of this year alone, the ASP has fallen another 17 percent.

The drop is driven partly by the introduction of $200 mini tablets like the Amazon (AMZN) Kindle Fire, but also a fall in the price of the dominant large-screen devices.

rb- No wonder Apple is suing everybody in sight to prevent competition. They need to protect their profit margins. Way to go USPTO.

Tablet Average Selling Price

Are We in the Post PC Era

Are We in the Post PC EraKevin C. Tofel at GigaOM recently wrote that by looking at the numbers, it’s difficult to argue that the Apple (AAPL) iPad is anything less than a success. The company sold more iPads — 15.4 million — than any traditional computer maker sold PCs in the last quarter of 2011. Mr. Tofel argues what is debatable, however, is whether the iPad will take us to the “post-PC” era, as Apple calls it. Former Apple director Michael Mace suggests that the PC isn’t going away, agreeing with Apple’s CEO, Tim Cook, who recently saidI don’t predict the demise of the PC industry, I don’t subscribe to that.

Michael Mace observed on his personal blog that. “I think the ‘PC era’ meme from Apple is self-serving hype. Of course, they want to convince you that the world is shifting away from a market where Apple has less than 10% worldwide share to a market where Apple has well over 50% share.

“... My thought is that PCs aren’t going to suddenly disappear, but people will continue to opt for capable tablets or hybrid devices in the place of future, new PC purchases. The mobile market is shifting traditional tasks away from PCs of old, and for people who need a PC occasionally, they will likely be able to access one remotely.

Apple is simply calling out the post-PC era because it has successfully transformed its business lines ahead of the curve and before its peers.

Mr. Tofel points out that when all is said and done, Mace makes one last salient point worth noting: How will Microsoft (MSFT) respond to the iPad? We know the answer is Windows 8, but there’s still an open question about how well the platform will do on tablets. Perhaps, Mace notes, we’re not exactly on the cusp of a post-PC age, but instead, a post-Microsoft era.

Related articles:

  • Amazing Stats from Apple Q3 Earnings Prove Yet Again We’re In A Post-PC Era

Magic Cable Trio All-in-One USB Simplicity

Magic Cable Trio All-in-One USB SimplicityTested.com points out the handy Innergie Magic Cable Trio which solves an age-old problem. You never have the right USB connector when you need it. The Magic Cable Trio combines mini USB, micro USB, and 40-pin dock tips into a single cable. The handy-dandy cable will play ball with your tablet, or just about any USB device you can get your hands on according to Tested. It won’t work with printers, but the Magic Cable Trio is meant for plug-and-play accessibility, not languishing behind a desk collecting dust.

The tips are all attached and fold out-of-the-way when not in use. Tested says the extra tips could be a bit of a nuisance, but you’ll never have to worry about losing the adapters in the bottom of a backpack. The Magic Cable Trio costs $20 at Innergie’s store.Innergie Magic Cable Trio

Related articles

Polycom on iPad

Polycom logoAnalysts are forecasting that the tablet market will grow five-fold by 2015 to 320 million units sold annually. The cumulative number of tablets in use by that point will be about 900 million. Many are predicting that the tablet will continue to gain in functionality and take over the laptop in the coming years.

Polycom is pioneering high-definition video collaboration for tablets called Polycom® RealPresence™ Mobile. Polycom RealPresence Mobile is the first enterprise tablet software that lets mobile users enjoy HD video collaboration from anywhere. It is available now on the Apple (AAPL) iPad 2, MotorolaXOOM, and Samsung (005930) Galaxy Tab 10.1—with more mobile devices to follow.

RealPresence Mobile extends Polycom’s HD video collaboration technology beyond the office and conference room. Iy bringing a high-quality, secure, reliable experience to tablets that is comparable to desktop and room systems.

RealPresence Mobile delivers enterprise video collaboration for the business tablet market and delivers provisioning, management, system interoperability, firewall traversal, and scalability that CIOs need, and the reliability, security, rich features, and lifelike quality that users demand.

