Beruflich Dokumente
Kultur Dokumente
10
Essential Business Tech
Lincoln, NE 68521
Circulation
(To adjust your bulk order or to
request racks.)
Technology intelligence for executives, marketing@pctoday.com
professionals, and entrepreneurs (800) 334-7458
36
Customer Service
(For questions about your sub-
scription or to place an order or
change an address.)
customer-service@pctoday.com
Mobile Office (800) 733-3809
FAX: (402) 479-2193
Highly useful information for conducting
business on the road
PC Today
P.O. Box 82545
Hours
Personal Electronics Mon. - Fri.: 7 a.m. to 8 p.m. (CST)
Sat.: 8 a.m. to 4 p.m. (CST)
If you think you know Xerox, think again. Although Xerox
Online Customer Service
continues to be the undisputed king when it comes to business- Electronics, services, and helpful advice
& Subscription Center
class copiers, printers, and document management systems, the for home and leisure www.pctoday.com
company’s new “Ready For Real Business” campaign highlights
the company’s B2B offerings. Turn to page 10 to find out more Authorization For Reprints
about the back-office business services Xerox provides for mid- (800) 247-4880
68 3809.
❚ Motorola To Invest $3.5 Billion Calif.,-based Cellmania, but few running Google’s Android OS to
In Mobility Division details were forthcoming from hit the market. HTC manufactured
In July Motorola announced it either company. Cellmania focuses the G1 and the G2, adding im-
would split in two, with Motorola on mobile application distribution provements to the G2 that comple-
Mobility becoming a unit devoted to and interface customization tech- ment the new Android 2.2 (aka
wireless products and home devices nologies and has a client list that Froyo) software. In addition to a
separate from Motorola Solutions. includes all of the major U.S. and touchscreen, the G2 features a
Motorola has since added that it in- European wireless carriers. swing-out QWERTY keyboard. The
tends to contribute $3.5 billion to the G2 works as a fast 4G phone in the
Mobility units, pending approval by ❚ AOL Continues Push cities where coverage is available
the board. The split is scheduled to For Mobile Crowd and supports Adobe Flash.
occur in Q1 2011. AOL will buy Rally Up, a year-old
development company specializing ❚ Walmart & T-Mobile Offer
❚ HP Gives Small ❚ Alcatel-Lucent Invests In in location-based social networking Contract-Free Calling
Businesses “Just Right IT” App Development applications for Apple’s iPhone and T-Mobile has found some inter-
HP recently launched a French technology company iPad. According to AOL, the Rally esting ways to compete in a market
line of products under the Alcatel-Lucent, which has shown Up team will move to AOL’s new dominated by contending wireless
“Just Right IT” banner, all interest in mobile app development, Palo Alto, Calif., facilities and work carriers, including its new affiliation
designed to make tech- will expand its capabilities in that with AOL on developing products with Walmart. The Walmart Family
nology run smoother for area with the acquisition of the that will be introduced initially as Mobile plan offers customers af-
SMBs. The products are Taiwanese company OpenPlug. mobile apps. fordable post-paid cellular plans
scaled to meet the needs of Known for its FlexibleWare tech- with no contract or multi-year com-
a variety of business types nology, OpenPlug offers a platform ❚ Apple Ditches Quattro For iAds mitment required. The plan also in-
and sizes and run the that helps developers create applica- Apple purchased the mobile adver- cludes a WebPak, a refillable card
gamut from desktop com- tions for multiple mobile operating tising company Quattro Wireless in that provides Internet access and
puters and printers to systems simultaneously. Terms of January for $275 million, but recently low-cost international calling.
servers and storage arrays. the acquisition were not disclosed. announced plans to shut down its ad
The portfolio also includes service in favor of Apple’s own iAd. ❚ Search Engine Deals
a wireless access point and ❚ Cisco & Citrix Team Up For Replacing the text on the Quattro The two largest search engines,
software for server and Virtual Desktop Simplicity Wireless Web site, Apple posted, “We Google and Bing, continue to ex-
storage management, believe iAd is the best mobile ad net- pand beyond their home portals.
backup, and recovery. work in the world,” adding that it Acting on an agreement reached ear-
would wind down existing Quattro lier this year, Microsoft’s Bing is now
Wireless Network campaigns the search engine behind Yahoo!
Cisco Systems and Citrix have through September. And in a farther-reaching move,
teamed up to offer a package Google and AOL agreed to continue
that combines Cisco’s Unified ❚ T-Mobile Releases Follow-Up its partnership (with Google pro-
Computing System and Citrix’s To First Android Phone viding search functionality) and ex-
XenDesktop virtualization software. The T-Mobile G2 is the follow-up tend it to include Google-supported
Bearing the lengthy name Cisco to the G1, the first smartphone mobile services for AOL.
Desktop Virtualization Solution with
Citrix XenDesktop, the package is
now available to businesses looking
for easy deployment of virtual
Windows desktops across a variety
of locations and devices.
❚ Huge Potential
For Wireless Charging
How Marketing It should come as no surprise that
Conferences or seminars
Execs Stay Current people get annoyed with using and
association meetings
LinkedIn, Facebook, or Twitter
tising executives have at least currently available solutions. Note-
a little bit of trouble keeping worthy, though, is the willingness of
up with today’s social media 40% of those survey respondents to pay
Trade publications
trends. Of the 375 surveyed, $50 or more for a wireless charging so-
56% reported finding it lution. Based on its research, In-Stat
“somewhat challenging” to forecast that the market potential for
keep up with social media and wireless charging gear will reach $4.3
9% said they find it “very billion by 2014.
challenging.” The remaining
35% found it not difficult at ❚ Semiconductor Rollercoaster
all, but that doesn’t mean they The latest semiconductor revenue fore-
Blogs
think social media is the best cast from research firm Gartner indicates
resource. Most prefer confer- that worldwide revenues will reach $300
ences, seminars, and in-person billion this year, marking a 31.5% in-
networking events. Here are crease over 2009, when revenues hit $228
the top responses for the re- 23% billion. Gartner analysts warn, however,
17% 18%
sources those surveyed find 14% 15% that production cuts in electronics indus-
7% tries around the globe won’t sustain this
most useful:
growth; it projects a mere 4.6% increase
in 2011 (to $314 billion) over 2010.
If You Think
You Know Xerox,
THINK AGAIN
Documentation Giant Expands, Adds B2B Services
erox is the undisputed king when it like. But the acquisition of ACS (and the services it
comes to business-class copiers, printers, allows us to offer) gives us an opportunity from an
and document management systems. But advertising perspective to reposition the brand with
if you think you know Xerox, think again. this campaign, to bring to light these capabilities,
It may be time to expect the unexpected. and to do it in a way that’s very fresh, very much a
The venerable giant (it’s been around breakthrough, particularly in the B2B space.
in one form or another since 1906) has un-
dertaken a far-reaching, multifaceted re- What business services is Xerox promoting?
branding effort aimed at letting business We have what we’ve always been doing, our doc-
users know just how much Xerox can do for them; ument management services. And then there are IT
the ultimate goal is to have mid- to large-enterprise outsourcing, HR services, customer care support, fi-
organizations outsource to Xerox those business- nance, and accounting services. Those are the ones
related functions that are not core to their business. for the campaign that we’re focusing on at the outset.
Thus, Xerox is now prepared to help those compa-
nies get “ready for real business” by offering B2B
services in the areas of finance and accounting,
human resources, customer care, IT outsourcing, and
document management. We spoke with Barbara
Basney, Xerox’s vice president of global advertising,
about the rebranding effort.
A few years back, Xerox launched a campaign most powerful way, I think, to tell the story of our ex- NOT YOUR PARENTS’
designed to rebrand the company as a document panded offerings and what we can do for our cus- XEROX & NOT
YOUR PARENTS’ AD
management company, rather than simply as a tomer/partners.
CAMPAIGN
provider of technology. What’s the relationship of
that campaign to this one? Can you explain a little about how Marriott The new campaign is defi-
That was the first step toward this bigger vision International and Target, to select two examples, nitely a different approach
of getting the company more firmly rooted in the are using Xerox services in their business? for historically staid
Xerox. The Web site (at
services space. It was a natural next step for us Basically Marriot had a global invoice process.
www.realbusiness.com) is
from being a document technology provider. This It was paper-based, it was very time-consuming, a multimedia extrava-
is certainly still a big part of it, and the campaign and it wasn’t very efficient; we partnered with ganza, complete with
doesn’t leave that off the table, but moves it for- them to help digitize and leverage workflow tech- music, video, tours of a
ward tremendously by adding all these other capa- nologies in that process. The end result is, on a virtual building, in-jokes,
customer stories, roaring
bilities and service offerings. global basis, the 11 million invoices and docu-
motorcycles, and
ments that they were processing were done more “Bullseye,” Target’s fa-
Given that our readers think they know Xerox quickly and efficiently, saving time and money. We mous Miniature Bull
pretty well, they may be surprised at the breadth provided the automation of that process for them Terrier mascot.
of these new service offerings. Finding that Xerox on a global basis.
It’s cute, all right. And it’s
now offers HR services or IT outsourcing may be Target, as a preeminent retailer, has extensive
funny. But it’s also se-
a bit unexpected. data on customers’ buying habits and purchase be- rious business, aimed at
It may be a surprise, but clearly with a cam- havior. In this case, Xerox helped them leverage communicating Xerox’s
paign like this we did some testing here, and it’s our XMPie [cross-media, one-to-one marketing] message to companies:
the right surprise. It’s: “I didn’t know they were ca- software, and helped them provide customization The new Xerox can im-
prove your company’s
pable of doing some of these things!” But it’s good of direct marketing materials going out to their
bottom line by relieving
to know, it’s credible, and it’s something that cer- customers. So, really making what you’re receiving your people of peripheral
tainly changes their perception of us and what we relevant and timely. As a result, Target saw double- functions and activities
can do for their company, and that is the intention digit response rates with those communications, a so that they can concen-
of the campaign. 50% lift [in data mining effectiveness], and a 30% trate on their real busi-
ness goals.
reduction of their production costs.
What are some of the companies Xerox is working
with in the ad campaign? People readily associate Xerox with copiers and
Out of the gate, we’re working with some global printers. Does that continue to be a strong busi-
brands and preeminent partner/customers. ness for Xerox?
Marriot, Procter & Gamble, Target, Ducati, and Our traditional printing, copying, and document
Notre Dame are the ones that we’re featuring to technology business still amounts to almost half of
begin with. And there are more to come.
The power of a campaign like this is in
the breadth of the story-telling, so our This is the largest and most integrated
intention is to keep this going, get a lot
of momentum behind it. campaign we’ve ever done.
How common is it for a company to use
its customers’ brands—and even their logos—in a our revenue. We have a very strong commitment to
marketing campaign? technology. Remember, too, that technology is also
In the course of advertising history, it’s certainly what helps enable solutions in the services space, so
been done with some degree of regularity, but I think it works together very synergistically, as well. It’s
that one of the insights around this campaign idea is still very important to our business.
that of “being ready for real business.” We’re putting
the spotlight on our customers and really show- What’s next for Xerox now that the new campaign
casing in an engaging way how we’re behind the is underway?
scenes helping them, giving them the freedom to I think that we concentrate on the power of this
focus on their real business. That’s our insight here. campaign and the opportunity of seeing it grow. We
And the power of telling that story comes from just launched on the 7th of September, so we’re just
naming who they are and explaining—in a very out of the gate and we’re looking forward to the
easy-to-understand way—what it is we do for them. care and feeding of this campaign and seeing it go
I think that’s core to that campaign concept and the well into 2011 and beyond. ▲
ENTERPRISE
SECURITY
Today’s Risks
by Seth Colaner
The Internet
E
nterprise security is an ongoing, high-
stakes game of one-upmanship between cy- The Internet is the world’s largest playground
bercriminals and security professionals, for social engineers, spammers, and hackers.
wherein the players dodge, parry, and thrust. These people might try to use every scam or trick
Both sides adapt to the others’ tactics in the in the book to get you to divulge sensitive infor-
perennial struggle for data, with the baddies at- mation they can sell to other crooks, use to steal
tacking here and the good guys thwarting there. identities, use to hack into financial accounts and
As many organizations gravitate to cloud com- past company firewalls, make money at your ex-
puting and virtualization technology, the oppor- pense, and spread chaos or malice.
tunities for attacks and means by The traps are laid everywhere. Social net-
which they’re carried out have grown working sites such as Twitter, Facebook, and
and evolved. Apple’s new Ping are rife with URLs that will
Security in the enterprise is more lead you to something unsavory if clicked; or
than defending the perimeter from as- worse, they’ll acquire and change the login cre-
sailants, however; it’s also about en- dentials of a friend of yours and then pose as that
suring that your hardware and software person and ask you for information. Hackers will
run properly. Just as the office building also artificially push their fake Web sites to the
needs to be monitored and maintained, top of search engine results by determining the
your technology needs expert hands hottest trending terms and filling their sites with
keeping it healthy. them. When you click one of their links, you may
Web browsers or Web Enterprises are vulnerable from targeted at- find yourself prompted to download malware
applications that tacks by cybercriminals, destructive malware, under the guise of something legitimate.
lack patches or
hardware or software failures, and the inevi- Prompting computer users to download fake
are not updated are
vulnerable to attacks. table problems of human error. Furthermore, security software has become a multilayered
security issues come from a variety of places. piece of criminal art. There was a time when a
Some are obvious, although others may not be bug on a Web site would ask you to download a
quite so intuitive. piece of software that turned out to be malware;
Although many cloud providers use robust se- flash drive, every computer he plugs his flash
curity policies and implementations, cloud drive into at work or at home could also become
providers that lack necessary security measures infected. It’s rather easy for a flash drive that is
are low-hanging fruit for hackers. used by an employee at home to find its way to a
corporate machine, where an infection could
Mobile Devices wreak havoc.
