Sie sind auf Seite 1von 80

Table Of Contents

www.pctoday.com Volume 8 • Issue 10 • October 2010


Product Coverage Inquiries
products@pctoday.com
(800) 247-4880
131 West Grand Drive

10
Essential Business Tech
Lincoln, NE 68521

Circulation
(To adjust your bulk order or to
request racks.)
Technology intelligence for executives, marketing@pctoday.com
professionals, and entrepreneurs (800) 334-7458

36
Customer Service
(For questions about your sub-
scription or to place an order or
change an address.)
customer-service@pctoday.com
Mobile Office (800) 733-3809
FAX: (402) 479-2193
Highly useful information for conducting
business on the road
PC Today
P.O. Box 82545

Xerox: Beyond Copiers 62 Lincoln, NE 68501-5380

Hours
Personal Electronics Mon. - Fri.: 7 a.m. to 8 p.m. (CST)
Sat.: 8 a.m. to 4 p.m. (CST)
If you think you know Xerox, think again. Although Xerox
Online Customer Service
continues to be the undisputed king when it comes to business- Electronics, services, and helpful advice
& Subscription Center
class copiers, printers, and document management systems, the for home and leisure www.pctoday.com
company’s new “Ready For Real Business” campaign highlights
the company’s B2B offerings. Turn to page 10 to find out more Authorization For Reprints
about the back-office business services Xerox provides for mid- (800) 247-4880

sized to large businesses.

Copyright 2010 by Sandhills


Publishing Company.

Enterprise Security Risks PC Today is a registered trade-


mark of Sandhills Publishing
Company. All rights reserved.
What are the biggest threats to enterprise security? How does Reproduction of material ap-
your organization spot security holes pearing in PC Today is strictly
prohibited without written per-
and plug them before any damage is mission. Printed in the U.S.A. GST
done? Turn to page 12 for a pair of ar- # 123482788RT0001 (ISSN 1040-
ticles on the topic. The first identifies 6484).

the biggest risks that large compa- PC Today is published monthly


nies currently face, and the second for $29 per year by Sandhills
will help you determine how to Publishing Company, 131 West
Grand Drive, P.O. Box 82545,
assess potential threats and ad- Lincoln, NE 68501-5380.
dress them head on. Subscriber Services: (800) 733-

68 3809.

Business Travel 911


Fast tech support especially for
traveling professionals
IN BRIEF
TECHNOLOGY NEWS

videoconferencing offerings, plans to there is some disagreement about


buy ExtendMedia for an undisclosed whether 3PAR was worth the price
sum. ExtendMedia specializes in soft- HP agreed to pay.
ware and services for video content
distribution across multiple device ❚ Google, ITA &
types. Cisco plans to integrate The Justice Department
ExtendMedia’s software into its Google is interested in acquiring
own IP video products. ITA Software, which provides data
for airlines, online travel services,
❚ HP Adds Security With ArcSight and even Microsoft’s Bing. The
HP announced it would acquire the U.S. Department of Justice, how-
Cupertino, Calif.,-based ArcSight ever, is investigating whether such
for about $1.5 billion in a deal that a move would give Google too
should be complete by year’s end. much control over the online travel
This ends speculation that IBM, industry, according to sources for
Oracle, or another firm would buy The Wall Street Journal.
ArcSight, which opened itself to
bidders in August. ArcSight offers ❚ 3M Buys Security &
❚ Cisco Makes ❚ New Dell Products Target HPC a robust line of security and related Tracking Companies
Smart Grid Deals Dell announced a new collection solutions primarily for large organi- The St. Paul, Minn.,-based 3M re-
Although terms of the of products designed with the HPC zations; its products will comple- cently announced two major acqui-
agreement were not dis- (high-performance computing) ment HP’s existing portfolio of sitions within one week: Pasadena,
closed, Cisco Systems market in mind. Geared toward ed- security hardware and software. Calif.,-based Cogent Systems and
announced plans to ac- ucation and research organizations, the Israeli company Attenti Hold-
quire Arch Rock, a San the products include the AMD- ❚ Intel’s Infineon Purchase ings for about $430 million and
Francisco-based company based PowerEdge C6105 rack- Adds Wireless Clout $230 million, respectively. Cogent
specializing in IP wireless mount server, the PowerEdge When Intel completes its $1.4 billion makes biometric identification and
sensor network technology M610x blade server, and the acquisition of Infineon’s wireless access control products for commer-
for smart grid applications Precision T7500 workstation for solutions business early next year, cial, government, and law enforce-
in data centers, office performing complex tasks. Intel will have significantly im- ment use. Attenti Holdings makes
buildings, and industrial proved its wireless arsenal. Intel’s tracking and monitoring devices
facilities. The news fol- wireless interests are currently with applications ranging from law
lowed another Cisco an- steeped in Wi-Fi and WiMAX; enforcement to health care.
nouncement: that its Infineon’s wireless business, called
IP-based platform would ❚ Xerox Launches WLS, includes 3G cellular tech-
power a smart meter “Real Business” Campaign nologies, which will help Intel’s
system from Itron, another With a new Web site (www.real LTE (Long Term Evolution) 4G en-
top smart grid company. business.com) and marketing cam- deavors. Intel says WLS will con- ❚ Juniper Might Buy
paign emphasizing its business tinue as a standalone business and WLAN Company
services, Xerox is promoting itself promises to support its customers. Juniper Networks is considering
as more than the copier and printer acquiring Trapeze Networks, a
company with the ubiquitous name. ❚ HP & 3PAR Make A Win-Win brand of Richmond, Ind.,-based
Turn to page 10 to find out more Now that the dust has settled from Belden. Trapeze Networks manufac-
about the company’s back-office the Dell-vs.-HP scuffle over 3PAR tures wireless networking gear and
business-process offerings in with HP’s $2.35 billion winning bid, related security and network man-
finance, customer care, IT out- questions remain as to what Dell agement products for big business,
sourcing, and other areas. will do next. Analysts agree, how- so the acquisition would enhance
ever, that HP will benefit from in- Juniper’s enterprise wireless net-
❚ Cisco To Buy corporating 3PAR’s utility storage working portfolio. Veterans from
Video Distribution Company products into its own storage port- Bay Networks, Cisco Systems,
Cisco Systems, known for its folio, bringing HP further into the Motorola, and Redback Networks
Telepresence and other cloud computing arena, although founded Trapeze in 2002.

6 October 2010 / www.pctoday.com


IN BRIEF
TECHNOLOGY NEWS

❚ Motorola To Invest $3.5 Billion Calif.,-based Cellmania, but few running Google’s Android OS to
In Mobility Division details were forthcoming from hit the market. HTC manufactured
In July Motorola announced it either company. Cellmania focuses the G1 and the G2, adding im-
would split in two, with Motorola on mobile application distribution provements to the G2 that comple-
Mobility becoming a unit devoted to and interface customization tech- ment the new Android 2.2 (aka
wireless products and home devices nologies and has a client list that Froyo) software. In addition to a
separate from Motorola Solutions. includes all of the major U.S. and touchscreen, the G2 features a
Motorola has since added that it in- European wireless carriers. swing-out QWERTY keyboard. The
tends to contribute $3.5 billion to the G2 works as a fast 4G phone in the
Mobility units, pending approval by ❚ AOL Continues Push cities where coverage is available
the board. The split is scheduled to For Mobile Crowd and supports Adobe Flash.
occur in Q1 2011. AOL will buy Rally Up, a year-old
development company specializing ❚ Walmart & T-Mobile Offer
❚ HP Gives Small ❚ Alcatel-Lucent Invests In in location-based social networking Contract-Free Calling
Businesses “Just Right IT” App Development applications for Apple’s iPhone and T-Mobile has found some inter-
HP recently launched a French technology company iPad. According to AOL, the Rally esting ways to compete in a market
line of products under the Alcatel-Lucent, which has shown Up team will move to AOL’s new dominated by contending wireless
“Just Right IT” banner, all interest in mobile app development, Palo Alto, Calif., facilities and work carriers, including its new affiliation
designed to make tech- will expand its capabilities in that with AOL on developing products with Walmart. The Walmart Family
nology run smoother for area with the acquisition of the that will be introduced initially as Mobile plan offers customers af-
SMBs. The products are Taiwanese company OpenPlug. mobile apps. fordable post-paid cellular plans
scaled to meet the needs of Known for its FlexibleWare tech- with no contract or multi-year com-
a variety of business types nology, OpenPlug offers a platform ❚ Apple Ditches Quattro For iAds mitment required. The plan also in-
and sizes and run the that helps developers create applica- Apple purchased the mobile adver- cludes a WebPak, a refillable card
gamut from desktop com- tions for multiple mobile operating tising company Quattro Wireless in that provides Internet access and
puters and printers to systems simultaneously. Terms of January for $275 million, but recently low-cost international calling.
servers and storage arrays. the acquisition were not disclosed. announced plans to shut down its ad
The portfolio also includes service in favor of Apple’s own iAd. ❚ Search Engine Deals
a wireless access point and ❚ Cisco & Citrix Team Up For Replacing the text on the Quattro The two largest search engines,
software for server and Virtual Desktop Simplicity Wireless Web site, Apple posted, “We Google and Bing, continue to ex-
storage management, believe iAd is the best mobile ad net- pand beyond their home portals.
backup, and recovery. work in the world,” adding that it Acting on an agreement reached ear-
would wind down existing Quattro lier this year, Microsoft’s Bing is now
Wireless Network campaigns the search engine behind Yahoo!
Cisco Systems and Citrix have through September. And in a farther-reaching move,
teamed up to offer a package Google and AOL agreed to continue
that combines Cisco’s Unified ❚ T-Mobile Releases Follow-Up its partnership (with Google pro-
Computing System and Citrix’s To First Android Phone viding search functionality) and ex-
XenDesktop virtualization software. The T-Mobile G2 is the follow-up tend it to include Google-supported
Bearing the lengthy name Cisco to the G1, the first smartphone mobile services for AOL.
Desktop Virtualization Solution with
Citrix XenDesktop, the package is
now available to businesses looking
for easy deployment of virtual
Windows desktops across a variety
of locations and devices.

