Tag Archive for RIMM

Blackberry is Dead – Long Live Blackberry

Blackberry is Dead - Long Live BlackberryLast week BlackBerry (BB) tweeted that they were letting their agreement with the Chinese electronics group TCL Communication lapse at the end of August 2020. This most likely is the end of the BlackBerry smartphone. TCL had been manufacturing BlackBerry smartphones since the Canadian company stopped making its name-sake phones in 2016 amid an attempt to re-shape itself into a cyber-security company.

BlackBerry’s preceded the iPhone and Android in important ways. How did the Blackberry phone go from world domination to last week’s announcement?

Blackberry history

March 1984: Research in Motion (RIM) was founded in Canada.

October 1997: RIM went public with an IPO on the Toronto Stock Exchange which raised $115 million.

July 1998: The RIM 850 the initial BlackBerry device offered something all its competitors couldn’t touch at the time – access to emails on the go (no voice).

1999: RIM joined NASDAQ as RIMM.

November 2001: Patent holding company NTP sued RIM for patent infringement RIM lost and was forced to settle for $612.5M in 2006.

March 2002: BlackBerry 5810 released, with both voice and data support. It ran on a 2G network and came with a color screen. It became the device of choice in corporate America due to its enterprise-level security.

BlackBerry Messenger2005:  RIM launched a proprietary mobile instant-messaging application BlackBerry Messenger. BBM came at a time when other mobile messaging options — like SMS messages — were subpar.

March 2007: The company “restated” $250M earnings relating to a “backdating” stock options scandal. RIM executives changed the date of stock sales to a low share price date to make money on their stock options. The scandal cost RIM’s co-CEOs Balsillie and Lazaridis and others their jobs at RIM and a total of C$77M in fines.

January 2007: Apple launched its first iPhone, opening the market to full touch screen phones.

January 2007 Apple launched its first iPhone,June 2007: BlackBerry had some 8 million customers.

October 2008: First Android-powered smartphone is released.

November 2008: BlackBerry launched the ill-fated Storm, its first full touch phone in reaction to iPhone.

September 2009: BlackBerry hits 20.7% worldwide smartphone market share in Q3. iPhone is at 17.1% and Android at 3.5%.

April 2010: Apple released the original iPad.

April 2011: RIM released the PlayBook tablet as a knee-jerk reaction to the success of the Apple iPad. Contributing to the PlayBook’s poor sales was the dumb decision to not offer email services without a BlackBerry smartphone.

July 2011: 10% of RIM workforce (2,000 workers) laid off.

October 2011: RIM had a global failure of its infrastructure – users are left without service for four days (Oct 10-13).

June 2012 RIM announces 5,000 layoffsJune 2012: RIM announced 5,000 layoffs.

January 2013: The company changed its name from Research in Motion to Blackberry and goes from RIMM to BBRY on the NASDAQ.

September 2013: BlackBerry peaked with 79 million global users and 4,500 employees are laid-off (40% of staff).

November 2013: John Chen becomes CEO and starts to pivot BBRY from a phone maker to a security firm.

September 2015: BlackBerry launched the Priv, the first Android-powered BlackBerry smartphone. BlackBerry acquired mobile security provider Good Technology for $425M and integrated it into the BlackBerry Enterprise Mobility Suite, for its enterprise customers.

September 2016: Blackberry becomes Blackberry Limited and stops making smartphones and outsource all hardware development and manufacturing.

BlackBerry users plummets to 11 million.May 2017: The number of BlackBerry users plummets from 80 million to 11 million.

October 2017: BlackBerry Ltd moved from NASDAQ as BBRY to BB on the NYSE.

November 2018: BlackBerry Limited purchased security firm Cylance for $1.4B.

May 2019: BBM for consumers is shut down.

The Blackberry Limited tweet marks the end of a line of devices that revolutionized mobile productivity for the enterprise. For the uninitiated (those under 30) in its heyday, Blackberry set the bar for mobile innovation. BlackBerry smartphones or “crackberries” as many referred to them helped set the stage for many of the mobile features we rely on today.

Blackberry Curve_8320The company made its own hardware which included a QWERTY keyboard. Qwerty keyboards that made it easier to fire off emails and instant messages. BlackBerry smartphones were the best way to stay connected without a laptop.

BlackBerry Mobile Services provided business users with quick encrypted end-to-end email over a low bandwidth connection. BMS also provided users access to not only their contacts, calendar, and email, but connected enterprise apps and data.

Back in the day when I was sharing technical services we even stood up a Blackberry Enterprise Server (BES) for our customers to link their BBeries to Exchange. BES was sold as a highly secure BES platform that ensured the content was always encrypted and uncrackable.

Holger Mueller, the principal analyst at Constellation Research, pointed out to TargetTech the irony of BlackBerry’s fall.

