Merry Christmas to all of you from all of us here at the West Chester Technology Blog. We are taking a break here until January 2, 2014. A new year will bring about a lot of great tech news. What will we see next in the tech world? What will be a hit? What will be a flop? Will Microsoft keep gaining market share in the smartphone world and will the Surface continue gaining momentum? Will wearable technology finally start to take off? Will cyber criminals keep making our digital lives miserable? What can Apple do to be cool again?
I for one cannot wait to see what happens and writing about it here.
I hope everyone has a great Christmas and New Year holiday. Enjoy your family, because just like I found out in October you never know what terrible turns and twists your life will take.
Stay Safe Everyone and Merry Christmas,
Bill
Tuesday, December 24, 2013
Saturday, December 21, 2013
I Shopped at Target, Now What?
So you shopped at Target between Nov. 27 and Dec.15, now what should you do? Here is some information that may help.
If your card information was compromised you are likely to notice small charges on your statement that show someone is testing out your card or targeted email scams. Be sure to look at your charges on your card and specifically for your debit card and make sure you change your PIN.
If you notice activity call your bank or credit card company and Target. They will report the activity to your credit card companies and call Target at (866) 852-8680.
I would recommend cancelling your card and requesting a new number. In addition it will be necessary to continue to monitor your account for the next six months for fraud.
Q: I shopped at Target during that time. What should I do?
A: Check your credit card statements carefully. If you see suspicious charges, report the activity to your credit card companies and call Target at 866-852-8680. You can report cases of identity theft to law enforcement or the Federal Trade Commission.
You can get more information about identity theft on the FTC's website at www.consumer.gov/idtheft, or by calling the FTC, at (877) IDTHEFT (438-4338).
Q: How did the breach occur?
A: Target isn't saying how it happened. Industry experts note that companies such as Target spend millions of dollars each year on credit card security, making a theft of this magnitude particularly alarming.
Experts disagree about how the breach might have happened. Avivah Litan, a security analyst with Gartner Research, says given all the security, she believes the breach may have been an inside job.
But thefts of this size are too big to be the work of company employees, says Ken Stasiak, founder and CEO of Secure State, a Cleveland-based information security firm that investigates data breaches like this one. Stasiak says that such breaches are generally perpetrated by organized crime or an overseas, state-sponsored hacker group.
Stasiak's theory is that the hackers were able to breach Target's main information hub and then wrote a code that gave them access to the company's point of sale system and all of its cash registers. That access allowed the hackers to capture the data from shoppers' cards as they were swiped.
James Lyne, global head of security research for the computer security firm Sophos, says something clearly went wrong with Target's security measures.
"Forty million cards stolen really shows a substantial security failure," he says. "This shouldn't have happened."
Q: Who pays if there are fraudulent charges on my account?
A: The good news is in most cases consumers aren't on the hook for fraudulent charges.
Credit card companies are often able to flag the charges before they go through and shutdown your card. If that doesn't happen, the card issuer will generally strip charges you claim are fraudulent off your card immediately.
And since the fraud has been tied to Target, it'll be the retailer that ultimately compensates the banks and credit card companies.
Q: How can I protect myself?
A: Like they say, cash is king. You can only lose what you're carrying, though admittedly many people may not feel safe walking around with a wad of bills in their pocket.
As stated before, credit card companies don't hold consumers liable for charges they don't make. Usually the worst thing consumers have to deal with is the hassle of getting a new credit card.
And the paper trail generated through credit card transactions can often make it easier do things such as return items you've purchased, or keep track of work-related expenses.
It's worth noting that while debit cards offer many of the same perks as credit cards, without the worry that you'll spend more than what's in your bank account, they often don't come with the same kind fraud protections.
As a result, those card holders may have a tougher time getting their money back if their number is stolen.
Q: How much is this going to cost Target?
A: It's too soon to tell. In addition to the fraud-related losses, banks may start charging Target a higher merchant discount rate, which is the amount retailers pay banks for providing debit and credit card services. While the percentage difference may be tiny, it could result in steep costs given the volume of transactions Target does, Litan says.
Litan added that the company could also face class action lawsuits from consumers, though most of them will be meritless, and fines from federal agencies. When combined, the costs of the breach could be so steep that they actually prompt Target to raise prices, she says.
"The real winner in this is Wal-Mart," she says.
Q: Can the bad guys be caught?
A: Stasiak says that given the sophistication of this attack, there's only about a 5 percent chance that the perpetrators will eventually be caught and prosecuted.
He notes that in cases like this, it's hard to determine where the attack originated and given the large mass of information involved it's not going to be found housed on someone's home computer.
Q: How can future breaches be prevented?
A: Litan says an easy way to prevent fraud would be to eliminate the use of easily cloned magnetic strip cards and upgrade to the kind of microchip technology used in most other parts of the world.
But she says banks have pushed back against the idea, because the microchip cards cost significantly more than the magnetic strip version and changing over all the country's ATMs could drive the total costs into the billions of dollars.
Lyne says it's unclear if the use of microchip cards would have prevented the Target breach, since it's unclear how it happened, but that it certainly wouldn't hurt.
Q: Why is the Secret Service investigating?
A: While it's most famous for protecting the president, the Secret Service also is responsible for protecting the nation's financial infrastructure and payment systems. As a result, it has broad jurisdiction over a wide variety of financial crimes. It isn't uncommon for the agency to investigate major thefts involving credit card information.
If your card information was compromised you are likely to notice small charges on your statement that show someone is testing out your card or targeted email scams. Be sure to look at your charges on your card and specifically for your debit card and make sure you change your PIN.
If you notice activity call your bank or credit card company and Target. They will report the activity to your credit card companies and call Target at (866) 852-8680.
I would recommend cancelling your card and requesting a new number. In addition it will be necessary to continue to monitor your account for the next six months for fraud.
Q: I shopped at Target during that time. What should I do?
A: Check your credit card statements carefully. If you see suspicious charges, report the activity to your credit card companies and call Target at 866-852-8680. You can report cases of identity theft to law enforcement or the Federal Trade Commission.
You can get more information about identity theft on the FTC's website at www.consumer.gov/idtheft, or by calling the FTC, at (877) IDTHEFT (438-4338).
Q: How did the breach occur?
A: Target isn't saying how it happened. Industry experts note that companies such as Target spend millions of dollars each year on credit card security, making a theft of this magnitude particularly alarming.
Experts disagree about how the breach might have happened. Avivah Litan, a security analyst with Gartner Research, says given all the security, she believes the breach may have been an inside job.
But thefts of this size are too big to be the work of company employees, says Ken Stasiak, founder and CEO of Secure State, a Cleveland-based information security firm that investigates data breaches like this one. Stasiak says that such breaches are generally perpetrated by organized crime or an overseas, state-sponsored hacker group.
Stasiak's theory is that the hackers were able to breach Target's main information hub and then wrote a code that gave them access to the company's point of sale system and all of its cash registers. That access allowed the hackers to capture the data from shoppers' cards as they were swiped.
James Lyne, global head of security research for the computer security firm Sophos, says something clearly went wrong with Target's security measures.
"Forty million cards stolen really shows a substantial security failure," he says. "This shouldn't have happened."
Q: Who pays if there are fraudulent charges on my account?
A: The good news is in most cases consumers aren't on the hook for fraudulent charges.
Credit card companies are often able to flag the charges before they go through and shutdown your card. If that doesn't happen, the card issuer will generally strip charges you claim are fraudulent off your card immediately.
And since the fraud has been tied to Target, it'll be the retailer that ultimately compensates the banks and credit card companies.
Q: How can I protect myself?
A: Like they say, cash is king. You can only lose what you're carrying, though admittedly many people may not feel safe walking around with a wad of bills in their pocket.
As stated before, credit card companies don't hold consumers liable for charges they don't make. Usually the worst thing consumers have to deal with is the hassle of getting a new credit card.
And the paper trail generated through credit card transactions can often make it easier do things such as return items you've purchased, or keep track of work-related expenses.
It's worth noting that while debit cards offer many of the same perks as credit cards, without the worry that you'll spend more than what's in your bank account, they often don't come with the same kind fraud protections.