Smartphones are becoming de rigeur for workers
on virtually every level of a company; they’re not Employees
just for the folks in the corner office anymore. It’s probably no surprise that one of the weakest
Further, many workers sync their personal smart- links in the security chain is a human being. People
phones with their company email accounts. make mistakes: they sometimes lose devices, click
Smartphones store a certain amount of data, bad links, or make uninformed decisions.
including contact information and personal de- Furthermore, social engineering schemes work
tails, but they also function as a portal to a com- solely because a malicious person does something
pany in the form of synced email (if nothing that dupes people. Scams in general, and social
The rise in
popularity of
cloud computing means
that hackers have yet another attack vector.
else). Just as having your smartphone synchro- engineering specifically, work because people (in-
nized to your work email is a powerful and con- advertently) give away important information,
venient tool, it also becomes a vulnerability if the such as login credentials, account numbers, com-
device is lost or stolen. A pilfered smartphone is pany information, and other sensitive data.
a veritable gold mine for identity thieves and so- Additionally, angry or disgruntled employees
cial engineers. can also present a risk, whether it’s stealing com-
Laptops present a similar, but in many ways pany data or some act of malevolence such as
more grave, risk. A lost or stolen laptop is chock- planting malware or disabling systems.
full of company secrets, internal communication, Fortunately, people are also the best defense
and personal details. against security threats. Both security professionals
USB flash drives, though eminently convenient who actively monitor and protect against mali-
for toting many gigabytes around in your pocket, cious attacks and other insecurities and employees
are also perfect vehicles for infecting computers who are educated about the schemes, scams, and
with malware. They’re ubiquitous, and if a co- other dangers can go a long way toward keeping
worker inadvertently picks up some bug on a your enterprise secure. ▲
Facing Today’s
KEY POINTS
▲ Organizations need to
do a gap analysis to de-
termine whether their
Enterprise
current security policies
cover new technologies
that could potentially
expose corporate data.
▲ Cloud-based backup
services productivity ap-
plications should have
third-party security certi-
Security Risks
fications in place. New Technologies & Initiatives Hinder Threat Management
▲ Accept that your
employees will use per- by Tessa Warner Breneman
sonal mobile devices
and social networking
E
services, and then edu- nterprise security risks are increasingly more difficult to manage.
cate them on appropriate With cloud computing on the rise, consumer devices infiltrating the
use and how to recog-
nize threats. network, and sophisticated attacks making their way to the network,
▲ Consider managed your security staff faces more difficult challenges than ever before.
security services as
a way to deal with
According to Symantec, cyber attacks cost or- couple of years. We’re really in a different environ-
the changing threat
landscape. ganizations an average of $2 million per year. In ment here. The security community is at a signifi-
its 2010 State of Enterprise Security Study, cant disadvantage.”
Symantec found that 75% of organizations re-
ported a cyber attack in the past 12 months. Know Where To Start
Additionally, 29% of respondents said attacks Updating your security policies is a step for-
have increased in the past year. These statistics ward in addressing today’s enterprise security
plus strict regulations and new business initiatives risks, but it can be difficult to know where to start
and which new technologies
and initiatives are causing
the widest security holes.
“
Because there are
few security measures
“Every large company al-
ready has some sort of secu-
built into IaaS rity program in place,” says
John Pescatore, vice presi-
(infrastructure as a service),” dent and distinguished ana-
says Jonathan Penn, lyst at Gartner Research. “In
a Forrester Research general, what we find is
that there are a couple areas
vice president, “users are that are causing the most
responsible for securing their breakage in the existing
assets, including plans and policies. One of
those is changes in the way
the operating system, IT is being delivered.”
applications, and files.
” According to Pescatore,
virtualization, the use of SaaS
(software as a service), cloud-
in Web 2.0 environments are adding to the daily based services, consumer-grade devices on the net-
headaches of security personnel. work, and the social Web are the primary gaps in
“Things are getting worse,” says Jonathan Penn, security policies today. Additionally, outside
vice president at Forrester Research. “Hackers are threats have become more targeted and financially
more resourced and more sophisticated. That’s motivated. Penn echoed Pescatore’s assessment of
been happening for a while, but I think we’re at the threat landscape, adding that many businesses
the point now where it’s escalated over the past don’t really know when they are being attacked,
A recent Forrester
Research survey indi-
cates the technologies
and initiatives that
concern enterprise man-
agers the most when
addressing the issue of
security risks.
door to additional security risks for enterprises. Pescatore also addressed the use of smart-
Forrester’s State Of Enterprise IT Security And phones. If employees want to use their personal
Emerging Trends report, co-authored by Penn, smartphones for work purposes, IT should ensure
states that consumerization concerns IT per- it can enforce password-protection and automatic
sonnel more than the cloud or virtualization. The timeout if the device is not used for a specific
report found that 46% of enterprises are con- amount of time. Additionally, Pescatore says
cerned with smartphones, while 38% said Web smartphones should have enforceable content en-
2.0 technologies are worrisome. In comparison, cryption, remote wipe capabilities, and active sync
37% of respondents cited concerns over cloud support. Most of the smartphone operating sys-
computing, while 34% said data center virtualiza- tems on the market offer these capabilities, but all
tion was cause for concern. To accommodate devices on the network should meet these require-
these changes, businesses must first accept that ments, Pescatore says.
employees will use these devices and services,
and then they must write policies around their Outsourcing Security
use within the workplace. Many enterprises are looking to outsource se-
“Don’t just say no, because [employees] are curity as a way to deal with the changing land-
going to do it anyway,” Penn says. “You need to scape and to reduce security costs. Penn says it’s
reach out to businesses more and figure out how to more than just organizations wanting to save
work with them and allow things, but set policy in money, even though that’s part of it. With out-
a way that balances the business need with the sourced security, organizations get around-the-
business risks.” Penn also says security adminis- clock support, quicker updates for security
trators need to educate users on how to use the products, and a staff of highly talented security
necessary tools and to identify some of the related providers. According to Forrester ’s State Of
risks. This will help establish a more collaborative Enterprise IT Security And Emerging Trends re-
environment between the business side and the IT port, 63% of companies that use managed secu-
staff rather than create an environment where rity services do so for the quality of protection.
there’s a lot of friction. Eighteen percent of the companies that partici-
Employees should understand what sensitive pated in the study say they are interested in
information looks like and where it resides on the using a service in the next year.
enterprise network. Additionally, IT administra- Regardless of whether your security is out-
tors should explain how threats appear on social sourced or in-house, be sure your security policies
Web sites, how to respond to those threats, and accurately and thoroughly address the threat land-
how to keep appropriately strong passwords for scape in the current business environment.
social networking accounts. The security policy Through education and collaboration between the
should also clearly point out appropriate and business and IT services departments, you can be
inappropriate use of social networking and Web sure your business is equipped to deal with out-
2.0 applications. side threats. ▲
Asset tracking. Some of the permissioning issues for tech support, remote server management is what
noted above can be considered a type of asset they’re thinking of—and for good reason. Remote
tracking, but they tend to relate mostly to legal re- server management allows techs to update, ex-
quirements that are part of development or mar- amine, reconfigure, and even reboot servers without
keting efforts. However, IT also has some very having to drive to the office or to an offsite data
specific asset-tracking requirements of its own—and center. And it means that your network administra-
thus some very good reasons for utilizing tools that tors can manage multiple servers in multiple loca-
enable remote audits or inventories of company as- tions without having to travel; given remote access,
sets. Some of these have to do with licensing issues much of that management can in fact be automated.
that are somewhat similar to those noted above: The holy grail of remote server management is
With remote access, staff members can audit indi- LOM (lights-out management). This refers to the
vidual PCs and other devices to determine what notion that in an ideal world, the data center
software is installed on which machines. An accurate would be “dark” because—since it’s controlled re-
and up-to-date (and largely automated) internal motely—people rarely need to enter, and the lights
audit can provide a straightforward accounting of would thus almost always be turned off. LOM is
software installations, and that can help avoid fines especially useful when an organization has servers
or a publisher lawsuit. in multiple locations and not enough staff to
Also, while it’s important to keep track of capital manage them. LOM—or any form of remote server
investments, it’s very easy to lose track of com- management, really—also minimizes foot traffic
puters, the peripherals attached to those computers, (and thus potential errors and accidents) and re-
and the software installed on them. Obviously, as duces travel time and costs.
soon as your asset inventory is out of date, your fi- Finally, don’t underestimate the potential im-
nancials are inaccurate; remote system audits can pact of remote server management on disaster re-
help you avoid this problem. covery planning. Your CoB plan probably assumes
Remote application deployment and system that IT staff will have access to servers in order to
upgrades. If you have more than one or two com- provide (or possibly to resume) services to your
puters in your organization, and especially if some employees. If remote server management is in
of them are offsite (at employees’ homes or in a place, that access is much more likely, even in the
satellite office, for example), keeping those systems event of a pandemic, impassable roads, or in-
up-to-date and populated with the appropriate ap- clement weather that keeps everyone at home.
plications absent some sort of remote access soon
becomes an IT nightmare. Remote Access Tools
System admins need a way to roll out fixes, A complete and comprehensive list of all remote
patches, system upgrades, and application updates access tools is beyond the scope of this article, but
without having to physically go to each machine. we’ve rounded up some of our favorites as good
Your staff has almost certainly already found a way examples of the genre—your IT staff will almost
to manage these updates remotely. (If not, you’d be certainly have informed suggestions about which
hearing about it. Constantly.) Many network utilities tools to consider.
incorporate the ability to initiate and monitor these GoToMyPC. Now owned by Citrix, GoToMyPC
sorts of updates; some of the remote access tools dis- (prices start at $19.95 per month per PC or $179.40
cussed in this article offer additional functionality re- per year; www.gotomypc.com) offers remote
lated to application rollouts and system updates. Desktop access for one to 20 computers. It enables
Remote server management. When your IT staff browser-based access to email, files, programs, and
thinks about remote access for anything other than network resources from home or on the road.
Citrix also offers GoToMeeting (online
The Wyse PocketCloud meeting software that includes
application, running
Desktop sharing functionality) and
here on an iPhone, is
also available for iPod GoToAssist (remote access designed
touch, iPad, and especially for helpdesk applications).
Android devices. LogMeIn Pro2. The commercial
version of LogMeIn Pro2 (prices start
at $69.95 per computer; tinyurl.com
/2bxms6h) allows users to control a
Desktop remotely, transfer files be-
tween computers, print remote files to
a local printer, share a Desktop with another Mac systems. It provides a central
person, and wake up a sleeping computer over the Web console for administration and
Web. Other versions are available to enable remote setup, and enables an administrator
access from mobile devices, including Android, to drive any type of system re-
iPhone, and iPad. motely and to directly access and
Microsoft Remote Desktop Connection. This launch external applications from
utility is included in most versions of Windows the console.
XP/Vista/7, and allows a user at a client computer Wyse PocketCloud. Pocket-
to connect to a remote host computer. It’s not as so- Cloud ($14.99 for iPad, iPhone;
phisticated as many of the other tools listed, but it’s Android price TBD; www.wyse
free (or, more accurately, you’ve already paid for it), .com/pocketcloud) allows access to The Remote Desktop
and it works well. If your remote access needs are a PC Desktop (physical or virtualized) from an iPad app renders a
minimal or infrequent, it will certainly do the job. iPad, iPhone, iPod touch, or Android device. Windows 7 screen,
Mocha Remote Desktop (RDP). RDP ($20 per- adding its own
sonal license or $200 unlimited company license for Security Issues To Keep In Mind Keyboard, Menu, and
Screen options at the
Windows Mobile, $5.99 for iPad/iPhone; www.mo By definition, opening up your network or your bottom.
chasoft.dk) provides mobile access (via Wi-Fi or ac- individual systems to remote access is a potential
cessible cellular network) to any Windows security risk. Before allowing employees to access
XP/Vista/7 PC, except for systems running Home company systems remotely, be sure to have appro-
and Windows Server editions of those operating priate safeguards and telecommuting policies in
systems. A commercial license allows the user to in- place. Safeguards and policies should cover such
stall the monitoring software on an unlimited things as using a work computer for personal proj-
number of workstations. The utility is available for ects (and/or allowing others to do so), accessing
iPhone/iPad, Palm, and Windows Mobile devices. unsecured Wi-Fi networks, backing up a company
RemotePC. Pro Softnet’s RemotePC ($49.95 per system to a non-company medium, changing secu-
RemotePC includes
month for 25 PCs; www.remotepc.com) allows ac- rity settings, etc. remote printing
cess to multiple PCs and servers in multiple loca- Many remote access applications require that capabilities.
tions and includes remote printing capabilities. the computer run Windows Remote Desktop
Compatible with most firewalls and proxy servers, Services, and some may require an open port in
RemotePC provides a browser-based administra- your firewall. (The standard port for remote access
tion console. Administrators can keep multiple is port 3389, but many applications will allow you
windows open simultaneously, one for each PC or to change that.) These are potential security
server being monitored. breaches, and your IT staff will almost certainly al-
Symantec pcAnywhere 12.5. Supporting ready be aware of them and be ready to implement
Windows, Linux, and Mac OS X, pcAnywhere appropriate safeguards.
