Cyber 02
Cyber 02
Cyber 02
02
CYBERTREND.COM
WHY LOOK
TO HYBRID
CLOUD?
IMPROVE EFFICIENCY
WITH FEWER RISKS
WHOLE CHICKEN
Tecumseh Farms Smart Chicken is truly the most natural chicken in the United States. All Tecumseh Farms
products are raised without the use of animal by-products, antibiotics, or hormones, are 100% all-natural, and are
processed using puried cold air instead of adding non-potable waterthats the air-chilled difference.
WWW.SMARTCHICKEN.COM
17
CONTACT US
P.O. Box 82545
Lincoln, NE 68501
or
120 W. Harvest Drive
Lincoln, NE 68521
TECHNOLOGIES TO WATCH
IN 2015
34 ENERGY
the latest news and research into energyconscious tech
36 IT
how to get more value out of your current and
outdated IT hardware
38 NETWORKING
how to add a guest Wi-Fi hotspot to your
company's wireless network
52 STORAGE
enterprise backup strategies and networkattached storage solutions for small and
midsize businesses
58 ELECTRONICS
the latest in premium consumer electronics
60 TIPS
smartphone, social media, and business
travel tips
40 SECURITY
learn about security and virtualization,
disaster recovery planning, how identity theft
works, and unified threat management
Copyright 2015 by Sandhills Publishing Company. CyberTrend TM is a trademark of Sandhills Publishing Company. All rights reserved.
Reproduction of material appearing in CyberTrend TM is strictly prohibited without written permission.
2013
2014
2015
2020
Automotive
96
189.6
372.3
3,511.1
Consumer
1,842.1
2,244.5
2,874.9
13,172.5
Generic Business
395.2
479.4
623.9
5,158.6
Vertical Business
698.7
836.5
1,009.4
3,164.4
Grand Total
3,032
3,750
4,880.6
25,006.6
The most recent report from IDC covering thin and terminal client shipments
shows a drop of 1.8% in 2014 Q3 compared
with 2013 Q3. This was unexpected as IDC
had originally anticipated 5% growth for the
quarter. IDC points to the winding down
of Windows XP migration projects, which
had been a contributing factor as some
users switched from PCs into thin clientbased computing, as a factor. When the results are in for the 2014 calendar year, IDC
expects to see a modest 1.2% growth compared with 2013. IDC expects the zero client
portion of the market (terminals without
OSes) to resume volume growth this year.
2014
2015
2016
279
259
248
39
62
85
PC Market Total
318
321
333
Tablets
216
233
259
Mobile Phones
1,838
1,906
1,969
11
2,060
2,148
2,239
2,378
2,469
2,572
When it comes to big data, organizations that are setting themselves apart
as leaders are changing how they measure operations, customer interactions,
and resource allocations, says Dan Vesset,
IDC program vice president for business
analytics and big data research. As part of
that, theyre working to get faster access
to more relevant data and undergoing
constant experimentation, he says. IDC
predicts that, by 2018, enterprises will be
required to invest in visual data discovery
tools and, within five years, hybrid on/offpremises big data and analytics solutions
will be required.
10%
41%
Smartphone
49%
Desktop
Tablet
Travel Research
13%
Smartphone
60%
Desktop
0%
26%
60%
STARTUPS
Agricultural Tech Startup Seeks To Help Farmers
Better Understand Their Crops
KEY POINTS
Hybrid cloud computing has
varying definitions, but the goal is
to give your business more agility
and scalability in terms of performance and access to resources.
Hybrid cloud environments let
you keep your sensitive data and
workloads onsite while moving
other workloads to the public cloud
for less expensive storage and
equal or better performance.
IT needs to establish a centralized process for managing and
monitoring the hybrid environment.
Cost savings are possible, but
you need to consider the other
major benefits of the hybrid cloud
first when making a decision.
of hybrid being an on-premises private cloud combined with an off-premises public cloud is actually a limited
definition and is only a subset of a
broader, cross-vendor hybrid cloud definition that is more aligned with the way
most organizations are constructing hybrid clouds. And in addition to being
two separate clouds that can work together, Anderson considers a situation
where you take two or more cloud
service offerings and combine them together to function as if they were a single
cloud service as hybrid cloud computing as well.
But these definitions of hybrid cloud,
in which at least two separate cloud environments must be involved, are not
the only ones out there. In fact, Dave
Bartoletti, principal analyst at Forrester
Research, says that Forresters definition of hybrid cloud is very direct
and involves a situation where a public
cloud service is connected to any other
type of system or service. This definition opens itself up to quite a few other
potential hybrid scenarios that arent
covered in the two or more cloud environments alternative.
To us, it means any public cloud service connected to anything else, says
Bartoletti. That could be another public
cloud service, a private cloud service,
or it could be connected back to a data
center application or database that is not
in a cloud at all. We take that approach
because what we mean by hybrid cloud
is not descriptive enough. Whats important for people to talk about is what
is the hybrid application use case youre
trying to solve? Hybrid could be private
and public, it could mean multiple public
clouds, and it could also mean a public
cloud resource connected to something
in your own data center.
Bartoletti digs a bit deeper into why
there are so many different definitions
for the hybrid cloud by explaining that
it comes from looking at it from a consumer standpoint, a vendor standpoint,
and a service provider standpoint. For
example, when an app and software developer looks at the hybrid cloud, they
see it as an opportunity to gain access
Unique Problem-Solving
Benefits Of Hybrid
When it comes to the benefits of implementing a hybrid cloud strategy, first
and foremost is the ability to run related
workloads in two separate operating environments without there being a major
performance disadvantage. And it also
allows companies to take advantage of
the public cloud without jeopardizing
mission-critical data. Hybrid cloud
computing allows some sensitive application workloads to run in a more
secure and protected environment while
making it possible for the business to
run other applications in lower-cost
cloud multi-tenant cloud infrastructures, DeCarlo says.
Another unique benefit of the hybrid
cloud is that because companies can
put different data and apps in different
locations, they can actually pair application and workloads scenarios with
the cloud environment that best address
their needs, Anderson says. This gives
companies a best-of-breed approach
that ensures the highest possible level
of performance, regardless of where the
workload is hosted.
Anderson does warn, however, that
hybrid models can introduce complexity, but that when good hybrid
cloud tools are used and when organizations plan for and implement a hybrid
cloud framework, this complexity can
be addressed.
10
that gives you the right security, performance, and other profiles.
Cost-Saving Potential
& Other Benefits
Anderson says that the two main reasons that most organization adopt cloud
computing is for agility benefits and
cost reduction. And while you can certainly see an increase in agility and flexibility with a move to the hybrid cloud,
its the cost savings aspect that is more
elusive, unless you put a strong foundation in place and use it in the right way.
Most organizations realize that cloud
computing may not result in cost savings,
but will produce other types of benefits,
agility being the primary benefit, says
Anderson. Hybrid cloud environments
can be part of the solution for recognizing
cost savings, but can also produce the
other benefits I mentioned above.
DeCarlo agrees that, anecdotally, the
movement in the hybrid cloud space
today is as much about agility as cost,
but says that most of these implementations are too new to really derive good
realization, those organizations have discovered that implementing a combination of cloud services, configured as a
hybrid cloud, is most likely to meet their
needs. In fact, Anderson says that according to Gartner survey data, nearly
75% of organizations believe they will
eventually implement a hybrid solution.
