Sunday, April 15, 2012

Google+ and Play

Google has unveiled some powerful new features to their arsenal. Google+ has got a facelift and easy controlled sharing. Google Play now allows you to backup and access your music, images and videos from anywhere. Play also allows you to purchase books, music and more. Watch out Facebook, iTunes and Amazon. Google is poised to take a big bite out of your business. So says me. 8)

Another feature worth noticing is 2 step verification. With Google creating a cloud version of all your apps (including phone), storage and identity, the 2 step verification is a good practice to secure your profile across all devices and computers you use. The virtual You is happening. Keep it safe.

Monday, February 20, 2012

Spam "over" attackers

Email continues to be one of the most frustrating and productive internet tools. I would probably be lost without it but as an email server administrator it can be extremely frustrating.

If I were to choose based on my overall experience, I would say your best options would be Gmail, Yahoo and Hotmail. Worst to date is AOL. AOL has a history of the most aggressive spam filtering. Unfortunately, you can't be too aggressive in your spam filtering because it then catches legitimate and sometimes time-sensitive emails. This has been a recurring theme for years.

Gmail, which I've been extremely happy with, also has its quirks. Recently, two clients complained of emails getting lost or not delivered. Because Gmail was spot-on in their filtering for so long, users seldom if ever found it necessary to check their spam folder. Well that's changed in the past couple weeks according to some user experiences.

Companies are making changes to their technology so fast that they seem to steamroll the things they got right to begin with. I look forward to a new protocol to replace an antiquated system. Email has been around a looooong time. In most cases, technology from that era has been deemed obsolete and rendered extinct. Let's hope email holds on until the next best means of communication comes along.

Monday, May 23, 2011

Big Brother Is Back!

The modern moguls of the mobile world, Apple and Google, have both admitted that they can and do track mobile devices using their independent operating systems along with GPS from a mobile carrier. (Subsequent statements deny these claims.) This has sparked debate as many see the action as a “big brother” invasion of privacy. The Senate has called a hearing with executives of both Google and Apple to discuss the privacy concerns along with members of the FTC. The FTC is advocating “Do Not Track” features on mobile devices much like the features now found on web browsers.

Apple claims they are not tracking users but harvesting user information pertaining to cell towers and Wi-Fi network positions. Whether the tracking software is nefarious or benign is the matter of debate. It’s obvious that these “features” could be used for both beneficial or invasive purposes.

Arguments for the former include SocialPass, an iPhone app that is taking advantage of GPS location to offer discounts and deals based on the user’s location right here in Philly. Also, in January of this year, police were able to capture a criminal by using the GPS in the phone he stole from his victim in Upper Darby. Arguments against could include fear of stalkers, ex-spouses or others with ill intent who might like to track your whereabouts.

But don’t panic yet. The tracking by Apple on their mobile devices is stored in an unencrypted file on your mobile device and desktop or laptop if you sync devices. Although it’s not encrypted, it’s not readily accessible unless someone were to steal or hack your device.

Sony and Facebook are also under fire for failure to safeguard the private information of its users. A hack of Sony’s Playstation allowed thousands of users’ data to be compromised. A security breach in Facebook gave nearly 100,000 advertisers and 3rd party applications access to personal profiles, photos and chats according to Symantic, although it’s likely they weren’t aware they had access. Facebook has since rectified the problem. Facebook’s proliferation has tempted numerous unscrupulous persons to attempt hacking users’ accounts, so be careful.

Technology has become commonplace today and provides numerous advantages but it also poses a risk to your personal information. Weigh the risks to benefit ratio to decide what you use and share. One of the most common safeguards often ignored is managing your passwords. It bears repeating: use strong passwords and change them regularly.

In other news, Microsoft spent a whopping $8.5 billion to acquire Skype, the popular VOIP software that allows users to engage in voice or video conversations for free or connect to a phone for pennies. It plans to incorporate Skype in many of it’s products. Meanwhile, LinkedIn stocks went from $45/share to $94.25/share in it’s first day on the NYSE. 110% in one day? Not bad.

Friday, April 22, 2011

Just Browsing

Some think the browser may soon become the most important piece of software on your computer...if it isn’t already. With the continual increase in cloud services you can understand why. (I’m writing this on Google docs.) Now that Microsoft offers a choice by ballot on Windows 7 operating system there may be more exploration and experimentation with the more popular browsers available today.