❚ RIM Buys Mobile Company


Cellmania
BlackBerry-maker Research In
Motion confirmed that it had
purchased the Mountain View,

8 October 2010 / www.pctoday.com


IN BRIEF
TECHNOLOGY NEWS

❚ Huge Potential
For Wireless Charging
How Marketing It should come as no surprise that

Conferences or seminars
Execs Stay Current people get annoyed with using and

Networking events or industry


New research from The keeping track of charging cables. A re-
Creative Group indicates that cent In-Stat survey confirmed that, with

Webinars or online training


most marketing and adver- 44% of people who are unsatisfied with

association meetings
LinkedIn, Facebook, or Twitter
tising executives have at least currently available solutions. Note-
a little bit of trouble keeping worthy, though, is the willingness of
up with today’s social media 40% of those survey respondents to pay

Trade publications
trends. Of the 375 surveyed, $50 or more for a wireless charging so-
56% reported finding it lution. Based on its research, In-Stat
“somewhat challenging” to forecast that the market potential for
keep up with social media and wireless charging gear will reach $4.3
9% said they find it “very billion by 2014.
challenging.” The remaining
35% found it not difficult at ❚ Semiconductor Rollercoaster
all, but that doesn’t mean they The latest semiconductor revenue fore-
Blogs

think social media is the best cast from research firm Gartner indicates
resource. Most prefer confer- that worldwide revenues will reach $300
ences, seminars, and in-person billion this year, marking a 31.5% in-
networking events. Here are crease over 2009, when revenues hit $228
the top responses for the re- 23% billion. Gartner analysts warn, however,
17% 18%
sources those surveyed find 14% 15% that production cuts in electronics indus-
7% tries around the globe won’t sustain this
most useful:
growth; it projects a mere 4.6% increase
in 2011 (to $314 billion) over 2010.

❚ WiMAX Subscriber Numbers To Rise


Microsoft Takes No. 2 Search Spot The mobile broadband (or 4G) tech-
Taking 65.1% of all searches, Google still reigns supreme among Internet search engines. Microsoft’s search nology WiMAX, backed by Clearwire
sites (Bing, MSN, and Windows Live), however, have ascended to take second place from Yahoo! for the and Sprint among others, has not taken
first time. According to Nielsen, the change in ranking took place in August following a month-over-month off as quickly as industry insiders antici-
change of 2% for Microsoft and -8% for Yahoo!, and a year-over-year change of 30% for Microsoft and -18% pated a few years ago. Still, there is
for Yahoo! Here’s how the major search engines stack up now: growth, with WiMAX subscribers ap-
proaching 59 million in 2010, according
2% to ABI Research. LTE is another 4G
2.1% AOL technology and is often seen as com-
Ask.com 3.8%
Other peting with WiMAX, but it’s likely the
two will coexist.

13.1% ❚ Facebook Won’t Be Ignored


Yahoo! Whatever your thoughts about the
social networking site Facebook, it con-
13.9% tinues to make major inroads with busi-
Microsoft nesses and consumers alike. Facebook
65.1% usage is especially prevalent in the UK,
Google where the site accounts for one in every
six Web page views, according to
Experian Hitwise. Not surprisingly
given that stat, Facebook also domi-
nates all other social networking sites
in the UK, accounting for 54.48% of all
visits to such sites.

PC Today / October 2010 9


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

If You Think
You Know Xerox,
THINK AGAIN
Documentation Giant Expands, Adds B2B Services

erox is the undisputed king when it like. But the acquisition of ACS (and the services it
comes to business-class copiers, printers, allows us to offer) gives us an opportunity from an
and document management systems. But advertising perspective to reposition the brand with
if you think you know Xerox, think again. this campaign, to bring to light these capabilities,
It may be time to expect the unexpected. and to do it in a way that’s very fresh, very much a
The venerable giant (it’s been around breakthrough, particularly in the B2B space.
in one form or another since 1906) has un-
dertaken a far-reaching, multifaceted re- What business services is Xerox promoting?
branding effort aimed at letting business We have what we’ve always been doing, our doc-
users know just how much Xerox can do for them; ument management services. And then there are IT
the ultimate goal is to have mid- to large-enterprise outsourcing, HR services, customer care support, fi-
organizations outsource to Xerox those business- nance, and accounting services. Those are the ones
related functions that are not core to their business. for the campaign that we’re focusing on at the outset.
Thus, Xerox is now prepared to help those compa-
nies get “ready for real business” by offering B2B
services in the areas of finance and accounting,
human resources, customer care, IT outsourcing, and
document management. We spoke with Barbara
Basney, Xerox’s vice president of global advertising,
about the rebranding effort.

Xerox recently launched an extensive advertising


campaign to promote its business services.
Essentially, this amounts to a major rebranding.
What was the impetus for the campaign?
This is the largest and most integrated campaign
we’ve ever done, so it’s quite significant. The im-
petus behind it was the February 2010 acquisition of
Affiliated Computer Services. That was a significant
acquisition for us: $6.4 billion. It tremendously ex-
panded our breadth of business process services ca-
pabilities, and that translated into tripling our
services business—it’s become about half of our $22
billion in revenues.

What does the rebranding involve?


From a brand perspective, the acquisition is a
huge repositioning opportunity for us. Xerox is still
known as a copier company; there’s still that legacy
perception. Despite the fact that the business has to a
great extent moved away from that pure association,
it hasn’t really seeded and rooted as firmly as we’d