In addition to the popularity growth
spurt, the way companies are using the
cloud is changing as well. Many organizations began their cloud deployments
with private cloud implementations
that might from time to time require
additional resources from an external
third-party public cloud, such as during
cyclical or seasonal periods with an extraordinary number of transactions,
DeCarlo says. She adds that many businesses and government entities are also
looking at the hybrid cloud as a way to
allow different applications running in
different clouds to tap into highly sensitive data [that] might be running in a
private cloud environment.
As these use cases continue to grow in
popularity and new ones are introduced,
even more providers will enter the market
and offer hybrid solutions for businesses.
The key is to not lose sight of what hybrid cloud computing is supposed to be
about. As long as you are finding ways to
spread out workload, gain access to new
resources, and use the right cloud environments for the right tasks, then you are
on the right track.
11
12
Cloud Computing
The cloud isnt a new topic by any
means, but it will remain extremely
relevant in 2015. Mueller views the
cloud as the only way to build nextgeneration applications, partly because
on-premises infrastructure lacks the
scale and technical capability and isnt
financially viable for even exploratory
trials of next-generation applications.
APPLICATIONS
Moving forward, Alan Boehme, Cloud
Security Alliance board member, says
the intersection of mobile, cloud, and
video, along with predictive analytics,
will impact enterprises in a major
way. The need to provide secure,
composite-built applications delivered
through real-time, API-driven platforms
and the associated security challenges
of operating in a perimeter-less environment are challenges for 2015 and
beyond, he says.
COLLABORATION
Collaboration gained many organizations attention last year. Expect collaboration and productivity tools to do
the same this year, including where
they intersect with analytics, says
Alan Lepofsky, Constellation Research
vice president and principal analyst.
Employees are overwhelmed with
content, he says. To help them work
more effectively, next-generation collaboration tools will use analytics to
help sort, filter, and prioritize what
employees are working on.
to the public cloud, which can decrease these cycles to days or hours
vs. weeks or months. Similarly, Bob
Tarzey, Quocirca analyst and director,
says organizations that arent considering the public cloud for new IT
deployments should question their
reluctance. Quocirca research indicates a continuous shift in acceptance
of public cloud as a viable option for
many IT deployment types, Tarzey
says. Furthermore, public cloud platforms are more secure and stable than
the ones many organizations can produce in-house.
Customer Experience
Mastering customer recordsrelevant information such as customer interactions, purchases, preferences, and
contextwill become increasingly important this year, says R Ray Wang,
Constellation Research chairman.
Examples include loyalty technologies,
master data management, and master
marketing profiles.
To better engage customers, Natalie
Petouhoff, Constellation Research
vice president and principal analyst,
suggests keeping an eye on customerfacing technology as it relates to multiple facets: advertising, marketing,
sales, customer service, after-service,
and data analytics. Also watch for
employee-facing technology that enables the back office to empower the
front office with relevant content; this
includes information about customer
Internet Of Everything
Starting in 2015 and on through
2020, Longbottom says, intelligent
businesses will start implementing
more Internet-connected devices and
systems. Planning, however, is key,
otherwise networks will be unable
to cope with all the data chattering
around it, he says. Longbottom recommends a nodal model of remoteintelligent aggregation devices. That
is, devices that are intelligent enough
to decide what information to discard,
keep, and push forward as significant
events. Big data approaches will also
be needed to ensure that dealing with
13
DATA
Joseph Pucciarelli, IDC vice president
and IT executive advisor, expects
data management and architecture
to be important trends in 2015. The
business value is in the data, not the
IT infrastructure, he says. With the
advent of new computing options,
including cloud services, its vital that
business leaders know where their
data is and how to access and protect
it. Monetization of data is the next
frontier, he says.
14
just providing employees a mobile experience for tools they currently use
isnt enough. Instead, he says, organizations must start viewing mobile as
a new way of working, rethinking entire business processes to find innovative ways to provide employees access
to people and content they require to
more effectively perform their jobs.
Peter Crocker, Smiths Point
Analytics founder, expects business
owners and executives will focus on
making mobile apps theyve built and
deployed more engaging and valuable. The number of mobile apps individuals use as a percentage of those
downloaded is very low, he says. Thus,
brands are realizing that app downloads arent a good measure of the
success of mobile strategies. A better
measurement is how often and how
long users engage apps, he says.
Crocker expects tools and services
that drive mobile app engagement to
be an important investment in 2015.
Some of the best are platforms that integrate messaging, analytics, and marketing automation, he says. Such tools/
services monitor app usage and use
predictive models to identify the most
opportune time and place to deliver
a personal and contextually relevant
message.
Device-wise, expect CYOD (choose
your own device) approaches and
SOCIAL MEDIA
Clive Longbottom, Quocirca founder,
sees social media fading as a means
for interacting with a broad swathe
of customers. Its now apparent that
the old ways are still best, he says.
Constellation Research vice president
and principal analyst Alan Lepofsky,
meanwhile, expects improved integration between social networking and
enterprise software. A desire to shift
conversations from email to more collaborative platforms with more integration of comments, likes, and real-time
chats into core business software will
continue, he says.
Security
As in 2014, security will remain a
chief concern for organizations this
year. In 2015, Cullinane says, an ability
to quickly share incident information
(in minutes, not days or weeks) that
is truly actionable (specific data about
what you need to look for) will be
critical as cybercriminals and attacks
become more sophisticated. Sharing
information anonymously will be
essential in a post-Snowden era,
Cullinane says. Recent security incidents involving major corporations are
essentially only indicators of whats to
come, he says.
King says 2014 was a fire storm of
sometimes embarrassing, always injurious security breaches resulting in
huge losses for companies attacked.
The industry really needs to step up
with new ideas that are both usable and
15
16
Analytics & Big Data - Analytics solutions are increasingly valuable, extending
beyond unearthing business insights to
provide better security and decision recommendations.
KEY POINTS
EMC started off as a physical
storage and memory company, but
has evolved to offer a wide range of
big data and cloud solutions.
EMC offers a hybrid cloud approach for companies so they can
safely take advantage of public
cloud environments in addition to
their internal storage infrastructure.
EMCs big data and analytics
solutions give companies the tools
they need to learn more about customers as well as their own internal
infrastructure.
EMC Mobile is a free application that can be used to plan out
an EMC deployment as well as
manage it after implementation.
17
18
have helped its customers stay up-todate with current trends. When network-based storage become popular,
EMC was right there to offer its products. When virtualization and the
cloud started going mainstream, EMC
made purpose-built products and solutions to meet customer needs. And
now that big data and analytics are hot
topics for many organizations, EMC
is ready to offer its products, services,
and expertise to customers.
Whether its an IT-based organization, a manufacturer, or even a health
care facility, EMC offers solutions designed to help customers take advan-
Hybrid Cloud
EMCs approach to hybrid cloud
is all about giving you, the customer,
choices, and providing support
throughout the entire migration process. You have the option of setting up
a hybrid cloud based on OpenStack,
Microsoft, or VMware infrastructure
and you can decide which public clouds
you want to utilize as well. And to make
this decision easier, EMC offers a list of
cloud service providers that are either
Silver, Gold, or Platinum level partners.
EMC clearly explains what types of services are supported with a given provider and what EMC products youll be
able to use to set up the specific type of
environment you want.
The process of setting up an EMC
private cloud is designed to be as easy
as possible and the company claims
it can get most environments up and
running in roughly 28 days. But perhaps the best services EMC offers to
newer cloud users are its educational
programs. EMCs IT Transformation
Workshop, Cloud Advisory Service,
and cloud education services are all
designed to provide companies that
are new to hybrid cloud environments
with an in-depth understanding of
what they can do with the cloud and
how the process actually works. Not
only will EMC cloud experts support
you throughout the process, theyll also
train your employees on how to properly manage and maintain the hybrid
cloud on their own.
