Tag Archive for Research In Motion

Mobile Patent Troll Sues Everyone

Mobile Patent Troll Sues EveryoneSurprise, surprise there’s another mobile-related patent lawsuit. at GigaOM says this time the plaintiff is an obscure Delaware-registered limited liability non-practicing entity called Steelhead. The patent in question covers ‘mobile radio handover initiation determination’ – in other words, choosing which cellular base station has the best signal as the handset moves from one place to another.

Cell phonesThe defendants are a who’s who of the mobile world: Apple (AAPL), AT&T (T), Google (GOOG), HTCKyocera (KYO), LG (LGLD), MetroPCS (PCS), Motorola Mobility, NEC Corporation (6701), Pantech, Research In Motion (RIMM), Sony (SNE), Sprint (S), T-Mobile, Verizon (VZ) and ZTE (763). The article says these firms committed the mortal sin of allowing their mobile phones to act like mobile phones. But the interesting thing about this particular suit is the origin of the suit – or, more precisely, the reporting around that origin.

Mr. Meyer reports that U.S. Patent No. 5,491,834 comes from BT (BT). It was filed in 1993 and granted in 1996. The patent is still listed by the USPTO as belonging to BT. In its court filings provided by the author, (the Motorola/Google example is here), Steelhead notes that it “owns all rights of recovery under the ‘834 Patent, including the exclusive right to recover for past infringement.

aggressively monetizingThe author suggests that this case may not be BT “aggressively monetizing” its patent portfolio. BT told Mr. Meyer, “BT sold all of its rights to the patents last year. We have no involvement in Steelhead Licensing LLC’s litigation activity.

BT claims the troll is not a shell front for the firm. A spokesperson for the telecom giant told GigaOM,  “BT doesn’t share in Steelhead’s licensing income”.

rb-

I have covered the mobile patent wars many times here. I don’t know why I find patent trolling so interesting to follow. Maybe it is the same reason I watch NASCAR highlights, for the crashes, or the buy a few Powerball tickets, just in case.

Maybe someday all the money spent on lawyers will actually go back to making things and creating jobs.

Kids squabblingShame on BT if this is a legit patent and they were not smart enough to enforce their claim when they had it. I’m no lawyer, it seems to me that mobiles that can’t find a cell tower to connect to don’t work.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tech Labor Day

Tech Labor DayToday is Labor Day in the U.S. The U.S. Department of Labor says Labor day is dedicated to the social and economic achievements of American workers. Outplacement firm Challenger, Gray & Christmas summed up the social and economic achievements of American tech workers recently. Their report stated that in the first half of 2012, layoffs in the technology sector hit their highest levels since 2009. There were more than 51,000 cuts announced by the end of June.

According to CRN, most of the layoffs came from the biggest firms. (rb- I kept a butcher’s toll of tech layoffs in 2009. The first half of 2012 seems just as grim.)

HP – Leads the body count in 2012 with its planned 27,000-plus layoffs. HP (HPQ) made the announcement in May, saying it would cut about 8% of its workforce over the next two years.

Nokia – The downward spiral continues for Nokia (NOK) with the announcement that it will slash 10,000 jobs. The NYT estimated the cuts to be around 19% of its worldwide workforce, by the end of 2013.

Sony In April Sony (SNE) said it would slash about 6 percent of its global workforce. That about 10,000 job cuts in an effort called “One Sony.” The cuts are said to refocus the company around its digital imaging, gaming, and mobile businesses. Sony also announced cuts at Sony Mobile Communications its mobile handset division. They plan to lay off 15% of its workforce or about 1,000 people. According to TechCrunch, the process is due to complete by March 2014.

Google – In a long-expected move, Google (GOOG) confirmed it would ax about 4,000 jobs from its Motorola Mobility subsidiary. This cut represents about 20% of Motorola’s 20,000-employee headcount. Google said that some 90 former Motorola facilities would be closed down.

Panasonic – In May, Panasonic (PCRFY) announced it would cut another 7,000 staff after announcing in April 2011 plans to cut 17,000 jobs over two years.

Research In Motion – Former king of smartphones, Research In Motion (RIMM) has suffered setback after setback in the face of Apple and Android competition. RIM early this year warned of workforce reductions, and in mid-June, several reports held that those reductions had already begun, in small batches of 10-or-so employees. New reports in August stated that RIM will cut some 3,000 other jobs this month.