10 October 2010 / www.pctoday.com


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

A few years back, Xerox launched a campaign most powerful way, I think, to tell the story of our ex- NOT YOUR PARENTS’
designed to rebrand the company as a document panded offerings and what we can do for our cus- XEROX & NOT
YOUR PARENTS’ AD
management company, rather than simply as a tomer/partners.
CAMPAIGN
provider of technology. What’s the relationship of
that campaign to this one? Can you explain a little about how Marriott The new campaign is defi-
That was the first step toward this bigger vision International and Target, to select two examples, nitely a different approach
of getting the company more firmly rooted in the are using Xerox services in their business? for historically staid
Xerox. The Web site (at
services space. It was a natural next step for us Basically Marriot had a global invoice process.
www.realbusiness.com) is
from being a document technology provider. This It was paper-based, it was very time-consuming, a multimedia extrava-
is certainly still a big part of it, and the campaign and it wasn’t very efficient; we partnered with ganza, complete with
doesn’t leave that off the table, but moves it for- them to help digitize and leverage workflow tech- music, video, tours of a
ward tremendously by adding all these other capa- nologies in that process. The end result is, on a virtual building, in-jokes,
customer stories, roaring
bilities and service offerings. global basis, the 11 million invoices and docu-
motorcycles, and
ments that they were processing were done more “Bullseye,” Target’s fa-
Given that our readers think they know Xerox quickly and efficiently, saving time and money. We mous Miniature Bull
pretty well, they may be surprised at the breadth provided the automation of that process for them Terrier mascot.
of these new service offerings. Finding that Xerox on a global basis.
It’s cute, all right. And it’s
now offers HR services or IT outsourcing may be Target, as a preeminent retailer, has extensive
funny. But it’s also se-
a bit unexpected. data on customers’ buying habits and purchase be- rious business, aimed at
It may be a surprise, but clearly with a cam- havior. In this case, Xerox helped them leverage communicating Xerox’s
paign like this we did some testing here, and it’s our XMPie [cross-media, one-to-one marketing] message to companies:
the right surprise. It’s: “I didn’t know they were ca- software, and helped them provide customization The new Xerox can im-
prove your company’s
pable of doing some of these things!” But it’s good of direct marketing materials going out to their
bottom line by relieving
to know, it’s credible, and it’s something that cer- customers. So, really making what you’re receiving your people of peripheral
tainly changes their perception of us and what we relevant and timely. As a result, Target saw double- functions and activities
can do for their company, and that is the intention digit response rates with those communications, a so that they can concen-
of the campaign. 50% lift [in data mining effectiveness], and a 30% trate on their real busi-
ness goals.
reduction of their production costs.
What are some of the companies Xerox is working
with in the ad campaign? People readily associate Xerox with copiers and
Out of the gate, we’re working with some global printers. Does that continue to be a strong busi-
brands and preeminent partner/customers. ness for Xerox?
Marriot, Procter & Gamble, Target, Ducati, and Our traditional printing, copying, and document
Notre Dame are the ones that we’re featuring to technology business still amounts to almost half of
begin with. And there are more to come.
The power of a campaign like this is in
the breadth of the story-telling, so our This is the largest and most integrated
intention is to keep this going, get a lot
of momentum behind it. campaign we’ve ever done.
How common is it for a company to use
its customers’ brands—and even their logos—in a our revenue. We have a very strong commitment to
marketing campaign? technology. Remember, too, that technology is also
In the course of advertising history, it’s certainly what helps enable solutions in the services space, so
been done with some degree of regularity, but I think it works together very synergistically, as well. It’s
that one of the insights around this campaign idea is still very important to our business.
that of “being ready for real business.” We’re putting
the spotlight on our customers and really show- What’s next for Xerox now that the new campaign
casing in an engaging way how we’re behind the is underway?
scenes helping them, giving them the freedom to I think that we concentrate on the power of this
focus on their real business. That’s our insight here. campaign and the opportunity of seeing it grow. We
And the power of telling that story comes from just launched on the 7th of September, so we’re just
naming who they are and explaining—in a very out of the gate and we’re looking forward to the
easy-to-understand way—what it is we do for them. care and feeding of this campaign and seeing it go
I think that’s core to that campaign concept and the well into 2011 and beyond. ▲

PC Today / October 2010 11


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

ENTERPRISE
SECURITY
Today’s Risks

by Seth Colaner

The Internet

E
nterprise security is an ongoing, high-
stakes game of one-upmanship between cy- The Internet is the world’s largest playground
bercriminals and security professionals, for social engineers, spammers, and hackers.
wherein the players dodge, parry, and thrust. These people might try to use every scam or trick
Both sides adapt to the others’ tactics in the in the book to get you to divulge sensitive infor-
perennial struggle for data, with the baddies at- mation they can sell to other crooks, use to steal
tacking here and the good guys thwarting there. identities, use to hack into financial accounts and
As many organizations gravitate to cloud com- past company firewalls, make money at your ex-
puting and virtualization technology, the oppor- pense, and spread chaos or malice.
tunities for attacks and means by The traps are laid everywhere. Social net-
which they’re carried out have grown working sites such as Twitter, Facebook, and
and evolved. Apple’s new Ping are rife with URLs that will
Security in the enterprise is more lead you to something unsavory if clicked; or
than defending the perimeter from as- worse, they’ll acquire and change the login cre-
sailants, however; it’s also about en- dentials of a friend of yours and then pose as that
suring that your hardware and software person and ask you for information. Hackers will
run properly. Just as the office building also artificially push their fake Web sites to the
needs to be monitored and maintained, top of search engine results by determining the
your technology needs expert hands hottest trending terms and filling their sites with
keeping it healthy. them. When you click one of their links, you may
Web browsers or Web Enterprises are vulnerable from targeted at- find yourself prompted to download malware
applications that tacks by cybercriminals, destructive malware, under the guise of something legitimate.
lack patches or
hardware or software failures, and the inevi- Prompting computer users to download fake
are not updated are
vulnerable to attacks. table problems of human error. Furthermore, security software has become a multilayered
security issues come from a variety of places. piece of criminal art. There was a time when a
Some are obvious, although others may not be bug on a Web site would ask you to download a
quite so intuitive. piece of software that turned out to be malware;

12 October 2010 / www.pctoday.com


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

then, as enough people got wise about the scam,


the download became fake security software that
would ostensibly protect you from a piece of
malware that the site wanted you to download;
now, a new bug mimics your browser’s malware
or phishing site detection warning and tries to
get you to update the software—which makes
you think you’re protecting yourself from
the very type of site or program that is duping
you. It’s almost like the malware version of a
Droste effect.
Good old-fashioned email spam is still a con-
stant threat. Although email programs and serv-
ices have become adept at filtering spam, some of
it still gets through, which includes such things as
the Nigerian scam and lottery scams, all of which routinely require login credentials, any insecurity A classic spammer
are based on the premise that you’ll get some great can mean that a hacker can gain access to your ac- tactic is an email that
benefit if you send some money first. Whatever count information and any sensitive data therein, requests your personal
information in exchange
money you send, of course, will disappear with or, depending on the type of application, pose as for money.
the spammer. Additionally, spam emails frequently you and perpetrate phishing scams.
contain either bad links or attachments that will
deliver a malware payload if downloaded. IT
P2P (peer-to-peer) file sharing networks are Even your faithful,
ideal platforms for malware makers and data stalwart IT department
thieves to do their work. Being on a P2P network can have flaws. The IT de-
requires you to open a hole in your computer’s se- partment is in charge of
curity so you can share files with others. If you do monitoring and managing
this incorrectly, you could expose much more the health of your net-
than just the few items you intended to share. work, which includes
Additionally, P2P software or any files you share such things as storage,
can contain viruses, Trojans, and other malware. data availability, ensuring
This is especially dangerous if you’re on a corpo- server uptime, and secu-
rate network. rity from outside threats. If IT personnel fail to do Social networking sites
Web browsers are often attack vectors, as well. their jobs, your company could face software or such as Apple’s Ping are
At any given time, hackers are discovering and ex- hardware failures and an influx of malware. rife with bad links and
phishing scams.
ploiting vulnerabilities in popular Web browsers Whether through a bug on your system or a tar-
including Mozilla Firefox, Internet Explorer, and geted attack, your organization’s data is vulner-
Google Chrome. (If you keep your Web browser able, and if there are insufficient security controls
current and patched, the risk is much smaller; in place, your system could be at risk.
browser makers patch known vulnerabilities rela- As cloud computing becomes popular, there
tively quickly, so the older your browser software are even more issues that an IT department has
is, the more likely it is to be exploited.) to deal with. Cloud computing, which relies on
Web applications fall under the same category the Internet to send and receive data, communi-
as Web browsers in that they often have vulnerabil- cations, and host applications, is an industry
ities that hackers can exploit. Because Web apps that lacks important security standardization.

TOP FIVE RISKS


Humans, including Malware from any Vulnerabilities in Mobile devices, Poor cloud
average user and IT number of sources network security including laptops, computing security
staff error, as well as and applications smartphones, and
malicious insiders flash drives

PC Today / October 2010 13


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

Although many cloud providers use robust se- flash drive, every computer he plugs his flash
curity policies and implementations, cloud drive into at work or at home could also become
providers that lack necessary security measures infected. It’s rather easy for a flash drive that is
are low-hanging fruit for hackers. used by an employee at home to find its way to a
corporate machine, where an infection could
Mobile Devices wreak havoc.
Smartphones are becoming de rigeur for workers
on virtually every level of a company; they’re not Employees
just for the folks in the corner office anymore. It’s probably no surprise that one of the weakest
Further, many workers sync their personal smart- links in the security chain is a human being. People
phones with their company email accounts. make mistakes: they sometimes lose devices, click
Smartphones store a certain amount of data, bad links, or make uninformed decisions.
including contact information and personal de- Furthermore, social engineering schemes work
tails, but they also function as a portal to a com- solely because a malicious person does something
pany in the form of synced email (if nothing that dupes people. Scams in general, and social

The rise in
popularity of
cloud computing means
that hackers have yet another attack vector.

else). Just as having your smartphone synchro- engineering specifically, work because people (in-
nized to your work email is a powerful and con- advertently) give away important information,
venient tool, it also becomes a vulnerability if the such as login credentials, account numbers, com-
device is lost or stolen. A pilfered smartphone is pany information, and other sensitive data.
a veritable gold mine for identity thieves and so- Additionally, angry or disgruntled employees
cial engineers. can also present a risk, whether it’s stealing com-
Laptops present a similar, but in many ways pany data or some act of malevolence such as
more grave, risk. A lost or stolen laptop is chock- planting malware or disabling systems.
full of company secrets, internal communication, Fortunately, people are also the best defense
and personal details. against security threats. Both security professionals
USB flash drives, though eminently convenient who actively monitor and protect against mali-
for toting many gigabytes around in your pocket, cious attacks and other insecurities and employees
are also perfect vehicles for infecting computers who are educated about the schemes, scams, and
with malware. They’re ubiquitous, and if a co- other dangers can go a long way toward keeping
worker inadvertently picks up some bug on a your enterprise secure. ▲

14 October 2010 / www.pctoday.com


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

Facing Today’s
KEY POINTS
▲ Organizations need to
do a gap analysis to de-
termine whether their

Enterprise
current security policies
cover new technologies
that could potentially
expose corporate data.