EMC also offers a wide range of
cloud-enabled solutions that will help
you beef up the performance of your
hybrid cloud and make sure you get
the level of performance you need.
VCE VBlock, for example, is a converged infrastructure platform designed to improve the overall agility
and efficiency of the hybrid cloud.
EMC Vspex serves as a secure bridge
between your private and public clouds
to make sure that all of your information and applications are safe.
Additionally, EMCs ViPR softwaredefined storage solution makes it much
simpler for your organizations IT
19
20
Trusted Infrastructure
Rather than relying on the traditional method of setting up your
physical and virtual infrastructure,
EMC takes the process to the next
level and helps you build what it calls
Trusted Infrastructure. EMCs Trusted
Infrastructure approach is built on the
three pillars of availability, security,
and backup and recovery. Availability
21
KEY POINTS
The cloud adds the potential
for more people to have access to
your data, but its also important
to consider human error and cloud
provider longevity as risk factors.
Major CSPs (cloud service providers) and many smaller ones have
improved their security approaches
over the years, and many now support regulatory compliance, as well.
Make sure your cloud provider
is properly certified and get thirdparty evaluations if at all possible.
Some companies, specifically
those in health care, financial, and
other heavily regulated industries,
still need to carefully calculate the
risks of a move to the cloud.
22
mean that I can actually deploy better security on some of my more sensitive systems that are internal, McCloskey says.
In other words, moving some workloads
that can handle more potential risk to
the cloud may free up IT resources and
let you better secure your internal infrastructure.
Jay Heiser, research vice president
at Gartner, agrees that no computing
model is safe from risk, but he does add
that many of the concerns leveled against
the cloud tend to be exaggerated. He compares this idea, obviously to a much lesser
degree, to the recent Ebola outbreaks
that have whipped some people into a
frenzy. The Ebola crisis here is a perfect
example of how an unfamiliar scenario
triggers anxiety and people tend to focus
on the wrong things to the wrong degree,
says Heiser. One of the biggest concerns
about the cloud is that the provider will be
hacked or that nefarious people work for
the company. But, Heiser says, its hard
to see much evidence of that.
Heiser points out that companies
should actually be less concerned about
the provider security and more concerned about their own internal handling
of the cloud. He says that sloppy Web
code and general sloppy usage of the
cloud can often put companies at risk
more than any cloud providers security
measures would. This is especially an
issue with the public cloud because its
easy for users to set up their own public
shares and inadvertently store sensitive
information in poorly protected places.
To help protect your company from this,
youll have to set up internal policies on
how to properly use the cloud and put
controls in place, neither of which is an
issue tied to a given cloud providers security offerings.
Another area where companies should
direct their concern is when it comes to
the actual longevity of the cloud provider
itself. Heiser says that many companies
have suffered data loss incidents due to
providers going bankrupt and practically falling off the face of the earth. This
specific situation happened with a major
storage-as-a-service provider that went
bankrupt and wasnt purchased, which
Comparing Providers
& Keeping Them In Check
Michela Menting, cybersecurity practice director at ABI Research, says optimizing a public cloud security approach
means that companies need to take many
factors into consideration. For instance,
she says, companies need to consider
compliance with laws and regulations
requiring knowledge of data location
and the ability to perform electronic discovery. This is crucial for companies
in the health care or financial industries
that need to know exactly where data is
stored and who has access to it. A solid
cloud provider should be able to give you
that information.
She adds that cloud providers should
be able to give you a wide range of security features to protect your data. This
includes tools like encryption, key management, and VPN-enabled cloud instances, Menting says. She also adds
that things such as software isolation;
visibility and transparency of security
controls; and data isolation, retention,
and sanitization methods are all important security measures to look for in
23
24
KEY POINTS
The profound impact that the BYOD
(bring your own device) trend has had
on businesses has been accompanied
by various data and security worries.
Many experts believe BYOD will
eventually give way (or is already
giving way) to a model known as
CYOD (choose your own device),
which is said to balance control between employers and employees.
Cloud-based services can be a
boon to worker collaboration, file
syncing/sharing, and productivity, but
such services require careful company
oversight.
In coming years, expect wearables
and various Internet-connected devices to increase mobility demands.
26
Understand BYOD
Despite its relative youth, BYOD has had
a monumental impact on organizations.
Not too long ago, it was more common
for companies to deploy, say, a fleet of the
same BlackBerry model to its workers, and
many companies retain this model for various mobility management purposes. By
contrast, BYOD ushered in an era where
employees are hopping on the corporate
networks with whatever personal device
they feel most productive with.
Beyond boosting productivity and employee satisfaction, BYOD is praised for
introducing potential costs-savings for companies because BYOD saves companies the
trouble of buying devices and associated
accessories. Another positive is that todays
increasingly tech-savvy workers are more
likely to troubleshoot their own device
problems or find a co-worker who can.
for company security, data integrity, compliance issues, and regulatory requirements.
The lack of control enterprises generally have
over personal devices accessing corporate
networks and data has led many to implement MDM (mobile device management),
MAM (mobile application management),
EMM (enterprise mobility management),
and other solutions to regain control.
Increasingly, experts point to EMM as
the future of corporate mobility. Gartner
dubs EMM the future evolution and convergence of several mobile management, security, and support technologies, including
MDM, MAM, application wrapping, containerization, and file sync/sharing. Gartner
says it eventually expects EMM will address
an array of mobility needs spanning various
smartphone, tablet, and PC OSes.
Similarly, Christian Kane, Forrester
Research analyst, believes EMM will eventually be part of workspace management
solutions that address mobile and PC management aspects. You need application access and data access regardless of the device
youre using at that moment, he says. So
companies will look to manage things like
access, policy, and security across all of these
things in a much more consistent way.
Forrester has noted that EMM improves
upon legacy MDM solutions in three main
areas: security, support, and experience.
Where experience is concerned, Forrester
states the ability to make application recommendations to employees, provide automation and self-service abilities, and enable IT
to roll out and integrate services quickly will
make EMM more enticing to companies.
Chris Silva, Gartner research director,
notes that via just one console, EMM suites
enable managing multiple policies and enforcement methods, which is essential to
managing mobility on a large scale. As mobile OSes mature, he says, more control is
being placed natively into the device. This
27
28
Certied Piedmontese beef tastes great: lean and tender, juicy and delicious.
But theres more to it than just avor. Certied Piedmontese is also low in fat
and calories. At the same time, its protein-rich with robust avor and premium
tenderness. Incredibly lean, unbelievably tender: Its the best of both worlds.
piedmontese.com
KEY POINTS
A new school of thought about big
data posits that the most valuable data
isnt necessarily the massive amounts
of data organizations already possess.
Some experts argue that the most
valuable business data arrives as a
constant influx from mobile devices,
social networks, and Internetconnected machines.
Apache Hadoop is viewed by some
as a vital part of any big data environment, because it handles large-scale
storage and processing well.
Historical data can have a great
deal of relevance, such as in tracing
the success history of a specific mechanical part. Real-time data can be
more important when tracking competitors and customer response.
30
A Matter Of Context
John Myers, research director with
Enterprise Management Associates,
describes a scenario that depicts how
old datawhich he frames as traditional, structured data a retailer might
pull from a POS (point of sale) system
combines with new, multistructured
data, such as that generated by a customer using the retailers mobile app.
This might include what the customer
is saying about the retailer via social
networks, portions of the mobile app
the customer is surfing to, and where
the customer is in a location-based-service perspective.