That’s the irony — users and CIOs got rid of [their] BlackBerrys despite email volume being up … Business users went from being productive on the go to [becoming] lurkers and [doing] email at night.

Tuong Nguyen, a senior principal analyst at Gartner, told TargetTech the BlackBerry smartphone relevance disappeared well before this week’s announcement.

By the time the company stopped making its own phones, its global smartphone market share was well under 1% .. In fact, they had started dipping under the 1% threshold [around] 2013-2014.

rb-

I think the market has space for a productivity-oriented company that respects its users. But to unseat Apple, that firm would have to excel at something else, like folding screens, projection, AR/VR.

Why Blackberry phones are deadThe original BlackBerry company — BlackBerry Limited — now focuses on security software. This is ironic since the Snowden papers revealed that the NSA has access to user data on BlackBerry devices.

In the end BlackBerry, just like Nokia, Palm and Microsoft underestimated the challenge from Apple  Perhaps BlackBerry needs to be done with phones.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Mobile Patent Troll Sues Everyone

Mobile Patent Troll Sues EveryoneSurprise, surprise there’s another mobile-related patent lawsuit. at GigaOM says this time the plaintiff is an obscure Delaware-registered limited liability non-practicing entity called Steelhead. The patent in question covers ‘mobile radio handover initiation determination’ – in other words, choosing which cellular base station has the best signal as the handset moves from one place to another.

Cell phonesThe defendants are a who’s who of the mobile world: Apple (AAPL), AT&T (T), Google (GOOG), HTCKyocera (KYO), LG (LGLD), MetroPCS (PCS), Motorola Mobility, NEC Corporation (6701), Pantech, Research In Motion (RIMM), Sony (SNE), Sprint (S), T-Mobile, Verizon (VZ) and ZTE (763). The article says these firms committed the mortal sin of allowing their mobile phones to act like mobile phones. But the interesting thing about this particular suit is the origin of the suit – or, more precisely, the reporting around that origin.

Mr. Meyer reports that U.S. Patent No. 5,491,834 comes from BT (BT). It was filed in 1993 and granted in 1996. The patent is still listed by the USPTO as belonging to BT. In its court filings provided by the author, (the Motorola/Google example is here), Steelhead notes that it “owns all rights of recovery under the ‘834 Patent, including the exclusive right to recover for past infringement.

aggressively monetizingThe author suggests that this case may not be BT “aggressively monetizing” its patent portfolio. BT told Mr. Meyer, “BT sold all of its rights to the patents last year. We have no involvement in Steelhead Licensing LLC’s litigation activity.

BT claims the troll is not a shell front for the firm. A spokesperson for the telecom giant told GigaOM,  “BT doesn’t share in Steelhead’s licensing income”.

rb-

I have covered the mobile patent wars many times here. I don’t know why I find patent trolling so interesting to follow. Maybe it is the same reason I watch NASCAR highlights, for the crashes, or the buy a few Powerball tickets, just in case.

Maybe someday all the money spent on lawyers will actually go back to making things and creating jobs.

Kids squabblingShame on BT if this is a legit patent and they were not smart enough to enforce their claim when they had it. I’m no lawyer, it seems to me that mobiles that can’t find a cell tower to connect to don’t work.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

How Does Your Equipment Stack Up?

How Does Your Equipment Stack Up?Engadget points us to phone-size.com that lets you compare the relative proportions of different smartphones. At the top of the webpage, you’ll also find a toolbar to enter the size and aspect ratio of your display. Once you jump through this minor hoop, according to Engadget, the utility produces accurate, life-size depictions of smartphones like Apple’s (AAPL) iPhonesGoogle’s (GOOG) Androids, and Research In Motion’s (RIMM) Blackberrys.

rb-

Really wanted to use the title.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Better Mobile Security

Better Mobile SecuritySmartphone users should be concerned about mobile security. This is more true if the mobile device is used for work and has your employer’s email or messaging server. IT staff can take steps to protect the data on the mobile. Eric Geier, the founder of NoWiresSecurity writes provided CIO Update with 6 tips for better mobile device security.

Choose encryption and use itTip No. 1 – Choose a mobile OS that supports encryption and use it: Mr. Greer says to make sure the mobile operating system (OS) and device support hardware-based encryption. The article says Apple’s (AAPL) iOS and Research In Motion’s (RIMM) BlackBerry support encryption for both internal and external storage. Without encryption, it’s possible that someone could recover the data on the device even without your lock PIN or password.

Full device encryption is limited and varies on current Android device manufactures. Mr. Greer writes that Motorola Mobility’s (MSI) business-oriented smartphones offer encryption capabilities on Android 2.3. Android 3.x includes an API to help developers offer encryption on tablets. Android 4.x tablets and smartphones should support encryption sometime in 2012. WhisperCore is a third-party encryption solution that is in beta for Nexus S and Nexus One.