▲ Cloud-based backup
services productivity ap-
plications should have
third-party security certi-
Security Risks
fications in place. New Technologies & Initiatives Hinder Threat Management
▲ Accept that your
employees will use per- by Tessa Warner Breneman
sonal mobile devices
and social networking

E
services, and then edu- nterprise security risks are increasingly more difficult to manage.
cate them on appropriate With cloud computing on the rise, consumer devices infiltrating the
use and how to recog-
nize threats. network, and sophisticated attacks making their way to the network,
▲ Consider managed your security staff faces more difficult challenges than ever before.
security services as
a way to deal with
According to Symantec, cyber attacks cost or- couple of years. We’re really in a different environ-
the changing threat
landscape. ganizations an average of $2 million per year. In ment here. The security community is at a signifi-
its 2010 State of Enterprise Security Study, cant disadvantage.”
Symantec found that 75% of organizations re-
ported a cyber attack in the past 12 months. Know Where To Start
Additionally, 29% of respondents said attacks Updating your security policies is a step for-
have increased in the past year. These statistics ward in addressing today’s enterprise security
plus strict regulations and new business initiatives risks, but it can be difficult to know where to start
and which new technologies
and initiatives are causing
the widest security holes.


Because there are
few security measures
“Every large company al-
ready has some sort of secu-
built into IaaS rity program in place,” says
John Pescatore, vice presi-
(infrastructure as a service),” dent and distinguished ana-
says Jonathan Penn, lyst at Gartner Research. “In
a Forrester Research general, what we find is
that there are a couple areas
vice president, “users are that are causing the most
responsible for securing their breakage in the existing
assets, including plans and policies. One of
those is changes in the way
the operating system, IT is being delivered.”
applications, and files.
” According to Pescatore,
virtualization, the use of SaaS
(software as a service), cloud-
in Web 2.0 environments are adding to the daily based services, consumer-grade devices on the net-
headaches of security personnel. work, and the social Web are the primary gaps in
“Things are getting worse,” says Jonathan Penn, security policies today. Additionally, outside
vice president at Forrester Research. “Hackers are threats have become more targeted and financially
more resourced and more sophisticated. That’s motivated. Penn echoed Pescatore’s assessment of
been happening for a while, but I think we’re at the threat landscape, adding that many businesses
the point now where it’s escalated over the past don’t really know when they are being attacked,

16 October 2010 / www.pctoday.com


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

which makes for an environment unlike that of five


years ago. People really don’t have a sense of their
level of risk, or if they are currently breached or
not, Penn explains.
Through a gap analysis, businesses can deter-
mine which areas of the security policy they need
to update and what new risks they must address.
Businesses can also look at newer technologies,
such as virtualization and cloud-based services,
to identify whether they could be utilizing more
cost-efficient security solutions, and whether the
According to the
risks associated with those solutions are worth
Symantec 2010 State of
the rewards. Enterprise Security study,
35% of organizations find
Risks In The Cloud IaaS makes their job
Many businesses are turning to the cloud for more difficult.
backup solutions and productivity software. How-
ever, there are a handful of risks associated with
these services that can be avoided as long as you do
your homework.
Pescatore points out that there are several free
cloud-based backups that are ad-supported, but
using these services presents a major risk for busi-
nesses. Too often, companies that rely on adver- The IBM X-Force 2010
tising for revenue close down or have terms of Mid-Year Trend And Risk
service agreements that change frequently. If you Report found most virtu-
alization vulnerabilities
are shopping for a cloud-based backup solution for
are at high and medium
your enterprise, carefully read the service agree- severity levels.
ments to find out what happens to your data if the
service provider shuts down its backup services.
Also, find out what happens to your company’s
data if you decide to switch services, what the poli- that the Web-based service meets at least the min-
cies are for data retention, and how quick the re- imum requirements for a variety of security stan-
sponse time is if you need your data restored. dards. Then, IT security administrators must audit
Similarly, there are special considerations for the services to ensure they are abiding by their
using Web-based productivity software. In addi- service agreements and maintaining a strong level
tion to researching service agreements and reten- of security.
tion policies, consider how your organization will Virtualization also has IT security personnel
deal with having a variety of security levels for concerned. Yankee Group recently released survey
different types of documents and how you provide results that cited security as the top concern for or-
access to that information. “When someone comes ganizations that have yet to implement an IaaS (in-
onboard or they request access, you appropriately frastructure as a service). The survey reports that
provision them,” Penn says. “Then when they 24% of large enterprises with cloud deployments
leave a group or leave a company, that access is are using IaaS, and 37% will likely adopt IaaS in the
rapidly denied. A lot of people are looking to tie it next two years. Because there are few security
to corporate credentials, and that’s a pretty impor- measures built in to IaaS, users are responsible for
tant thing, so you can limit access effectively by securing their assets, including the operating
doing that.” You’ll also need to decide how you are system, applications, and files.
going to let clients and other third parties access “All this IT stuff is moving out of your environ-
your documents online. ment, so you need a way to secure your assets
Businesses looking at cloud-based backup serv- there,” Penn says.
ices or Web productivity software should only go
with services that have third-party security cre- Risk & Consumerization
dentials or that have been assessed by a third The plethora of consumer services and devices
party in some way. That way, organizations know being used for business purposes has opened the

PC Today / October 2010 17


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

A recent Forrester
Research survey indi-
cates the technologies
and initiatives that
concern enterprise man-
agers the most when
addressing the issue of
security risks.

door to additional security risks for enterprises. Pescatore also addressed the use of smart-
Forrester’s State Of Enterprise IT Security And phones. If employees want to use their personal
Emerging Trends report, co-authored by Penn, smartphones for work purposes, IT should ensure
states that consumerization concerns IT per- it can enforce password-protection and automatic
sonnel more than the cloud or virtualization. The timeout if the device is not used for a specific
report found that 46% of enterprises are con- amount of time. Additionally, Pescatore says
cerned with smartphones, while 38% said Web smartphones should have enforceable content en-
2.0 technologies are worrisome. In comparison, cryption, remote wipe capabilities, and active sync
37% of respondents cited concerns over cloud support. Most of the smartphone operating sys-
computing, while 34% said data center virtualiza- tems on the market offer these capabilities, but all
tion was cause for concern. To accommodate devices on the network should meet these require-
these changes, businesses must first accept that ments, Pescatore says.
employees will use these devices and services,
and then they must write policies around their Outsourcing Security
use within the workplace. Many enterprises are looking to outsource se-
“Don’t just say no, because [employees] are curity as a way to deal with the changing land-
going to do it anyway,” Penn says. “You need to scape and to reduce security costs. Penn says it’s
reach out to businesses more and figure out how to more than just organizations wanting to save
work with them and allow things, but set policy in money, even though that’s part of it. With out-
a way that balances the business need with the sourced security, organizations get around-the-
business risks.” Penn also says security adminis- clock support, quicker updates for security
trators need to educate users on how to use the products, and a staff of highly talented security
necessary tools and to identify some of the related providers. According to Forrester ’s State Of
risks. This will help establish a more collaborative Enterprise IT Security And Emerging Trends re-
environment between the business side and the IT port, 63% of companies that use managed secu-
staff rather than create an environment where rity services do so for the quality of protection.
there’s a lot of friction. Eighteen percent of the companies that partici-
Employees should understand what sensitive pated in the study say they are interested in
information looks like and where it resides on the using a service in the next year.
enterprise network. Additionally, IT administra- Regardless of whether your security is out-
tors should explain how threats appear on social sourced or in-house, be sure your security policies
Web sites, how to respond to those threats, and accurately and thoroughly address the threat land-
how to keep appropriately strong passwords for scape in the current business environment.
social networking accounts. The security policy Through education and collaboration between the
should also clearly point out appropriate and business and IT services departments, you can be
inappropriate use of social networking and Web sure your business is equipped to deal with out-
2.0 applications. side threats. ▲

18 October 2010 / www.pctoday.com


Remote Access Tools
KEY POINTS
▲ Remote access is not
simply another “fun”
tech toy; there are
several compelling rea-
sons to add it to your
Be There—Even When You Can’t Be There
business toolkit.