Say a home improvement retailer
wants to cross-sell or up-sell to a customer, Myers says. Here, real-time data
is extremely important. For example,
if the retailer knows the customer has
its app on, is driving down the street
nearing a competitors store, the retailer
could entice him with a real-time offer
to visit one of its locations instead. If the
Get Agile
Boris Evelson, Forrester Research
vice president and principal analyst, says
statements about new data being more
valuable or old data being less valuable are essentially simplified ways of
addressing a more complex issue. The
new business mantra isnt about historical vs. real-time data or small
volumes vs. large volumes, Evelson
says. Rather, its about business agility
31
in the sense of being able to do something very fast but also being able
to turn around on a dime and rebuild
it from scratch very fast again, because
otherwise were going to lose our customers to competitors, he says.
Evelson says differentiators between
new, more real-time big data and historical-type data is just one part of the
equation in the overall business agility
theme. Broadly, Evelson says, weve entered the age of the customer, meaning
while internal business processes (finances, HR, etc.) are still important, customer-facing processes really trump all
that. Evelson says todays customer is
empowered with mobile phones and has
cloud-based access to your business and
all your competitors, and they really can
switch from one service provider, or one
product to another, literally with a click
of the button on their mobile phone. So
basically customers rule.
Business agility, or being able to adjust and adapt to ever-changing customer demands literally on a dime or
at the speed of thought, is what will
set successful businesses from less successful ones, Evelson says. Data professionals must ask what they can do to
support business agility, he says. The
answer is embracing a complete framework that enables agile BI (business intelligence), agile business analytics, and
agile big data, he says. Data agility isnt
just about technology including from
32
SPEED OF CHANGE
You use CyberTrend
to keep tabs on the latest
.COM
Get the latest issue right now
online at www.processor.com
or on your iPad via the iTunes Store.
Greenovations
ENERGY-CONSCIOUS TECH
The technologies
that make our
lives easier also
produce some
unwanted side
effects on the
environment.
Fortunately, many
researchers,
manufacturers,
and businesses
are working to
create solutions
that will keep us
productive while
reducing energy
demands to lessen our impact on
the environment.
Here, we examine some of the
newest green
initiatives.
Toshiba and IHI Corp. are designing turbines that will float in, and be driven by, currents in the ocean.
34
Solpro Says Its New Helios Smart Is The World's Fastest Mobile
Solar Power Recharger, Able To Recharge Phones In 90 Minutes
Solar-power charger company Solpro says its new Helios Smart solar-powered
charging unit is able to charge products more than four times faster than other mobile solar-powered chargers and can fully recharge a depleted smartphone battery in
about an hour and a half of sunlight. Solpro says this the Helio recharges about four
times faster than most other chargers. Able to charge smartphones, tablets, music
players, and similar mobile products, the Helios Smart also can charge two products
at once. The charger comes with built-in patent-pending technology that allows it to
examine multi-product charging situations and prioritize charging order so that attached devices are charged as quickly as possible. A special trifold design allows for the
maximum solar surface in a minimal space,
and the charger can be folded up like a wallet
to fit into your pocket. At night, you have the
option of recharging the charger using USB.
The Helios Smart weighs 0.63 pound.
35
36
Recover Value
Hardware typically covered under IT
asset recovery includes PCs, laptops, servers,
monitors, fax machines, copiers, printers,
smartphones, and tablets. Increasingly,
wearables and IoT (Internet of Things)related devices are also included. For many
companies, donating such equipment to
charities, schools, etc. is a viable disposal
option with possible tax breaks. Further,
says Sandi Conrad, Info-Tech Research
Group director, many ITAD providers will
manage the process, including properly licensing OSes, ensuring equipment works,
and transferring the equipment.
Traditionally, though, IT asset recovery has meant getting value back from
unwanted equipment. This is changing
as useful life spans for equipment are extending. Companies, for example, are
keeping PCs and servers five or more years
vs. three. Thus, ITAD providers are receiving older assets with less resale value.
Conrad says some disposal companies do
work to recover value beyond equipments
seven-year range, though recovering significant value is less likely if extending the
process this long.
Also impacting the recovery value of
PCs/laptops currently is that more companies are replacing them with mobile devices,
thus driving PC/laptop prices down and
diminishing their recovery value, says Rob
Schafer, Gartner research director. In general, recovering value may be possible for
four- and five-year-old assets if an ITAD
provider excels at extracting value from precious metals used in them, although the
precious metal market is also declining due
to manufacturers using less of such metals.
An oddball exception to the declining
recovery trend is mobile devices, Schafer
says, primarily because end users tend to
replace them after two or three years, well
short of their actual useful life. Thus, ITAD
providers receive younger equipment.
Further, mobile devices have smaller footprints, making them more economical to
ship to where resale markets reside. Many
larger ITAD providers have integrated
mobile devices into their existing documentation, dismantling, recycling, and resale
processes, Conrad says.
Given the declining recovery value for
most IT hardware, Schafer says, executives
expecting to receive checks and not invoices following recovery processes should
change their thinking because the trend is
the exact oppositedisposal costs may well
outweigh recovery revenue. What's more,
the cost of properly performing ITAD
meaning compliance with local data-security and environmental regulations and
ensuring strong, secure chains of custody
and transportationare increasing substantially, he says. Therefore, Schafer recommends realistically budgeting disposal costs
up front, when purchasing assets.
Whats In A Provider
Among the positive traits to look for
in an ITAD provider is its ability to
37
Internet Connection
A strong, stable Internet connection
is the foundation on which you will set
38
Wireless Router
If you plan to use one wireless
router to support two separate networks, look for a business-class router
that supports a maximum data transfer
speed of at least 300Mbps; some
models will support much faster rates.
The most recent Wi-Fi standard available as we went to press is 802.11ac,
which has been shown to offer realworld data transfer rates of 600Mbps
and better when communicating with
devices using 802.11ac adapters.
A dual band router is a good option
because it operates on both the 2.4GHz
frequency (which most current and
older devices support) and the 5GHz
frequency (which 802.11n/ac devices
support, and which offers the fastest
data transfer speeds). Most dual-band
routers offer the choice of broadcasting
in 2.4GHz, 5GHz, or both simultaneously to support the widest range of
devices and prevent signal interference.
Many consumer- and business-oriented routers let you easily create two
separate networks: one you can use
for your companys internal network,
and one you can use to provide wireless Internet access for guests with WiFi-enabled devices. Wireless routers
and access points can range in price
from $20 to as much as $300 or more
depending on their speed and feature
sets, so make sure you only pay for
functionality that you and your customers or visitors are likely to use.
Software
All wireless routers come with a
software or firmware-based user interface that enables you to change the
routers settings. Some software might
be included on a disc or accessible only
via a Web browser and the routers
default IP address. When attempting to
access the settings menu, always follow
the instructions specific to your device.
Most often, you can launch a Web
browser on the computer connected to
the router, type the IP address for your
router into the address bar (a commonly used IP address 192.168.1.1, but
this can vary by device), log in, and
Setup
Once you have all of the hardware
and software you need for a Wi-Fi
hotspot, its time to get it up and running. Most mainstream routers sold
in the U.S. have software that is intuitive to use and makes it simple to add
a guest hotspot. With some routers,
Security
Perhaps the most important thing to
think about when setting up a public
Wi-Fi hotspot is to make sure that
your guest hotspot is separate from
your company network. Most routers
support WEP (Wired Equivalency
Privacy), WPA (Wi-Fi Protected
Access), and WPA2 technologies,
which provide for encryption and password protection. Use one of these settings as a minimum safeguard from
potential unauthorized access or abuse;
we recommend using WPA2 as it provides the best security.