($199.99 for one remote access; www.symantec The proliferation of mobile devices requires re-
.com/norton/symantec-pcanywhere) provides mote, portable access across multiple domains,
support for multiple monitors and allows the user which no doubt contributes to security and support
to specify a monitor to view or to scroll among all concerns. However, the reality is that any tool you
monitors attached to the host computer. The utility use to provide remote access must include—or at
provides the ability to transfer files and run oper- least be compatible with—some form of mobile re-
ating system utilities on the remote system. mote access. Mobile devices are already ubiquitous,
TeamViewer. Compatible with most firewalls, and their popularity will only increase over the
TeamViewer (prices start at $749; www.teamviewer next few years, so mobile remote access needs to be
.com) can facilitate remote presentations, tech sup- a part of your workflow.
port calls, and remote server administration. The
app is easy to install and use and also provides VoIP, Sometimes Shiny Is OK
video, and chat functionality. TeamViewer is avail- Remote access is not a panacea for all business
able for Windows, Mac, and Linux platforms, with ills, but it does allow a variety of business
additional client apps for iPhone/iPad. Free for non- processes and activities—legal, procedural, and
commercial use. communicative—to continue even when the partic-
visionapp Remote Desktop 2010 R2. Often re- ipants are physically separated from their tools. It’s
ferred to as vRD (prices start at $99 for one admin- one of those instances when slick technology actu-
istrator; www.visionapp.com), this tool allows ally does make sense, not because it’s impressively
users to administer Windows, Linux/Unix, and shiny, but in spite of it. ▲
Cloud
Security
& The
Feds
Making Progress
by Seth Colaner
vector for malware. Additionally, flash drives are to the NIST (National Institute of
easy to lose or misplace, leading to data loss or Standards and Technology) and the
breaches, if the device is found by the wrong person. GSA with oversight from Vivek
Risks of cloud solutions include the need to rely Kundra, the Obama administra-
on a vendor for security as well as the issues associ- tion’s federal CIO.
ated with multitenancy. Multitenancy is where These agencies have created
computing resources, such as software, is shared FedRAMP (Federal Risk and Au-
across an organization or by multiple entities. thorization Management Program),
According to the GAO study, 24 agencies claim an initiative designed to take on the
multitenancy is a risk because it’s conceivable that task of providing authorization for The GAO (Government
one entity could access the data of another. various vendors so that individual agencies don’t Accountability Office)
The issue with trusting a vendor, of course, is have to. This in turn allows government agencies to published a study on the
something everyone who uses cloud computing use cloud solutions that have already been vetted status of the federal
government and cloud
has to deal with, but in light of the gravity of gov- and also significantly reduces the time it takes to get
security.
ernment data, the problem is brought into stark a deployment up and running.
relief. The study indicates that almost all of the Individual agencies will still need to make sure
surveyed agencies were concerned about a that any special security considerations for their
vendor employing less-than-adequate security particular agency are met.
measures, loss of control over data, incorrect data
deletion processes, which can leave supposedly Existing Options
erased data exposed, and insufficiently secure Of course, the federal government already has
hiring practices for data center employees. considerable IT resources, including offices and
Further, agencies are concerned that they won’t many, many data centers.
be able to conduct independent audits of cloud For example, the Federal Cloud Computing
service provider security. PMO (Project Management Office), which is part
There are no big surprises there, but what is pos- of the GSA and lives in the Office of Citizen
sibly a more compelling finding
from the study is that government
agencies are finding it difficult to . . . agencies are concerned that they won’t
assess the security level of a given
vendor, determining what aspects be able to conduct independent audits of
of security are the responsibility of
the vendor and the customer re- cloud service provider security.
spectively, and a lack of guidance
regarding how to evaluate, select, and deploy a Service and Innovation Technologies, was created
cloud initiative. In other words, it’s not that they in March 2009 for the purpose of bringing tech-
can’t find a trustworthy provider; they can’t figure nical expertise and leadership to governmental
out how to determine trustworthiness. cloud computing initiatives. One of its tasks was
In sum, the report found that many government creating a Web portal where government agencies
agencies were trying to implement cloud solutions can learn about and acquire cloud computing
but found themselves stymied at various steps of services; the result is Apps.gov.
the process, in large part because no rubric exists Additionally, Kundra wants the federal govern-
for them to follow regarding vetting vendors and ment to start leveraging the resources it already
ensuring data security. has. Reading between the lines, that likely means a
rise in private clouds government-wide. Private
Moving Forward clouds use the same technology any cloud deploy-
In the report, the GAO suggested that multiple ment uses but are designed to be used only by one
agencies including the OMB (Office of Management entity, such as a single company.
and Budget), GSA (General Services Administra- Although the federal government (admittedly)
tion), and Department of Commerce develop better has a long way to go before its cloud computing
cloud security policies and guidelines for assessing potential is sorted out and realized, it’s clear that
cloud security. it’s working hard on the goal. Potentially, the gov-
The task of creating cloud security guidelines ernment could lead the way for the private sector
that government agencies can follow when selecting by establishing cloud security standards and guide-
a cloud vendor and services apparently fell largely lines for deployment. ▲
Browsers Battle
For Web Supremacy
Positioning In A Crowded Market
by Christian Perry
I
KEY POINTS f you didn’t get your fill of fireworks this “Microsoft has lost its way. With Bill Gates
▲ Internet Explorer no summer, don’t fret. After a period of relative gone, numerous lawsuits, and anti-monopoly rul-
longer owns the lion’s
stillness, the browser battles are once again ings against it, a lot of its spark, bluster, and vi-
share of the browser
market, as Firefox,
heating up as developers work to overtake the sion has disappeared. Microsoft is no longer
Chrome, and others have competition with technologies poised to revolu- paving the way, but rather playing catch-up to
attracted hordes of users tionize the Web experience. How those battles will Apple and Google. I think that’s where the real
with their extensibility shake out is anyone’s guess, but there’s no denying battle is: a closed-wall garden as proposed by
and ease of use.
it will be a blast to watch. Apple, or an open Web accessible to all, as is
▲ Just around the “Just when you thought it was dead, the Google’s vision,” Duperval says.
corner, the next genera- browser space is becoming interesting again,” says Despite IE’s massive loss of market share over
tion of browsers prom-
Laurent Duperval, president of Duperval Con- the years, it’s not going down without a fight. In
ises big innovation on
the heels of HTML5 and
sulting. “We’re heading toward a commoditiza- fact, IE saw month-to-month upticks this summer
other technologies de- tion of the browser, but we aren’t quite there yet. at the expense of Firefox and Chrome, and
signed to make the Web There are enough differences in features and per- Microsoft representatives are quick to point out that
an even bigger part of formance among browsers to make it difficult to the browser still rules the roost in the big picture.
users’ lives.
choose one that works best in all situations. Microsoft has big expectations for the upcoming
▲ Firefox isn’t enjoying There’s plenty more fun to have.” IE9, and a platform preview of the browser indi-
the massive growth evi- The Web browser market is more crowded cates it will include technological advancements
dent in recent years, but
than over, with Microsoft’s Internet Explorer, that could put it back on par with its market coun-
Mozilla developers are
working to improve the
Mozilla’s Firefox, Google’s Chrome, Apple’s terparts. Could this be a response to innovations
overall Firefox experi- Safari, and other browsers all staking
ence, including exten- claims in a realm rife with potential
sion stability. profits from search affiliations, adver-
▲ Any browser, in- tising, and other avenues. One certain
cluding Opera, con- victor is unlikely to emerge from the
tinues to have the browser battles, but big movements
opportunity to seize sig-
within the market are a good bet.
nificant user share with a
feature that’s yet unseen
in other browsers.
Move Over, Microsoft
Five years ago, IE owned a massive
browser share in the United States, com-
manding nearly 90% of the market, fol-
lowed by the upstart Firefox browser at
just 8%, Safari at roughly 2%, and Opera
at about a half percent. Today, IE’s
overwhelming domination is a mere
memory as Firefox has enjoyed steady
adoption to boost its market share to
about 24%. Meanwhile, a browser that
didn’t exist five years ago—Chrome—
According to Laurent Duperval, president of Duperval Consulting,
has cut into IE’s share to the tune of 7%, Microsoft has lost its way in the browser market. “Microsoft is no
and Safari and Opera have also experi- longer paving the way, but rather playing catch-up to Apple and
enced steadily increasing adoption rates. Google,” he says.
Fire Still Burns At Mozilla and set a new bar for what’s expected from all
Despite Firefox’s slight summer market slump, browser vendors,” Dotzler says.
the outlook remains bright for the open-source Safari has now followed the extensions trend
browser. In early July, IBM announced that it se- made popular by Firefox, unveiling in July the
lected Firefox as the default browser for its 400,000 Safari Extensions Gallery, which marks the first ap-
worldwide employees due to several factors, in- pearance of extensions in Apple’s browser. These
cluding standards compliance, security, extensibility, extensions use recent Web technologies such as
and continuing innovation. Even the market change HTML5 and CSS3 and are digitally signed and
itself is seen as a potential positive by Mozilla, which sandboxed to help ensure security.
continues to place a heavy emphasis on trans-
forming the browser as we know it today. It’s Anyone’s Game
“While our share at [Web market analysis com- Duperval predicts that the current trend of IE
pany] Net Applications has dropped a couple of slowly losing market share as Firefox holds steady
points, our number of actual users continues to and WebKit-based browsers gain traction will con-
grow,” says Mozilla spokesperson Asa Dotzler. tinue. However, he says that at some point, all three
“This stronger-than-normal variance from trend is primary layout engines—IE, Gecko, and WebKit—
a direct result of the more competitive landscape, will be evenly matched, and the one pulling ahead
though, and we see it as a positive but also a chal- will do so because it offers a feature that’s head and
lenge. We’ve got a great product with Firefox 4— shoulders above anything found in the competi-
testing in beta now and due by the end of the tion. And despite its tiny market share, don’t dis-
year—and we think users are going to just love it.” count the dark horse.
Firefox has come under fire recently for an as- “Opera has a very small market share, but many
pect that sets it apart from other browsers—its browser innovations first appear on Opera and
thousands of extensions (or add-ons). While these then are ported to Firefox, Chrome, and IE. Opera
extensions certainly help to morph the browser to a has the potential to change everything if the com-
user’s particular needs, some can also cause sta- pany can introduce a feature that is not easily re-
bility or performance problems. However, Dotzler producible in other browsers. If it’s important
notes that among thousands of sophisticated enough, it will drive customers to at least try it and
Firefox extensions, there are bound to be extensions eventually adopt it,” Duperval says.
that adversely affect performance. Looking farther ahead, Duperval says to expect
“We’ve been working hard over the last couple more standards compliance among browser devel-
of years to build a more robust add-ons platform opers—including Microsoft, who he says used to
and SDK (software development kit) that gives our “ignore” standards, but has worked to make the
developer community the tools they need to build latest IE compliant with the Acid2 browser test. He
rich extensions without compromising user per- also says to keep an eye on open-source video
formance or security—and the ability to do so with codecs (particularly HTML5), which will help to
far less effort than in the past. Firefox 4 will see the create a “much more interesting” Web experience,
debut of this new set of capabilities, and we think and mobile browsers, which continue to proliferate
it’s really going to change the whole game, again, in phones, tablets, TVs, and cables boxes. ▲
Service features. This varies by provider, but in On-Site IP PBX. The option of having an on-site
general, most of the following services will be IP PBX gives business owners maximum control
available with VoIP: over a VoIP-based phone system. It also has the
highest cost, both in capital outlay and recurring
• Caller ID • Fax
costs from software licensing, maintenance, and
• Caller ID blocking • Contact List
management. There’s also the additional cost of
• Call forwarding • Virtual numbers
subscribing to a VoIP gateway service in order to
• Call transfer (multiple numbers
make calls to landlines.
• Call blocking per handset)
On-site IP PBX systems include Avaya (www The Avaya 9600 Series of
• Voicemail • Multi-ring
.avaya.com), ADTRAN (www.adtran.com), Cisco IP Deskphones can be
• Multi-way calling • Find-me/Follow-me used at remote
SBCS (Smart Business Communication Systems)
• 911 or e911 service • Portable phone locations, including a
(www.cisco.com), and Fonality (www.fonality.com). home office, as well as in
• Redial numbers
Managed VoIP service. A hybrid of hosted and the office. Features
on-site PBX VoIP systems, this option uses an IP include a context-
VoIP Systems & Types PBX installed at your site, with a dedicated net- sensitive graphical user
For Small Business interface, high-fidelity
work connection back to the managing company.
audio, and low power
There are almost as many types of VoIP systems Managed VoIP services usually provide all of the consumption.
as there are types and sizes of businesses. necessary components, including IP phones, and
Software-based PC-to-PC. Load VoIP software handle all maintenance.
onto your PC, then place and receive calls using ei- Managed VoIP services include mindSHIFT
ther a computer headset or one or more handsets (www.mindshift.com), T-Systems (www.t-systems
connected to a PC. You will need a good Internet .com), Taridium (www.managedvoip.net), and
connection for this system. If you plan to use the VoicePlex (www.voiceplex.net).
host PC for other activities, you will also need
some type of QoS (Quality of Service) enabled IP Phones
Internet router or modem to ensure voice data has IP phones are a must if you’re building your
priority over other types of Internet traffic. own VoIP system or expanding your existing
Software-based PC-to-PC services include Google system. IP phones are available in wireless and The Cisco Unified
Voice (voice.google.com), Skype (www.skype.com), desktop models that plug into an Ethernet jack, as Wireless IP Phone
and Yahoo! Voice (voice.yahoo.com). well as USB-based phones that will work with soft- 7925G, which is
compatible with
Residential/SOHO hardware-based VoIP. This ware-based VoIP.
the Cisco Unified IP
type of VoIP system uses an ATA (Analog Telephone IP phones include: Avaya 3641 and 3645 IP Phone 7900 Series of
Adapter) or VoIP-equipped router to allow you to Wireless Handsets (www.avaya.com), Cisco desktop phones,
use your existing wired or wireless phones with the Unified IP Phone 8900 Series (www.cisco.com), and supports Bluetooth and
system. There’s no computer involved, so you don’t Siemens Gigaset C475 IP (www.gigaset.com). is built tough to
withstand dust, liquids,
need to leave a computer running 24/7 or worry
and being dropped on
about directing Internet traffic. These systems are a Don’t Toss Your Landline Just Yet its head.
good choice for small home offices, as well as home Landlines may appear to be heading the way of
owners who wish to transition to VoIP. the dodo, but they still have the edge in at least a
Residential/SOHO hardware-based VoIP serv- couple of areas. If the power goes out, your land-
ices include MagicJack (www.magicjack.com), line phone will still operate. Emergencies are the
VoIP.com, and Vonage (www.vonage.com). other main benefit of landlines. Dial 911 and your
Hosted VoIP solutions. Hosted VoIP service call will be dispatched to the correct facility in your
providers have an IP PBX system at their site. They area; your physical location will automatically be
sell VoIP services, usually on a pay-per-use or transmitted, as well. Although they didn’t always,
monthly subscription basis, to small businesses. many VoIP providers now offer 911 or e911 service.