▲ You’ll find remote


by Rod Scher
access useful for such
things as remote tech
support, server manage-
Remote access is the type of technology that sounds as if it might be
ment, and education/ just another shiny toy that the folks in IT want to play with.
training.

▲ These days, remote


Let’s face it: Techies (and you may be one your- Why Remote Access?
access often means mo-
self) are enamored of lights and switches and but- In a nutshell, says Raghu Kulkarni, CEO of re-
bile access; be sure to
consider whether your tons; they sometimes succumb to the allure of mote access vendor Pro Softnet, “The most impor-
people need a remote flashy, complex technology simply because it’s tant thing is to enable productivity. With remote
access tool that is com- flashy and complex, rather than because it’s actu- access tools, one can work from anywhere and be
patible with one or more able to access his office PC via the Internet.”
ally sound (but boring) business practice.
types of mobile device:
Sometimes the result is an over-engineered solu- We’ll outline several specific reasons to consider
smartphones, PDAs,
tablets, etc. tion, with IT staff doing things a certain way remote access, but as Kulkarni notes, the bottom
simply because they can, rather than because line is productivity: If the technology enables you
▲ Along with the advan-
things actually need to be done that way—or for and your staff to do more work more quickly and
tages, keep in mind that
there are potential secu- that matter, done at all. do it more easily, then it’s a sensible investment.
rity issues associated But this isn’t one of those times. There are com- Tech support and remote troubleshooting. Even
with opening up your pelling business reasons to utilize remote access if you don’t run an actual outbound help desk, your
network and systems to tech folks are constantly supporting internal em-
technologies. We’ll give you an overview and ex-
remote access.
plain what remote access tools can do for you. ployees who need advice, run into trouble, or forget

20 October 2010 / www.pctoday.com


how to accomplish a PC-related task. It’s often much comprehensive teleworking strategy. Another 28%
faster to resolve a problem (or show the employee are currently implementing such a strategy. In fact,
how to resolve the problem) by remotely logging in only about 10% of those polled do not plan to
to the employee’s machine. Once the support person adopt a teleworking plan of one sort or another.
is signed in, he can see the employee’s screen, con- (Some are doing so as a recruitment tool: Over 40%
trol input with his own mouse and keyboard, and— of surveyed employers indicated that their organi-
with the permission of the employee—manipulate zations offer telecommuting privileges as a way of
files and data on the remote system. attracting and retaining employees.) Finding ways
Education and training. In one sense, the remote for staff to work from home or while on the road
access-mediated tech support discussed above can pays big benefits, and remote access tools provide
and often does become a teachable moment: Rather mechanisms for doing so safely and efficiently.
than simply correct a problem, the tech can log in to Permissions management. If you license or dis-
a system and either show the employee how to re- tribute data for whatever reason, you almost cer-
solve the issue or else, with the tech’s guidance, tainly take care not to run afoul of permissioning
have the employee himself undertake the resolution. requirements: If you have the right to use one piece
More broadly, though, remote access tools also of content in one state or country but not in another,
allow a technician or trainer to show multiple or in one form but not in another, you need tools in
people (say, seated in a conference room in which a place to ensure that you abide by those restrictions.
projector is being used as the display or seated at If you pay for a piece of licensed material based on
multiple systems in multiple locations) how an ap- how (or where, or how often) you distribute it, you
plication works, how a new process is envisioned, or need the ability to track that usage.
how to make a presentation. Some remote access Remote access tools can be part of your permis-
tools are especially designed for this sort of sharing, sions management infrastructure, allowing you to
of course; we’ll note some examples shortly. log in to remote systems to determine which data
Telecommuting. According to a recent Info-Tech was sent where and when. On the receiving end,
Research Group survey, 28% of mid-sized organiza- such tools can be used to track the systems on
tions report that they have fully implemented a which permissioned content resides.

PC Today / October 2010 21


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

Asset tracking. Some of the permissioning issues for tech support, remote server management is what
noted above can be considered a type of asset they’re thinking of—and for good reason. Remote
tracking, but they tend to relate mostly to legal re- server management allows techs to update, ex-
quirements that are part of development or mar- amine, reconfigure, and even reboot servers without
keting efforts. However, IT also has some very having to drive to the office or to an offsite data
specific asset-tracking requirements of its own—and center. And it means that your network administra-
thus some very good reasons for utilizing tools that tors can manage multiple servers in multiple loca-
enable remote audits or inventories of company as- tions without having to travel; given remote access,
sets. Some of these have to do with licensing issues much of that management can in fact be automated.
that are somewhat similar to those noted above: The holy grail of remote server management is
With remote access, staff members can audit indi- LOM (lights-out management). This refers to the
vidual PCs and other devices to determine what notion that in an ideal world, the data center
software is installed on which machines. An accurate would be “dark” because—since it’s controlled re-
and up-to-date (and largely automated) internal motely—people rarely need to enter, and the lights
audit can provide a straightforward accounting of would thus almost always be turned off. LOM is
software installations, and that can help avoid fines especially useful when an organization has servers
or a publisher lawsuit. in multiple locations and not enough staff to
Also, while it’s important to keep track of capital manage them. LOM—or any form of remote server
investments, it’s very easy to lose track of com- management, really—also minimizes foot traffic
puters, the peripherals attached to those computers, (and thus potential errors and accidents) and re-
and the software installed on them. Obviously, as duces travel time and costs.
soon as your asset inventory is out of date, your fi- Finally, don’t underestimate the potential im-
nancials are inaccurate; remote system audits can pact of remote server management on disaster re-
help you avoid this problem. covery planning. Your CoB plan probably assumes
Remote application deployment and system that IT staff will have access to servers in order to
upgrades. If you have more than one or two com- provide (or possibly to resume) services to your
puters in your organization, and especially if some employees. If remote server management is in
of them are offsite (at employees’ homes or in a place, that access is much more likely, even in the
satellite office, for example), keeping those systems event of a pandemic, impassable roads, or in-
up-to-date and populated with the appropriate ap- clement weather that keeps everyone at home.
plications absent some sort of remote access soon
becomes an IT nightmare. Remote Access Tools
System admins need a way to roll out fixes, A complete and comprehensive list of all remote
patches, system upgrades, and application updates access tools is beyond the scope of this article, but
without having to physically go to each machine. we’ve rounded up some of our favorites as good
Your staff has almost certainly already found a way examples of the genre—your IT staff will almost
to manage these updates remotely. (If not, you’d be certainly have informed suggestions about which
hearing about it. Constantly.) Many network utilities tools to consider.
incorporate the ability to initiate and monitor these GoToMyPC. Now owned by Citrix, GoToMyPC
sorts of updates; some of the remote access tools dis- (prices start at $19.95 per month per PC or $179.40
cussed in this article offer additional functionality re- per year; www.gotomypc.com) offers remote
lated to application rollouts and system updates. Desktop access for one to 20 computers. It enables
Remote server management. When your IT staff browser-based access to email, files, programs, and
thinks about remote access for anything other than network resources from home or on the road.
Citrix also offers GoToMeeting (online
The Wyse PocketCloud meeting software that includes
application, running
Desktop sharing functionality) and
here on an iPhone, is
also available for iPod GoToAssist (remote access designed
touch, iPad, and especially for helpdesk applications).
Android devices. LogMeIn Pro2. The commercial
version of LogMeIn Pro2 (prices start
at $69.95 per computer; tinyurl.com
/2bxms6h) allows users to control a
Desktop remotely, transfer files be-
tween computers, print remote files to