As a result, those card holders may have a tougher time getting their money back if their number is stolen.
Q: How much is this going to cost Target?
A: It's too soon to tell. In addition to the fraud-related losses, banks may start charging Target a higher merchant discount rate, which is the amount retailers pay banks for providing debit and credit card services. While the percentage difference may be tiny, it could result in steep costs given the volume of transactions Target does, Litan says.
Litan added that the company could also face class action lawsuits from consumers, though most of them will be meritless, and fines from federal agencies. When combined, the costs of the breach could be so steep that they actually prompt Target to raise prices, she says.
"The real winner in this is Wal-Mart," she says.
Q: Can the bad guys be caught?
A: Stasiak says that given the sophistication of this attack, there's only about a 5 percent chance that the perpetrators will eventually be caught and prosecuted.
He notes that in cases like this, it's hard to determine where the attack originated and given the large mass of information involved it's not going to be found housed on someone's home computer.
Q: How can future breaches be prevented?
A: Litan says an easy way to prevent fraud would be to eliminate the use of easily cloned magnetic strip cards and upgrade to the kind of microchip technology used in most other parts of the world.
But she says banks have pushed back against the idea, because the microchip cards cost significantly more than the magnetic strip version and changing over all the country's ATMs could drive the total costs into the billions of dollars.
Lyne says it's unclear if the use of microchip cards would have prevented the Target breach, since it's unclear how it happened, but that it certainly wouldn't hurt.
Q: Why is the Secret Service investigating?
A: While it's most famous for protecting the president, the Secret Service also is responsible for protecting the nation's financial infrastructure and payment systems. As a result, it has broad jurisdiction over a wide variety of financial crimes. It isn't uncommon for the agency to investigate major thefts involving credit card information.
Friday, December 20, 2013
A Special Thank You
I love you little brother. |
My little brother was, so unfairly taken from his family by a drunk driver on the evening of October 4th, 2013. These past few months have been a real struggle for me and I believe I have carried on as best as can be excepted but I cannot believe that there will be no more road trips, no more concerts, no more Sunday NFL football (Ian's Eagles and my Broncos), no more music talk, no more political debates, no more just sitting around talking and enjoying a pint or two together and no more being there for each other. Even a simple thing like watching football on Sundays are diminished now.
I must say I am amazed that there is barely a moment since October 4 that I have not felt sad. Sure sometimes my sadness gets over powered by other things going on in the moment but it is always there.
Just some of the gifts from my co-workers for my brother's family this holiday season. |
One thing that I have learned from this terrible - tragic - unnecessary experience is that I really do have true friends out there and I am very thankful to everyone for everything everyone has done these past few months.
On a professional end 2013 was a great year, on a personal end, 2013 you cursed me.
2013 you will not be missed.....
China Explores the Moon
This is not really a tech
story that this blog handles normally however tech news slows down
during the holidays and I wanted no one to miss this story so I decided to
write a little about it here.
This past Saturday, December 14, China became only the third nation (after the U.S. and Russia) to accomplish a soft-landing on the moon, which is an amazing task.
What Does This Mean for the U.S. Space Program?
If China is successful with their new space program and they decide to focus on Mars and landing on an asteroid it will probably kick off a new space race, this time between the United States and China as Sputnik did in 1957 between the U.S. and the Soviet Union.
Back to China's Moon Mission
In order to move the moon probe into a gentle landing, the Chinese lander was equipped with state-of-the-art mini rockets, which allowed it to gently hover above the lunar surface. This allowed it to avoid small boulders and large rocks that litter parts of its Sinus Iridum (Bay of Rainbows) landing site.
The successful landing occurred at 8:11 a.m. EST.
Using its high-resolution imaging and hovering capabilities, the craft safely touched down in the Bay of Rainbows, a basalt sand/rock crater plane in the Lunar north. After landing safely, the Yutu ("Jade Rabbit") rover climbed off the Chang'e 3 spacecraft without issue on Saturday, snapping pictures.
A picture of the offloaded rover is snapped by Chang'e 3 [Image Source: CCTV]
China's
first and second Lunar probes provided mankind with unprecedented map of the
Lunar surface. Over the next few months Yutu will add yet more insight,
"tasting" the chemicals in Lunar rock and exploring the Lunar
dirt/crust with ground-penetrating radar.
The
lander is powered by a radioisotope heater, while the rover is powered by a
solar panel. Both will only operate by day to safeguard their sensitive electronics
from the chilling northern Lunar night.
You can be assured that the United States Space Program will be watching this closely and we can all hope that we, as a nation will be exploring the stars again with a new inspired mission we can all collectively get excited about.
This past Saturday, December 14, China became only the third nation (after the U.S. and Russia) to accomplish a soft-landing on the moon, which is an amazing task.
What Does This Mean for the U.S. Space Program?
If China is successful with their new space program and they decide to focus on Mars and landing on an asteroid it will probably kick off a new space race, this time between the United States and China as Sputnik did in 1957 between the U.S. and the Soviet Union.
Back to China's Moon Mission
In order to move the moon probe into a gentle landing, the Chinese lander was equipped with state-of-the-art mini rockets, which allowed it to gently hover above the lunar surface. This allowed it to avoid small boulders and large rocks that litter parts of its Sinus Iridum (Bay of Rainbows) landing site.
The successful landing occurred at 8:11 a.m. EST.
Chang'e 3 used its hovering jets to touch down softly on Saturday. [Image Source: News.cn] |
Using its high-resolution imaging and hovering capabilities, the craft safely touched down in the Bay of Rainbows, a basalt sand/rock crater plane in the Lunar north. After landing safely, the Yutu ("Jade Rabbit") rover climbed off the Chang'e 3 spacecraft without issue on Saturday, snapping pictures.
Chang'e 3, post-landing. [Image Source: News.cn] |
The Yutu
rover stands roughly 5 feet and features a six-wheel independent bogie-style
suspension, similar to the rovers that the NASA
used to rove the moon in decades past. It has been nearly four
decades since the U.S. and Russia last roamed the moon.
You can be assured that the United States Space Program will be watching this closely and we can all hope that we, as a nation will be exploring the stars again with a new inspired mission we can all collectively get excited about.
Thursday, December 19, 2013
Target Customers Beware
Living in a digital world does not comes without it's dangers and if you recently shopped at Target it just got a little scarier. Happy Holidays from the cybercriminals.
That is because credit and debit card information of many Target customers have apparently been stolen during the Black Friday weekend, according to reports. In fact this may be been continued for another two weeks after black Friday weekend.
The thieves got access to data stored on the magnetic stripe on the back of the credit and debit cards through card swiping devices that could have been tampered with at the retailer's stores. This fact was reported by the Wall Street Journal on Wednesday, citing people familiar with the matter.
This is a real security problem because it is the data on the stripe which can be used to make counterfeit cards. If the thieves also intercepted PIN (personal identification number) data for debit transactions, they would have the ability to reproduce stolen debit cards and use them to withdraw cash from bank accounts through ATM's.
Millions of cardholders could be vulnerable as a result of the breach that is believed to have affected about 40,000 card devices at store registers, the Journal said, citing people familiar with the incident. The breach extends to nearly all Target locations in the United States.
If you have shopped at any Target store from late November through today I would recommend that you cancel the card you used there and have a new one issued. Also double and triple check your account (you used) and your bank account if it was a debit card.
That is because credit and debit card information of many Target customers have apparently been stolen during the Black Friday weekend, according to reports. In fact this may be been continued for another two weeks after black Friday weekend.
The thieves got access to data stored on the magnetic stripe on the back of the credit and debit cards through card swiping devices that could have been tampered with at the retailer's stores. This fact was reported by the Wall Street Journal on Wednesday, citing people familiar with the matter.
This is a real security problem because it is the data on the stripe which can be used to make counterfeit cards. If the thieves also intercepted PIN (personal identification number) data for debit transactions, they would have the ability to reproduce stolen debit cards and use them to withdraw cash from bank accounts through ATM's.
Millions of cardholders could be vulnerable as a result of the breach that is believed to have affected about 40,000 card devices at store registers, the Journal said, citing people familiar with the incident. The breach extends to nearly all Target locations in the United States.