You don’t have to spring for an IP PBX system, and Check to be sure any VoIP provider you’re consid-
the service provider takes care of managing and ering includes reliable 911 services in its plans. ▲
maintaining the hosted equipment. You
rent or buy IP phones and use your net-
work to connect to the hosted service. The Cisco SBCS System is an easy-to-set-up solution
Hosted VoIP service providers in- with integrated voice, data, video, and security
components. Features include voicemail, an
clude 8x8 (www.8x8.com), OnSIP (www
automated attendant, paging, conferencing, video
.onsip.com), and Vocalocity (www.vocal calls, basic call distribution capabilities, and wireless
ocity.com). access (not available on all models).
Business Software
The Latest Releases & Updates
by Carmen Carmack
▲ ▲▲ ▲▲▲
▲ The new AutoCAD Microsoft Rolls Out EAS For Hotmail systems. The update is for all users and applies
for Mac software works To make synchronizing with Windows Live to client and server systems. It includes fixes that
natively in Mac OS X
Hotmail easier on mobile phones and devices, correct issues with a document containing a ma-
and works with its
unique features, such Microsoft has integrated EAS (Exchange ActiveSync) liciously crafted embedded font, prevents an attack
as cover flow. with the newest version of Hotmail. Now you can get that could result in interception of user creden-
email and calendar and contact information pushed tials or other sensitive information, and protects
▲▲ Google’s new automatically to your phone or mobile device from a against a maliciously crafted PDF document from
Priority Inbox for Gmail
Hotmail account. According to Microsoft, there are leading to unexpected application problems or
automatically sorts your
incoming mail to help nearly 300 million phones with EAS and more than code execution.
keep it organized. 360 million active Hotmail accounts.
Autodesk Set To Release
▲▲▲ To make syncing Windows Intune Announced AutoCAD For Mac
easier on mobile phones
Microsoft announced that its Windows Intune After many years of a Windows-only offering,
and devices, Microsoft
has integrated EAS service will be generally available by early 2011. Autodesk announced that its AutoCAD software
(Exchange ActiveSync) The new cloud-based solution for managing and will soon be available for Apple’s Mac com-
with the latest version of securing PCs includes update management, mal- puters. AutoCAD 2011 for Mac runs natively on
Windows Live Hotmail. ware protection, PC monitoring, remote assistance, Mac OS X and is due out this fall. The company
and security policy management. Priced at $11 per says it purposely designed the user interface
PC per month, the service works on desktop and with a familiar Mac look and feel, and that the
notebook PCs running Windows XP Professional new version takes full advantage of the Mac OS
SP 2 or later, Windows Vista (Enterprise, Ultimate, X features and capabilities.
and Business), or Windows 7 (Enterprise, Ultimate,
and Professional). Volume discounts are set to be New View For Gmail
available for 250 PCs or more. Google is trying out a new Priority Inbox fea-
ture that aims to help keep incoming Gmail organ-
Apple Releases Security Update ized. The new Priority Inbox splits your inbox into
Apple has released Security Update 2010-005 for three sections: Important And Unread, Starred,
its Mac OS X Leopard and Snow Leopard operating and Everything Else. A built-in filter automatically
determines how to categorize incoming mail based reporting and alert features. Jigsaw for Salesforce
on patterns such as the people you email fre- CRM starts at $29 per user per month.
quently and the messages you open and reply to.
You can re-categorize the messages as needed, and Lawson Software Offers Cloud-Based
tag important messages you have already read for ERP Disaster Recovery
the Starred section. Organizations with the Lawson Software introduced Lawson Disaster
“Enable pre-release features” option selected in the Recovery, a cloud-based disaster recovery service
designed to help its customers re-
cover from a technology-related dis-
Salesforce CRM customers can now aster. The new software service helps
organizations resume critical business
receive real-time updates on business processes, such as payroll, finance, ac-
counts receivable/payable, inventory
contact and company data with Jigsaw, management, and procurement. The
company states that the service pulls
an extensive directory of company data hourly and provides a two-hour
restore point, with a recovery taking
and contact information. 12 hours or less. Lawson Disaster
Recovery is available to Lawson S3
Management customers operating on
Google Apps control panel will have the chance to a Microsoft Windows environment.
try out the new Priority Inbox.
Security Updates For Adobe Reader
QuickBooks 2011 Release Available & Adobe Acrobat
This Fall Critical vulnerabilities have been identified in
Intuit announced availability of QuickBooks Adobe Reader 9.3.3 (and earlier) for Windows,
2011, scheduled for release this fall. The latest edi- Mac, and Unix and Adobe Acrobat 9.3.3 (and
tion of Quick-Books Pro and Premier offer new earlier) for Windows and Mac. These vulnerabili-
features such as enhanced views of important cus- ties could cause the application to crash and could
tomer and vendor details. Users can also take ad- potentially let an attacker take control of the af-
vantage of QuickBooks Connect, a new service fected system. The updates address issues dis-
that lets small businesses access key QuickBooks cussed at the Black Hat USA 2010 security
data remotely via the Internet or a mobile device. conference in July 2010. They also incorporate crit-
And the company states that a simplified startup ical updates to the Adobe Flash Player version
process makes it easier and fasterfor new small- 10.1.53.64 (and earlier). At press time, Adobe an-
business owners to get up and running. The sug- nounced that additional security updates were
gested retail price for QuickBooks Pro Edition pending for Adobe Reader 9.3.4 and Adobe
is $229.95. The QuickBooks Premier Edition (in- Acrobat 9.3.4.
cluding industry-specific versions) is priced
at $399.95. Dell Expands Security Solutions
Portfolio With Trend Micro
Salesforce.com Introduces Jigsaw Dell and Trend Micro have partnered to bring
For Salesforce CRM Trend Micro Worry-Free Business Security
Salesforce CRM customers can now receive Services to SMBs. Trend Micro security experts are
real-time updates on business contact and com- hosting the security solution, and Dell and Trend
pany data with Jigsaw, an extensive directory of Micro developed a customized user interface to
The newest version of
SMB accounting software, company and contact information. Integrated with simplify the management process for endpoint se-
QuickBooks Pro 2011, will Chatter, salesforce.com’s enterprise social collabo- curity. The service includes a centralized Web-
be available soon. ration technology, Jigsaw for Salesforce CRM can based management console and minimizes the
automatically identify changes to important con- impact to system performance. It also provides
tact and company data in Salesforce CRM, update pre-configured security parameters and global
the records, and publish the changes in Chatter neighborhood threat detection to identify new
in real time. Users can receive updates on their Web threats when they emerge and block dan-
mobile devices. The new service also includes gerous Web sites, viruses, and other threats. ▲
Greenovations
Energy-Conscious Tech
by Nathan Lake
Run Down
Competition Heats Up
C
ompetition is often the basis of innovation,
and few industries are as competitive as the
smartphone operating system realm. The
rising demand for smartphones by both consumers
and business users has turned up the pressure on
mobile platform developers to rapidly churn out
products to satisfy everyone. User expectations are
high, and many new and updated mobile OSes
face fierce public scrutiny. But many companies
have risen to the challenge and produced winning
formulas for their mobile OSes. Others, however,
are struggling to find an identity and meet the
market demands.
According to ChangeWave Research, smart- Android platform. While iOS 4 is limited to the
phone owners appreciate applications, easy-to-use iPhone (and tied down to AT&T for the time being),
interfaces, and Internet access the most out of all the Android platform can run on devices from a va-
the features their smartphones offer. It should be no riety of manufacturers and are sold through all the
surprise that Google’s Android and Apple’s iOS 4, major carriers.
which both offer thousands of applications and vi- Android also recently announced the Android
sual, intuitive interfaces, top the list as the most sat- 2.2 platform (also known by its code name Froyo,
isfying mobile operating systems. as in frozen yogurt), which will include Exchange
“The developers are pretty pragmatic,” Fodale capabilities, such as account auto-discovery and
says. “They’re going to go develop applications calendar sync. Additionally, Android 2.2 features a KEY POINTS
where they see the opportunity to make money. I Web browser equipped with V8 JavaScript to in- ▲ Google’s Android and
Apple’s iOS 4 are on
think that’s what’s going to drive folks who want crease performance, and apps that support two-
a roll with high cus-
to use the phone for more than just a phone.” way push sync capabilities. tomer satisfaction,
HTC put the new Android 2.2 platform on its and an interface that
Android On A Roll popular HTC Evo 4G phone (available from Sprint; users enjoy and want
With the release of popular new phones such as www.sprint.com) and an Android 2.2 update was to use.
the Motorola Droid 2 and Droid X (both available released for the Motorola Droid. ▲ Research In Motion’s
from Verizon; www.verizonwireless.com), Android Android has also benefitted from its open- BlackBerry 6 OS,
has catapulted forward to claim 13% of the overall source strategy. Developers took to creating appli- which is currently
featured on the Torch,
U.S. smartphone OS market share, according to cations for the Android platform right away, and
is trying to appeal
Nielsen’s Q2 2010 statistics. Last year at this time now it has more than 50,000 applications to choose to consumers with
Android had just 2% of the overall market. Nielsen from. Because many consumers are interested in a more visual and
also reported that 27% of all smartphones pur- the amount of applications they can download to fluid interface.
chased in the past six months run Android, which their phone, the Android Market is an asset to ▲ Microsoft’s Windows
is slightly more than iOS 4’s 23% share. Android’s platform overall. Phone 7 won’t be
Part of Android’s rise can be attributed to the di- available until the
versity in its distribution and the nature of the Apple iOS 4 Satisfies Customers holiday season, but
most early reports
Apple’s iOS 4 has helped Apple continue to chip
from critics have
away at Research In Motion’s lead in the overall been positive.
The Apple iPhone 4 from AT&T runs iOS 4 and tops the
charts for customer satisfaction, according to smartphone market share. According to Nielsen,
▲ Palm’s (and now HP’s)
ChangeWave Research. Apple has 28% of the market as of Q2 of this year
webOS, Nokia’s
(compared to 21% in Q2 2009). Apple, however, has Symbian, and other
recently lost ground to Android as Android sales Linux-based OSes
The Verizon Wireless
Motorola Droid 2 surpassed iPhone 4 sales over the past six months. (Android aside) lag at
includes Android 2.2 But that doesn’t indicate that iOS 4 is fading. the bottom of the
(aka Froyo) with market, without a clear
Nielsen also reported that 89% of iPhone users plan
enterprise features, path for the future.
to stick with the iPhone, while 21% of Android
including Exchange
users and 29% of BlackBerry owners are consid-
support.
ering an iPhone as their next purchase.
Apple’s iOS 4 introduced better multi-
touch and multitasking capabilities
and folders to help you organize your
apps. FaceTime, a video calling appli-
cation that works with a Wi-Fi con-
nection, was also introduced to
complement both of the iPhone 4’s
built-in cameras. The OS also in-
cludes features designed for enter-
prise use. For example, iOS 4
supports network encryption,
password protection, and remote
wipe. It also supports Microsoft
Exchange, over-the-air push
email, calendar, contacts, and
VPN protocols.
as “People” for your contacts’ information and so- consumers. And there are no distinguishing fea-
cial networking status updates and “Messaging” tures that set webOS apart from those competitors.
for all your messages, among others. The hub-
based approach is intended to accomplish Symbian & Linux Smartphones
Microsoft’s goal of creating a device that stream- Nokia’s Symbian may be the most popular OS
lines professional and personal information and ac- globally, but it has yet to make a dent in the U.S.
tivities. For instance, not only does Windows market share with just 2% of the pie. Fodale says
Phone 7 pack full support for Microsoft Exchange Symbian struggles in the U.S. because it lacks the
and Mobile Office, it also includes Xbox LIVE distribution channels other OSes enjoy. Consumers
games and Zune music and videos. are less aware of Symbian, so there’s very little de-
When Windows Phone 7 is released, it will have mand for its devices. For example, Verizon Wireless
the same advantage as Android with regards to its does not carry any smartphone equipped with a
distribution model. Microsoft doesn’t manufacture Symbian platform. Instead, Symbian has found
its own hardware, so Windows Phone 7 will show success in emerging markets and in markets that
up on a variety of devices through multiple wire- demand lower-cost products.
less carriers. This could help Microsoft rebound at This doesn’t mean Nokia doesn’t want Symbian
least a little since losing 12% market share between to be in the U.S. or that some consumers aren’t
Q2 2009 and Q2 2010. using Symbian devices. You can find unlocked
Symbian phones on the Web, and earlier this year
What About webOS? Symbian released an open-source version of its
Palm introduced webOS on the Pre and the software with hopes that developers would start
Pixi, but it has failed to creating more apps for the
make an impact in the platform and increase de-
The Nielsen Company reports that BlackBerry-
market and HP an- mand. Symbian^4 is also
maker Research In Motion is still the market
nounced earlier this year it leader, but Apple and Google are quickly scheduled to be released
would acquire Palm. The catching up to it. sometime this year. The
The Sprint Palm Pre is webOS market share is OS reportedly will offer
one of four webOS down to 3% from 8% last improved touchscreen in-
phones; webOS has seen year. Some analysts have tegration and better appli-
a decline in market
share over the past year.
predicted that HP will use cation support.
the webOS for mobile de- Although Android is by
vices other than smart- far the most popular Linux-
phones in the future, such based OS on the market,
as a tablet PC. Samsung’s Bada and
Although the webOS Nokia’s and Intel’s jointly
has just a sliver of the developed Meego could
overall market share, it also make plays for new
could represent an option smartphone customers.
for those looking for an However, it appears that
affordable smartphone. these OSes are destined for
While many of the high- low-cost phones in
end—and highly cov- emerging markets and
eted—smartphones retail therefore, says Fodale,
for $199 after two-year “might not command at-
contract price reductions, tention in North America.”