22 October 2010 / www.pctoday.com


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

a local printer, share a Desktop with another Mac systems. It provides a central
person, and wake up a sleeping computer over the Web console for administration and
Web. Other versions are available to enable remote setup, and enables an administrator
access from mobile devices, including Android, to drive any type of system re-
iPhone, and iPad. motely and to directly access and
Microsoft Remote Desktop Connection. This launch external applications from
utility is included in most versions of Windows the console.
XP/Vista/7, and allows a user at a client computer Wyse PocketCloud. Pocket-
to connect to a remote host computer. It’s not as so- Cloud ($14.99 for iPad, iPhone;
phisticated as many of the other tools listed, but it’s Android price TBD; www.wyse
free (or, more accurately, you’ve already paid for it), .com/pocketcloud) allows access to The Remote Desktop
and it works well. If your remote access needs are a PC Desktop (physical or virtualized) from an iPad app renders a
minimal or infrequent, it will certainly do the job. iPad, iPhone, iPod touch, or Android device. Windows 7 screen,
Mocha Remote Desktop (RDP). RDP ($20 per- adding its own
sonal license or $200 unlimited company license for Security Issues To Keep In Mind Keyboard, Menu, and
Screen options at the
Windows Mobile, $5.99 for iPad/iPhone; www.mo By definition, opening up your network or your bottom.
chasoft.dk) provides mobile access (via Wi-Fi or ac- individual systems to remote access is a potential
cessible cellular network) to any Windows security risk. Before allowing employees to access
XP/Vista/7 PC, except for systems running Home company systems remotely, be sure to have appro-
and Windows Server editions of those operating priate safeguards and telecommuting policies in
systems. A commercial license allows the user to in- place. Safeguards and policies should cover such
stall the monitoring software on an unlimited things as using a work computer for personal proj-
number of workstations. The utility is available for ects (and/or allowing others to do so), accessing
iPhone/iPad, Palm, and Windows Mobile devices. unsecured Wi-Fi networks, backing up a company
RemotePC. Pro Softnet’s RemotePC ($49.95 per system to a non-company medium, changing secu-
RemotePC includes
month for 25 PCs; www.remotepc.com) allows ac- rity settings, etc. remote printing
cess to multiple PCs and servers in multiple loca- Many remote access applications require that capabilities.
tions and includes remote printing capabilities. the computer run Windows Remote Desktop
Compatible with most firewalls and proxy servers, Services, and some may require an open port in
RemotePC provides a browser-based administra- your firewall. (The standard port for remote access
tion console. Administrators can keep multiple is port 3389, but many applications will allow you
windows open simultaneously, one for each PC or to change that.) These are potential security
server being monitored. breaches, and your IT staff will almost certainly al-
Symantec pcAnywhere 12.5. Supporting ready be aware of them and be ready to implement
Windows, Linux, and Mac OS X, pcAnywhere appropriate safeguards.
($199.99 for one remote access; www.symantec The proliferation of mobile devices requires re-
.com/norton/symantec-pcanywhere) provides mote, portable access across multiple domains,
support for multiple monitors and allows the user which no doubt contributes to security and support
to specify a monitor to view or to scroll among all concerns. However, the reality is that any tool you
monitors attached to the host computer. The utility use to provide remote access must include—or at
provides the ability to transfer files and run oper- least be compatible with—some form of mobile re-
ating system utilities on the remote system. mote access. Mobile devices are already ubiquitous,
TeamViewer. Compatible with most firewalls, and their popularity will only increase over the
TeamViewer (prices start at $749; www.teamviewer next few years, so mobile remote access needs to be
.com) can facilitate remote presentations, tech sup- a part of your workflow.
port calls, and remote server administration. The
app is easy to install and use and also provides VoIP, Sometimes Shiny Is OK
video, and chat functionality. TeamViewer is avail- Remote access is not a panacea for all business
able for Windows, Mac, and Linux platforms, with ills, but it does allow a variety of business
additional client apps for iPhone/iPad. Free for non- processes and activities—legal, procedural, and
commercial use. communicative—to continue even when the partic-
visionapp Remote Desktop 2010 R2. Often re- ipants are physically separated from their tools. It’s
ferred to as vRD (prices start at $99 for one admin- one of those instances when slick technology actu-
istrator; www.visionapp.com), this tool allows ally does make sense, not because it’s impressively
users to administer Windows, Linux/Unix, and shiny, but in spite of it. ▲

PC Today / October 2010 23


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

Cloud
Security
& The
Feds
Making Progress

by Seth Colaner

T he give and take between assimilating cloud technology to make


KEY POINTS
▲ The upsides and
downsides to cloud your organization run more efficiently and dealing with the asso-
computing for the private
sector are the same ones
ciated security pitfalls and technical glitches is not exclusive to
faced by the U.S. gov- the private sector. The U.S. government has to weigh
ernment.
the pros and cons of new technology, as well—including im-
▲ Many government
agencies have or have
proved efficiency, cost savings, and disaster backup on the plus side versus
attempted to enact cloud the problems of software or hardware malfunctions, human operator error,
initiatives but are ham-
pered by the lack of co- and security breaches.
gent cloud security
guidelines. In fact, the federal government (which after all federal government to determine the benefits and
includes the military) has much more at stake than risks associated with moving the government’s
▲ The NIST, GSA, and
most of the private sector. Government data and IT—or at least portions of it—to the cloud.
office of the federal CIO
are working to create the applications include those needed to keep country- The study found that cloud computing offers
necessary security guide- wide infrastructures running, information on mil- both benefits and risks for information security.
lines. lions of government employees, military strategies, Benefits include virtualization and automation,
▲ Federal CIO Vivek state secrets, and more. Ensuring security for any which help workers produce virtual machine im-
Kundra wants the gov- cloud deployments is paramount. ages faster; low-cost disaster recovery and data
ernment to leverage the storage; and the ability to implement security con-
IT resources it already A Report From the Government trols as needed, on demand.
has to become more effi- Accountability Office Additionally, because cloud solutions allow
cient and spend less
money. The federal government is not resting on its lau- workers to access data via the Internet at any time,
rels regarding cloud initiatives and security. The the need for physical removable media such as USB
GAO (Government Accountability Office) recently flash drives all but vanishes. Physical media—espe-
conducted a survey from a number of groups and cially flash drives—have been a bane to companies
agencies from the industry, private sector, and the everywhere, as they present a vulnerable attack

24 October 2010 / www.pctoday.com


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

vector for malware. Additionally, flash drives are to the NIST (National Institute of
easy to lose or misplace, leading to data loss or Standards and Technology) and the
breaches, if the device is found by the wrong person. GSA with oversight from Vivek
Risks of cloud solutions include the need to rely Kundra, the Obama administra-
on a vendor for security as well as the issues associ- tion’s federal CIO.
ated with multitenancy. Multitenancy is where These agencies have created
computing resources, such as software, is shared FedRAMP (Federal Risk and Au-
across an organization or by multiple entities. thorization Management Program),
According to the GAO study, 24 agencies claim an initiative designed to take on the
multitenancy is a risk because it’s conceivable that task of providing authorization for The GAO (Government
one entity could access the data of another. various vendors so that individual agencies don’t Accountability Office)
The issue with trusting a vendor, of course, is have to. This in turn allows government agencies to published a study on the
something everyone who uses cloud computing use cloud solutions that have already been vetted status of the federal
government and cloud
has to deal with, but in light of the gravity of gov- and also significantly reduces the time it takes to get
security.
ernment data, the problem is brought into stark a deployment up and running.
relief. The study indicates that almost all of the Individual agencies will still need to make sure
surveyed agencies were concerned about a that any special security considerations for their
vendor employing less-than-adequate security particular agency are met.
measures, loss of control over data, incorrect data
deletion processes, which can leave supposedly Existing Options
erased data exposed, and insufficiently secure Of course, the federal government already has
hiring practices for data center employees. considerable IT resources, including offices and
Further, agencies are concerned that they won’t many, many data centers.
be able to conduct independent audits of cloud For example, the Federal Cloud Computing
service provider security. PMO (Project Management Office), which is part
There are no big surprises there, but what is pos- of the GSA and lives in the Office of Citizen
sibly a more compelling finding
from the study is that government
agencies are finding it difficult to . . . agencies are concerned that they won’t
assess the security level of a given
vendor, determining what aspects be able to conduct independent audits of
of security are the responsibility of
the vendor and the customer re- cloud service provider security.
spectively, and a lack of guidance
regarding how to evaluate, select, and deploy a Service and Innovation Technologies, was created
cloud initiative. In other words, it’s not that they in March 2009 for the purpose of bringing tech-
can’t find a trustworthy provider; they can’t figure nical expertise and leadership to governmental
out how to determine trustworthiness. cloud computing initiatives. One of its tasks was
In sum, the report found that many government creating a Web portal where government agencies
agencies were trying to implement cloud solutions can learn about and acquire cloud computing
but found themselves stymied at various steps of services; the result is Apps.gov.
the process, in large part because no rubric exists Additionally, Kundra wants the federal govern-
for them to follow regarding vetting vendors and ment to start leveraging the resources it already
ensuring data security. has. Reading between the lines, that likely means a
rise in private clouds government-wide. Private
Moving Forward clouds use the same technology any cloud deploy-
In the report, the GAO suggested that multiple ment uses but are designed to be used only by one
agencies including the OMB (Office of Management entity, such as a single company.
and Budget), GSA (General Services Administra- Although the federal government (admittedly)
tion), and Department of Commerce develop better has a long way to go before its cloud computing
cloud security policies and guidelines for assessing potential is sorted out and realized, it’s clear that
cloud security. it’s working hard on the goal. Potentially, the gov-
The task of creating cloud security guidelines ernment could lead the way for the private sector
that government agencies can follow when selecting by establishing cloud security standards and guide-
a cloud vendor and services apparently fell largely lines for deployment. ▲

