Monday, May 23, 2011
Big Brother Is Back!
Apple claims they are not tracking users but harvesting user information pertaining to cell towers and Wi-Fi network positions. Whether the tracking software is nefarious or benign is the matter of debate. It’s obvious that these “features” could be used for both beneficial or invasive purposes.
Arguments for the former include SocialPass, an iPhone app that is taking advantage of GPS location to offer discounts and deals based on the user’s location right here in Philly. Also, in January of this year, police were able to capture a criminal by using the GPS in the phone he stole from his victim in Upper Darby. Arguments against could include fear of stalkers, ex-spouses or others with ill intent who might like to track your whereabouts.
But don’t panic yet. The tracking by Apple on their mobile devices is stored in an unencrypted file on your mobile device and desktop or laptop if you sync devices. Although it’s not encrypted, it’s not readily accessible unless someone were to steal or hack your device.
Sony and Facebook are also under fire for failure to safeguard the private information of its users. A hack of Sony’s Playstation allowed thousands of users’ data to be compromised. A security breach in Facebook gave nearly 100,000 advertisers and 3rd party applications access to personal profiles, photos and chats according to Symantic, although it’s likely they weren’t aware they had access. Facebook has since rectified the problem. Facebook’s proliferation has tempted numerous unscrupulous persons to attempt hacking users’ accounts, so be careful.
Technology has become commonplace today and provides numerous advantages but it also poses a risk to your personal information. Weigh the risks to benefit ratio to decide what you use and share. One of the most common safeguards often ignored is managing your passwords. It bears repeating: use strong passwords and change them regularly.
In other news, Microsoft spent a whopping $8.5 billion to acquire Skype, the popular VOIP software that allows users to engage in voice or video conversations for free or connect to a phone for pennies. It plans to incorporate Skype in many of it’s products. Meanwhile, LinkedIn stocks went from $45/share to $94.25/share in it’s first day on the NYSE. 110% in one day? Not bad.
Friday, April 22, 2011
Just Browsing
If you have Internet access then you likely use a browser everyday. In fact, the popularity of the Internet was in part because of the first graphical web browsers like Netscape. Soon Microsoft used it’s marketing dominance by including it’s browser, Internet Explorer, with the Windows operating system resulting in the prolific use of IE. Soon Opera, Safari, Mozilla Firefox, Chrome and a host of others appeared to vie for Internet users attention.
If you consider yourself a web enthusiast then you may have chosen different browsers for specific purposes. You may notice that certain websites perform better on one browser than on another. Like anything, there are pros and cons in your choice.
Most browsers provide support like pop-up blockers, search fields and custom toolbars. Security features can be enabled or disabled by going to “Options” or “Internet Options” in the “Tools” menu dropdown. “Favorites” or “Bookmarks” are a common feature for saving your most commonly visited website addresses.
Besides these shared features there are some notable differences. Internet Explorer supports ActiveX which is sometimes used to enhance an application’s feature set. (Note: ActiveX can also be used to exploit your computer by untrusted sites.) Firefox does not support ActiveX and thus is noted as a safer browser with numerous plugins available for functionality, customization and usability. However, some plugins can actually hinder your browsers rendering speed. Google’s Chrome has gained popularity recently for eliminating extras in favor of simplicity and speed. Opera also concentrates on speedy delivery and Safari is used on Apple’s popular mobile devices like the iPhone and iPad.
Some useful features or plugins for your browser include Awesome Screenshot for Chrome which is great for capturing screenshots and modifying them to share on or offline. FireBug for Firefox is an excellent resource for developers for analyzing the code behind the page. Google toolbar has many features. One of the best of these is the Autofill for forms. Fill out your personal information and let the browser remember it to conveniently fill out similar web forms in the future. Safari has this built-in the “Edit” menu dropdown.
Today their are literally dozens of web browsers available. The most popular and their latest estimated use are Internet Explorer - 44%, Firefox - 29%, Google Chrome 14%, Safari 6%, Opera 3% and mobile browsers at 4%. For a long list of browsers and some of their features, visit http://www.multibrowsers.com . You may find one that fits your particular style or requirement. Happy surfing!