RealPresence Mobile scales, supporting up to 75,000 devices and 25,000 concurrent calls.

You can find download a free end-user application from the Apple Store, Android Market, and Samsung Apps.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

A History of Mac Malware: Part 2

A History of Mac Malware: Part 2Graham Cluley at Sophos recently wrote an excellent history of Apple Macintosh malware. He points out that Mac malware is a subject that raises strong emotions. There are some who believe that the problem is over-hyped and others who believe that the malware problem on Macs is underestimated by the Apple-loving community. The author writes that hopefully, this short history will go some way to present the facts and encourage sensible debate. (rb- We have just taken on a new customer which is 85% Mac and 15% PC. I have had this very conversation with my Apple certified tech who does the field support.)

Click here to read part 1 of the History of Mac Malware. Click here to read my recent series commemorating the 25th anniversary of the computer virus.

Sophos logoBig changes to the Mac malware scene arrived with the release of Mac OS X – a whole new version of the operating system which would mean that much of the old malware would no longer run. All future, Mac-specific malware would have to be written with a new OS in mind.

2004 – The Renepo script worm (also known as “Opener”) attempted to disable Mac OS X security including the Mac OS X firewall. The author reports that the Renepo worm would download and install hacker tools for password-sniffing and cracking, make key system directories world-writable, and create an admin-level user for hackers to later abuse.

Renepo script wormIn 2004, hackers also wrote a proof-of-concept program called Amphimix which demonstrated how executable code could be disguised as an MP3 music file on an Apple (AAPL) Mac. Amphimix appeared to been written as a proof-of-concept highlighting a vulnerability in Apple’s software.

2006 – The first virus for Mac OS X was discovered in 2006. OSX/Leap-A was designed to use the Apple iChat instant messaging system to spread itself to other users. As such, it was comparable to an email or instant messaging worm on the Windows platform.

iChatThe author concludes that it was correct to call OSX/Leap-A a virus or a worm. It was not correct to call OSX/Leap-A a Trojan horse. Not that that stopped many in the Mac community claiming it wasn’t a real virus.

2007 – Sophos discovered an OpenOffice multi-platform macro worm capable of running on Windows, Linux, and Mac computers. The BadBunny worm dropped Ruby script viruses on Mac OS X systems and displayed an indecent JPEG image of a man wearing a rabbit costume.

BadBunny wormThe first financial malware for Mac appeared in 2007. The OSX/RSPlug-A Trojan horse was first detected by researchers at Intego. Mac users infected themselves by downloading and running a fake codec that claimed to help users view pornographic videos. Once on a victim’s Mac, RSPlug changed that machine’s DNS settings so that, while browsing the web, users would redirect to phishing sites or sites containing advertisements for other pornographic sites.

According to Kasperskey’s Threat Post, RSPlug’s various incarnations are all forms of the DNSChanger malware. DNSChanger featured prominently as the target of the FBI’s 2011 take-down of the malware network, dubbed Operation Ghost Click.

2008 – Apple malware became more sophisticated in 2008. Cybercriminals targeted Mac and PC users in equal measure, by planting poisoned ads on TV-related websites. If accessed via an Apple Mac, surfers would be attacked by a piece of Macintosh scareware called MacSweeper. Close relatives of MacSweeper including Imunizator, claimed to find privacy issues on the user’s computer.

The author details the growing sophistication of Mac malware in 2008.

  • Mac scarewareThe OSX/Hovdy-A Trojan horse would steal passwords from Mac OS X users, open the firewall to give access to hackers, and disable security settings.
  • Troj/RKOSX-A a Trojan horse is a Mac OS X tool to assist hackers to create backdoor Trojans, which can give them access and control over your Apple Mac computer.
  • The Jahlav Trojan was similar to other malware campaigns, cybercriminals created a bogus webpage claiming to contain a video. Visiting the site produces a message saying that you don’t have the correct codec installed to watch the video whereupon the site offers you a DMG file for Apple Macs.