PC Today / October 2010 25


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

Browsers Battle
For Web Supremacy
Positioning In A Crowded Market

by Christian Perry

I
KEY POINTS f you didn’t get your fill of fireworks this “Microsoft has lost its way. With Bill Gates
▲ Internet Explorer no summer, don’t fret. After a period of relative gone, numerous lawsuits, and anti-monopoly rul-
longer owns the lion’s
stillness, the browser battles are once again ings against it, a lot of its spark, bluster, and vi-
share of the browser
market, as Firefox,
heating up as developers work to overtake the sion has disappeared. Microsoft is no longer
Chrome, and others have competition with technologies poised to revolu- paving the way, but rather playing catch-up to
attracted hordes of users tionize the Web experience. How those battles will Apple and Google. I think that’s where the real
with their extensibility shake out is anyone’s guess, but there’s no denying battle is: a closed-wall garden as proposed by
and ease of use.
it will be a blast to watch. Apple, or an open Web accessible to all, as is
▲ Just around the “Just when you thought it was dead, the Google’s vision,” Duperval says.
corner, the next genera- browser space is becoming interesting again,” says Despite IE’s massive loss of market share over
tion of browsers prom-
Laurent Duperval, president of Duperval Con- the years, it’s not going down without a fight. In
ises big innovation on
the heels of HTML5 and
sulting. “We’re heading toward a commoditiza- fact, IE saw month-to-month upticks this summer
other technologies de- tion of the browser, but we aren’t quite there yet. at the expense of Firefox and Chrome, and
signed to make the Web There are enough differences in features and per- Microsoft representatives are quick to point out that
an even bigger part of formance among browsers to make it difficult to the browser still rules the roost in the big picture.
users’ lives.
choose one that works best in all situations. Microsoft has big expectations for the upcoming
▲ Firefox isn’t enjoying There’s plenty more fun to have.” IE9, and a platform preview of the browser indi-
the massive growth evi- The Web browser market is more crowded cates it will include technological advancements
dent in recent years, but
than over, with Microsoft’s Internet Explorer, that could put it back on par with its market coun-
Mozilla developers are
working to improve the
Mozilla’s Firefox, Google’s Chrome, Apple’s terparts. Could this be a response to innovations
overall Firefox experi- Safari, and other browsers all staking
ence, including exten- claims in a realm rife with potential
sion stability. profits from search affiliations, adver-
▲ Any browser, in- tising, and other avenues. One certain
cluding Opera, con- victor is unlikely to emerge from the
tinues to have the browser battles, but big movements
opportunity to seize sig-
within the market are a good bet.
nificant user share with a
feature that’s yet unseen
in other browsers.
Move Over, Microsoft
Five years ago, IE owned a massive
browser share in the United States, com-
manding nearly 90% of the market, fol-
lowed by the upstart Firefox browser at
just 8%, Safari at roughly 2%, and Opera
at about a half percent. Today, IE’s
overwhelming domination is a mere
memory as Firefox has enjoyed steady
adoption to boost its market share to
about 24%. Meanwhile, a browser that
didn’t exist five years ago—Chrome—
According to Laurent Duperval, president of Duperval Consulting,
has cut into IE’s share to the tune of 7%, Microsoft has lost its way in the browser market. “Microsoft is no
and Safari and Opera have also experi- longer paving the way, but rather playing catch-up to Apple and
enced steadily increasing adoption rates. Google,” he says.

26 October 2010 / www.pctoday.com


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

seen in Chrome and recent versions of other


browsers? Google suggests that’s the case.
“We first launched Google Chrome because we
believed we could make browsers more powerful
and fun to use,” says Brian Rakowski, product
manager for Google Chrome. “We are very happy A glance at browser
usage share over the
with Chrome’s progress and believe that it has
past five years shows a
helped push the Web forward in the past two sharp decline for
years. We’re seeing real advances in many other Microsoft’s Internet
browsers, adding new technologies like HTML 5, Explorer while Mozilla’s
speeding up JavaScript, and improving security.” Firefox ramps upward to
enjoy a bigger piece of
Rakowski adds, “We hope that Chrome will keep
the action. Note also the
improving the Web platform and inspire other quick rise of Google’s
browsers to continue making improvements, just Chrome browser.
SOURCE: NET APPLICATIONS
as they’ve inspired us.”

Fire Still Burns At Mozilla and set a new bar for what’s expected from all
Despite Firefox’s slight summer market slump, browser vendors,” Dotzler says.
the outlook remains bright for the open-source Safari has now followed the extensions trend
browser. In early July, IBM announced that it se- made popular by Firefox, unveiling in July the
lected Firefox as the default browser for its 400,000 Safari Extensions Gallery, which marks the first ap-
worldwide employees due to several factors, in- pearance of extensions in Apple’s browser. These
cluding standards compliance, security, extensibility, extensions use recent Web technologies such as
and continuing innovation. Even the market change HTML5 and CSS3 and are digitally signed and
itself is seen as a potential positive by Mozilla, which sandboxed to help ensure security.
continues to place a heavy emphasis on trans-
forming the browser as we know it today. It’s Anyone’s Game
“While our share at [Web market analysis com- Duperval predicts that the current trend of IE
pany] Net Applications has dropped a couple of slowly losing market share as Firefox holds steady
points, our number of actual users continues to and WebKit-based browsers gain traction will con-
grow,” says Mozilla spokesperson Asa Dotzler. tinue. However, he says that at some point, all three
“This stronger-than-normal variance from trend is primary layout engines—IE, Gecko, and WebKit—
a direct result of the more competitive landscape, will be evenly matched, and the one pulling ahead
though, and we see it as a positive but also a chal- will do so because it offers a feature that’s head and
lenge. We’ve got a great product with Firefox 4— shoulders above anything found in the competi-
testing in beta now and due by the end of the tion. And despite its tiny market share, don’t dis-
year—and we think users are going to just love it.” count the dark horse.
Firefox has come under fire recently for an as- “Opera has a very small market share, but many
pect that sets it apart from other browsers—its browser innovations first appear on Opera and
thousands of extensions (or add-ons). While these then are ported to Firefox, Chrome, and IE. Opera
extensions certainly help to morph the browser to a has the potential to change everything if the com-
user’s particular needs, some can also cause sta- pany can introduce a feature that is not easily re-
bility or performance problems. However, Dotzler producible in other browsers. If it’s important
notes that among thousands of sophisticated enough, it will drive customers to at least try it and
Firefox extensions, there are bound to be extensions eventually adopt it,” Duperval says.
that adversely affect performance. Looking farther ahead, Duperval says to expect
“We’ve been working hard over the last couple more standards compliance among browser devel-
of years to build a more robust add-ons platform opers—including Microsoft, who he says used to
and SDK (software development kit) that gives our “ignore” standards, but has worked to make the
developer community the tools they need to build latest IE compliant with the Acid2 browser test. He
rich extensions without compromising user per- also says to keep an eye on open-source video
formance or security—and the ability to do so with codecs (particularly HTML5), which will help to
far less effort than in the past. Firefox 4 will see the create a “much more interesting” Web experience,
debut of this new set of capabilities, and we think and mobile browsers, which continue to proliferate
it’s really going to change the whole game, again, in phones, tablets, TVs, and cables boxes. ▲

PC Today / October 2010 27


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

Add VoIP To Your Office


Out With Analog, In With Digital

by Tom Nelson and Mary O’Connor

The ADTRAN NetVanta 7060 is an IP telephony


system that includes IP PBX support, voicemail,
voice quality monitoring, a dial-by-name
directory, paging output, an auto attendant,
and a graphical user interface.

Avaya currently offers two wireless IP handsets


compatible with 802.11a, b, and g networks. The
handsets also integrate with Avaya servers
for in-house and on-campus calls.

Skype is one of the most


popular messaging and
VoIP applications
VoIP (Voice over Internet Protocol), one of the fastest growing communica-
available. A new Skype tion technologies, has an almost irresistible appeal for businesses of all sizes
Manager is available for
businesses that want to that want to expand their current phone service, install new service, or cut
centrally manage their
employees’ use of Skype.
monthly expenditures, as well as ditch their legacy PBX systems. The trend is
clear; the landline’s days are numbered.