Wednesday, March 23, 2011
You’ve Got Mail! or not...
So I understand when people come to me regarding problems with their e-mail. We’ve come to rely on e-mail to get to it’s destination quickly and without incident but it doesn’t always work as expected. So I thought I’d give a brief history and then trace the path of an e-mail.
E-mail emerged from businesses’ need for communication within their own network. Then came e-mail services that acted much like some social networks today. You could only communicate with those who were also subscribed to your brand of e-mail but not to anyone outside of it. Of course this was less than optimal so today we have e-mail that can communicate with anyone else on the planet that has an e-mail address.
The top three free e-mail services today are Hotmail, Yahoo and Gmail with a combined 600+million subscribers. Then there are a plethora of other e-mail servers that accommodate the many website domain names out there.
If your message doesn’t reach it’s destination, there are numerous possibilities why. Your message originates as simple text with a header that determines the recipient. Your e-mail server searches the internet to find a nameserver which defines the physical location of the e-mail server hosting your recipients e-mail. If that can’t be found it isn’t going anywhere. If it is found it must travel a virtual gauntlet. E-mail travels along the many ISP lines owned and maintained by companies like Verizon, Comcast, ATT, and others on it’s way from server to server like a passenger on a train going from station to station. There are typically from 6 to a dozen servers along a given path. If any of those lines are disconnected or any of those servers are down then your e-mail could be delayed or lost completely.
Not only that but your message also has to transverse a series of firewalls, anti-virus and anti-spam programs. The anti-spam alone compares information in the e-mail against 25+ lists maintained with typical spam triggers. Systems are usually “weighted” to give more credibility to some of these lists than others. However, if your e-mail has elements flagging it on enough of these list compares, it is caught in the anti-spam net. The trick for e-mail server administrators has always been how to configure the “perfect” scenario to catch the true spam without catching the legitimate e-mail. Some services are better than others in this area.
So if your e-mail doesn’t reach it’s destination, there’s just a couple of possibilities for it’s failure. Don’t fret. It’s still more reliable than my post office.
Saturday, February 26, 2011
The Next Big Thing
A wave of technology is breaking against the consumer world. Although the amplitude is relatively the same, the frequency is increasing exponentially. It’s so prolific that Best Buy has touted it’s buy back program on recent commercials. (You know the ones, “3G, 4G, 5G, 6G”...”A new phone is out that’s better than yours”)
The latest and possibly the most influential items tossed our way is the cloud and the tablet. You might find, as many others do, that there is a cloud surrounding the “cloud”. A simple definition for the “cloud” was reiterated by the speaker at a seminar in New York I attended a few weeks ago, ‘Any solution that uses another computer through a network’. Acknowledging that definition implies we’ve been using the “cloud” for years in one form or another. So why all the hype? Part of that is a marketing method latched onto by many companies to infuse new fire into older products that have been using the technology and some is the new ways in which it is being used.
The tablet has been a ripple until Apple’s iPad hit the scene. Apple announced it sold over 7.3 million iPads in the 4th quarter of 2010 alone, raising the number to over 19 million for the year. The popularity has attracted other big players such as google whose Android platform is now featured on the Samsung Galaxy Tab, Dell Streak, Motorola Xoom and soon on devices by Toshiba, HTC and LG according to Ian Paul of PC World. This is leading some to predict the total sales of tablets to triple this year. That is a flood of tablets entering our media world. Watch a movie, watch TV, listen to music, read a book and send a spreadsheet all in the palm of your hand. Not too big, not too small. It’s somewhat surprising tablets didn’t take off when they were introduced a decade ago.
The combination of these and other trends is changing the way we produce, seek and view media similar to how TV entered nearly every home in the twentieth century. The continual advances of the internet, cloud computing, tablet technology and mobile access combined with social networks are changing how we work, play and view the world. And just like TV it is producing both good and bad consequences in many ways. Let’s hope the good win out.