From a guests perspective, Wi-Fi
security means that they will have to
select the SSID (service set identifier,
or network name) if it's visible, or type
it in when connecting if the SSID is
hidden, as well as enter a password in
order to log on to the network. To simplify matters, make sure your guests
know how to obtain a password, and
change the password on a regular basis.
Requiring guest users to accept a
ToS (Terms of Service) agreement can
also be beneficial. You can do this by
employing a captive portal, a common
feature of business-class routers, which
is essentially a splash page users will
see on their device screen when logging
on to the network.
Other Considerations
Using router settings, you can impose bandwidth controls to protect
your other networks from experiencing
a bottleneck. You can also set guest
connection time limits and designate
which websites or applications are
permitted to use the hotspot and even
charge fees for using the hotspot. Once
you have installed any necessary hardware (routers, range extenders, and access points), adjusted the settings, and
turned on your guest Wi-Fi network,
its ready to be discovered and used.
39
KEY POINTS
UTM (unified threat management) has traditionally appealed
to SMBs due to solutions integrating multiple security tools in
one appliance.
For security personnel, UTMs
consolidated approach means
only one appliance to monitor
and manage.
Depending on the solution,
there can be significant overlap in
features and functionality among
UTM and next-generation firewall
solutions.
NGFWs (next-generation firewalls) are generally considered as
offering higher performance than
UTMs and are geared toward enterprise organizations.
40
SIMPLICITY. COMPREHENSIVE. Consolidation. Integration. Centralized control. These are but a few terms used to
describe UTM (unified threat management), a security approach traditionally
popular with smaller companies due to
its integration of multiple security technologies in one appliance. For companies,
UTM means having just one solution (vs.
many) to install, monitor, and manage.
Increasingly, larger enterprises are
adopting UTM solutions, albeit those
generally offering advanced features. Its
these features that are largely the source
of confusion about how UTM differs
from NGFW (next-generation firewall)
offerings. This article explores these and
other issues concerning UTM.
UTM solution. The hardware, for example, may be purpose-built and use
ASICs (application-specific integrated
circuit) to perform specific functions or
be more generic and use COTS (commercial off-the-shelf) processors to keep cost
down and maintain product flexibility.
ASICs are considered to provide the
highest level of performance because
they use hardware to accelerate specific
functions that a general processor would
perform at an average rate, Rodriguez
says. At least one UTM vendor using
generalized hardware, however, claims
its closing the performance gap by using
integrated features in COTS processors,
he says.
Software in a UTM solution can be
a combination of technologies from
different vendors or from one vendor,
Ayoub says. The one common thread
among all solutions today is they require
some sort of subscription service to keep
the device up-to-date with current threat
information, he explains.
Beyond the traditional hardware-software appliance, virtual UTM appliances
are gaining momentum, Rodriguez says.
These lack some performance acceleration that dedicated hardware provides,
but theyre necessary to inspect traffic between virtual machines and other virtual
environments, such as public and private
clouds, he says. Elsewhere, Ireland expects
companies will start looking to the cloud
for UTM, though presently customers
are still hooked on the buzz of it.
Problems Solved
The primary problems UTMs were
designed to deal with was that there
were just too many security applications
at the gateway, and it was becoming difficult to manage all those, says Charles
Kolodgy, IDC research vice president,
secure products. For example, an organization might have had five pieces of
hardware. UTM was designed to reduce
the number and centralize management.
Rodriguez says the appliance sprawl
organizations faced resulted in administrators being overwhelmed with managing so many solutions, to the point
they couldnt. Appliance sprawl also
41
42
KEY POINTS
Many CISOs/executives arent
aware of security risks possible in a
virtualized environment. Some who
are may be limited in their authority
and ability to protect against them.
One concern regarding security
in virtual environments is attackers
gaining access to a virtual machine
console.
A key issue that executives face
is their organizations security tools
not extending coverage, management, and policy creation into virtual
environments.
Finding a consulting agency that
employs penetration testers versed
in testing virtualized environments is
one approach to starting to improve
security in a virtualized environment.
Growing Concern
While publicity may be lacking, concerns about security threats in virtual environments are real. According to Kyle
Prigmore, Enterprise Strategy Group associate analyst, 69% of 315 enterprise IT
and information security professionals
the firm surveyed in 2013 reported being
concerned or very concerned about a
virus or other type of malicious code infecting desktops or servers.
Gartner research director Eric Ahlm,
meanwhile, detailed in a recent article five
security concerns related to server virtualization that impact network security, one
being the use of non-virtualized network
security controls in a virtual network,
something that can break the cloud.
Another concern is a vulnerability in the
hypervisor circumventing all network security contained within it. A similar risk
resides with the concept of the virtual
environments super admin that could
override virtual network access controls
without impediment, Ahlm writes.
43
Whats At Stake?
To illustrate the seriousness of concerns, The CISOs Guide To Virtualization Security from Forrester Research
details a 2011 security incident in which
a fired IT administrator at a pharmaceutical company used a service account
to access the companys network. Using
an unauthorized installation of a virtualization platform, the former employee
deleted 88 virtual servers that held a majority of the companys computer infrastructure, effectively freezing operations
for days and leaving employees unable
to ship product, cut checks, or communicate by email.
Forrester states while many CISOs
arent aware of virtualization security
risks, some who hold concerns lack authority or influence regarding infrastructure and operations to enforce policy
or implement new security controls.
Forrester also writes that most security
professionals possess limited knowledge
about the usefulness and availability of
virtualization-aware security solutions.
Some security professionals, especially
CISOs and other security leaders who
have risen up the technical ranks, lack
the confidence in virtualization knowledge they desire, according to Forrester.
This is particularly the case when we
compare virtualization with more mature
security areas, such as network security.
Security controls that are embedded, or otherwise integrated into the virtual systems management, do better
than those that are just standalone security islands.
ERIC AHLM
Research Director : Gartner
Chief Dangers
Compared with traditional security
configurations, dangers for a virtualized
environment can differ. Virtualized components are just like their physical counterparts but with several additional items
to worry about, Sanabria says. Beyond
potential vulnerabilities concerning
a physical server, theres a worry about
the guest tools software installed on
its virtual counterpart, he says. Further,
there have been a few virtual machine
escape vulnerabilities that could allow an
44
45
KEY POINTS
Documents that you throw out,
such as old financial and medical
records, might provide enough
information for a criminal to steal
your identity and access your
accounts.
Be particularly careful with health
care documentation, as it might contain birth dates, policy numbers, and
billing information thats extremely
valuable to identity thieves.
Many identity thieves are interested in gaining access to your
finances, while others will impersonate you for criminal activities.
Collect all evidence of identity
theft, including canceled checks,
suspicious emails, and credit card
statements.
46
Information Gathering
There are a number of ways in which
criminals can find the information they
need to steal a persons identity. They
generally prefer the easiest routes possible and often start looking for the information online. A first easy place to get
information is through social networks.
People can reveal a lot of personal information about themselves that can be
easily aggregated, says Menting. Many
people will list their birthdays, current
jobs, and relationship statuses (including
significant others names) in the publicfacing profile.
Automated phishing emails and calls
are another relatively effortless method
employed by crooks. Scammers attempt
to lure you into providing password and
other personally identifiable information
by impersonating a legitimate company
or individual, says Gravelines. Phishing
scams are often given away by suspicious
threats and prompts that the recipient
click links or provide credit card information over the phone or by email instead advising a person to call his bank or
log into his online account.