the Pixi Plus and Pre Plus According to Nielsen, smartphone penetration
are free with a two-year in the U.S. reached 25% at the end of Q2 2010. Competition
contract from Verizon and Heats Up
AT&T, and the Pixi is just $49.99 with a two-year The smartphone operating system market will
contract from Sprint. (The Pre runs $149.99 with a only continue to get more competitive as both the
two-year contract from Sprint.) major and minor market players continue to evolve
Although webOS has many of the features con- and adapt to consumer demands. Windows Phone
sumers and business users are looking for, the ap- 7 is sure to shake up the market, while it’s still a
plication catalog has far fewer apps than its matter of time before we see if BlackBerry 6 OS has
competitors, making the platform less appealing to made an impact. ▲
Touch
The Display Revolution Continues
by Christian Perry
F
KEY POINTS rom flexible screens to an innovation that input, creating a revolutionary user
▲ Projected capacitive creates the illusion of texture on touch- experience in which users simply
technology currently
screens, the mobile display market continues flick, glide, and pinch their way
reigns as the king of
mobile touchscreen to be a hotbed of invention. Seemingly outlandish across the handset’s user interface.”
innovation, thanks to depictions appearing in sci-fi movies of past years In early capacitive touchscreens,
its highly accurate are now commonplace in the displays of handheld manufacturers applied a conduc-
feedback and features devices, so perhaps it’s no surprise that we now tive layer to the glass and then de-
such as multitouch.
expect practically every wild prototype technology livered voltage to it. This process
▲ Increasingly powerful to appear in retail devices sooner or later. enabled users to run a finger across
application proces- In the meantime, the mobile market is teeming the uncoated side of the glass to create a capacitor,
sors are helping man-
with products that make handheld data navigation which worked in tandem with an integrated con-
ufacturers to push the
limits of capacitive both easy and enjoyable. Advances in capacitive troller to determine where the finger was located
technology for even displays continue to emerge at a steady pace as on the screen and where it was traveling. Although
more creative naviga- manufacturers strive to outpace their mobile com- revolutionary, these relatively limited touchscreens
tional abilities. petition. For mobile customers, these advances ul- were found best suited to kiosks and other basic
▲ Flexible mobile dis- timately contribute to a huge collection of display applications that didn’t involve complex opera-
plays aren’t quite choices that look to expand into interesting, pro- tions. The mobile market, on the other hand, gen-
ready for prime time, ductive realms in the near future. erated a need for more accurate touchscreen
but they’re nearing
technology—and that’s where
release and should
eventually grace the
Capacitive Creativity projected capacitive touch-
market with a wide According to Andrew Hsu, screens entered the picture.
range of unique technology strategist at Synap- Thanks to etching on the con-
form factors. tics (www.synaptics.com), the ductive layer that creates a
▲ Haptics-based re- most groundbreaking change in higher-resolution touch surface,
search in the mobile mobile touchscreens in recent these touchscreens now are
realm could result in years has been the adoption fueling a new generation of
retail mobile devices
of projected capacitive-based mobile touch-related technology.
with displays that em-
ulate textures or fric- touchscreens. Thanks to this ca- “More recently, there con-
tion on a flat screen. pacitive technology, touch- tinues to be wider adoption of
screens are now the status quo capacitive touchscreens in hand-
in more consumer-friendly de- sets due to ongoing improve-
vices than ever before, due to ments in supply chain efficiency
several reasons. as well as more cost-effective
“There continues to be wider
“First, this technology is adoption of capacitive touchscreens implementations. Additionally,
much more durable than the in handsets,” says Andrew Hsu, there continues to be innovation
older resistive technology, en- technology strategist at Synaptics. in the user interface as program-
abling designers to target touch- mers continue to explore im-
screens in handsets with more proving the user experience in
widespread appeal,” Hsu says. “Second, this tech- devices enabled with multitouch gestural input,”
nology enabled more industrial design options, en- says Hsu. “With increasingly more powerful applica-
abling the current generation of sleek handsets with tion processors designed into newer mobile phones,
wide aesthetic appeal. Finally, capacitive touch- touchscreen input enables much more efficient ways
screens are highly optimized for gestural finger to interact with a handset. Some notable examples
by Rod Scher
A
KEY POINTS s software and infrastructure head into the As you would expect, companies—especially
▲ Given that so much
cloud, many SMB owners, executives, and those with an investment in cloud-based tech-
functionality is moving
to the cloud, the ability
managers are realizing significant benefits nology—are working feverishly to find a solution
to print—especially from from the shift: By working in the cloud, companies to the problem.
mobile devices—is find they need fewer IT workers to deploy, manage,
becoming an issue of and update software and servers. And by opting for Google Cloud Print
paramount importance.
“pay as you go” cloud services, businesses can avail One potential option is Google’s Cloud Print
▲ Some cloud-printing themselves of the applications and infrastructure service. Currently in development, Cloud Print en-
tools are already avail- they need without paying for more than they can visions “cloud-aware” printers. Simply select and
able, and companies
use. The bottom line, quite literally, is that SMBs are register a cloud-aware printer with Google’s
such as Google and HP
are prepared to make
finding that resources no longer dedicated to prop- service and it becomes accessible.
large investments to ping up creaking IT infrastructure can instead be The main impetus for the Google undertaking is
make large-scale cloud devoted to product development, marketing, or that the company needs printing technology that
printing a reality. other important but often neglected activities. will be compatible with its browser-based Chrome
▲ As with any other But the move to the cloud is not without its wrin- operating system. Because the company’s OS will
technology, you’ll want kles. For example, one seemingly simple question is not have native print drivers, Cloud Print is one
to keep security issues only now being addressed: If a company’s data, ap- approach to providing printer functionality.
in mind when consid-
plications, and infrastructure reside in the cloud, The ongoing development effort may pay off.
ering cloud-based
printing options.
how are you supposed to print—especially from the This summer Google noted on its blog, “We are
many mobile devices that are now so ubiquitous? working with a number of printer manufacturers
▲ Although promising,
After all, even if employees traveled with printers to bring cloud print capabilities to their printers.
the cloud printing land-
scape is currently im-
(which of course they do not), those devices gener- HP [has] announced a full suite of cloud-aware
mature, with few proven, ally do not provide printing services. The problem printers ranging from $99 consumer printers to
straightforward, enter- may become even more widespread, given that business-oriented printers. All these printers will
prise-class solutions OSes of the future (including Google’s much-antici- work with Google Cloud Print out of the box.”
widely available.
pated Web-based Chrome OS) may themselves re-
side in the cloud: If the OS does not live on my HP’s ePrint
computer, how do I send documents to a printer? In the meantime, HP has been working on ePrint,
its latest cloud-printing initiative.
This is aimed at releasing consumer
and SMB models of cloud-enabled
printers. (While the low-end ePrint-
enabled printer retails for just $99, the
recently released business-oriented
Officejet Pro 8500A e-All-in-One car-
ries an MSRP of $299.99. It offers ac-
cess to cloud-based apps designed
specifically for small-business cus-
tomers and includes the ability to
move files to and from the cloud.)
HP’s ePrint-enabled printers are es-
sentially “smart” printers with a Web
Cortado’s ThinPrint technology ($39.98; connection, access to cloud-based pro-
tinyurl.com/24r4car) provides tools that ductivity apps, and an email address:
let you print to any printer in which
Any document that you can email,
your RIM BlackBerry can establish a
Bluetooth or Wi-Fi connection. you can send through the cloud to be
rendered and then “delivered” (that
Femtocell Technology
Business Bonanza Or Overhyped Add-On?
by Jennifer Farwell
L
ong touted as the panacea for poor mobile finish line. These devices are attractive to carriers
phone coverage, femtocells are small cel- and consumers, not only because they enhance
lular base stations that provide a strong spotty service, but also because they move traffic off
signal where you wouldn’t otherwise have the carrier’s wireless network, increasing Internet
one. They connect to the cellular carrier’s network speeds and reducing dropped calls for other users.
via a broadband connection, routing calls over the Many companies (with networking and commu-
Internet in much the same way that VoIP (Voice nications giant Cisco leading the charge) are also
over Internet Protocol) technologies do. They then working to make femtocells workable for larger
broadcast that signal over the air like cellular business environments, from national retailers to
KEY POINTS towers, but with a much smaller (typically 30- to 1000-plus employee enterprises. However, practical
▲ Femtocells are rolling 50-foot) range. considerations have made—and are still making—
out across the consumer
Right now, femtocells are rolling out for con- conquest of the business landscape a challenge
and very small office
landscape, but chal-
sumer and home/small office use, with Alcatel- (more about that in a moment).
lenges remain for Lucent (whose Bell Labs formulated the concept of
widespread busi- femtocells in 2000), Cisco Systems, Qualcomm, Base Camp
ness adoption. NEC, Ubiquisys, and other companies racing to the AT&T, Sprint, and Verizon all offer femtocell
▲ The technology is products with support for three (Sprint and
limited by the number Verizon) or four (AT&T) concurrent voice calls.
of channels available for Users can authorize specific numbers to access the
dedicated voice calls,
device: 10 with AT&T; 50 with Sprint or Verizon.
but capacity will
quadruple next year.
Note that Verizon’s is a 2G offering, and its author-
ized number restriction is for priority rather than ac-
▲ Software integration
cess control. When no cellular signal is available,
will be a major issue,
as femtos don’t cur-
any Verizon customer in range can use the femtocell
rently interface with if there is a free channel. This model may appeal to
unified communica- business users who want their access points to
tions and complex allow every potential visitor to make cellular calls.
security systems used
In theory, with a good broadband connection, a
by businesses.
femtocell signal should always be excellent over its
▲ Current femtocells range, but as with Wi-Fi, this is dependent upon in-
run only on one carrier
tervening obstacles. If you start a call on a femtocell
network, so in environ-
ments (like businesses)
and leave your home or office, the device hands the
where users employ call off to the strongest network signal it senses. (If
more than one carrier, a there is intervening dead air, the call will drop, and
model will have to be users report this has occurred with the devices.)
worked out to enable
The reverse (cellular-to-femto handoffs) is cur-
roaming or multiple-
carrier devices.
rently not possible. Another issue for businesses is
femto-to-femto handoffs, letting someone con-
tinue a call across multiple femto access points.
Nick Karter, senior director of business develop-
ment for chip giant Qualcomm, says his firm has
developed the technology to support these capa-
AT&T’s new
3G Microcell bilities efficiently.
supports four
simultaneous Standard Bearer
voice or 3G One of the wild cards regarding femtocell de-
data connections.
ployment has been standardization. As most mobile
Future Thinking
These possibilities sound interesting, but Jim
Tavares, Cisco’s director of strategy and business
Ultimately, a chip could be flexible enough
development, says other issues must be resolved to support multiple carriers, or manufacturers
before femtocells will have broad applicability in
business environments. First, he notes, is that large could put all the carriers on multiple chips
enterprise businesses will want as many as 32 or
64 voice channels. (Karter says that based on ex- within a single base station.
tensive coverage analysis, Qualcomm has con-
cluded that the “sweet spot“ is at 16 channels, and requiring an unlimited plan) for sending and re-
his firm has developed a 16-channel chip.) ceiving calls across their own broadband connec-
Second and more significant, says Tavares, is soft- tions. “Business and home customers say they
ware integration. “In the home, the femto doesn’t in- cannot be without coverage,” Tavares notes.
tegrate with other products beyond the broadband “Carriers are seeing that the only way they are
router,“ he notes. “Businesses want to integrate with going to make 3G coverage completely pervasive is
their unified communications system, so they get the to put femtos everywhere. Everyone is looking for
same experience they get on the desktop. Or they leverage. Carriers will want to use femtocells to lock
may have sophisticated security systems with fire- in the most lucrative customers, and business cus-
walls. You can’t have the security system taking tomers are going to want to get significant dis-
down the femtos. Before we can meet the require- counts for using femtocells as opposed to the more
ments of these customers, we have to look at what expensive macro network. The business models are
applications and hardware we need to integrate.” going to evolve to balance all that leverage out.” ▲
by Nathan Lake
Y
ou probably rely on your smartphone for
many things, but with new software and
updates, you can improve both the effi-
ciency and functionality of your mobile phone. NDrive is a
We’ll detail the most popular newly released soft- full-featured
navigation app
ware and key updates to help you maximize your
for Android-
smartphone’s ability to help you on the road. based phones.
not connected to the Internet, Pulse loads the news may allow viruses to run on your iPhone. The
onto your Android phone. patch is also designed to stop malicious code that
can access and alter system privileges. The update
New For BlackBerry also blocks the JailbreakMe exploit that made it
Mr. Number (free; mrnumber.com) is a caller ID possible to unlock the iPhone.
and contact backup service for your BlackBerry. There’s an updated version of Flickr For iPhone
In the new version, Mr. Number (free; www.flickr.com) from
lets you perform a reverse Yahoo!. Version 1.2 gives you
lookup of any U.S. number, multitasking capabilities that
which is handy if you see a let you upload photos and
business number and want to videos while doing something
know where a caller is calling else in the application. Previ-
from. The application uses ously, you couldn’t do any-
caller ID information from the thing until the progress bar had
service’s more than 250,000 filled. The Flickr app also intro-
users, which has the ability to duces a Twitter sharing feature,
flag numbers from automated so you can simultaneously
dialers and telemarketers. Thus, post a Flickr address to Twitter
Mr. Number can help you avoid when you upload a photo or
calls from people trying to sell video. Note that you’ll need to
you things. Mr. Number can re- link your Flickr account to your
turn a name for nearly 70% of Twitter account to perform a
mystery number searches. ReaddleDocs gives you a way to dual update.