If you have Internet access then you likely use a browser everyday. In fact, the popularity of the Internet was in part because of the first graphical web browsers like Netscape. Soon Microsoft used it’s marketing dominance by including it’s browser, Internet Explorer, with the Windows operating system resulting in the prolific use of IE. Soon Opera, Safari, Mozilla Firefox, Chrome and a host of others appeared to vie for Internet users attention.

If you consider yourself a web enthusiast then you may have chosen different browsers for specific purposes. You may notice that certain websites perform better on one browser than on another. Like anything, there are pros and cons in your choice.

Most browsers provide support like pop-up blockers, search fields and custom toolbars. Security features can be enabled or disabled by going to “Options” or “Internet Options” in the “Tools” menu dropdown. “Favorites” or “Bookmarks” are a common feature for saving your most commonly visited website addresses.

Besides these shared features there are some notable differences. Internet Explorer supports ActiveX which is sometimes used to enhance an application’s feature set. (Note: ActiveX can also be used to exploit your computer by untrusted sites.) Firefox does not support ActiveX and thus is noted as a safer browser with numerous plugins available for functionality, customization and usability. However, some plugins can actually hinder your browsers rendering speed. Google’s Chrome has gained popularity recently for eliminating extras in favor of simplicity and speed. Opera also concentrates on speedy delivery and Safari is used on Apple’s popular mobile devices like the iPhone and iPad.

Some useful features or plugins for your browser include Awesome Screenshot for Chrome which is great for capturing screenshots and modifying them to share on or offline. FireBug for Firefox is an excellent resource for developers for analyzing the code behind the page. Google toolbar has many features. One of the best of these is the Autofill for forms. Fill out your personal information and let the browser remember it to conveniently fill out similar web forms in the future. Safari has this built-in the “Edit” menu dropdown.

Today their are literally dozens of web browsers available. The most popular and their latest estimated use are Internet Explorer - 44%, Firefox - 29%, Google Chrome 14%, Safari 6%, Opera 3% and mobile browsers at 4%. For a long list of browsers and some of their features, visit http://www.multibrowsers.com . You may find one that fits your particular style or requirement. Happy surfing!

Wednesday, March 23, 2011

You’ve Got Mail! or not...

I’ve been anxiously expecting a few letters. I haven’t received them. I’m accustomed to getting my mail everyday but I haven’t received any mail for an entire week. Two visits and a phone call later, I still have no mail even though I live across the street from the post office. Very frustrating! We expect our messages to get through. Afterall, we are living in the 21st century.

So I understand when people come to me regarding problems with their e-mail. We’ve come to rely on e-mail to get to it’s destination quickly and without incident but it doesn’t always work as expected. So I thought I’d give a brief history and then trace the path of an e-mail.

E-mail emerged from businesses’ need for communication within their own network. Then came e-mail services that acted much like some social networks today. You could only communicate with those who were also subscribed to your brand of e-mail but not to anyone outside of it. Of course this was less than optimal so today we have e-mail that can communicate with anyone else on the planet that has an e-mail address.

The top three free e-mail services today are Hotmail, Yahoo and Gmail with a combined 600+million subscribers. Then there are a plethora of other e-mail servers that accommodate the many website domain names out there.

If your message doesn’t reach it’s destination, there are numerous possibilities why. Your message originates as simple text with a header that determines the recipient. Your e-mail server searches the internet to find a nameserver which defines the physical location of the e-mail server hosting your recipients e-mail. If that can’t be found it isn’t going anywhere. If it is found it must travel a virtual gauntlet. E-mail travels along the many ISP lines owned and maintained by companies like Verizon, Comcast, ATT, and others on it’s way from server to server like a passenger on a train going from station to station. There are typically from 6 to a dozen servers along a given path. If any of those lines are disconnected or any of those servers are down then your e-mail could be delayed or lost completely.

Not only that but your message also has to transverse a series of firewalls, anti-virus and anti-spam programs. The anti-spam alone compares information in the e-mail against 25+ lists maintained with typical spam triggers. Systems are usually “weighted” to give more credibility to some of these lists than others. However, if your e-mail has elements flagging it on enough of these list compares, it is caught in the anti-spam net. The trick for e-mail server administrators has always been how to configure the “perfect” scenario to catch the true spam without catching the legitimate e-mail. Some services are better than others in this area.

So if your e-mail doesn’t reach it’s destination, there’s just a couple of possibilities for it’s failure. Don’t fret. It’s still more reliable than my post office.