Set a lock PIN or password:Tip No. 2 – Set a lock PIN or password: The article says that enabling a password, whether it’s called a PIN, passcode, or passphrase, is the first line of defense in maintaining privacy and security. It helps prevent others from picking up your phone or device and snooping around if it becomes lost, stolen, or just left unattended. It’s also usually required if encryption is enabled on the device writes the author. A PIN will protect data and privacy from causal snoopers.

Tip No. 3 – Enable auto-wiping of data: Most mobile OSes support automatic wiping of the device’s data after a certain number of incorrect passwords attempts. Mr. Greer says auto-wiping is natively supported by iOS, Windows Phone 7, and BlackBerry. Android requires a third-party app, such as Autowipe.

It is important to keep all your data regularly backed up so the data can be restored to a new mobile after it is wiped.

Setup remote trackingTip No. 4 – Setup remote tracking and management: Before your phone or device gets misplaced or stolen the blog recommends that a remote tracking and management system should be set up. Most let you see the device’s GPS location on a map, send audible alerts to help you find it, and display a visual message to tell others how to return it. They typically also let you remotely lock and/or wipe it before someone else gets their hands on it. According to Mr. Greer:

  • For iOS 4.2 or later, Apple provides a free service.
  • For earlier iOS versions there’s the MobileMe service from Apple at $99 a year after the 60-day free trial.
  • For Android, you have to use a third-party app.
  • For Windows Phone 7 Microsoft provides the free Windows Live for Mobile service.
  • For BlackBerry, RIM provides the free BlackBerry Protect service.

Limit Wi-Fi hotspot usageTip No. 5 – Limit Wi-Fi hotspot usage: When you use public Wi-Fi hotspots that aren’t encrypted, all your Internet traffic is transmitted through the air and can be easily intercepted. The most important sites and services, such as banking websites, usually implement their own (HTTPS/SSL) encryption that protects their individual traffic. But most email providers and many social networking sites don’t; thus eavesdroppers can likely capture their passwords and traffic.

On the other hand, most 3G, 4G, and other cellular data connections are usually encrypted by the carriers. Plus eavesdropping on these types of connections isn’t as popular. Therefore, when you’re out and about you should try to use the data connection rather than unsecured Wi-Fi hotspots.

If you insist on using Wi-Fi hotspots, use those that offer enterprise encryption and 802.1X authentication, such as from T-Mobile and iBahn. Alternatively, consider using a VPN connection to secure your traffic from local eavesdroppers.

Use an antivirus or security app:Tip No. 6 – Use an antivirus or security app: Viruses, malware, and hacking on mobile devices is a growing problem. The author recommends installing a security app to help prevent infections and intrusions. Most AV solutions also offer other features, such as remote wiping, backup, and locating.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablet Security Tips

Tablet Security Tips ICSA Labs, an independent division of Verizon has provided third-party testing and certification of security products since 1989. They suggest a series of security tips for smartphone, tablet, or app user’s Help Net Security reports.

Only buy apps from recognized app stores

App storeApps from unofficial third-party stores and applications downloaded from peer-to-peer sites are much more likely to contain malware than apps sanctioned by official vendor stores such as the Android App Market or Apple App Store.

Think twice about accepting permissions

Most applications, legitimate as well as malicious ones, need users to accept several “permissions” before the apps are installed. Check carefully to be sure that the app comes from a legitimate source. I wrote about mobile phones leaking data previously.

Monitor bills for irregular charges.

Monitor billsIf attackers gain access to personal information stored on the mobile device, they can quickly rack up charges by sending “silent” text messages to high-priced call services. For example, if the Google (GOOG) Android Trojan GGTracker is inadvertently installed on a device, it can sign up users, without their knowledge, for premium text messaging services.

Employ security policies to protect employer-issued devices

Employers should enforce password-based access and require voice mail codes so that only authorized users can get access to data on employer-issued devices.

Be mindful of more personal devices at work

more personal devices at workCompanies must have security systems and policies in place to safeguard their business environment and prevent access to company networks from employees’ personal devices. I wrote about BYOT here.

Remember that a tablet is a tiny PCs

Many security threats that apply to traditional computers also apply to mobile devices, such as smartphones and tablets, and consumers should take necessary measures to protect themselves. One way to do this is to install anti-malware software on mobile devices and enable VPN functionality.

Protect your tablet, smartphone, and voicemail PIN

Protect your tablet, smartphone, and voicemail PINIf your mobile phone does not have a password, add one that is at least six digits. Try to choose a unique password that is not already used across other systems and accounts. Do not use repeating digits in passwords or voice mail pins. Remember that your provider will never request your voice mail pin, so do not be tempted to give it to anyone who requests it.

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.