Ironically Apple issued a support advisory in 2008 urging customers to run anti-virus software – but after media interest, rapidly deleted the page from their website.

OSX/iWorkS-A Trojan horse2009 – ThreatPost reports that in 2009 Symantec found the OSX/iWorkS-A Trojan horse. The malware was added to a version of Apple’s iWork ’09 software suite that popped up on BitTorrent file sharing sites. The incident was noteworthy because the trojan was packaged with the actual iWork application, so the Mac users, many of which do not use an antivirus solution, would have no reason to suspect that their machines were infected because of the download. The trojan itself communicated with a remote server and was intended to scan machines for data and track Internet history and keystrokes. A new variant of the Trojan was distributed in a pirated version of Adobe (ADBE) Photoshop CS4.

Online video was a major conduit for Mac malware in 2009.

  • Sophos reported on how hackers were planting versions of the RSPlug Trojan horse on websites, posing as an HDTV program called MacCinema.
  • Hackers planted a version of the Jahlav Mac Trojan horse on a website posing as a portal for hardcore porn videos.
  • The Twitter account of celebrity blogger Guy Kawasaki had a malicious link posted onto it, claiming to point to a sex video of Gossip Girl actress Leighton Meester. In reality, however, the link leads unsuspecting users to malware that could infect Mac users.

Leighton MeeterIn 2009 Apple finally began to build some rudimentary anti-malware protection into Mac OS X. Although it wasn’t really equal to a true anti-virus product (it only protected against a handful of Mac malware, doesn’t defend you if you try to copy an infected file from a USB stick for instance, and doesn’t offer clean-up facilities), it was still encouraging to see some attempt to offer more protection for Mac users.

2010 – Throughout 2010 Mac malware was distributed disguised as a legitimate application.

  • The OSX/Pinhead Trojan (aka HellRTS) was disguised as iPhoto, the photo application which ships on modern Macs. The backdoor Trojan horse can allow hackers to gain remote control over your iMac or MacBook.
  • Boonana cross-platform wormA Java applet distributed via Facebook (FB) was used to target not just Windows computers but Mac OS X and Linux too. The Boonana cross-platform worm appeared, disguised as a video and runs in the background, and reports system information to servers on the Internet, which can be a big breach of personal information. The Trojan also attempts to spread itself by sending messages from the user account to other people through spam.
  • A piece of Mac spyware called Spynion (also known as OpinionSpy or PremierOpinion) came to light, attached to screen savers and other add-ons for users’ Macs. it’s a variant of Windows spyware that has existed since 2008. Spynion would take advantage of users not properly reading End User License Agreements (EULAs), allowing it to spy on browsing habits and search behavior.

In late 2010, Sophos issued a free anti-virus for Mac home users. Early reports indicated that there are plenty of Mac users with malware on their computers – some of it Windows malware, some Mac OS X, and some cross-platform. The author states that there’s no doubt that the Windows malware problem is much larger than the Mac threat, but that doesn’t mean that the danger of malware infection on Mac OS X is non-existent.

The events of 2011 would make it clearer to Mac users than ever before that the malware threat was real..

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

The End of Microsoft?

The End of Microsoft?The BusinessInsider published some awesome charts from Horace Dediu of Asymco that shows the collapse of Microsoft (MSFT) and Intel’s (INTC) monopoly in personal computing. Henry Blodget says the chart shows how Google‘s (GOOG) Android and Apple (AAPL) have successfully eaten into Wintel‘s market share. Is it the end of Microsoft?

BI - Share of Personal Computing Platforms

Blodget included a chart from BI Intelligence showing the unit sales of PCs, smartphones, and tablets.

BI - Global Internet Device Shipmetns

rb-

This does not say that Microsoft is going to collapse. It still has a number of successful businesses. It’s just not going to run the world like it once did according to the article. So this is not the end of Microsoft.