Olympus –  CNET reports that Olympus (OCPNY) will cut 2,700 employees from its global workforce between now and March 31, 2014.

Yahoo – Back in April Yahoo (YHOO) cut about 2,000 employees across all the major units of the company. CRN speculates that Yahoo’s job cutting will grow as new CEO Marissa Mayer gets her feet wet.

Lexmark – Lexmark (LXK), the printer maker is jettisoning its inkjet printers and laying off 1,700 workers as paper becomes increasingly passe in an age of online photo albums on Internet hangouts like Facebook and Pinterest according to MercuryNews.com.

Cisco – In mid-July, Cisco (CSCO) confirmed 1,300 more job cuts, about 2 percent of its global workforce.

Activision – Activision (ATVI) subsidiary Blizzard Entertainment, maker of World of Warcraft announced that it will cut its global workforce by 600 employees Gamespot reported in February.

Best Buy logoBest Buy – CNET reports that the retail giant has decided to cut 650 Geek Squad workers. Best Buy (BBY) confirmed to Minneapolis-St. Paul news station KARE 11 the nationwide layoffs were effective August 1.

Logitech – the $2.3 billion peripherals king has had Logitech’s financial struggles. In June, Logitech (LOGI) said it would cut about 450 jobs, roughly 13 percent of its global workforce.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Better Mobile Security

Better Mobile SecuritySmartphone users should be concerned about mobile security. This is more true if the mobile device is used for work and has your employer’s email or messaging server. IT staff can take steps to protect the data on the mobile. Eric Geier, the founder of NoWiresSecurity writes provided CIO Update with 6 tips for better mobile device security.

Choose encryption and use itTip No. 1 – Choose a mobile OS that supports encryption and use it: Mr. Greer says to make sure the mobile operating system (OS) and device support hardware-based encryption. The article says Apple’s (AAPL) iOS and Research In Motion’s (RIMM) BlackBerry support encryption for both internal and external storage. Without encryption, it’s possible that someone could recover the data on the device even without your lock PIN or password.

Full device encryption is limited and varies on current Android device manufactures. Mr. Greer writes that Motorola Mobility’s (MSI) business-oriented smartphones offer encryption capabilities on Android 2.3. Android 3.x includes an API to help developers offer encryption on tablets. Android 4.x tablets and smartphones should support encryption sometime in 2012. WhisperCore is a third-party encryption solution that is in beta for Nexus S and Nexus One.

Set a lock PIN or password:Tip No. 2 – Set a lock PIN or password: The article says that enabling a password, whether it’s called a PIN, passcode, or passphrase, is the first line of defense in maintaining privacy and security. It helps prevent others from picking up your phone or device and snooping around if it becomes lost, stolen, or just left unattended. It’s also usually required if encryption is enabled on the device writes the author. A PIN will protect data and privacy from causal snoopers.

Tip No. 3 – Enable auto-wiping of data: Most mobile OSes support automatic wiping of the device’s data after a certain number of incorrect passwords attempts. Mr. Greer says auto-wiping is natively supported by iOS, Windows Phone 7, and BlackBerry. Android requires a third-party app, such as Autowipe.

It is important to keep all your data regularly backed up so the data can be restored to a new mobile after it is wiped.

Setup remote trackingTip No. 4 – Setup remote tracking and management: Before your phone or device gets misplaced or stolen the blog recommends that a remote tracking and management system should be set up. Most let you see the device’s GPS location on a map, send audible alerts to help you find it, and display a visual message to tell others how to return it. They typically also let you remotely lock and/or wipe it before someone else gets their hands on it. According to Mr. Greer:

  • For iOS 4.2 or later, Apple provides a free service.
  • For earlier iOS versions there’s the MobileMe service from Apple at $99 a year after the 60-day free trial.
  • For Android, you have to use a third-party app.
  • For Windows Phone 7 Microsoft provides the free Windows Live for Mobile service.
  • For BlackBerry, RIM provides the free BlackBerry Protect service.