Cybercriminals might try to obtain the
information directly from the source by
hacking into an organization that holds
The Tip-Off
Being on the receiving end of a
phishing email may make it seem like
youre being targeted for identity theft,
but typically, the automated emails are
sent to hundreds of random email addresses. That being said, not all phishing
emails are random. Menting says, When
you start receiving very personal phishing
emails that are directly related either to
your career or your hobbies, or reference
very specific details of your private life,
you may start to worry.
Phishing emails can be tailored to
match the look and style of the emails
you might receive from a legitimate company. Theres a trend now for phishing
emails that purport to be an invoice for
something you have ordered. You just
need to take the time to think back if you
have actually ordered anything or if you
recognize the name at all, says Menting.
If your business starts receiving targeted
phishing emails, its a good idea to alert
47
Information Application
So, lets say a criminal has successfully found the credentials necessary to
steal your identity. What next? In general, an identity thiefs goal is to steal
your name and other personal information with the intent of gaining access
to finances, incurring debts, or impersonating you for other fraudulent purposes, says Gravelines. Criminals can
use your personally identifiable information to log in to sensitive websites,
such as online banking sites. Once in
control of your accounts, the criminal
can make changes to gain complete control. For example, he might alter your
mailing address, and of course, change
login credentials, so you cant access
your account.
If account takeover isnt pos sible, crooks will move on to the next
best thing: creating a new account.
Gravelines says that criminals might
open a new cell phone plan under your
name and credit card, call organizations
posing as you to acquire even more information, get medical treatment, or
avoid a criminal record by providing
your name and drivers license. In effect, the criminals cover will be your
identity. As the victim, youll be left to
48
Recommended Action
If you notice fraudulent charges on
your financial accounts, your first step
is to contact your bank, as well as credit,
phone, and utility companies to close or
freeze any accounts the thief has taken
over. If false accounts, credit, or loans
have been opened in your name, youll
also want to immediately go to the police
and report the crime to the department
with jurisdiction. Get a copy of the police report to provide proof of identity
theft when contacting other organizations, says Gravelines.
After youve contacted the appropriate
creditors, banks, and utilities, you might
report the identity theft to the Federal
Trade Commission (877-438-4338) and
provide one of its representatives with
the details of your case. The FTC wont
resolve any individual identity theft cases,
but your report could help overall law
enforcement action against identity theft.
Preemptive Action
[Individuals] should make sure that
they have adequate insurance in place,
or that at the very least, the services and
organizations with which they share
their data has adequate anti-fraud and
security risk policies in place to counter
against such eventualities, says Menting.
If you feel a company or financial institution doesnt provide enough protection
against identity theft, you might be better
served to find one that does.
KEY POINTS
Despite the importance of
applications and systems to organizations, many dont have DR
(disaster recovery) plans implemented, let alone test their plans.
Key to creating an effective DR
plan is getting involvement from
all the right departments and
personnel and obtaining the right
information.
Vital to any DR plan is prioritizing systems, applications,
data, etc. in terms of business
continuity.
Accounting for the types of
disasters that are probable and
which systems to include are key
to DR plans.
All Aboard
Before deciding what to include in
a DR plan, its important to first determine whom to involve in planning. The
answer isnt just IT. Though your ITs
input is key, IT doesnt necessarily know
in which order computer systems should
be restored for business operations,
says Roy Illsley, Ovum principal analyst. He advocates forming a cross-business unit team headed by IT or a Chief
Risk Officer.
Similarly, consultant Dr. Steve Goldman of Steve Goldman Associates says
because a quality DR plan has an enterprise-wide impact, every department
49
should provide input to meet RTO (recovery time objectives). IT cant and
shouldnt do that, he says. Prior to a
disaster, each department must understand the impact of DR plan implementation on its operations and staff.
Ideally, all LOB (line of business)
managers who oversee applications that
a DR plan will protect should participate, says Dave Simpson, 451 Research
senior analyst, including by signing off
on service-level agreements for applications and determining RTOs and RPOs
(recovery point objectives). Notably, the
lower the RPO/RTO times, the more expensive the DR setup, Simpson says.
Ashar Baig, research director at
Gigaom Research, also emphasizes obtaining each departments feedback concerning RTOs/RPOs, because these are
specific to application types and should
go into plans. A department should indicate, for example, that it needs, say,
its customer relationship management
program restored within four hours after
a disaster to resume business continuity.
Thats not for IT to decide, Baig says.
Further, business-critical priorities for
applications must be conveyed to service providers the company uses and
stipulated into contracts as part of a DR
plan. The DR plan is no good until the
service provider agrees with this, signs
the contract, and theres teeth within the
contract for noncompliance, Baig says.
David Hill, Mesabi Group founder,
says CIOs can help target representatives from operations, application development, technical support, and
other units who are essential to DR for
planning purposes. Additionally, corresponding C-level executives in business units, legal, human resources, and
auditing should assign representatives.
Overall, any unit a disaster would potentially impact should have skin in the
planning game, says Hill. Depending
on the enterprises size and complexity,
multiple people with DR planning skills,
experience, and knowledge should be
involved to help ensure the plans validity, integrity, and completeness. Such
expertise can come from existing employees with proper training; through
50
What To Include
Developing a DR plan thats wellsuited to the enterprise is vital. Though
purchasing a generic plan from a consultant is an option, youll get a generic
response, Goldman says. This strategy
is guaranteed to fail. DR plans must be
specific to the organization.
What information needs to be gathered largely depends on whether the enterprise already has a DR plan in place
or is creating its first one. If an existing
plan only requires some fine tuning,
Hill says, the DR team will probably
know what information is necessary. If
a major overhaul is required, however,
a team may feel its almost starting from
scratch. Overall, capturing information
for the initial DR plan is daunting, Hill
says. Further, theres a danger planning
will be nickel and dimed if executives
arent committed or feel theyre being
forced to participate.
Broadly, planning requires understanding the hardware and software
assets the company has, the relative
business priority of these assets, and
how the assets relate to one another,
Illsley says. Organizations must also understand when an asset will and wont be
needed following a disaster. Quarterly
business reports, for example, may be a
high priority at quarters end but not at
the beginning of the next quarter. Once
assets are known, Illsley says, a risk profile that accounts for who uses an asset,
where, and how should be assigned to
each asset. This level of information will
enable the organization to start to look
at possible solutions, Illsley says.
51
KEY POINTS
Organizations large and small
have a need for the secure and
flexible storage options that a NAS
(network-attached storage) unit
provides.
Building a NAS system can be a
simple and inexpensive way to bolster the integrity and security
of your organizations data.
Using RAID (redundant array of
independent disks), or a file system
that performs some form of data
redundancy, is vital to any good NAS
device strategy.
When purchasing a third-party
NAS unit, you commonly have the
option to supply your own HDDs
(hard disk drives) or buy a unit that
comes with drives already installed.
52
users can change settings and configurations remotely using a Web-based interface similar to the kind used to configure
wireless routers.
53
Benefits Of A Purpose-Built
Machine
If your organization needs a particularly large NAS device, you may want to
focus on a purpose-built machine rather
than going the DIY route. PCs tend to
have somewhat limited storage expansion
capabilities. Depending on the NAS appliance you select, you can have a dozen or
more bays which you can populate with
HDDs or SSDs in a variety of sizes, up to
3TB or more, so capacity is very flexible.
Third-party NAS vendors can also
help you determine how much capacity
is necessary to meet the organizations
needs. Post setup support and a clear
54
Security, A Surety
Like everything else connected to your
network, security is an important consideration when looking into setting up
a NAS unit. If you plan to use the NAS
system for proprietary data, customer
records, email records, and anything else
that falls under compliance regulations,
then data must be restricted to all but
authorized users. NAS software typically
offers users the ability to allow or block
guest access. Data encryption is another
security measure that you should enforce
for the most valuable data.