Related articles
  • Wintel and the Disappearing PC World (beta.fool.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Microsoft Eliminating Backup Generators

MSFT Eliminating Backup GeneratorsThe venerable diesel backup generator has long been a symbol of reliability for mission-critical installations. Backup generators provide the emergency power required to keep servers online during utility power outages. Data Center Knowledge reports that the growing focus on using clean energy to power large data centers is prompting Microsoft (MSFT) and other tech titans to ditch their generators, along with their diesel fuel emissions.

backup energy options Microsoft is the latest company to announce its intention to cut its use of diesel generators. The move is part of a broader initiative to make Microsoft’s server farms more sustainable and less reliant on the utility grid according to DCK. Microsoft Utility Architect Brian Janous wrote in a recent blog post.

We are currently exploring alternative backup energy options that would allow us to provide emergency power without the need for diesel generators, which in some cases will mean transitioning to cleaner-burning natural gas and in other cases, eliminating the need for backup generation altogether.

Bloom Energy, fuel cellsDKC speculates that the reference to natural gas suggests that Microsoft is preparing to add fuel cells to replace its generators. That could be good news for Bloom Energy,  which recently scored wins to replace generators and UPS units at new data centers of eBay (EBAY) in Utah and supplement power Apple‘s (AAPL) data center in North Carolina.

DCK explains the Bloom Energy Server is a solid oxide fuel cell technology that converts fuel to electricity through an electrochemical reaction, without any combustion. The Bloom box can continue to run during grid outages because they are housed at the customer premises. Bloom boxes can run on natural gas or a range of other biofuels, including methane gas from landfills.

Diesel engine exhaust is a regulated pollutantAnother reason MSFT may be replacing generators according to DCK is that they have caused Redmond several headaches in recent years, including an Azure cloud outage in Europe (when multiple generators didn’t start during a utility outage) and public controversy about whether the diesel emissions from Microsoft’s generators in Quincy, WA could cause health problems for local residents. Diesel engine exhaust is a regulated pollutant and can be toxic in high concentrations.

Or Microsoft’s motivation could be to become less dependent on the utility grid and use renewable energy to power its servers the blog says. The company says its “data plants” will break new ground in integrating electricity and computing, bring together data centers and renewable power generation.

Biomass waste-powered data center.One type of renewable energy Microsoft has explored is a waste-powered data center. It could be built on the site of a water treatment plant or landfill. In his blog post, Janous indicated that Microsoft is evaluating a biomass project in Europe (rb- I wrote HP’s plan to use manure to run a data center here).

Given the unreliability of the electric grid and the need for continuous availability of cloud services, Microsoft maintains diesel generator backup at all of our data centers…” Janous wrote. “These generators are inefficient and costly to operate. From both an environmental and a cost standpoint, it makes no sense to run our generators more than we absolutely must.”

Microsoft data centerMicrosoft is also considering “long-term purchases from larger grid-connected installations that would displace some portion of our grid purchases,” Janous wrote. Google (GOOG) has embraced a similar strategy, using power purchasing agreements to add more than 200 megawatts of wind power to the local utility grids that support its data centers.

Microsoft is taking steps to position itself to make bulk power deals according to DCK. “We have recently signed on as an advisory board member with Altenex, an operator of a network that enables member companies to more efficiently engage with developers of renewable energy projects,” Janous said. “We expect this engagement with Altenex to improve our ability to identify and evaluate cost-effective clean energy projects.

rb-

Cummins logoI recall as a newbie techie the first time I had to be in on Sunday morning to work with the site engineer to crank up the 100 HP Cummins standby generator. The firm ran the monthly test to make sure the critical systems stayed up. The generator was enclosed in a secure room that contained the heat and noise. The exhaust was vented out. One of my regular jobs was to kick the standby 55-gallon drum of diesel with the hand pump on it to make sure there was fuel available for the generator.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

A History of Mac Malware: Part 1

A History of Mac Malware: Part 1Graham Cluley at Sophos recently wrote an excellent history of Apple Macintosh malware. He points out that Mac malware is a subject that raises strong emotions. There are some who believe that the problem is over-hyped and others who believe that the malware problem on Macs is underestimated by the Apple-loving community. The author writes that hopefully, this short history will go some way to present the facts and encourage sensible debate. (rb- We have just taken on a new customer which is 85% Mac and 15% PC. I have had this very conversation with my Apple certified tech who does the field support.)