Limit Wi-Fi hotspot usageTip No. 5 – Limit Wi-Fi hotspot usage: When you use public Wi-Fi hotspots that aren’t encrypted, all your Internet traffic is transmitted through the air and can be easily intercepted. The most important sites and services, such as banking websites, usually implement their own (HTTPS/SSL) encryption that protects their individual traffic. But most email providers and many social networking sites don’t; thus eavesdroppers can likely capture their passwords and traffic.

On the other hand, most 3G, 4G, and other cellular data connections are usually encrypted by the carriers. Plus eavesdropping on these types of connections isn’t as popular. Therefore, when you’re out and about you should try to use the data connection rather than unsecured Wi-Fi hotspots.

If you insist on using Wi-Fi hotspots, use those that offer enterprise encryption and 802.1X authentication, such as from T-Mobile and iBahn. Alternatively, consider using a VPN connection to secure your traffic from local eavesdroppers.

Use an antivirus or security app:Tip No. 6 – Use an antivirus or security app: Viruses, malware, and hacking on mobile devices is a growing problem. The author recommends installing a security app to help prevent infections and intrusions. Most AV solutions also offer other features, such as remote wiping, backup, and locating.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Which Mobile OS is Most Hit by Malware?

Which Mobile OS is Most Hit by Malware? Help Net Security reminds us that most mobile phone users still don’t have a mobile AV solution installed on their devices making. This makes it hard to gauge just how many of them have been hit by mobile malware. To overcome this fact, Microsoft (MSFT) researchers observed that mobile phones often get synched with the users’ computers. Also, users often use their computers to search for mobile apps on third-party application markets and file-sharing sites. These habits allow mobile malware to occasionally end up on their desktop/laptop computers and gets detected by desktop anti-virus software.

MicrosoftResearchers at the Microsoft Malware Protection Center (MMPC) were able to use thes detection to get an idea of what malware attacks the various mobile operating systems. The MMPC found was that Symbian users’ devices are getting hit with a disproportionately bigger number of threats than those targeting other operating systems. In August 2011, Microsoft detected around 42,000 of them.

Malware attacks

Microsoft’s Marianne Mallen says that Symbian-specific malware seems to be evolving and Zeus-in-the-mobile (“ZItmo“) and SpyEye-in-the-mobile (“Spitmo“) are the most recently detected malware and arguably the most dangerous for the user.

JavaThe Sun Oracle (ORCL) Java ME platform takes second place in the MSFT research, with nearly 24,000 threats detected in August 2011, mostly apps sending text messages to premium-rate numbers.

The MMPC found that Google‘s (GOOG) Android malware numbers were rather low when compared to Symbian and Java ME platforms. There were around 2,800 hits in August, but have been steadily rising since February. Much of the Android malware uses privilege-escalation exploits to install itself or other components on the device without having to ask the user for permission.

At the end of the MSFT list are Apple (AAPL) iOS and Research In Motion (RIMM). No new threats for Apple’s mobile OS have been discovered this year, and the total number of threats detected in August was around 590. RIM brings up the rear with only 5 malicious apps detected during that month and can boast of only one completely new threat springing up for it this year:.

Apple ComputersMs. Mallen’s advice to mobile users is to scan applications downloaded when possible, even when it’s already on a mobile device. Ms. Mallen says that even apps from the official app stores, may have been repackaged with malware that can run stealthily without the user being made aware of the underlying payload,” she points out. “The payload can include data-theft, silent SMS-sending in the background, and downloading and installing of other malware components, among other things. This malware (or links to it) could also be spammed or sent through email, using social engineering to entice the user to download a copy of the malware onto the desktop.”

rb-

UMMM no critique of mobile malware issues on WinPhones?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablet Notes

Tablet NotesTablet adoption is reportedly outpacing the take-up rates of smartphones, computers, mp3 players, or game consoles. Adoption is underway in a variety of sectors beyond the consumer segment, into retail, industrial, education and business. The demands for mobility and real-time access to data are driving the tablet market.  Sales are expected to exceed 147 million by 2015.

Microsoft: It’s Not Too Late To Win In Tablets

Microsoft logoThe financial geniuses at Citi (C) that brought us the housing bubble also believe that Microsoft (MSFT) can still win the tablets wars. The BusinessInsider cites a report by Citi that says despite being late into the market Microsoft can become “#2 behind iPad” for these reasons:

Tablets are too expensive – Citi notes gadgets need to fall below $300 before they really take off. Until they reach that cost, Microsoft has time to reach people who haven’t jumped on the iPad bandwagon.