Naturally, A NAS
Expanding storage can seem like more
trouble than its worth. When properly
configured, however, an inexpensive
NAS system can be a set-it-and-forget-it
proposition that adds convenience, security, and new levels of data availability to
all the right employees.
NAS software like the type that FreeNAS offers can display useful logs,
such as system load, available disk space, and uptime.
Enterprise Backup
NOTEWORTHY ABILITIES, DEVELOPMENTS & VARIATIONS IN SOLUTIONS
KEY POINTS
While the gap in features and abilities between high- and low-end enterprise backup solutions has narrowed,
features among vendors solutions
still vary.
Compared to years ago, more
delivery models are available today
for backup solutions, including cloud
options and purchasing from different
types of vendors.
When looking at backup solutions
check each solutions support matrix, or ability to support a companys
applications, OSes, and hypervisors.
Automation, deduplication, compression, disk-to-disk-to-tape, cloud
computing, and virtualization are noteworthy features available in todays
enterprise backup solutions.
Changing Times
With regard to backup and storage
in general, Russell uses the term compressed differentiation to note that
differences between high- and low-end
solutions have narrowed, or become
compressed, over the years, with capabilities moving down market and becoming more accessible. Conversations
around backup have also changed. A
decade ago, Russell says, when listening
to an organizations requirements, hed
say, Oh, this is kind of the land of the
killer feature, one of unique capability,
and if not unique, one that only the
large, major providers could actually
deliver. Today, he says, he can rattle
off a half dozen or more vendors, as well
as numerous delivery models (cloud,
buying from hypervisor or pure-play
storage vendors, etc.).
55
Primary Considerations
Commonly, experts regard backup as
one piece of a broader data protection
puzzle. In turn, data protection is about
disaster recovery, business continuity,
data retention, governance, and other
issues, says Russ Fellows, Evaluator
Group analyst and senior partner.
Enterprise backup applications are just
one tool for solving these needs. One
reason traditional backup products have
achieved and retained their preeminent
recognition is their use of policies for
56
With automation removing many errors and data reduction techniques in place, sites can protect the same
amount of data with fewer backups.
MIKE KARP
Vice President & Principal Analyst : Ptak Associates
AVOID MISTAKES
Among the mistakes enterprises
make when devising and implementing backup plans is focusing on
a particular technology or solution
before understanding associated
backup problems and expectations.
Other mistakes: not accounting for
all of the data they need to protect,
or backing up data they dont need
to. Yet another often-cited mistake
is not testing recovery processes.
Simply making backup copies and
checking theyre being stored isnt a
valid strategy, much less a disaster
recovery capability, says Russ
Fellows, Evaluator Group analyst and
senior partner. If an application requires a one-minute recovery point
objective and 30-minute recovery
time objective, for example, test
this regularly. Too often companies
assume that copying data implies
theyre protected, when too often
that isnt the case, Fellows says.
57
58
Compact Wireless
Speaker, Big Sound
US.CREATIVE.COM
If you'd like to fill a small space with big
sound for a reasonable price, Creative has you
covered with its Sound Blaster Roar (formerly
$199.99, now $149.99). The Roar uses either
Bluetooth or NFC (Near Field Communications)
to connect wirelessly with an audio system,
smartphone, tablet, or other compatible device.
Although the Roar measures at a modest 2.2 x
7.9 x 4.5 inches (HxWxD), it features two frontfiring drivers to spread high frequencies forward, as well as an active top-firing mid-range
and bass driver to deliver full sound, with rich
bass even at low volumes. The Roar also includes a built-in microphone with 360-degree
voice pickup (which enables it to perform as a
speakerphone) and a voice recorder with onetouch control, among other enticing features.
59
Images, clockwise from top left, courtesy of Apple (1), Samsung (2), Sony (3), Microsoft (4, 5), and BlackBerry (6)
Smartphone Tips
A ROUNDUP OF POPULAR HOW-TOS
BLACKBERRY
Transfer BBM Contacts To A New
BlackBerry 10 Smartphone
If you are using BlackBerry Messenger
7.0 or later, all of your BBM contacts
are backed up online. This simplifies
the process of transferring contacts to a
new BlackBerry 10 device. On the new
smartphone, all of your contacts will automatically be transferred when you set
up the phone using the same BlackBerry
ID and password used on your previous
phone. BlackBerry does not permit the
use of two different BlackBerry IDs on a
single smartphone. If you have set up a
BlackBerry 10 smartphone with an older
BlackBerry ID and you would like to use
a newer BlackBerry ID instead, you must
first perform a security wipe, which is
available in general settings. Then set
up the device again, this time using the
newer BlackBerry ID and password.
60
ANDROID
Delete App Shortcuts
Although it hasnt received much attention following a small amount of fanfare surrounding its release, the Google Keep service lives on as a Web-based
service for maintaining notes via desktop computers and mobile devices. Notes
can contain combinations of text, bullet lists, checklists, pictures, reminders,
and more, with a modicum of formatting tools available, so its a handy way
of keeping track of projects, tasks, and thoughts. You can start using Keep by
accessing the online service at keep.google.com or by using the app, which is
available for Android smartphones and tablets via the Google Play store. As with
Gmail, you can archive notes you dont presently need but want to hang on to
for later. The app interface is intuitive, enabling you to quickly create notes on
the go. You can tap the menu icon and then tap Archive to view archived notes;
the menu provides access to reminders and deleted notes, as well. Notes are also
searchable, but cannot be tagged or downloaded as they can using other notetaking services and apps.
Although it hasnt received much attention following a small amount of fanfare surrounding its release, the Google Keep service lives on as a Web-based
service for maintaining notes via desktop computers and mobile devices. Notes
can contain combinations of text, bullet lists, checklists, pictures, reminders,
and more, with a modicum of formatting tools available, so its a handy way
of keeping track of projects, tasks, and thoughts. You can start using Keep by
accessing the online service at keep.google.com or by using the app, which is
available for Android smartphones and tablets via the Google Play store. As with
Gmail, you can archive notes you dont presently need but want to hang on to
for later. The app interface is intuitive, enabling you to quickly create notes on
the go. You can tap the menu icon and then tap Archive to view archived notes;
the menu provides access to reminders and deleted notes, as well. Notes are also
searchable, but cannot be tagged or downloaded as they can using other notetaking services and apps.
61
I OS
AirPrint Advice
The iPhone has had the ability to print to a wireless printer since the iPhone
3GS, but for many of you, the ability to print from your iPhone remains a mystery, something that appears to require special incantations and the proper
phase of the moon. In reality, most of the problems that individuals experience
when trying to print from their iPhones are caused by using the wrong type of
printer. The printer must support AirPrint protocols, and must be connected
to the same Wi-Fi network as the iPhone. You can check the printers manual
or the manufacturers feature list to ensure that it supports AirPrint. If it does,
heres how to print from your iPhone.
The AirPrint-enabled printer must be connected directly to your Wi-Fi
network. It cant be connected indirectly through a Mac or PC, or through a
third-party wireless printer adapter. To print from your iPhone, bring up an app
and select the page you wish to print. Tap the Action button, then tap the Print
button. In the dialog box that opens, configure any relevant printer options,
such as page size or number of copies, and then tap Print.
62
WINDOWS PHONE
At A Loss? Tap & Hold
Cortana, new with Windows Phone 8.1 smartphones, is designed to be your digital personal assistant.
63
Facebook
When setting up a Facebook profile,
the service asks for a lot of personal informationincluding education history,
64
Twitter
By default, Twitters account settings
make your tweets available for all to see.