Click here for part two of this series. Click here to read my recent series commemorating the 25th anniversary of the computer virus.

Apple II1982 – Apple II – The first virus to affect Apple computers wasn’t written for the Macintosh (the original Mac did appear until 1984). 15-year-old student Rich Skrenta wrote the Elk Cloner virus, capable of infecting the boot sector of Apple II computers. On every 50th boot the Elk Cloner virus would display a short poem:

It will get on all your disks
It will infiltrate your chips
Yes, it’s Cloner!

It will stick to you like glue
It will modify RAM too
Send in the Cloner!

The blog says many Apple fans are surprised that the Elk Cloner boot sector virus predates IBM (IBM) PC viruses by some years. (I got my first paying tech job using an Apple II and PFS:File to build a database).

1987 – Macintosh – The nVIR virus began to infect Apple Macintosh computers, spreading its malware mainly by floppy disk. It was a similar story to what was happening in the world of MS-DOS malware, where viruses would typically travel from computer to computer by users sharing floppy disks.

Source code for nVIR was later made available, causing a rash of variants for the Mac platform. The author writes that the first anti-virus products for Mac, some free, some commercial, began to emerge in response th this malware. (In my first tech support Job, I got very familiar with the Mac 30/SE, since there was a computer lab full of them with a SCSI chain from the Mac to an external hard drive to a scanner. They also printed to a LaserWriter 2 with AppleTalk and Phonenet. I still have a bag of terminators.)

Mac 30/SE1988 – HyperCard – Running on early versions of Apple’s Mac OS, one HyperCard virus displayed a message about Michael Dukakis’s US presidential bid before self-destructing:

Greetings from the HyperAvenger! I am the first HyperCard virus ever. I was created by a mischievous 14-year-old, and am completely harmless. Dukakis for preseident (sic) in ’88. Peace on earth and have a nice day

1990 – The MDEF virus (aka Garfield) emerged, spreading malware on application and system files on the Mac.

1991 – HC (also known as Two Tunes or Three Tunes) was a HyperCard virus discovered in Holland and Belgium in March 1991. The writes that on German language versions of the operating system it would play German folk tunes and display messages such as “Hey, what are you doing?” and “Don’t panic.”

Microsoft Office1995 – Concept Macro Virus – Microsoft (MSFT) accidentally shipped the first-ever Word macro virus, Concept, on CD-ROM. It infected both Macs and PCs running Microsoft Word. Concept was not written with malicious intent but thousands of macro viruses were to follow, many also affecting Microsoft Office for Mac. Word macro viruses turned the world of Mac *and* Windows malware on its head overnight according to Sophos.

Macro viruses are written in an easy-to-understand macro language that Microsoft included in its Office programs making it. The blog says the macro language made it child’s play to create new malware variants. Most people at the time considered documents to be non-dangerous and were happy to receive them without thinking about the security risks. Just opening a Word .DOC file could infect your computer because the macro virus’s code was embedded within.

1996 – Laroux  Excel macro virus – The Laroux virus did not affect Mac users until Microsoft released Excel 98 for Mac and then Apple users could also become victims.

QuickTime logo1998 – Hong Kong introduced the next significant Mac malware outbreak the blog says.  It was first spotted in the wild in Hong Kong. The worm – dubbed AutoStart 9805 – spread rapidly in the desktop publishing community via removable media, using the CD-ROM AutoPlay feature of QuickTime 2.5+. (rb- An AutoPlay issue – whoda thunkit?). In the same year, Sevendust, also known as 666, infected applications on Apple Mac computers.

After 1988 Mr. Cluely writes that big changes to the Mac malware scene were just around the corner. The release of Mac OS X, a whole new operating system which would mean that much of the old malware would no longer be capable of running. Mac-specific malware would have to be written with a new OS in mind.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.