Android tablets are not very good – Citi believes that Android tablets won’t take off like Google’s (GOOG) Android Smartphones.

Android faces legal challenges – Android tablet makers are already facing a bunch of intellectual property suits from Apple (AAPL), Nokia (NOK), Oracle (ORCL), and Microsoft. Citi thinks Microsoft is hoping for royalties of $7.50 to $12.50 per unit. That would erase some of the cost-advantage of shipping Android.

Apps – Microsoft has an army of 6 million .NET developers who could start developing touch-optimized apps for Windows tablets. Plus, Citi says Microsoft can make Office an exclusive for its tablet and exploit its Xbox business to offer exclusive big-ticket games.

Enterprise – IT departments already know how to deploy, update, and push apps out to Windows PCs, so a Windows-based tablet should be easier to deal with than other tablets. Microsoft will also probably make Office an exclusive to its tablets and could create a technology where a tablet can “extend” a PC by giving them access to locally stored files. Citi does note that the “bring your own device” trend might favor the iPad instead, but this trend is still in the early days and not proven.

Citi predicts that about 75 million tablets will ship in 2013 and that Microsoft will have a “meaningful share” of those.

GigaTrust Brings Enterprise Rights Management To Apple’s iPhone And iPad

GigaTrust logoGigaTrust, a publisher of Enterprise Rights Management (ERM) content protection software that enhances and extend Microsoft (MSFT) Active Directory Rights Management Services (AD RMS) announced the release of the GigaTrust for iPhone and iPad mobile devices. The product consists of a client and “Mobility Server” that enables persistent content protection for the Apple (AAPL) iPhone and iPad equivalent to that provided by GigaTrust for the Research In Motion’s (RIMM) BlackBerry smartphone and Windows Desktop according to DarkReading.

Reportedly GigaTrust for iPhone and iPad protects content at rest, in transit, and in use, allowing users to securely deliver and persistently protect emails while they are being read on the device. Additionally, iPhone and iPad users can apply GigaTrust protection to outgoing emails and email responses.

Mobile Security: The Great Misconception

Smartphone securityResearch from Kaspersky Lab shows that many users feel more secure using mobile devices than PCs to surf the Internet and that most consider the risk of losing personal data higher on computers than on their mobile devices. The report noted by ITnewsLink says there has been a recent increase in the number of attacks on mobile operating systems like Google’s (GOOG) Android and Apple’s (AAPL) iOS, and experts expect to see considerably more in the future. Despite this, users in the Kaspersky Lab survey feel more secure accessing the Internet via a mobile device.

In the survey, users consider the risk of losing personal data lower on a mobile device than on a PC – despite the fact that around a fifth of all smartphone users has already experienced the loss or theft of a mobile device. The majority of users reported they store personal data, such as photos, emails or contact details, on their mobiles. Around one-third also save login information, such as PIN codes or passwords, for services on their mobile devices, demonstrating a large gap between secure reality and user perception

Next! Turns Your iPad into a Real Productivity Tool

Leftturn Labs logoAppScout says Next! For iPad is proof that the iPad can do work The app is a getting-things-done (GTD) styled app that will help keep your projects organized, keep your tasks from overwhelming you, and keep you moving towards your goal.

Next! can help you organize your to-dos and projects. AppScout says it doesn’t have the same features as a project management suite like Microsoft Project, it’s perfect for those projects that are essentially a long series of tasks to be completed with due dates and dependencies for each of them.

You can take notes, store documents relevant to your project, and tag items that you want to review with others, all from your iPad. Next! will even serve as a light document management system, giving you a central place for all of your project-associated documents, images, and files that you’ll need to refer to as you do the work.

Since the app follows the GTD philosophy it allows you to create action lists based on when the tasks will be completed as opposed to an arbitrary priority list. Your tasks can be adjusted as they get nearer or come into focus. You also get overall project status and health bars that show how far you’ve progressed towards completing your tasks and how closely you’re tracking to your schedule.

Next! is available in the iTunes App Store for the introductory price of $9.99.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.