Interested in streaming both view and manage documents Looking for a utility to man-
videos and music from your on your iPhone. age the documents on your
BlackBerry to a PC? What about iPhone? ReaddleDocs ($4.99;
streaming media from a PC or Xbox 360 to your readdle.com) from Readdle offers a built-in docu-
BlackBerry? Hypoxia Media Player ($7.99; www ment viewer and also works as a file manager that
.hypoxiaplayer.com) from mblware does both, and lets you save documents from the Web, email at-
it serves as a media player for the video, images, tachments, and download and upload files from
and music stored on your phone. Using your MobileMe iDisk and other popular online storage
BlackBerry’s Wi-Fi connectivity, Hypoxia can con- services, such as Filesanywhere. The app supports
nect to your home or work wireless network and the transfer of files using an EDGE or 3G network
stream music stored in your Windows Media rather than just Wi-Fi. You can even exchange
Player library. On the flip side, Hypoxia can stream files with other iPhone users or email files stored
multimedia content to a PC with Windows Media in ReaddleDocs to colleagues. You can use
Player, an Xbox 360, or another BlackBerry con- ReaddleDocs to open Microsoft Office documents
nected to the Wi-Fi network. created in Word, Excel, and PowerPoint. The 1.6
Yougetitback.com offers Mobile Superhero update provides a new PDF reader utility that of-
($19.99 a year or $1.99 a month; www.yougetit fers horizontal scrolling and support for high-
back.com) to provide security for your BlackBerry. lighting and note annotations. You can save your
Mobile Superhero provides remote phone lock ca- annotations in the PDF and transfer them to Apple
pability if you lose your phone, and it lets you au- Preview or Adobe Acrobat Reader on a Mac. ▲
tomatically lock your BlackBerry after a change to
the SIM card—which is what a thief is most likely
to do after taking your phone. If you do lose your
mblware’s Hypoxia
BlackBerry, Yougetitback.com can use Mobile
Media Player is an
Superhero to map your phone’s location using ei- application that
ther the BlackBerry’s GPS or Cell ID towers. acts as both a
media player and
New For iOS streaming utility
that lets you play
Apple released iOS 4.0.2 (www.apple.com) to
content to an Xbox
fix security vulnerabilities that could occur when 360, a PC, or ano-
viewing PDF files. For example, Apple indicates ther BlackBerry.
that loading a PDF with malicious embedded fonts
IPHONE APPS
BLACKBERRY APPS
Tips
by Andrew Leibman
■ Android
MOVE APPS TO EXTERNAL MEMORY
With one of the latest revisions to Google’s Android platform, version 2.2 (codenamed
Froyo), you can now transfer apps to your microSD card and run them from external
memory. This is particularly handy for those whose appetite for apps exceeds their Android-
based phone’s internal memory. You can also use this new capability to craft profiles based
Got the latest version of on swapping multiple SD cards. For instance, you could offload all your games and enter-
Android? Find out for yourself.
tainment apps to one SD card, and load up another with business and productivity apps.
BLACKBERRY
Settings, scroll to the bottom of the BlackBerry App World
list and select About Phone, and icon and press the track
then scroll toward the bottom of this pad, select the Search icon,
list and look for Android Version. type app world into the
(In earlier builds, this is referred to text box, press the Menu
as the Firmware Version.) If you see key, and then select Search.
version 2.2 or higher, you’re all set The BlackBerry App World
to start moving apps. BlackBerry App World 2.0 has should be one of your top
To move an app, start by making a few notable features you results, so select it and select the Upgrade
sure you’re on the Home screen don’t want to miss out on. button. Simply follow the onscreen in-
and press the Menu button. Tap structions to download the latest revi-
Settings, Applications, and Manage GET BLACKBERRY APP WORLD 2.0 sion, and then select it to begin the
Applications. On the Downloaded It seems like you can’t swing a bricked installation process.
tab, you will see all apps currently smartphone without hitting an app store To download the latest App World
installed on your handset’s in- these days. To make sure you keep up OTA, press the Menu key, select the
ternal memory. with the iJoneses, now you can down- Browser icon to launch it, press the Menu
Next, select an app you want to load the latest version of the BlackBerry key, select Go To, type www.blackberry
move and look for the Move To SD App World, which features a streamlined .com/appworld, and then press the track
Card option. If this option is avail- interface, lets you pay for apps using a pad to navigate to the site. Scroll to and
able (not all apps support this credit card or by adding to your wireless click the Download Now icon, select
feature), tap it to complete the opera- bill, enables wireless barcode scanning, your language, click Next, and then se-
tion. Repeat these steps for each app offers free apps and paid apps starting at lect Download. Follow the onscreen in-
you want to move. Note, however, 99 cents, and lets you access Top 25 lists structions to complete the download and
that apps requiring regular updates to find the most popular apps. install the utility. Upon launching the re-
from the Web will run very slowly You can download BlackBerry App tooled BlackBerry App World, you’ll be
when installed on an external World 2.0 in one of two ways: using the prompted to accept the terms and condi-
memory card, and many will fail to App World or OTA (over the air), by vis- tions, after which you’ll be at the new, if
run at all. Don’t move apps that run iting www.blackberry.com/appworld somewhat familiar, BlackBerry App
in the background at boot, such as al- using the BlackBerry Browser. To down- World interface.
ternative Launchers and live wallpa- load the new App World using the old
pers; they won’t work as intended way, press the Menu key, highlight the
and would need to be manually
launched each time you restarted
your device. Also, when your Android-based phone Wi-Fi connections wherever
is connected to the PC, you won’t have access to you go, chances are you’re
any apps installed on the toting around countless Wi-
memory card. Fi credentials you’ll never
use again.
MANAGE YOUR WI-FI You’re probably readily
CONTACTS familiar with how to add
Get the latest version of the
Wi-Fi is a godsend for a Wi-Fi network to your
BlackBerry App World from the
those of us who require a phone; just access the Home BlackBerry App World.
nearly constant data con- screen, press the Menu but-
nection. But if you’ve ton, tap Settings, tap Wireless
made a habit of adding & Networks, and then tap Wi-Fi Settings. The sub-
menu lets you turn on Wi-Fi, add Wi-Fi networks, and
enable or disable open network notifications.
However, to delete a disused Wi-Fi connection,
Access the Move To SD Card
command from the Manage you’ll need to press and hold your finger on the un-
Applications submenu. wanted connection SSID (Service Set Identifier) until
■ BlackBerry
FUN WITH ALARMS & APPOINTMENTS
You may have experimented with your The Maps app gives
you all the directions
BlackBerry’s ability to schedule alarms while on
you need.
the road, but alarms can be used for more than
just a DIY wakeup call. To schedule multiple
alarms to remind you of tasks throughout the the Contacts button
day, start by pressing the Menu from the bottom of
key and selecting the BlackBerry the screen, and then
Calendar application icon. The app selecting a contact
displays today’s date automatically, (address data must
but you can access the rest of the week be available for the contact).
by scrolling to the right. Press the If you tap the Recents button from the bottom of
Menu key to get options including the screen, you can select from the list of recent
View Week and View Month. View location searches you’ve made. Tapping the
Agenda displays all Calendar entries Bookmarks button lets you choose from a list of
for the current week. To set an alarm, bookmarked locations. When you’ve selected your
choose the day, scroll to the hour of the Start and End locations, tap the Done button and
You can define several parameters
appointment, and press the track pad. The fol- the iPhone will display the map view with the
for each appointment.
lowing screen lets you send a reminder to your highlighted route, a green pushpin at the origin
email or Facebook accounts, input a subject and and a red pushpin at the destination.
location, set a start and end time, confirm the To view your route as a text list, tap the icon in
Time Zone, relate the type of appointment, provide the lower-right corner to reveal a context-sensitive
reminders, set recurrence, and mark as private. You menu. Tap List to get turn-by-turn directions. Select
can also add notes at the bottom of the screen. any of the list items to see a zoomed view of that
Once you have set an appointment, press the portion of the trip on the map, and advance the
Escape key and select Save. Back in the main focus on the route to the next turn by tapping the
Calendar screen, you can set Alarms, as well, which right arrow in the upper-right corner of the screen.
are basically just nondescript appointments. To set If you tap the lower-right icon again, you can tap
an alarm, press the Menu key, select New
Alarm, input a Subject, select the Recurrence
IPHONE
and end date, press the Escape key, and then USE THE HORIZONTAL KEYBOARD IN SAFARI
select Save. As onscreen keyboards go, the iPhone has one of
the best, but when held vertically, the cramped key-
■ iPhone board makes it easy to make mistakes. However, if you
GET DIRECTIONS rotate your iPhone horizontally, the keyboard appears
The iPhone’s Maps application can give across the bottom half of the wider screen, with larger
you GPS-accurate directions whether trav- letters and characters, which makes typing a much less
eling by car, using public transit, or on foot. typo-prone endeavor. If you’re planning to use the
To get started, tap the Maps icon on the keyboard in Safari, make sure you rotate the iPhone
Home screen and then tap the Directions before summoning the keyboard (by tapping a text
button at the bottom of the screen. The box, such as the address bar). Once the keyboard is
utility’s Start field defaults visible, the aspect ratio is
to your current location, locked until you close
but you can change this by the keyboard again.
tapping and typing an
alternate address. Next,
input your destination ad- The horizontal keyboard is
significantly more spacious
dress in the End field. You
than the keyboard in the
can also add locations to vertical orientation.
either field by tapping the
address book icon, tapping
the Map button to see the route on a plain, feature- To mark a message as
less map; tap the Satellite button from this menu to unread, tap the message
see your route on a satellite image, or tap the Hybrid to view it, press and
button to see satellite images with the map overlay. hold a finger anywhere
To reverse the directions, just tap the S-shaped in the gesture area, and
arrow between the Start and End fields at the top of then press the K key.
the screen. The car, bus, and walking icons at the top Swipe right-to-left in the
of the screen let you view your route and travel gesture area to return to
times by car, public transit (if available), or on foot, the main message card,
respectively. If transit directions are available, you’ll and the email you just
see appropriate times for each bus or train stop at viewed will be bolded as
the top of the screen, as well as the estimated arrival though you had not
time and total fare. If transit directions are available, opened it yet.
you can tap the clock icon in the upper-right corner To set a flag, tap the
You can use gestures
of the screen to set departure and arrival times or message to view it, press and
in the Email app to
tap Load More Times to open up more options. hold a finger anywhere in the perform some
gesture area, press the G key, advanced functions.
■ webOS and then swipe right-to-left to
EMAIL GESTURE SHORTCUTS return to the main email menu.
The gesture area on webOS-based phones such Now the message you just viewed will be flagged.
as the Palm Pre and Pixi give you the ability to do To move an email message to another folder, tap
some pretty basic functions, including navigating the message you want to move, press and hold a
forward and backward through applications and finger anywhere in the gesture area, press the M
key, and then select the folder into which you want
to deposit the message. Swipe right-to-left to return
SYMBIAN
ADD PHOTOS TO YOUR CONTACTS to the main email menu and navigate to the new lo-
If you want to see a friendly face whenever you receive a call from cation to find your moved message.
someone in your contacts list, assign a photo to each contact. First make To view the recipients of a particular email mes-
sure you have a photo of the contact stored on your phone (if not, you sage, tap the message from which you want to
can always take a quick snapshot of them with your device or add an view the recipients, press and hold a finger any-
image the next time you sync your device). Next, press Menu, select the where in the gesture area, press the S key, and then
Communic (Communications) folder, and then select Contacts. Select you’ll see the number of recipients followed by
the contact to which you want to add a picture, press the Options their contact names. Swipe right-to-left to return to
softkey, select Edit, press the Options softkey again, and then select the main email menu.
Add Thumbnail. Scroll through the images and select the one you want
to add. Press the Done softkey to return to the Contacts menu; you’ll ■ Windows Mobile
see the image you added beneath the contact name. FIND DOWNLOADED FILES
To take a photo of someone in your contacts list with your If you’ve ever struggled to find a file you just
Symbian S60 3rd Edition-based phone, press the Menu key, select downloaded onto your Windows Mobile phone,
Media, select Camera, and then just take the photo by pressing the then chances are you’re not alone. The device
Navi-scroll key. Next, press the Options softkey, select Set As Contact downloads files to different locations depending on
Call Img, select Assign To Contact, select the appropriate contact, the file type and the download method.
and then choose OK. To locate files on your device that you put there
using ActiveSync (Windows XP), Windows Mobile
Device Center (Vista), or Sync Center (Windows 7),
messages. You may not know, however, that look in the My Device folder first. If the files aren’t
holding your finger in the gesture area and there, it’s possible that an application you down-
pressing a letter key can execute a number of ac- loaded moved them elsewhere.
tions depending on the application you’re using. To find a media file, such as a song, ringtone, or
Some of the most useful gesture-based shortcuts video from a Web site, explore the associated My
are reserved for use in the Email application. Music, My Ring Tones, and My Videos folder.
To perform the email-related shortcuts, first When you download and install applications,
launch the Email application by tapping the enve- the new application will be located in another pro-
lope icon on the bottom of the Home screen. (If gram-specific folder. For instance, games will be lo-
you’re using a Palm Pre, slide open the keyboard.) cated in the Games folder. ▲
by Blaine Flamig
When you’re away from the office, your productivity doesn’t have to stop.
The Web is exploding with mobile sites and online services, including office
tools, news alerts, entertainment, and any number of other useful items.
Just as quickly, it seems, others go under, are bought by larger companies,
or simply evolve into something different. We’ve found some of the freshest
and most useful sites, services, and updates for you to consider.
APPLE SPRUCES UP year’s edition at roughly half the size and weight. The new
I P OD L INEUP nano also forgoes the traditional clickwheel in favor of a touch-
■ Knowing what to make screen with multitouch support. Volume buttons and a built-in
of the September press clip are present, as are an FM radio, VoiceMemos, Photos app,
conference Apple held to and 24-hour battery life. What’s gone is the video recording/
debut its new iPod lineup playback ability Apple added to last year’s nano.
is tricky. That’s because Elsewhere, the iPod touch—8GB ($229), 32GB ($299), and
beyond launching new 64GB ($399) models—is now slimmer but adds the same high-
nano, touch, and shuffle models characterized as representing res Retina display (960 x 640) the iPhone 4 includes. The touch
the most significant overhaul to the lineup ever, Apple touched also bears the same front- and rear-facing cameras to conduct
on numerous other media fronts, including debuting Ping, a video chats via Apple’s FaceTime software over Wi-Fi. HD-
social networking service built into iTunes. quality video recording is also onboard, as is a new A4 processor
iPod-wise, the new 2GB shuffle ($49) brings back the button- to add gaming muscle to the touch, which includes Game
based navigation of the second-gen shuffle while retaining mul- Center software for multiplayer gaming support. Apple also re-
tiple playlist support and VoiceOver, which speaks song, artist, vamped the Apple TV ($99), which is now smaller, easier to use,
and album titles. Available in five colors, the shuffle touts 15 and makes HD television (99 cents) and first-run HD movies
hours of battery life. The new 8GB ($149) and 16GB ($179) nano (starting at $3.99) available but only as rentals. Netflix streaming
models, meanwhile, sport a radically different design than last is also integrated.