If you have shopped at any Target store from late November through today I would recommend that you cancel the card you used there and have a new one issued. Also double and triple check your account (you used) and your bank account if it was a debit card.
Wednesday, December 18, 2013
Shopping with HTTPS
Being that it is the holiday season and if you are reading this fine tech blog you have no doubt shopped online, and chances are you have probably noticed, or been told to look for, certain indicators that you have a secure Web connection.
For many years, the primary indicator was a padlock at the bottom of your browser screen. Now, the padlock is likely to be found in the address bar up top. Sometimes the address bar itself will turn a different color (usually green) when you enter a secure website.
The "http" prefix on the website, if it's visible, will change to "https" The "s" stands for "secure."
Learning to read these browser indicators is an important way to avoid becoming a victim of cybercriminals.
What is HTTPS Anyway?
Hypertext Transfer Protocol Secure (https) is a communications protocol for secure communication over a computer network, with wide adoption on the Internet. This security level is the result of layering the Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol, which adds the security capabilities of SSL/TLS to standard HTTP communications.
If you do not see that a site is using the HTTPS protocol always avoid providing any personal or financial information.
For many years, the primary indicator was a padlock at the bottom of your browser screen. Now, the padlock is likely to be found in the address bar up top. Sometimes the address bar itself will turn a different color (usually green) when you enter a secure website.
The "http" prefix on the website, if it's visible, will change to "https" The "s" stands for "secure."
Learning to read these browser indicators is an important way to avoid becoming a victim of cybercriminals.
What is HTTPS Anyway?
Hypertext Transfer Protocol Secure (https) is a communications protocol for secure communication over a computer network, with wide adoption on the Internet. This security level is the result of layering the Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol, which adds the security capabilities of SSL/TLS to standard HTTP communications.
If you do not see that a site is using the HTTPS protocol always avoid providing any personal or financial information.
Surface Sales Surging This Season?
Here is some good holiday cheer for Microsoft. I have been a proud user of first the Microsoft Surface then the Surface Pro 2 tablet. This mobile device is much more then a tablet and performs in many ways like a really good laptop. I have been able to travel several times exclusively with this device which is really saying something because I often need to provide remote support, work on webpage design in addition to all of the other work related tasks many of us do when away from the office. The Surface can also compete in many ways with the iPad as well in respect to consumer tasks, although it is in this area where Microsoft is still working to catch up.
Now it appears that Microsoft’s Surface Pro 2 and Surface 2 tablets are selling very well. Many retailers are sold out with just over a week to go until Christmas. It’s unclear whether Microsoft built smaller quantities of tablets and might be manufacturing the sellouts, or whether the company is actually enjoying a hot streak with Surface Pro 2 and Surface 2 sales. I tend to believe it is selling well, simply because I believe it is a very good solution for those who want a good mobile solution that performs well for both work and home.
Either model is listed as “sold out” on Microsoft’s online store, no matter which configuration buyers try to purchase. The same goes for Walmart’s online store and Best Buy’s retail stores – interestingly though, Best Buy’s website shows the devices as available. According to a Best Buy salesperson in New York City, the new Surface tablet is “extremely popular” with shoppers, although no actual sales numbers were provided by the stores. Amazon, on the other hand, still has Surface Pro 2 and Surface 2 units for sale, although "stock is limited".
Interestingly, Microsoft is not willing to reveal sales numbers for its new Surface tablets. “With regards to specific inventory levels or sales numbers we don’t comment on those specific figures,”
Microsoft Surface senior manager Ben Reed recently stated, “I would say that it’s our goal to get these two tablets into as many people’s hands as possible, and we’re actively working with manufacturing teams and retail partners to replenish stock where it’s been sold out as soon as possible.”
It’s not clear when more Surface stock will be available in these stores.
The Surface 2 and Surface Pro 2 are Microsoft’s second-generation Windows tablets, which were released on October 22nd.
You can learn more about the Microsoft Surface from these earlier blog articles I posted.
Much of this story was originally reported at Mashable.com.
Now it appears that Microsoft’s Surface Pro 2 and Surface 2 tablets are selling very well. Many retailers are sold out with just over a week to go until Christmas. It’s unclear whether Microsoft built smaller quantities of tablets and might be manufacturing the sellouts, or whether the company is actually enjoying a hot streak with Surface Pro 2 and Surface 2 sales. I tend to believe it is selling well, simply because I believe it is a very good solution for those who want a good mobile solution that performs well for both work and home.
Either model is listed as “sold out” on Microsoft’s online store, no matter which configuration buyers try to purchase. The same goes for Walmart’s online store and Best Buy’s retail stores – interestingly though, Best Buy’s website shows the devices as available. According to a Best Buy salesperson in New York City, the new Surface tablet is “extremely popular” with shoppers, although no actual sales numbers were provided by the stores. Amazon, on the other hand, still has Surface Pro 2 and Surface 2 units for sale, although "stock is limited".
Interestingly, Microsoft is not willing to reveal sales numbers for its new Surface tablets. “With regards to specific inventory levels or sales numbers we don’t comment on those specific figures,”
Microsoft Surface senior manager Ben Reed recently stated, “I would say that it’s our goal to get these two tablets into as many people’s hands as possible, and we’re actively working with manufacturing teams and retail partners to replenish stock where it’s been sold out as soon as possible.”
It’s not clear when more Surface stock will be available in these stores.
The Surface 2 and Surface Pro 2 are Microsoft’s second-generation Windows tablets, which were released on October 22nd.
You can learn more about the Microsoft Surface from these earlier blog articles I posted.
Much of this story was originally reported at Mashable.com.
Tuesday, December 17, 2013
FAA Looks to Expand New Cell Phone Use Policy
I have written about this story several times now and one final twist is here. I never accepted that mobile devices could impact airplanes in any meaningful technical way and I was thrilled to see that the FAA finally lifted that unnecessary restriction from passengers (on takeoff and landing). On a recent trip by air it was awesome to have US Airways simply direct everyone to switch their mobile devices to "airplane" mode for takeoff and again on approach for landing. The only restrictions at this point were the use of laptops (over 5lbs) which needed to be put away.
However it seems many are pushing for the use of "cell phone" while in flight. Now here - technology issues aside I believe that this should remain restricted. Airplanes are crowded places and the aggravation this will cause to those around someone carrying on a conversation (by phone) while in flight will more then likely lead to confrontations by frustrated passengers.
Regardless of my opinion here, the Federal Communications Commission is actually proposing a new rule, permitting cellphones in the air. Unsurprisingly, many, just like me are unhappy about the prospect of sitting next to a loud yapper for hours. However, help could be at hand, in the form of the Department Of Transportation. It may prohibit voice calls, for being unfair to consumers. I will stay on top of this ongoing story and keep you, my dedicated readers up to date. What do you think? Should we be allowed to talk on the cellphone while in flight?
However it seems many are pushing for the use of "cell phone" while in flight. Now here - technology issues aside I believe that this should remain restricted. Airplanes are crowded places and the aggravation this will cause to those around someone carrying on a conversation (by phone) while in flight will more then likely lead to confrontations by frustrated passengers.
Regardless of my opinion here, the Federal Communications Commission is actually proposing a new rule, permitting cellphones in the air. Unsurprisingly, many, just like me are unhappy about the prospect of sitting next to a loud yapper for hours. However, help could be at hand, in the form of the Department Of Transportation. It may prohibit voice calls, for being unfair to consumers. I will stay on top of this ongoing story and keep you, my dedicated readers up to date. What do you think? Should we be allowed to talk on the cellphone while in flight?
Friday, December 13, 2013
A True Tablet/Laptop Hybrid Arrives
With Christmas fast approaching I wanted to write one more time before the end of the year about Microsoft Surface line of tablets. This is truly the first affordable and usable tablet/laptop hybrid available today.
There are two distinct versions here so be aware of the differences before you decide to purchase one.
First there is the Surface RT (gen 1) or Surface 2 (gen 2). This version does not run Windows Pro and therefore you can not run native Windows applications and you are restricted to the Windows Store for your applications. However this one does come with Microsoft Word, Excel, PowerPoint and Outlook pre-installed. If you primarily only use your tablet for Microsoft Office services, email and internet this one can be found for under $300 (RT) and $449 (Surface 2).