The alternative is a protected mode, where
your tweets are only visible to your approved
Twitter followers. Protected tweets are also
not retweetable, so even approved users cant
share your tweets. You also cannot share
permanent links to your tweets with anyone
but approved followers. If you want to use
Twitter to drive Web traffic, the restrictions
in the protected mode might undermine why
you joined Twitter in the first place.
If you want to adjust your tweet privacy level, or the other privacy controls on
Twitter, start by signing into Twitter and
bringing up your account settings. Next,
click Security And Privacy and scroll down
to Privacy. If you only want approved followers to see your tweets, click the Protect
Google+
For Google+, privacy has been a key consideration from the very beginning. For example, youve always been able to assign a
privacy level for each post you share. And
based on the Circles (friend groups) youve
set up, its easy to share content with only
a specific crowd. Google+ also offers detailed privacy settings where you can control most every aspect of your profile. Visit
your Google+ page, click your name, select
the drop-down menu under the Google+
logo, and choose Settings.
In the Settings window, you can customize who can send you notifications,
comment on your public posts, and manage
subscriptions. If you want to configure the
audience settings for your posts, photos,
and profile updates, scroll down to the Your
Circles section and click Customize. By default, Google+ pushes updates to the people
in your Friends, Family, and Acquaintances
groups. To block a particular group, remove the check from the checkbox. If you
want to reach a larger group of people, you
might want to add a check to the Following
checkbox, so followers of your Google+
profile will be added to Your Circles list.
Next, scroll down to the Profile section.
Here, you can configure how people are able
to find your profile and control what content is displayed in your profile. A setting of
interest for businesses is the Allow People
To Send You A Message From Your Profile,
as this setting offers a way for consumers to
reach out to you. If the setting is limited to
Your Circles or Extended Circles, customers
might not be able to contact you.
If you use Google+ on your mobile
device, youll also want to examine the
Location Settings section. These settings let
you enable or disable location reporting via
your smartphone and tablet. If enabled, you
can control who can see your current city
and/or exact location. The precise location
is ideal for those who wish to share their
location with friends and family. If thats
LinkedIn
The business-focused nature of LinkedIn
ensures that privacy is a priority. To examine your settings, log in to LinkedIn,
hover your cursor over your profile photo in
the right-hand corner, and select Manage,
which is next to the Privacy & Settings
heading. Scroll down to Privacy Controls
and youll find a host of options to control
what others can see on your profile and
activity feed. For example, you can turn off
activity updates that let other connections
know when you make a change to your profile or follow another company.
If you use LinkedIn to search for
new clients and key connections within
an organization, you can opt to remain
anonymous, so people wont know that
you looked at their profile. To do so, click
Select What Others See When Youve
Viewed Their Profile. There are two anonymous options, one where others will see
an industry and title, or you can opt to
be completely anonymous. You can also
manage who can follow your updates, edit
blocked connections, and shut down users'
ability to view your connections.
65
Understand Roaming
Roaming occurs whenever a wireless carrier other than your own provides your device with a cellular signal.
International roaming rules and rates
are typically different from those that
apply in the U.S., so here's the No. 1
66
Barring that, bring your carriers tollfree customer service phone number
with you; if you have any doubt as to
how your plans roaming rates work
when traveling, use a local phone to call
that number and find out.
67
YOURE READY TO give your presentation, but until that first slide appears on
the big screen, you can never be sure
that your equipment has got your back.
We cant tell you not to worry, but these
handy tips should help bail you out if
your presentation goes south.
68
Sound. Some HDMI and DisplayPort digital video connections can carry
audio through the same port, but both
notebook and projector must support
audio over the digital video connection.
Traditionally, audio is connected using
the notebooks audio out jacks and the
projectors audio in ports; both of these
are often RCA or 3.5mm. If youre not
using the projectors built-in speakers,
make sure you connect your notebooks
audio out to the sound system you intend to use and turn the volume down
on the projectors speakers.
Network Connection
Many venues supply network projectors, which are made available as a
shared resource. Making a connection to
a network projector is as easy as plugging
your notebook into the corporate network via wired or wireless Ethernet.
Check with the companys IT staff for
specifics. Once connected, use the network connection wizard in Windows 7 to
find the projector you wish to use:
Click Start (the Windows button
in the bottom-left corner of the
screen).
Click All Programs.
Click Accessories.
Click Connect To A Network
Projector.
The network connection wizard
may inform you that your notebooks firewall is blocking the
ability to connect with the projector. Click to establish the network connection.
Either have the wizard search for
available network projectors or
enter the projectors address manually if it is available.
Once connected, a Network Presentation window will minimize to your
Taskbar. When youre ready to make your
presentation, open the Network Presentation window and select Resume. Your
notebook will treat the network projector
like an external monitor.
NOTEBOOK-PROJECTOR
TROUBLESHOOTING TIPS
Turn off all equipment before
connecting the notebook to the
projector.
If possible, use a digital
connection to ensure a highquality presentation.
If youre not using the projectors built-in speakers, turn
them down and connect the
notebooks audio out to the
sound system.
No Video
In many cases, your notebook will
detect that you have a projector plugged
into one of its video outputs and will
automatically turn on the port. Not all
notebooks do this, however; and even
those that can still have missing video
if the notebook isnt set to duplicate the
Desktop or extend it to the secondary
monitor (the projector). Many notebooks use a function key combination
to toggle the projector port on or off
and set how you can use the display. We
recommend using the control panels
in Win7:
Right-click a blank area on the
Desktop.
Select Screen Resolution.
Select the second display from the
drop-down menu.
Select Extend These Displays from
the Multiple Displays drop-down
69
Hotspot Troubleshooting
Ordinarily, when you carry your
laptop into an airline lounge, it will
automatically connect to the available Wi-Fi hotspot. But what if that
doesnt happen? First, check that your
notebooks Wi-Fi adapter is turned on.
Often, youll see a backlit Wi-Fi icon
near the keyboard. If the icon isnt illuminated, look for a physical switch
that you can flip to enable the adapter.
Sometimes, the state of your network
connection is easily determined by
an icon in the notification area of the
Taskbar. For instance, a red X on the
70
A Touchy Touchpad
If you use your laptop on a dock
(and use an external mouse and keyboard), you can go weeks or months
with a deactivated touchpad and never
realize it until you hit the road. If you
find yourself in this situation, you
An Unresponsive Keyboard
Or Mouse
If your programs and applications
dont respond to keyboard commands,
use your mouse to shut down the computer by clicking Start, then Shut Down
(in Win7) or tap the Power Button and
tap Shut Down (in Win8). Unplug the
keyboard from your PC and then reconnect it. Restart your PC to determine whether this process corrected the
problem. (If both input devices are unresponsive, you can press and hold the
Power Button on the tower to manually
shut down your system.)
If your mouse isnt responding, but
your keyboard is, press the Windows
key in Win7 to open the Start menu,
use the Right-Arrow key to select Shut
Down, and then press ENTER. In Win8,
press CTRL-ALT-DELETE, press the
Tab key until the power icon is highlighted, and then press ENTER. Unplug
your mouse and then reconnect it. (If
necessary, you can press and hold the
Power button to shut down the PC.)
Then restart your computer to see if
these instructions fix your problem.
If youre using a wireless keyboard
and mouse, ensure that the peripherals
are synced and in range of the wireless
receiver. You may also need to install
new batteries. If these steps dont enable
peripheral communication with the PC,
try reinstalling device drivers. You can
often download these from the mouse
and keyboard manufacturer websites.
71