Ereaders
By The Numbers
More Choices, Lower Prices
With ebook
support, a color
display, and a
by Carmen Carmack
wide range of
additional
capabilities, the
Apple iPad is
S
ince Apple launched the iPad in April, the heating up the
ereader and ebook industries have an- competition in
nounced a steady stream of enhanced tech- the ereader
nologies, lower prices, and new devices. Sales for market.
ereaders and ebooks have increased. And debates
rage over the benefits of dedicated ereader devices multifunction capabilities, E Ink ereaders such as
with electronic-ink technology from E Ink (such as Amazon’s Kindle, the Barnes & Noble nook, and
the Amazon Kindle and Barnes & Noble nook) the Sony Reader line have dropped in price. When
compared to multi-use devices that include ebook the iPad hit the market earlier this year, the
capabilities and offer color LCD screens (such as Amazon Kindle 2 cost $259. Amazon lowered the
the iPad and tablet PCs). Here’s a sampling of re- price to $189 in July (now dropped further to
cent developments in the world of ereaders. $139)—after Barnes & Noble decreased the price of
the nook to $199.
New Kindles Outpace Past Sales Not to be outdone, Borders currently offers the
Amazon released its third Kindle version in July. Kobo ereader (which also uses E Ink) for $129.99.
The company says that the newest Kindle has an The bookseller is also selling the LCD Aluratek
enhanced electronic-ink screen with improved con- Libre and the Sony Pocket for $99.99 and $109.99,
trast, a new design with a 21% smaller body with respectively. Both the Libre and the Pocket offer 5-
the same 6-inch display, 15% lighter weight at just inch displays and downloadable ebooks through a
8.5 ounces, faster page turns, up to one month of computer connection, while the Kobe ereader of-
According to Amazon, battery life with wireless off, double the storage to fers a 6-inch display and Bluetooth connectivity.
its newest Kindle is 3,500 books, and no glare even in bright sunlight.
selling better than ever. Sony Updates Reader Product Line
The Wi-Fi version is priced at $139, while the 3G
The Wi-Fi model is
priced at $139 and the wireless with free 3G connectivity is $189. Sony has restyled all three of its ereader devices,
3G version costs $189. According to Amazon, more of the reduced their size and weight, and made new
new Kindles were or- touchscreens available across the entire line. The
dered in the first four Reader Pocket Edition ($179.99) includes the new 5-
weeks of availability inch touchscreen, multiple color choices, and 2GB
than in the same time- of onboard memory to store as many as 1,200
frame following any other Kindle books. The 6-inch display Reader Touch Edition
launch. “Kindle is the best-selling ($229.99) offers 2GB of onboard memory and dual
product on Amazon.com for two years expansion slots for up to 32GB of added memory; it
running and our new-generation Kindles can also play audio files. The 7-inch display Reader
are continuing that momentum,” says Steven Daily Edition ($299.99) includes 3G/Wi-Fi connec-
Kessel, senior vice president, Amazon Kindle. tivity, a Web browser, and the same memory capa-
bilities as the Reader Touch Edition.
iPad Rocks The Price Boat
Since Apple introduced the $499 iPad, prices for New Ereaders Announced
dedicated ereaders have dropped significantly. The Sharper Image announced its new Literati
Perhaps in an effort to compete with the iPad’s color display ereader, which it is planning to ship in
October to more than 7,000 retailers, including Best with a 118.9% increase over June 2009 ($29.8 mil-
Buy and Macy’s. The 7-inch display ereader sup- lion). Year-to-date ebook sales were up 204.2%.
ports Wi-Fi connectivity and the Kobo ebook soft- In July, Amazon announced that over the pre-
ware. Its estimated cost is $159 or less through vious three months, it sold 143 Kindle books for
rebates and special offers. every 100 hardcover books. And in the month prior,
Borders is upping its collection of ereaders, the rate increased to 180 Kindle books for every 100
with the addition of the 7-inch color display hardcovers. The numbers include Amazon.com’s en-
Velocity Micro Cruz Reader ($199.99) and the tire U.S. book business and sales of hardcover books
Velocity Micro Cruz Tablet ($299.99). Both include where there is no Kindle edition. Free Kindle books
were excluded. Amazon also noted that it had sold
more than three times as many Kindle books in the
first half of 2010 as in the first half of 2009.
by Rod Scher
W
e’ve seen the future of books—and it’s not every reader will run on every phone or PDA. Many,
Apple’s iBooks bookstore ink on paper. The ebook is the wave of the in fact, run on only one or two devices.
(running here on an future, and while Amazon’s Kindle and Having acquired an ereader app, you will typi-
iPhone) lists books in Barnes & Noble’s nook lead the dedicated ereader cally start the app (which often comes with a free
various categories, and it pack, the smartphone, PDA, or other mobile device sample book or two), and then click a Store, Shop
also lets you search for a
you already own can almost certainly run an ereader For Books, Find Books, or similar button. Generally,
particular book.
app that will bring a world of books right to you. this takes you to an online store at which you have
previously set up an account, and from which you
Content Is Still King can now purchase and download one or more
The ereader landscape can be confusing, so we’ll books. (Note that there are almost always free or in-
give you an overview of what’s available in the expensive books available, either classic works in the
way of readers for mobile devices and the sorts of public domain or loss-leader backlist titles the pub-
functionality you can expect from them. But the lisher is giving away to encourage interest in the au-
first thing to wrap your head around is that there is thor’s newer books.)
normally a difference between content (that is, the
books themselves) and the software that you use to What To Look For In An Ereader
acquire and display that content. Simply put, in Here are some things you’ll want to consider
most cases, the book and the ereader are not the when shopping around for an ereader:
same thing. Most ereaders are free and may work User interface. When you start looking at
on one or several devices. The software will down- ereader apps, you’ll want to keep four criteria in
load and display books in a particular file format, mind: First and foremost, you need an app that will
although that file format is usually no concern of run on your device and that offers a user interface
Seen here running on yours; all you care about is that a particular reader with which you’re comfortable. Does it include
a Palm Pre, the Kobo lets you access some sort of online store that in turn useful search features? Do you like the way you
reader lacks some features, allows you to download and read a book. “turn” pages? Are the brightness levels and colors
but is easy to use.
appropriate? How about the direction in which the
The Typical Process pages are oriented? (And if these are not to your
The first thing you need, of course, is an ereader liking, can you change them?)
app for your device. There are dozens of them: Content acquisition. The content-acquisition
Some excellent ones are published by the same folks experience should be as painless as possible. For
who sell the most popular purpose-built ereader de- example, although the eReader Pro interface is ex-
vices, the aforementioned nook and Kindle. Don’t cellent in many respects, we found that content ac-
assume that these are your only options, though. quisition was clumsy and frustrating, requiring the
There are other excellent mobile ereader apps that user to go to multiple sources and enter unlock
you’ll want to consider, including the Aldiko, codes for each purchase.
Stanza (now owned by Amazon), eReader Pro, and Pricing. Many ereaders are free, but most books
Kobo readers. On Apple devices (iPad, iPhone, iPod cost money—after all, publishers and authors have
touch), Apple’s iBooks reader is also popular. to make a living. But prices vary; in our experi-
But don’t assume that you’re limited to one ence, Amazon and nook prices tend to be a bit
reader, or even two. Given the competition in book lower than prices at the iBooks store, but it pays to
offerings and the fact that some vendors provide ac- shop around. Just as with any other retailer, dif-
cess to publications that other vendors lack, many ferent ebook vendors are constantly offering sales
The iPhone nook is full-fea-
people read multiple books on multiple readers. and giveaways. For the moment, the typical price
tured and allows access to
Barnes & Noble’s catalog of Of course, depending on which mobile device for a digital bestseller seems to have settled in at
more than 1 million books. you use, your options may be somewhat limited; not between $9.99 and $13 or so.
EREADER FEATURES
search change adjust integrated highlights & table of search Google
book adjust font colors brightness dictionary notes bookmarks copy contents or Wikipedia
Aldiko x x x x x
B&N/nook x x x x x x x x x
eReader Pro x x x x x x x
iBooks x x x x x x x x x x
Kindle x x x x x x x x x
Kobo x x x x
Stanza x x x x x
EREADERS & COMPATIBLE Not all devices will run all ereader apps. Here's a list of some of the
MOBILE DEVICES more popular mobile devices and ereader apps that run on them.
DEVICE READER
Adobe eReader
Reader Aldiko B&N/nook Pro Kobo Kindle Mobipocket MS Reader Stanza Wattpad
Android-based x x x x x
BlackBerry x x x x x x
iPhone/iPod touch x x x x
Palm Pre/Pixi x
T-Mobile HTC x
Windows x x x x
Mobile-based
If you receive a transmission error, the ping press ENTER. Lines will appear with access times
data is not leaving your PC. Your firewall is likely and IP addresses. The final few hops should show
blocking you from accessing the network. You’ll domain names—the last one being your network.
want to add the site to your firewall as an allowed This is the route—and the time the trip is taking—
exception (refer to your firewall’s help documenta- between nodes on the Internet.
tion for instructions) and try again. If an early hop takes a long time or causes
If you receive a response after an excessive the trace to hang (a flood of timeouts), contact
number of time-outs, the network’s response to your ISP. If you reach many hops before things
your connection may be slow and your browser go awry, the problem may be with a gateway or
or other network access utility may be giving up router at or near the location of the remote net-
▲ If you can send data
before it connects. Lengthen the response time by work. Check with the network administrator for
packets but none are
adding a -t switch (ping -t followed by the IP ad- assistance. returned, it generally
dress or DNS name). This will ping the address means the network is
indefinitely. After a dozen pings, press CTRL- Get Connected refusing to acknowledge
Break to view the packet data. If there is no re- Setting up a direct VPN connection gives you your request.
sponse yet, continue awhile longer, and then press a dedicated login interface and lets you avert
CTRL-C. If you never get a response or the DNS issues. To set up the connection in WinXP,
number of pings to get a response is considerable, select Control Panel on the Start menu. Click
skip to “Trace the Route” for assistance. Network And Internet Connections and then se-
If you get a message saying the ping request lect Create A Connection To The Network At
could not find the host or the response indicates Your Workplace. In Vista/Win7, click Control
the number of data packets sent is zero, the net- Panel on the Start menu and click Network And
work is not acknowledging your ping. Changes Internet (in Category view), then Network And
to the network or configuration may now be pre- Sharing Center. Click Set Up A Connection Or
venting access. Contact the network adminis- Network (Vista) or Set Up A New Connection Or
trator for further assistance. Network under Change Your Network Settings ▲ Obtaining the
(Win7). Select Connect To A Workplace, then Use DNS name and IP
Look It Up My Internet Connection. (Vista/Win7 offers address and comparing
You can look up a DNS name from an IP ad- smart card as a connection option. We won’t dis- access times between
dress and vice versa. From the command line cuss that here.) the two can determine
whether Windows is
window, type nslookup followed by a space and Select Virtual Private Network Connection, experiencing DNS
either the DNS name or the IP address and press name the connection, and provide the host (DNS) resolution issues.
ENTER. name or IP address. If you are asked if you would
Write down the DNS name and numeric se- like to dial a connection, click No (unless you only
quence you see in the lines that begin with Name: have dial-up Internet) and click Finish (WinXP) or
and Address: (ignore aliases). If you are checking Connect (Vista/Win7). The OS will attempt to con-
an IP address, the DNS name should help con- nect you without configuring any settings. If this
firm it. If you recognize nothing, contact the net- solution does not work, or if you are using WinXP,
work administrator to confirm the IP address. proceed with the following instructions.
If you are using a DNS name, Windows may Return to the Network Connections window in
be having a problem with DNS name resolution WinXP or the Network and Sharing Center in
(translating the DNS name into an IP address). Vista/Win7 and click the option to manage network
Perform two pings from the same command line connections. Right-click your VPN network icon
window, first using the DNS name you wrote and select Properties. Next, click the Networking ▲ The point at which
down and then using the IP address. Compare tab, click Internet Protocol (in Vista/Win7, you’ll a route trace hangs
the access times and packets you sent and re- need to do this for TCP/IP V4 and TCP/IP V6), and can help you
determine where
ceived. If there is a big difference in behaviors click Properties. Override automatic configuration
your request for
pinging the DNS name vs. the IP address, skip to and provide the exact IP address and DNS names network attention is
“Get Connected.” for the network. Exit the Properties interface, right- being disrupted.
click the VPN icon, and click Connect. Provide your
Trace The Route login information if prompted.
Tracing the path data packets take going to If you cannot connect, Windows can provide
the network will help pinpoint problems. From the some assistance, but you may need more ad-
command line window, type tracert followed vanced configuration information. Contact the net-
by a space and the DNS name or IP address, and work administrator for detailed information. ▲
Use Wi-Fi
Hotspots Wisely
Wi-Fi hotspots are everywhere these days, from airport
concourses to the local coffee shop or burger joint.
Unfortunately, warnings about using hotspots also abound. Don’t worry—with a little effort and a modicum
of care, you can locate and use Wi-Fi hotspots safely, making life a little easier when you travel.
If you don’t get the range you expect, con- Best Practices
sider using a range-enhancing antenna or an- In WinXP
tenna extender. Some adapters include a ▲ Keep your notebook
updated with security
built-in external antenna. If yours doesn’t but
fixes and other releases.
has the appropriate connectors, you can buy
Having the most recent
an add-on device such as RadioLabs’ (radio security pack is particu-
labs.com) Laptop WiFi Antenna or Xterasys’ larly important. If you
(www.xterasys.com) External 2.4GHz IEEE don’t automatically up-
date WinXP, use the
802.11b/g Wireless Antenna Extension.