The more powerful (and expansive) version is the Surface Pro (gen 1) and Surface Pro 2 (gen 2). Here you get everything that comes with the RT or Surface 2 but because it is running full Windows 8.1 you can run any native Windows application. This one starts at $899.
For me I have the Surface Pro 2 and during my recent vacation away from the office I was able to travel with this exclusively with no need to also drag along a laptop. This is a big deal to me because I often have to work on the road, connect in to various workstations and servers to provide remote support. I was called upon to do this several times this past trip and the Surface Pro 2 performed admirably. What a sense of freedom it was to only have to bring this small form factor tablet/PC with me! I have never before found anything that could handle these tasks outside of a laptop. Because this also acts as a tablet you can get away with leaving your iPAD behind as well.
The Surface Pro and Surface Pro 2 can also be connected to a dock ($199) at your office which when connected to your local network can act as an office PC. When you work day is done you simply disconnect from the dock and travel how with your tablet/PC.
There are two distinct versions here so be aware of the differences before you decide to purchase one.
First there is the Surface RT (gen 1) or Surface 2 (gen 2). This version does not run Windows Pro and therefore you can not run native Windows applications and you are restricted to the Windows Store for your applications. However this one does come with Microsoft Word, Excel, PowerPoint and Outlook pre-installed. If you primarily only use your tablet for Microsoft Office services, email and internet this one can be found for under $300 (RT) and $449 (Surface 2).
The more powerful (and expansive) version is the Surface Pro (gen 1) and Surface Pro 2 (gen 2). Here you get everything that comes with the RT or Surface 2 but because it is running full Windows 8.1 you can run any native Windows application. This one starts at $899.
For me I have the Surface Pro 2 and during my recent vacation away from the office I was able to travel with this exclusively with no need to also drag along a laptop. This is a big deal to me because I often have to work on the road, connect in to various workstations and servers to provide remote support. I was called upon to do this several times this past trip and the Surface Pro 2 performed admirably. What a sense of freedom it was to only have to bring this small form factor tablet/PC with me! I have never before found anything that could handle these tasks outside of a laptop. Because this also acts as a tablet you can get away with leaving your iPAD behind as well.
The Surface Pro and Surface Pro 2 can also be connected to a dock ($199) at your office which when connected to your local network can act as an office PC. When you work day is done you simply disconnect from the dock and travel how with your tablet/PC.
The dock has plenty of USB ports, video/audio out, LAN and is self powered. |
The Surface sits very nice in the dock and connects by pushing the 2 sides in.
Once connected you can use your Surface on your local network.
With the dock you can of course use a large monitor, keyboard, mouse and external speakers. This is a great setup for your office and allows you to truly have a travelling office.
If someone is looking for a good laptop/tablet hybrid this is what I currently recommend. You can learn more here.
8Bit Star Trek Returns on the iPAD
I do not normally write about video games here but in the case of the new IPAD app (game) I will make an exception just because I look forward to checking it out.
In this new IPAD game from Xcube Games and YesGnome a temporal rift has caused old foes and surprising new allies to find their way into an unexplored region of space. You are directed to build your ship, choose your crew, and explore an 8-bit galaxy like no one has before.
Set within the original Star Trek universe, players will apparently encounter familiar characters and locations from Star Trek™: The Original Series and Star Trek™: The Next Generation, as well as all new crew members, aliens, and mysterious planets to explore. The game also features narration by the one and only George Takei, the original music from the series, and a user interface based on the iconic LCARS (Library Computer Access/Retrieval System) system.
Star Trek™ Trexels is available here for the $2.99.
If you are over 40 years old this 8bit interface is sure to bring back great memories. |
In this new IPAD game from Xcube Games and YesGnome a temporal rift has caused old foes and surprising new allies to find their way into an unexplored region of space. You are directed to build your ship, choose your crew, and explore an 8-bit galaxy like no one has before.
Set within the original Star Trek universe, players will apparently encounter familiar characters and locations from Star Trek™: The Original Series and Star Trek™: The Next Generation, as well as all new crew members, aliens, and mysterious planets to explore. The game also features narration by the one and only George Takei, the original music from the series, and a user interface based on the iconic LCARS (Library Computer Access/Retrieval System) system.
Star Trek™ Trexels is available here for the $2.99.
Thursday, December 12, 2013
Switching from Gmail to Outlook.com
I always recommend using a free personal email service like Gmail or Microsoft as opposed to your ISP's email service. Why is this? Well lets say you have a Comcast email address and you decide to switch to Verizon. You are going to be in a position where you are forced to change your email address which can be a big inconvenience. If you use Microsoft or Gmail for example you will not need to make any email address changes, regardless of your ISP (internet service provider).
During the past year Microsoft has really stepped up their free email service and transitioned what had been Hotmail and Live.com over to Outlook.com. This is the one I recommend.
As I just noted switching email services can be a huge decision, and a major chore. You have to notify friends and family members about your new email address, transfer over your contacts and folders, and find a way to get all your messages from one service to the other.
The thought of all that work might discourage you from switching, even if you're not happy with your current email provider. But if you use Google's Gmail and it just isn't working for you anymore, Microsoft wants to simplify the process of moving to Outlook.com.
The software recently introduced s new functionality in Outlook.com that lets you easily transfer over all your emails, contacts, and folders from Gmail. The new service is rolling out and should be available to all Outlook.com accounts worldwide over the next several weeks.
You can access the new tool from your Outlook.com settings, or by clicking here and signing in with your Outlook.com account (if you don't already have an account, you'll be able to sign up for one). From there, you'll have the option to import all your Gmail into a new set of subfolders in Outlook.com.
Next, you will need to sign in to Gmail and grant the tool access to your account. Once you OK this, the tool will start copying over your email and you will be navigated back to Outlook.com. After you start the import process, Microsoft will send you instructions on how to set up email forwarding, so that all the messages sent to your Gmail account go to Outlook.com. Once the import is complete, Microsoft will send to a message letting you know it has finished.
During the past year Microsoft has really stepped up their free email service and transitioned what had been Hotmail and Live.com over to Outlook.com. This is the one I recommend.
As I just noted switching email services can be a huge decision, and a major chore. You have to notify friends and family members about your new email address, transfer over your contacts and folders, and find a way to get all your messages from one service to the other.
The thought of all that work might discourage you from switching, even if you're not happy with your current email provider. But if you use Google's Gmail and it just isn't working for you anymore, Microsoft wants to simplify the process of moving to Outlook.com.
The software recently introduced s new functionality in Outlook.com that lets you easily transfer over all your emails, contacts, and folders from Gmail. The new service is rolling out and should be available to all Outlook.com accounts worldwide over the next several weeks.
You can access the new tool from your Outlook.com settings, or by clicking here and signing in with your Outlook.com account (if you don't already have an account, you'll be able to sign up for one). From there, you'll have the option to import all your Gmail into a new set of subfolders in Outlook.com.
Next, you will need to sign in to Gmail and grant the tool access to your account. Once you OK this, the tool will start copying over your email and you will be navigated back to Outlook.com. After you start the import process, Microsoft will send you instructions on how to set up email forwarding, so that all the messages sent to your Gmail account go to Outlook.com. Once the import is complete, Microsoft will send to a message letting you know it has finished.
Friday, December 6, 2013
Freedom in the Sky
Yesterday was the start of a even better relationship between me and the FAA. I have been flying my entire adult life and the silly notion that my mobile device could cause dangerous havoc has always astounded me. Sure it was only an inconvenience to have to shut down my iPhone or tablet or Kindle on take off and landing but I always believed that there was no real technical reason for this rule being there.
Airplanes are one of the most amazing machines ever built by mankind. Think about, at 6:50 AM the wife and I are in cold and foggy Philadelphia and by 10:00 AM we are enjoying Florida weather and walking through EPCOT at Walt Disney World. Also being heavily involved in the tech world the mere notion that mobile devices were dangerous to air travel bugged me.
My believe was made certain about a year ago when an off duty US Airways crew member sat on her iPhone texting away as we took off on our flight while everyone else of course had turned there's off.