Saturday, February 26, 2011

The Next Big Thing

A wave of technology is breaking against the consumer world.  Although the amplitude is relatively the same, the frequency is increasing exponentially.  It’s so prolific that Best Buy has touted it’s buy back program on recent commercials.  (You know the ones, “3G, 4G, 5G, 6G”...”A new phone is out that’s better than yours”)

The latest and possibly the most influential items tossed our way is the cloud and the tablet.  You might find, as many others do, that there is a cloud surrounding the “cloud”.  A simple definition for the “cloud” was reiterated by the speaker at a seminar in New York I attended a few weeks ago, ‘Any solution that uses another computer through a network’.  Acknowledging that definition implies we’ve been using the “cloud” for years in one form or another.  So why all the hype?  Part of that is a marketing method latched onto by many companies to infuse new fire into older products that have been using the technology and some is the new ways in which it is being used.

What is happening is a shift from reliance on our personal or business computers and the catalog of programs we load on them to simply accessing programs that are built and maintained on another network, in most cases through the internet.  Many enterprise businesses are already eliminating cost of IT personel, servers, backup, hardware upgrades and maintenance by using “cloud” based systems.  It appears this shift is starting to infiltrate the consumer world as well.

The tablet has been a ripple until Apple’s iPad hit the scene.  Apple announced it sold over 7.3 million iPads in the 4th quarter of 2010 alone, raising the number to over 19 million for the year.  The popularity has attracted other big players such as google whose Android platform is now featured on the Samsung Galaxy Tab, Dell Streak, Motorola Xoom and soon on devices by Toshiba, HTC and LG according to Ian Paul of PC World.  This is leading some to predict the total sales of tablets to triple this year. That is a flood of tablets entering our media world.  Watch a movie, watch TV, listen to music, read a book and send a spreadsheet all in the palm of your hand.  Not too big, not too small.  It’s somewhat surprising tablets didn’t take off when they were introduced a decade ago.

The combination of these and other trends is changing the way we produce, seek and view media similar to how TV entered nearly every home in the twentieth century.  The continual advances of the internet, cloud computing, tablet technology and mobile access combined with social networks are changing how we work, play and view the world.  And just like TV it is producing both good and bad consequences in many ways.  Let’s hope the good win out.


Sunday, January 30, 2011

Communication Breakdown?

You could argue we live in a world of communication overload.  Telephone, text messages, instant messaging, blogs, Facebook, Twitter, RSS feeds, e-mail, postal mail, TV, radio,...did I miss anything?  Oh yeah! Tablets are here.  Can you name how many of these forms of communication is not tied to the Internet in some way? One.  Every modern form of communication is influenced by or provided by the Internet.  And there’s some big news where the Internet is concerned.  We’ll mention our top contenders.

In our number one spot goes back to the roots.  ARPA, Advanced Research Projects Agency, was responsible for the first computer network that eventually became the Internet using a 32bit addressing system.  The current addressing system, IPv4 (Internet Protocol version 4), allows for over 4.2 billion addresses...and we’re running out!  Vint Cerf who was part of the ARPA project and a Vice President at Google is involved again promoting the new version 6 that will allow for hundreds of trillions of addresses.  Google along with Facebook and Yahoo! are planning on testing the newer protocol within their highly trafficked sites on June 8, 2011, proclaimed by the Internet Society as World IPv6 Day. This will be the largest scale use to date and could determine the future of the Internet, literally.  Anyone remember that webpage that said “You’ve reached the end of the Internet”?  Who’d a thunk?

Web 2.0 has been around for awhile now and video is a large part.  You can watch TV shows, movies, tutorials and public videos on the web now.  It may be transparent to most but the new standards for web documents are in process and its name is HTML5.  Well, unfortunately there continues to be no agreed upon standard for videos.  They’ve been dispersed into proprietary formats for Flash, Quicktime, Windows Media Player and more. Just when developers and users thought that a new standard would be born for the future of web video, the big players, Google, Adobe, Apple, Microsoft and others can’t agree on what that should be.  So, Mozilla’s Firefox and Chrome backed by Google will support one format while Microsoft’s Internet Explorer will support a different format.  The losers? You, the users who will undoubtedly carry the headache of installing plugins (and don’t forget updates) for your browser and web developers that will continue to pay for the burden of these Goliath vs. Goliath battles by creating workarounds and multiple outputs to allow the masses to view in their favorite format.

Speaking of video entertainment, federal regulators approved a merger between Comcast and NBC (who also owns majority stake in Hulu, a provider of network TV on the Internet) on January18th.  Apparently, a stipulation was that the merger support the emerging online video market and broadband accessibility rather than stifle or manipulate the market with their formidable combined content and delivery capabilities.  I’m sure they’ll be happy to comply.  Relatively sure...