Windows Update site
(update.microsoft.com)
Avoid Evil Twins to search for and install
Free municipal and college hotspots are available updates.
popping up everywhere, and data thieves
Vista will warn you if you try to connect to an unsecured net- ▲ When you run
are taking advantage of them to lift your in- work, but you can override the recommendation. Windows Update, also
formation. Hackers establish open networks check for driver updates.
with official-sounding names, such as Click the Custom button
before you run the up-
SeattleFreeWiFi, and then monitor those networks the network is secure (a few are), in which case you
date engine and then see
and access users’ information at will. Beware a need a network key or code. (You’ll need to speak what items appear under
public network unless you can confirm its SSID to a network administrator about this.) Hardware (Optional). A
(Service Set Identifier; its public name) or you are With unsecure networks or networks with secu- final best practice is to
at a reputable business with Wi-Fi access and rity protocols that Windows doesn’t recognize, turn off or manage file
sharing before you con-
only that network is within range. both WinXP and Vista will attempt to block the
nect to a public network.
connection. In WinXP, if you want to connect
Hotspot 101: Find ’Em anyway, select the Allow Me To Connect To The
To find wireless hotspots along your route, re- Selected Wireless Network Even Though It Is Not
search online or use a Wi-Fi sniffer (hotspot de- Secure checkbox. (This option is not present in all
tector). For online research try the Wi-Fi locator on versions.) In other versions of WinXP and in Vista, Best Practices
the PCToday.com home page. Other sites we like are the OS will warn you of the dangers but lets you In Vista/Win7
▲ As with WinXP, it’s im-
Wi-FiHotSpotList.com and the Wi-Fi-FreeSpot override its recommendations.
portant to keep your
Directory (www.wififreespot.com). If Wi-Fi access is Some networks also hide their network names. Windows Vista/Win7 and
a primary consideration in your choice of hotels, Vista and some versions of WinXP can see the networking drivers up-
check out the Annual Hotel Wi-Fi link on Hotel- name of the network but title them Unnamed. If dated. In particular, users
Chatter’s Web site (www.hotelchatter.com). you can obtain and supply the network SSID, you report that they often re-
solve connection drops
If you lack the time or desire to map a wireless can make the connection.
through driver updates.
route, sniff it out as you go. WinXP and Vista have If nothing seems to be working but you think Vista/Win7 also have ex-
built-in sniffer utilities. Right-click the icon for your you are connected, ping a known Web site, such as cellent troubleshooting
wireless connection in the System Tray and select Yahoo! (www.yahoo.com) to see if it responds. To utilities. Open the Net-
View available Networks (WinXP) or Connect To A do this, you need to open the Start menu in WinXP work And Sharing Center
and click Diagnose And
Network (Vista). You can also purchase third-party or Vista, select Run, type cmd in the Open field,
Repair to start resolving
sniffer software, or your network adapter’s soft- and press ENTER. Type ping www.yahoo.com (or your issues.
ware may include one. whatever URL you want). If you get a response,
▲ You don’t have to turn
To scan for a Wi-Fi network before you set up your machine is connected to the Internet, so the
off file sharing when you
your notebook, consider a Wi-Fi hotspot-finding problem is with your PC or browser. If you receive connect to public net-
device from a manufacturer such as Canary Wire- notification that the connection has timed out, the works that are unsecure.
less (www.canarywireless.com). There are also de- problem is with the network. The Network Awareness
vices designed to help you find information about feature disables file and
signal strength, security, and other details that will The Power Is Yours printer sharing, including
public folder and media
help you determine which hotspot to choose. In the end, how safely and fruitfully you use sharing, as well as Net-
Wi-Fi access is up to you. As a final precaution, work Discovery. It also
Hotspot 102: Connect To ’Em whenever you are not using your wireless adapter, turns Windows Firewall
To connect to a fee-based public network, you turn wireless off. This completely prevents anyone on. If you want to share
files, you can update
will provide (or choose) a user ID and/or else from connecting to your computer and saves
these settings using the
access code at connection or when you open your precious battery life. To turn wireless off, right- options in the Network
browser. Connecting to a free wireless network click the icon for your wireless connection in the And Sharing Center, but
should require only opening your browser, unless System Tray and select Disable. ▲ we advise against it.
Revive A Crashed
Notebook
Someday you will face the inevitable notebook failure. You’ll be working
diligently on the documents you need for your three o’clock meeting or be right in the middle of composing
a lengthy email describing the highlights of your previous business trip, and your Windows notebook will
freeze, suddenly shut down, or reboot itself. Or perhaps your Web browsing is halted by an unexpected blue
screen bearing an ominously lengthy error message.
Unfortunately, these common errors could be the result of several different issues, so it can be difficult to
pinpoint the cause of a failure. But luckily there are also many common solutions that often yield positive re-
sults. Next time your notebook experiences an error, remember these tips.
Notebook With A Blue Screen ample, an attached external hard drive left on be-
The cryptic error message on a BSOD (blue fore the notebook powered up may cause a blue
screen of death) can make it difficult to determine screen at startup; you have to wait as Windows
the problem’s origin. But the BSOD, also called a scans the external drive before completing startup.
stop error, is actually a safeguard. When Windows Restarting the notebook will often solve
detects a serious problem, it stops what it’s doing the issue. However, if a particular BSOD error ap-
and reverts to a blue screen to protect your OS pears repeatedly, write down the stop error mes-
from damage. Most often, Windows will display sage, such as “STOP: 0x0000007E.” This will tell
the error when there is a hardware issue or a con- you which error has occurred so you can
flict with device drivers. It doesn’t always mean investigate a solution at Microsoft Help And
serious trouble, but it slows you down; for ex- Support (support.microsoft .com).
Spontaneous Reboot or Shutdown for five to 10 seconds until your notebook turns off. Back To Normal
Without warning, your notebook may reboot itself When you start your notebook once again, chances ▲ If your notebook
or shut down completely. Although numerous issues are everything will run smoothly. problems persist, you’ll
obviously have to resort
could be the cause, there are three common possibili- If the freeze occurs each time you open a specific
to consulting your
ties. First, if you or your IT staff upgraded the hard- program, make sure you have installed any up-
IT staff, local computer
ware in your notebook, some components may be dates or patches that the program might need. If a repair store, or the
incompatible, causing the system to shut down to program is out-of-date, it may cause your notebook manufacturer. But take
avoid damage. You or your IT staff may try re- to freeze each time you open it because it is incom- heart: Unless your
notebook has undergone
moving or replacing a newly installed component to patible with another program or the OS. If a spe-
physical duress or your
see if the shutdown error persists. If you are certain cific program doesn’t seem to be causing the
hard drive has become
that the failure is not hardware-related, check to problem, try defragmenting your hard drive. damaged, your data is
make sure that the air intake fans are not impeded. Defragmenting combines fragmented files and most likely retrievable.
Blocked fans decrease the amount of cool airflow into cleans up your hard drive so that your notebook
your notebook, and if the computer gets too hot, it can access files faster. If it takes less effort to find
will shut itself down as a precautionary measure to and access files, your notebook will use a smaller
prevent component damage. amount of its memory capacity and thereby gain
Automatic reboots or shutdowns could also be the ability to perform more actions simultane-
the result of a virus. If you have an antivirus pro- ously. If your notebook still suffers from regular
gram installed on your notebook, make sure it is freezes, notify your IT department; you may
up-to-date and then run a full scan of the hard need to reinstall the OS.
drive. If you don’t have an antivirus program, buy
one or download a free program such as AVG Free Inability To Shut Down
Anti-Virus (free.avg.com). Once your antivirus pro- The inability to turn off a notebook is often
gram is ready to go, run a full scan to search for caused by a software (not hardware) error. A
any malware. When the scan is complete, follow program may be unable to close, and because
the program’s instructions to remove or quarantine it’s still running, Windows can’t exit. If your
any discovered malware. notebook refuses to turn off each time you shut
down, begin by determining which program ▲ You can use the Task
Frozen Notebook might be causing the problem. Note any “end pro- Manager to diagnose a
gram” or “program not responding” messages or problematic program.
You’re undoubtedly familiar with this scenario:
Things are going fine with your notebook when press CTRL-ALT-DELETE to check the Task Mana-
suddenly you can’t switch between multiple appli- ger for programs running in the background.
cations or a program hangs when you try to open If you recently made a change
it. The mouse and keyboard may or may not re- to that program, make sure that
spond, and you usually have to restart the com- updates aren’t available for the
puter, which is an inconvenience that can turn into program. Otherwise try System
a disaster if you haven’t saved your work. Restore to return your PC to the
Freezes are often the result of memory overload. state it was in prior to the
The memory in your notebook has a certain capacity, change. To do this in Windows 7,
and if there are too many processes running simulta- click Start, type system restore,
neously, your notebook may freeze because it can’t click System Restore; in Win-
keep up. Malware is a common culprit in causing dows Vista, click Start, Control
freezes, and sometimes two programs in conflict Panel, System And Maintenance,
with each other can freeze your computer, especially Backup And Restore Center, and ▲ With the Add And
if the computer doesn’t have sufficient processing Restore Computer; in Windows XP, click Start, All Remove Programs
power or memory. If the keyboard or mouse is re- Programs, Accessories, System Tools, and System feature in Windows, you
can determine which
sponsive, start troubleshooting by pressing CTRL- Restore. If the problem persists, you may have to
program is causing an
ALT-DELETE. Enter the Task Manager and end the remove the program. error by removing it and
program you believe may have caused the freeze To uninstall a program in Vista, click Start, seeing if the problem is
(usually the last you attempted to open). A problem- Control Panel, and Uninstall A Program to get resolved.
atic application name may be labeled “not re- started; in WinXP, click Start, Control Panel, and
sponding,” which helps you identify which program choose Add Or Remove Programs. Locate the ap-
is causing the trouble. If the keyboard or mouse does propriate program in the list and choose Remove.
not respond, you may have to perform a hard (aka Don’t remove a program unless you have the exe-
cold) shutdown by holding down the power button cutable file or the installation discs on hand. ▲
Revive A Dead
Smartphone Emergency CPR Techniques
All other smartphones. You can generally per- BlackBerry (all models). Remove the battery
form a soft reset by powering the phone off, re- for 30 seconds. Reinstall the battery and turn the
moving the battery for 30 seconds, and powering phone back on.
the phone back on. HTC FUZE. With the device turned on, press
and hold the Left and Right soft keys. While holding
Hard Reset the keys, use the stylus to press and hold the Reset
A hard reset is a last-ditch option that returns button on the bottom of the device near the USB
your phone to its factory settings, which means port. Text on the display will ask you to confirm
you will lose all the data and installed appli- the reset.
cations. Before performing a hard reset, you will HTC HD2. With the device powered off, press
want to remove the memory card from your and hold the Volume Up and Volume Down but-
phone; that way, you can recover data from tons. With the volume buttons depressed, press and
the card later. release the End/Power button. When a warning ▲ Don’t worry if it takes
Android (all models with functioning menu message displays, release the volume buttons. Next, your BlackBerry several
systems). One of the following menu-based sys- press the Volume Up button to perform the reset. minutes to start up after
tems for performing a hard reset should work, de- Pressing any other button cancels the reset. a reset; this is normal.
pending on the phone and version of Android. HTC Touch Pro, Touch Pro2, Touch Diamond.
Open the application menu. Tap Settings, SD With the device turned on, press and hold the
and Card Storage, Factory Data Reset, and follow Volume Down and Enter buttons. While holding
the on-screen instructions. the keys, use the stylus to press the Reset button,
From the Home screen, tap Menu, Settings, located under the battery cover. Continue to hold
Privacy, and Factory Data Reset, and then follow the Volume Down and Enter keys until a warning
the on-screen instructions. message displays. Release the Volume Down and
From the Home screen, tap Menu, Settings, Enter keys, and then press the Volume Up key to
Security, and Factory Data Reset, and then follow reset the phone. Pressing any other button cancels
the on-screen instructions. the reset.
When the menu system isn’t functional, follow iPhone (all models). From the Home screen,
these phone-specific options to perform a hard reset. tap Settings, General, Reset, and Reset All Settings.
Google Nexus One. Turn your phone off. Next, This action resets all preferences but retains ap-
hold the Volume Down button and press the plications and data. If that doesn’t work, from the
Power button. Use the Volume Down button to se- Home screen, tap Settings, General, Reset, Erase ▲ The hard reset and
lect Clear Storage from the list of options. Press All Content, and Settings. This will delete all soft reset procedures are
the Power button and confirm your selection by data and applications and return the iPhone to fac- the same for all iPhones.
pressing the Volume Up button. tory conditions.
T-Mobile G1. With the G1 powered off, press and Nokia (all models). With your phone powered
hold the Home-End keys until you see a triangle on or in standby mode, type *#7370# and select Yes
with an exclamation point. Open the QWERTY key- when prompted. You may need your Lock Code for
board and press ALT-W. confirmation. The default lock code is 12345.
Motorola Droid. Turn the phone off. Press and If your phone doesn’t turn on, try pressing the
hold the Power-X keys to force the phone into re- On/Off button, *, and 3 simultaneously.
covery mode. Next, press and hold the Volume Up- Palm Pre. Open Device Info, tap Phone Reset
Camera key to display the recovery menu. Select Options, and then tap Full Erase twice. If your
Wipe Data/Factory Reset from the menu, and then Palm Pre is frozen and you’re unable to use the
select Reboot Phone. menus to perform a reset, try running the latest
Motorola Backflip. Power the phone off. Press version of webOS Doctor (www.palm.com/us
and hold the Power and Camera buttons. When /support/downloads/pre/recoverytool/webos
the phone turns on, you need to release the _java_sprint) to troubleshoot and reset the device.
Power button but continue to hold the camera Follow the on-screen instructions.
button until prompted to release it. Next, press Palm Centro and Treo. Press and hold the
▲ If your Nokia smart-
the Volume Down button. After 15 seconds, a Power On/Off button. While holding the button,
phone doesn’t turn on
yellow triangle with an exclamation point will remove the battery, wait 10 seconds, and then rein- after you perform a hard
appear. With your phone closed, tap the bottom- stall the battery. Continue to hold the Power button reset, try pressing the
right corner of the display, and select Wipe until you see the Palm Powered screen. Release the On/Off button, *, and
Data/Factory Reset. Press OK and follow the on- Power button. When the screen displays the “Erase 3 simultaneously.
screen instructions. all data?” query, press the Up button. ▲
Spirit Airlines