Anyway as I reported a couple of months ago the FAA has finally lifted this silly rule. Yesterday was my first flight where the passengers were simply directed to switch their mobile devices to "airplane mode". Airplane mode turns of the cellular and wireless services on your devices, but they continue to function otherwise. This means you can read you Kindle, listen to music, work on that critically important document or watch a movie on your iPad.
Laptops (anything over 5 labs) are still required to be put away during takeoff and landing which is simply so they do not start flying around if things get a little bumpy. This rule I understand.
For me, what did I do this time on my first flight of tech freedom? I simply continued listening to music on my old iPhone while we took off and landed. Maybe next time I will read my Kindle or watch a movie.
The Big Question
But why was this silly rule imposed on us air travelers for so long? I have also felt that there was no technical or mechanical reason but one of "safety". Yesterday's flight proved this to me. As we were getting ready for takeoff and the crew were running down all of the safety rules (oxygen masks etc.) almost no one was paying attention. You guessed it, almost every passenger was reading, watching a video, playing a game or like me, listening to music.
Passengers do need to hear these safety rules - so I am predicting that once this behavior is observed by the airlines on a regular basis there will be a modification that requires something more from the air traveler. So stay tuned and watch for this to happen in a year or so.
Airplanes are one of the most amazing machines ever built by mankind. Think about, at 6:50 AM the wife and I are in cold and foggy Philadelphia and by 10:00 AM we are enjoying Florida weather and walking through EPCOT at Walt Disney World. Also being heavily involved in the tech world the mere notion that mobile devices were dangerous to air travel bugged me.
My believe was made certain about a year ago when an off duty US Airways crew member sat on her iPhone texting away as we took off on our flight while everyone else of course had turned there's off.
Anyway as I reported a couple of months ago the FAA has finally lifted this silly rule. Yesterday was my first flight where the passengers were simply directed to switch their mobile devices to "airplane mode". Airplane mode turns of the cellular and wireless services on your devices, but they continue to function otherwise. This means you can read you Kindle, listen to music, work on that critically important document or watch a movie on your iPad.
Laptops (anything over 5 labs) are still required to be put away during takeoff and landing which is simply so they do not start flying around if things get a little bumpy. This rule I understand.
For me, what did I do this time on my first flight of tech freedom? I simply continued listening to music on my old iPhone while we took off and landed. Maybe next time I will read my Kindle or watch a movie.
The Big Question
But why was this silly rule imposed on us air travelers for so long? I have also felt that there was no technical or mechanical reason but one of "safety". Yesterday's flight proved this to me. As we were getting ready for takeoff and the crew were running down all of the safety rules (oxygen masks etc.) almost no one was paying attention. You guessed it, almost every passenger was reading, watching a video, playing a game or like me, listening to music.
Passengers do need to hear these safety rules - so I am predicting that once this behavior is observed by the airlines on a regular basis there will be a modification that requires something more from the air traveler. So stay tuned and watch for this to happen in a year or so.
Wednesday, December 4, 2013
Reversible USB on the Way!
Why this took so long I really do not know but it is finally here. Am I the only one excited about the new reversible USB plug which is seemingly on the way to the market next year.
The next generation of USB is currently being developed, according to a press release by USB 3.0 Promotor Group. The new connectors, known as Type Cs, will sport a number of new features, including a smaller and thinner design. However the feature that has me most excited is that it will be reversible. "Users will no longer need to be concerned with plug orientation/cable direction, making it easier to plug in,” the press release explains.
That might seem like a minor detail, but everyone knows the nuisance of fiddling to orient a USB plug the right way, which probably collectively consumes a fair amount of time across the global population. The ports are used for everything from computers to phones and even car sockets. This new USB feature follows in the footsteps of Apple’s “Lightning” connector for its most recent generations of mobile devices, which are reversible as well.
Copies of the new USB will be sent out in early 2014 for a 45-day review period before being formally released onto the market.
Tuesday, December 3, 2013
FBI Issues Holiday Scam Reminder
Watch Out for Bad Santa when online. |
So here is more online holiday shopping scam information.
Following on the heals of this fine blog the FBI, this week issued a series of reminders to online shoppers to beware of scams and to use their common sense.
"Scammers use many techniques to defraud consumers, from phishing e-mails offering too good to be true deals on brand-name merchandise to offering quick cash to victims who will re-ship packages to additional destinations. Previously reported scams are still being executed today," the FBI states.
Here's a rundown of the FBI's advice, some are more obvious than others.
Keep a watchful eye on your personal credit information at this time of year for any possible fraudulent activity.
Be careful when receiving online correspondence from banks. Never click on a link embedded in an email from your bank. Rather, open a new webpage and manually enter the URL to avoid getting snagged in a phishing trap.
Stick mainly to reputable online sites. Those unfamiliar to you might be traps designed to swipe your personally identifiable information.
Don't assume even top search results will take you to a reputable site. Take a close look at the URL (website address) of any site you plan to visit to see if anything looks odd, such as extra characters. Make sure the payment page of any website you use starts with https, not just http.
Don't respond to unsolicited email (i.e., spam)
Be wary of emails claiming to contain photos in attached files... which could contain viruses.
Avoid filling out forms contained in email messages that as for personal info.
Be on the alert if you are requested to act quickly or if there is an emergency that requires your attention, as these could be scams.
Check out US-CERT's posting on Holiday Season Phishing Scams and Malware Campaigns.
Finally, if it looks too good, it probably is.
Sunday, December 1, 2013
Staying Safe on Cyber Monday... and Beyond
With Cyber Monday only a day away I wanted to post some reminders regarding how to stay safe while shopping online. Of course these tips are not only important for "Cyber Monday" but anytime your are shopping online.
- Keep a Clean Machine: All the devices you use for shopping - including smartphones and
tablets - should have up-to-date software including security software, operating systems, programs and apps.
- When in Doubt, Throw it Out: Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk email.
- Think Before you Act: Be wary of communications that offer amazing deals that sound too good to be true, implore you to act immediately - including those about a problem with an order or payment or ask you to view the website via a provided link.
- Get Savvy about Wi-Fi Hotspots: Don’t share personal or financial information over an unsecured network (a connection that doesn’t require a password for access). Using the direct web access on your phone (via a 3G/4G connection) is safer than an unsecured wireless network when on your mobile device.
- Make Sure the Site is Legitimate: This includes a closed padlock on your web browser’s address bar or a URL address that begins with shttp or https. This indicates that the purchase is encrypted or secured. For new sites, check online reviews.
- Protect your Personal Information: Be alert to the kinds of information being collected to complete the transaction. Make sure the information requested is only that needed to complete the transaction. Only fill out required fields on checkout forms. Check the website's privacy policy. Make sure you understand how your information will be stored and used.
- Use Safe Payment Options: Credit cards are generally the safest option because they allow buyers to seek a credit from the issuer if the product isn’t delivered or isn’t what was ordered. Credit cards may have a limit on the monetary amount you will be responsible for paying. Never send cash through the mail or use a money-wiring service.
- Keep a Paper Trail: Save records of your online transactions, including the product description, price, online receipt, terms of the sale, and copies of email exchanges with the seller. Read your credit card statements as soon as you get them to make sure there aren’t any unauthorized charges. If there is a discrepancy, call your bank and report it immediately.
Thursday, November 28, 2013
Happy Thanksgiving!
Happy Thanksgiving from all of us here at the West Chester Technology Blog to your, our many dedicated readers.
Today try to stay off of the smartphones and enjoy your family, friends, football and food!
Wednesday, November 27, 2013
How To back out of IE11
During the past week or 2 Microsoft has added Internet Explorer 11 to it's list of "critical updates" which can be a real problem for many of us. Many of the internet sites we visit such as banks and other important service providers simply are not ready for Microsoft's newest browser, and Microsoft should know this. Unfortunately IE 11 (Internet Explorer) was unwisely (if you ask me) added to the most resent critical update list. This means anyone who has critical updates setup to automatically download & install is "rewarded" with the newest internet browser.
Now don't get me wrong IE 11 has some great new features such as the new Developer Tools, better standards support and better HTML 5 video among other security improvements.
If you find, that after this update occurs IE crashes and does not behave normally or that some of the sites you regularly visit start misbehaving you should downgrade IE 11 to IE 10 or IE 9.
To do this open the "Control Panel" and "Programs and Features". Then click "View Installed Updates" on the left panel. Be patient as this can take a few moments to load all the updates. Under "Microsoft Windows" select "Internet Explorer 11" and uninstall it.
Once you have completed this you will be asked to reboot the PC. Do this and log back into Windows. Internet Explorer will revert back to either IE9 or IE10, depending on which one you were using at the time of the upgrade.
At some point down the road, hopefully soon, IE 11 will work fine with just about everything we use, but for now, many of us will experience problems with the new browser and downgrading it is really the only solution.
Not So fast Microsoft! |
Now don't get me wrong IE 11 has some great new features such as the new Developer Tools, better standards support and better HTML 5 video among other security improvements.
If you find, that after this update occurs IE crashes and does not behave normally or that some of the sites you regularly visit start misbehaving you should downgrade IE 11 to IE 10 or IE 9.
To do this open the "Control Panel" and "Programs and Features". Then click "View Installed Updates" on the left panel. Be patient as this can take a few moments to load all the updates. Under "Microsoft Windows" select "Internet Explorer 11" and uninstall it.
Once you have completed this you will be asked to reboot the PC. Do this and log back into Windows. Internet Explorer will revert back to either IE9 or IE10, depending on which one you were using at the time of the upgrade.
At some point down the road, hopefully soon, IE 11 will work fine with just about everything we use, but for now, many of us will experience problems with the new browser and downgrading it is really the only solution.
Live Remote Support Now Available
Mann Tech Services now offers live remote tech support services. Many technical problems can be evaluated and even corrected through remote services which is always faster and more convenient. You can now request this type of service by submitting an online work order form which is always available on the left column of this fine blog.
Live Remote Tech Support can even include training sessions with applications like Word, Excel, Outlook, PowerPoint and Windows operating systems.
Live Remote Tech Support can even include training sessions with applications like Word, Excel, Outlook, PowerPoint and Windows operating systems.
Tuesday, November 26, 2013
CryptoLocker Invades a PD
I have written about the CryptoLocker virus and other security problems countless times in this blog and here is yet another recent real life example of what can go wrong with computer security, even when police departments are involved.
A U.S. police department was so determined to get back important files that had been encrypted by the rampaging CryptoLocker Trojan it decided to pay the ransom being demanded by the criminals.
It sounds like a far-fetched and probably serious breach of law enforcement protocol, but according to a local news report, this is exactly what the police department in Swansea, Mass., decided to do when "several images and word documents," were found to have been encrypted by the malware.
The department had followed the instructions given by CryptoLocker and on Nov. 10 bought two bitcoins worth $750 which resulted in the criminals sending the decrypt key, police said.
The "Trojan" is so complicated and successful that you have to buy these bitcoins, which we had never heard of," said Swansea Police Lt. Gregory Ryan in an admission to the press many will find quite staggering.
Ryan didn't say why the files were so important that a police department saw fit to pay a digital ransom to criminals, but insisted "It was an education for [those who] had to deal with it," and that at least the infection had not caused damage to the system the department used for booking official reports and logging photographs.
"We were never compromised," Ryan said, a statement that many would deem inaccurate.
Only last weekend, the UK National Crime Agency put out an alert that the criminals behind CryptoLocker were now targeting UK SMEs on a large scale. Their recommendation is that affected businesses do not pay the ransom, not least because there is no guarantee that they will even receive an unlock key.
There is growing concern about the scale and success of the CryptoLocker campaign which, it is worth pointing out, is far from the first malware to use the technique of locking or encrypting victim's files. A key element of CryptoLocker's recent success is that it has started demanding untraceable bitcoins for payment rather than more conventional money channels that were easier to block or trace.
Another weakness is that there is often no central place for affected individuals to report infections, nor seek advice. Consequently, some victims pay up. The citizens of Swansea, Mass., now know that this helplessness includes their local police department.
"With the FBI stating that this type of activity should not be encouraged by paying the ransom, it is surprising to see that the local police department paying to regain access to the files," commented Gavin Millard, EMEA technical director of security firm Tripwire.
"What is more concerning though, is the apparent lack of security and backup procedures on systems that could be storing critical and highly confidential documents."
I have written this countless times on this little tech blog. Never ever open attachments that you did not specifically ask for. When in doubt, contact the sender by phone to verify that the attachment is legitimate. Otherwise you may be in the same sinking boat as the police department in this article.
A U.S. police department was so determined to get back important files that had been encrypted by the rampaging CryptoLocker Trojan it decided to pay the ransom being demanded by the criminals.
It sounds like a far-fetched and probably serious breach of law enforcement protocol, but according to a local news report, this is exactly what the police department in Swansea, Mass., decided to do when "several images and word documents," were found to have been encrypted by the malware.
The department had followed the instructions given by CryptoLocker and on Nov. 10 bought two bitcoins worth $750 which resulted in the criminals sending the decrypt key, police said.
The "Trojan" is so complicated and successful that you have to buy these bitcoins, which we had never heard of," said Swansea Police Lt. Gregory Ryan in an admission to the press many will find quite staggering.
Ryan didn't say why the files were so important that a police department saw fit to pay a digital ransom to criminals, but insisted "It was an education for [those who] had to deal with it," and that at least the infection had not caused damage to the system the department used for booking official reports and logging photographs.
"We were never compromised," Ryan said, a statement that many would deem inaccurate.
Only last weekend, the UK National Crime Agency put out an alert that the criminals behind CryptoLocker were now targeting UK SMEs on a large scale. Their recommendation is that affected businesses do not pay the ransom, not least because there is no guarantee that they will even receive an unlock key.
There is growing concern about the scale and success of the CryptoLocker campaign which, it is worth pointing out, is far from the first malware to use the technique of locking or encrypting victim's files. A key element of CryptoLocker's recent success is that it has started demanding untraceable bitcoins for payment rather than more conventional money channels that were easier to block or trace.
Another weakness is that there is often no central place for affected individuals to report infections, nor seek advice. Consequently, some victims pay up. The citizens of Swansea, Mass., now know that this helplessness includes their local police department.
"With the FBI stating that this type of activity should not be encouraged by paying the ransom, it is surprising to see that the local police department paying to regain access to the files," commented Gavin Millard, EMEA technical director of security firm Tripwire.
"What is more concerning though, is the apparent lack of security and backup procedures on systems that could be storing critical and highly confidential documents."
I have written this countless times on this little tech blog. Never ever open attachments that you did not specifically ask for. When in doubt, contact the sender by phone to verify that the attachment is legitimate. Otherwise you may be in the same sinking boat as the police department in this article.
Monday, November 25, 2013
Do You Know a Virus from a Worm?
Here is a question I am asked all the time. Have you ever wondered what the difference is between a Virus and a Worm? Perhaps you - yourself have stepped into my office and asked this very question.
Well very simply a virus is a program that replicates, which means it spreads from file to file on your system and from PC to PC. In addition, it may be programmed to erase or damage data.
Worms are generally considered to be a subset of viruses, but with certain key differences. A worm is a computer program that replicates, but does not infect other files. Instead, it installs itself once on a computer and then looks for a way to spread to other computers.
In the case of a virus, the longer it goes undetected, the more infected files there will be on the computer. Worms, however, create a single instance of their code. Moreover, unlike a virus, a worm code is stand-alone.
To sum this up, a worm is a separate file while a virus is a set of code which adds itself to existing files.
Well very simply a virus is a program that replicates, which means it spreads from file to file on your system and from PC to PC. In addition, it may be programmed to erase or damage data.
Worms are generally considered to be a subset of viruses, but with certain key differences. A worm is a computer program that replicates, but does not infect other files. Instead, it installs itself once on a computer and then looks for a way to spread to other computers.
In the case of a virus, the longer it goes undetected, the more infected files there will be on the computer. Worms, however, create a single instance of their code. Moreover, unlike a virus, a worm code is stand-alone.
To sum this up, a worm is a separate file while a virus is a set of code which adds itself to existing files.
Sunday, November 24, 2013
Skydrive Introduces Itself to Apple
Microsoft's cloud storage solution, "Skydrive" has been my favorite for a couple of years know. Their free service includes 7GB of space which is 5GB more then Dropbox. I had also used a Windows phone for about a year and one of the best features was the direct photo to Skydive upload feature. When I switched over to the Android Galaxy Note 3 this was probably the feature I missed most.
Microsoft is obviously working to expand it's presence in the mobile platform world with their Windows Phone and Surface tablets. On the software side of things Skydive is one of their biggest successes. Until now the camera to Skydive feature was only available to Windows Phone users.
Last week Microsoft announced a major update to its Skydrive app for iOS, which brings with it more advanced photo storage features, and enhanced Facebook sharing options. This isn’t the first Skydrive app for Apple’s mobile operating system, as Microsoft has had a presence inside the App Store for a couple of years, steadily updating the Skydrive app in the meantime.
Now, with the recent release of iOS 7, Microsoft thought the time was right to give it a complete makeover, bringing it visually into line with the new, minimalist look of iOS. One of the most significant feature alterations is the ability to automatically share pictures taken with your iPhone or iPad onto your Skydrive. Much like Android’s auto-upload to Google+, you can choose whether this is done over 3G/4G or Wi-Fi, plus you’re given the option to lower the resolution of the picture to help make the most of the available space.
Pictures shared through Skydrive are then visible on your Windows computer or tablet, along with images captured from any other device connected to the account. Viewing the pictures through the app, it’s possible to share them directly to Facebook, and Microsoft has added a few new options to make this easier. Single or multiple images can be shared, either to an existing or new album, and can be marked for public or private viewing in the app itself.
Finally, the Skydrive app now integrates with Office Mobile and OneNote for iOS, meaning there’s no more messing around with the Quicklook viewer if you need to examine or edit documents saved in Skydrive. The new look Skydrive app will be ready to download for free from the iTunes App Store today.
I expect that these features will be bright to Android shortly as well.
Microsoft is obviously working to expand it's presence in the mobile platform world with their Windows Phone and Surface tablets. On the software side of things Skydive is one of their biggest successes. Until now the camera to Skydive feature was only available to Windows Phone users.
Last week Microsoft announced a major update to its Skydrive app for iOS, which brings with it more advanced photo storage features, and enhanced Facebook sharing options. This isn’t the first Skydrive app for Apple’s mobile operating system, as Microsoft has had a presence inside the App Store for a couple of years, steadily updating the Skydrive app in the meantime.
Now, with the recent release of iOS 7, Microsoft thought the time was right to give it a complete makeover, bringing it visually into line with the new, minimalist look of iOS. One of the most significant feature alterations is the ability to automatically share pictures taken with your iPhone or iPad onto your Skydrive. Much like Android’s auto-upload to Google+, you can choose whether this is done over 3G/4G or Wi-Fi, plus you’re given the option to lower the resolution of the picture to help make the most of the available space.
Pictures shared through Skydrive are then visible on your Windows computer or tablet, along with images captured from any other device connected to the account. Viewing the pictures through the app, it’s possible to share them directly to Facebook, and Microsoft has added a few new options to make this easier. Single or multiple images can be shared, either to an existing or new album, and can be marked for public or private viewing in the app itself.
Finally, the Skydrive app now integrates with Office Mobile and OneNote for iOS, meaning there’s no more messing around with the Quicklook viewer if you need to examine or edit documents saved in Skydrive. The new look Skydrive app will be ready to download for free from the iTunes App Store today.
I expect that these features will be bright to Android shortly as well.
Saturday, November 23, 2013
Curisosity vs. Attachments
Another quick security tip...
If an email or email attachment seems suspicious, do not open it, even if your anti-virus software indicates that the message is clean. Cyber Criminals are constantly releasing new viruses, and the anti-virus software might not have the signature yet. When in doubt contact the person who supposedly sent the message to make sure it's legitimate before you open the attachment.
This is especially important in the case of forwards. Even messages sent by a legitimate sender might contain a virus. If something about the email or the attachment makes you uncomfortable, there may be a good reason.
Don't let your curiosity put your computer at risk.
If an email or email attachment seems suspicious, do not open it, even if your anti-virus software indicates that the message is clean. Cyber Criminals are constantly releasing new viruses, and the anti-virus software might not have the signature yet. When in doubt contact the person who supposedly sent the message to make sure it's legitimate before you open the attachment.
This is especially important in the case of forwards. Even messages sent by a legitimate sender might contain a virus. If something about the email or the attachment makes you uncomfortable, there may be a good reason.
Don't let your curiosity put your computer at risk.
The Future of Wearable Technology
It has been about 2 months now that I have been using the Galaxy Gear Smart Watch. For the most part my experience has been a good one and I enjoy using the watch. With the holidays approaching and everyone looking for great tech gifts I wanted to recap very clearly my impressions of this and then write a little bit about my thoughts on the future of wearable technology in general.
So here we go.
The Galaxy Gear
The pros of this device are that it is great way to keep up to date with email and text messages without needing to grab your phone constantly. You can of course customize the watch display in various modes to include the date, current weather conditions, steps walked and more.
There is also a camera on the wrist band which can take pictures and short video clips which are automatically sent to your phone as well. The quality of the images are low at about 2mp which is to be excepted.
Because it is connected to your phone through Bluetooth it also acts as an extension to your phone. Incoming calls can be viewed to see who is calling without reaching for your phone and you can even accept or reject the incoming the call from the watch, You can even carry on a conversation with the watch.
The cons include the watch band which I have found is bigger then is should be which is probably the result of the camera which is in the band. Also the battery needs to be charged about every 2 days and there is a dock/cradle which you must use. I mentioned the ability to talk (on the phone) through the watch, however this is very difficult if not impossible in crowded places or if you want to have a private conversation. The last negative point I will mention here is that the Galaxy Gear currently only works with the Samsung Galaxy S II and III and Note 2 and 3.
In conclusion if you have one of the supported phones and you like some of the benefits I mentioned here you might enjoy checking this out. There is some real good uses here and it is always a conversation piece when people see it.
The Future of Wearable Technology
First is there a future here? The answer is yes and although we are in the very early stages of finding what works (the smart watch) and what does not (google glass). The "google glass" kind of freaked people out. Who wants to have a conversation with someone who's attention is obviously somewhere else and who could be taking pictures of you and even recording the conversation. However wearable technology is actually a natural fit for watches and I believe that this is the area where we will see a successful evolution and acceptance by consumers.
The smart watch will be the first successful and profitable wearable technology and this will probably occur during the next two years. You will see this when the watches get a little smaller and can act independently from smartphones.
So here we go.
The Galaxy Gear
The pros of this device are that it is great way to keep up to date with email and text messages without needing to grab your phone constantly. You can of course customize the watch display in various modes to include the date, current weather conditions, steps walked and more.
There is also a camera on the wrist band which can take pictures and short video clips which are automatically sent to your phone as well. The quality of the images are low at about 2mp which is to be excepted.
Because it is connected to your phone through Bluetooth it also acts as an extension to your phone. Incoming calls can be viewed to see who is calling without reaching for your phone and you can even accept or reject the incoming the call from the watch, You can even carry on a conversation with the watch.
The cons include the watch band which I have found is bigger then is should be which is probably the result of the camera which is in the band. Also the battery needs to be charged about every 2 days and there is a dock/cradle which you must use. I mentioned the ability to talk (on the phone) through the watch, however this is very difficult if not impossible in crowded places or if you want to have a private conversation. The last negative point I will mention here is that the Galaxy Gear currently only works with the Samsung Galaxy S II and III and Note 2 and 3.
In conclusion if you have one of the supported phones and you like some of the benefits I mentioned here you might enjoy checking this out. There is some real good uses here and it is always a conversation piece when people see it.
Every time I sit at the pub people ask, "hey is that - that smart watch on TV" and just about everyone I have met is curious about what it does. This leads to my prediction which follows. |
The Future of Wearable Technology
First is there a future here? The answer is yes and although we are in the very early stages of finding what works (the smart watch) and what does not (google glass). The "google glass" kind of freaked people out. Who wants to have a conversation with someone who's attention is obviously somewhere else and who could be taking pictures of you and even recording the conversation. However wearable technology is actually a natural fit for watches and I believe that this is the area where we will see a successful evolution and acceptance by consumers.
The smart watch will be the first successful and profitable wearable technology and this will probably occur during the next two years. You will see this when the watches get a little smaller and can act independently from smartphones.
Wednesday, November 20, 2013
Microsoft's eBay Store
I give Microsoft this. Microsoft has tried many innovative things over the past few years. This week Microsoft who already of course has their own retail website, not to mention over 75 Microsoft Store brick-and-mortar locations in the U.S. and Canada. Microsoft obviously has plans to expand their retail presence, and their latest effort in doing is the announcement of their very own store on eBay.
According to the Microsoft blog,” By working with eBay, a top global shopping destination with more than 124 million active users globally, even more customers can now purchase their favorite Microsoft first-party products including Surface and Xbox, as well as accessories. Our customers can expect the same safe online shopping experience, return policy and free shipping from the Microsoft Store on eBay that they’ve come to expect on microsoftstore.com.”
Right now, the eBay page for Microsoft does seem to arrive with a limited supply of products in comparison to the main Microsoft Store site. It is still selling the previous generation Surface and Surface Pro tablets at a discount, instead of having the most recent Surface products on sale. While everyone is looking forward to the Xbox One this weekend, the eBay page is still pushing the aged Xbox 360 console. I hope Microsoft updates their new eBay store soon because this is a great idea but the catalog needs to be updated if it to find success.
According to the Microsoft blog,” By working with eBay, a top global shopping destination with more than 124 million active users globally, even more customers can now purchase their favorite Microsoft first-party products including Surface and Xbox, as well as accessories. Our customers can expect the same safe online shopping experience, return policy and free shipping from the Microsoft Store on eBay that they’ve come to expect on microsoftstore.com.”
Right now, the eBay page for Microsoft does seem to arrive with a limited supply of products in comparison to the main Microsoft Store site. It is still selling the previous generation Surface and Surface Pro tablets at a discount, instead of having the most recent Surface products on sale. While everyone is looking forward to the Xbox One this weekend, the eBay page is still pushing the aged Xbox 360 console. I hope Microsoft updates their new eBay store soon because this is a great idea but the catalog needs to be updated if it to find success.
Monday, November 18, 2013
Introducing the LP Browser
Check out another Blog Site that I am partnered with at www.lpbrowser.blogspot.com.
If you love music and have or collect vinyl records be sure to check it out.
Here are some random examples of the custom made, handcrafted LP Browsers which are made out of the wood selected by the customer such as Douglas Fur, Poplar, Maple and Oak and stained in any style requested.
These presented here are proudly owned, displayed and used by this very blogger!
There will always be a link to the LP Browser Blog on the left panel of this fine blog.
Sunday, November 17, 2013
Looking Back on Challanger
What is the most complex accomplishment of our government in the past 50 years? To me this is a "no brainer". The ability to put human beings in space and return them safely home, as President Kennedy first proposed in the mid 1960's is easily the correct answer. We, the United States of America through NASA have now done this hundreds of times. All of this has not come without great risk... and tragedy.
NASA has made errors in design and judgment. There have been three occasions which led to death and disaster are February 21, 1967, when three astronauts will killed on the Launchpad while conducting a live test of Apollo 1. The second failure was on January 28, 1986 when the space shuttle Challenger exploded during launch killing all 7 astronauts on board. The most recent NASA disaster was when the Columbia exploded on re-entry killing all 7 astronauts on board on February 1, 2003.
On a mathematical scale alone the percentage of our success reaching into space is impressive. However percentages when considering human lives is an entirely different consideration. Each of these three disasters were caused by human error and each time started with problems in system design followed by arrogance by those making decisions even when the design flaws were brought to their attention.
So much of what we do on a daily basis and how we make decisions can be learned by reflecting on these 3 NASA disasters. NASA's space program is in a slow down period at this time because the space shuttle program has been retired after 20+ years of missions and although the new Orion program promises a return to the moon and then Mars it will take longer then it otherwise should, primarily because of our slumping economy and the non-committal of society in general.
This weekend I watched the new Discovery Channel movie, "The Challenger Disaster" which was excellent. Although there is some "dramatic license" with the telling of this true story it is well worth your time if you want to learn more about that space shuttle disaster. This is the Discovery Channel’s first dramatic feature film, The Challenger Disaster, staring Bruce Greenwood, William Hurt and Brian Denney.
The film is based around Richard Feynman’s investigation into the 1986 Space Shuttle Challenger disaster that killed all seven astronauts during liftoff.
Based on Dr. Feynman’s book What Do you Care What Other People Think, the film will follow Feynman’s efforts to discover the cause of the shuttle's explosion and expose the truth behind the disaster.
The Challenger Disaster premièred on Saturday November 16th The Science Channel and airs throughout the month. I recommend everyone check it out.
I have not read the book "Truth, Lies and O-Rings: Inside the Challenger Disaster" by Allan J. McDonald but it sits on my Kindle in the on-deck circle. This book has received excellent reviews and is now considered the best account of what went wrong with the Challenger. If you are interested in learning more check it out.
NASA has made errors in design and judgment. There have been three occasions which led to death and disaster are February 21, 1967, when three astronauts will killed on the Launchpad while conducting a live test of Apollo 1. The second failure was on January 28, 1986 when the space shuttle Challenger exploded during launch killing all 7 astronauts on board. The most recent NASA disaster was when the Columbia exploded on re-entry killing all 7 astronauts on board on February 1, 2003.
On a mathematical scale alone the percentage of our success reaching into space is impressive. However percentages when considering human lives is an entirely different consideration. Each of these three disasters were caused by human error and each time started with problems in system design followed by arrogance by those making decisions even when the design flaws were brought to their attention.
So much of what we do on a daily basis and how we make decisions can be learned by reflecting on these 3 NASA disasters. NASA's space program is in a slow down period at this time because the space shuttle program has been retired after 20+ years of missions and although the new Orion program promises a return to the moon and then Mars it will take longer then it otherwise should, primarily because of our slumping economy and the non-committal of society in general.
This weekend I watched the new Discovery Channel movie, "The Challenger Disaster" which was excellent. Although there is some "dramatic license" with the telling of this true story it is well worth your time if you want to learn more about that space shuttle disaster. This is the Discovery Channel’s first dramatic feature film, The Challenger Disaster, staring Bruce Greenwood, William Hurt and Brian Denney.
The film is based around Richard Feynman’s investigation into the 1986 Space Shuttle Challenger disaster that killed all seven astronauts during liftoff.
Based on Dr. Feynman’s book What Do you Care What Other People Think, the film will follow Feynman’s efforts to discover the cause of the shuttle's explosion and expose the truth behind the disaster.
The Challenger Disaster premièred on Saturday November 16th The Science Channel and airs throughout the month. I recommend everyone check it out.
I have not read the book "Truth, Lies and O-Rings: Inside the Challenger Disaster" by Allan J. McDonald but it sits on my Kindle in the on-deck circle. This book has received excellent reviews and is now considered the best account of what went wrong with the Challenger. If you are interested in learning more check it out.
Saturday, November 16, 2013
TA13-317A: Microsoft Updates for Multiple Vulnerabilities
Original
release date: November 13, 2013 | Last revised: November 16, 2013
Systems Affected
- Windows Operating System and Components
- Microsoft Office
- Internet Explorer
Overview
Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these vulnerabilities.
Description
The Microsoft Security Bulletin Summary for November 2013 describes multiple vulnerabilities in Microsoft software. Microsoft has released updates to address these vulnerabilities. The November Security Bulletin includes a patch for the new “watering hole” campaign which utilizes a US-based website that specializes in domestic and international security policy.
Impact
These vulnerabilities could allow remote code execution, elevation of privilege, information disclosure or denial of service.
Solution
Apply Updates
Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for November 2013, which describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). Home users are encouraged to enable automatic updates.
References
- Microsoft
Security Bulletin Summary for November 2013
- Microsoft
Windows Server Update Services
- Turn
Automatic Updating On or Off
Revision History
- November 13, 2013: Initial Release
Subscribe to:
Posts (Atom)