VoIP Benefits by eliminating the cost of maintaining a voice net-


All VoIP systems perform the same basic task: work. Hosted VoIP systems maintain all equip-
they convert analog voice to digital data, and send ment external to your site; you are responsible only
the data as multiple data packets through a data for your existing internal data network.
network. In many cases, the data network is the Flexibility. Adding handsets, assigning new
Internet. You can also use VoIP over a private data phone numbers, and configuring call routing can
network, either your internal LAN (to provide in- all be performed through the VoIP system’s user
house phone service to your business) or exter- interface. No need to call the phone company to
nally (to link up multiple business locations over make these changes; you can make them yourself.
your corporate intranet). Some VoIP systems allow you to add new func-
Service costs. Almost all VoIP services let you tionality from a menu of services with just the click
place free calls to other VoIP users, anywhere in of a mouse.
the world. Calls made to conventional phone users Portability. Since VoIP is delivered over the
are routed primarily over the Internet, and then Internet, you have the freedom to move your
transferred to the appropriate phone carrier at the handsets or VoIP attachment device anywhere
destination as a local call. This allows per-call and there is Internet service. Your mobile workers can
per-minute charges to fall to extremely low levels, use VoIP software to turn their laptops into mobile
if not disappear entirely. VoIP-based phones they can use to place or receive
Up-front installation costs range from very little calls with the same number they use in the office.
(for small VoIP systems hosted by VoIP providers) Customer convenience. VoIP phone numbers
to a lot (with pricing on par with large digital PBX aren’t location-based. If you’re located in Pocatello,
systems); it really depends on the size and com- Idaho, for example, you can have a San Diego
plexity of your needs. In any event, the savings in number to allow your predominantly southern
monthly bills can quickly offset the one-time instal- California clientele to call you just as if it were a
lation expense. local call. This works in both directions; calls you
Maintenance costs. Because VoIP uses your ex- place to San Diego will be no-cost local calls for
isting data network, it offers the possibility to dra- you. You can set up multiple numbers, each from a
matically reduce your company’s overall expenses different region, to service your major clients.

28 October 2010 / www.pctoday.com


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

Service features. This varies by provider, but in On-Site IP PBX. The option of having an on-site
general, most of the following services will be IP PBX gives business owners maximum control
available with VoIP: over a VoIP-based phone system. It also has the
highest cost, both in capital outlay and recurring
• Caller ID • Fax
costs from software licensing, maintenance, and
• Caller ID blocking • Contact List
management. There’s also the additional cost of
• Call forwarding • Virtual numbers
subscribing to a VoIP gateway service in order to
• Call transfer (multiple numbers
make calls to landlines.
• Call blocking per handset)
On-site IP PBX systems include Avaya (www The Avaya 9600 Series of
• Voicemail • Multi-ring
.avaya.com), ADTRAN (www.adtran.com), Cisco IP Deskphones can be
• Multi-way calling • Find-me/Follow-me used at remote
SBCS (Smart Business Communication Systems)
• 911 or e911 service • Portable phone locations, including a
(www.cisco.com), and Fonality (www.fonality.com). home office, as well as in
• Redial numbers
Managed VoIP service. A hybrid of hosted and the office. Features
on-site PBX VoIP systems, this option uses an IP include a context-
VoIP Systems & Types PBX installed at your site, with a dedicated net- sensitive graphical user
For Small Business interface, high-fidelity
work connection back to the managing company.
audio, and low power
There are almost as many types of VoIP systems Managed VoIP services usually provide all of the consumption.
as there are types and sizes of businesses. necessary components, including IP phones, and
Software-based PC-to-PC. Load VoIP software handle all maintenance.
onto your PC, then place and receive calls using ei- Managed VoIP services include mindSHIFT
ther a computer headset or one or more handsets (www.mindshift.com), T-Systems (www.t-systems
connected to a PC. You will need a good Internet .com), Taridium (www.managedvoip.net), and
connection for this system. If you plan to use the VoicePlex (www.voiceplex.net).
host PC for other activities, you will also need
some type of QoS (Quality of Service) enabled IP Phones
Internet router or modem to ensure voice data has IP phones are a must if you’re building your
priority over other types of Internet traffic. own VoIP system or expanding your existing
Software-based PC-to-PC services include Google system. IP phones are available in wireless and The Cisco Unified
Voice (voice.google.com), Skype (www.skype.com), desktop models that plug into an Ethernet jack, as Wireless IP Phone
and Yahoo! Voice (voice.yahoo.com). well as USB-based phones that will work with soft- 7925G, which is
compatible with
Residential/SOHO hardware-based VoIP. This ware-based VoIP.
the Cisco Unified IP
type of VoIP system uses an ATA (Analog Telephone IP phones include: Avaya 3641 and 3645 IP Phone 7900 Series of
Adapter) or VoIP-equipped router to allow you to Wireless Handsets (www.avaya.com), Cisco desktop phones,
use your existing wired or wireless phones with the Unified IP Phone 8900 Series (www.cisco.com), and supports Bluetooth and
system. There’s no computer involved, so you don’t Siemens Gigaset C475 IP (www.gigaset.com). is built tough to
withstand dust, liquids,
need to leave a computer running 24/7 or worry
and being dropped on
about directing Internet traffic. These systems are a Don’t Toss Your Landline Just Yet its head.
good choice for small home offices, as well as home Landlines may appear to be heading the way of
owners who wish to transition to VoIP. the dodo, but they still have the edge in at least a
Residential/SOHO hardware-based VoIP serv- couple of areas. If the power goes out, your land-
ices include MagicJack (www.magicjack.com), line phone will still operate. Emergencies are the
VoIP.com, and Vonage (www.vonage.com). other main benefit of landlines. Dial 911 and your
Hosted VoIP solutions. Hosted VoIP service call will be dispatched to the correct facility in your
providers have an IP PBX system at their site. They area; your physical location will automatically be
sell VoIP services, usually on a pay-per-use or transmitted, as well. Although they didn’t always,
monthly subscription basis, to small businesses. many VoIP providers now offer 911 or e911 service.
You don’t have to spring for an IP PBX system, and Check to be sure any VoIP provider you’re consid-
the service provider takes care of managing and ering includes reliable 911 services in its plans. ▲
maintaining the hosted equipment. You
rent or buy IP phones and use your net-
work to connect to the hosted service. The Cisco SBCS System is an easy-to-set-up solution
Hosted VoIP service providers in- with integrated voice, data, video, and security
components. Features include voicemail, an
clude 8x8 (www.8x8.com), OnSIP (www
automated attendant, paging, conferencing, video
.onsip.com), and Vocalocity (www.vocal calls, basic call distribution capabilities, and wireless
ocity.com). access (not available on all models).

PC Today / October 2010 29


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

Business Software
The Latest Releases & Updates

by Carmen Carmack

Keeping up with new business-related software releases and


updates can be a full-time job. To make the task a bit easier,
we’ve searched for recent announcements for business software
and related services that might be helpful to your business.

▲ ▲▲ ▲▲▲

▲ The new AutoCAD Microsoft Rolls Out EAS For Hotmail systems. The update is for all users and applies
for Mac software works To make synchronizing with Windows Live to client and server systems. It includes fixes that
natively in Mac OS X
Hotmail easier on mobile phones and devices, correct issues with a document containing a ma-
and works with its
unique features, such Microsoft has integrated EAS (Exchange ActiveSync) liciously crafted embedded font, prevents an attack
as cover flow. with the newest version of Hotmail. Now you can get that could result in interception of user creden-
email and calendar and contact information pushed tials or other sensitive information, and protects
▲▲ Google’s new automatically to your phone or mobile device from a against a maliciously crafted PDF document from
Priority Inbox for Gmail
Hotmail account. According to Microsoft, there are leading to unexpected application problems or
automatically sorts your
incoming mail to help nearly 300 million phones with EAS and more than code execution.
keep it organized. 360 million active Hotmail accounts.
Autodesk Set To Release
▲▲▲ To make syncing Windows Intune Announced AutoCAD For Mac
easier on mobile phones
Microsoft announced that its Windows Intune After many years of a Windows-only offering,
and devices, Microsoft
has integrated EAS service will be generally available by early 2011. Autodesk announced that its AutoCAD software
(Exchange ActiveSync) The new cloud-based solution for managing and will soon be available for Apple’s Mac com-
with the latest version of securing PCs includes update management, mal- puters. AutoCAD 2011 for Mac runs natively on
Windows Live Hotmail. ware protection, PC monitoring, remote assistance, Mac OS X and is due out this fall. The company
and security policy management. Priced at $11 per says it purposely designed the user interface
PC per month, the service works on desktop and with a familiar Mac look and feel, and that the
notebook PCs running Windows XP Professional new version takes full advantage of the Mac OS
SP 2 or later, Windows Vista (Enterprise, Ultimate, X features and capabilities.
and Business), or Windows 7 (Enterprise, Ultimate,
and Professional). Volume discounts are set to be New View For Gmail
available for 250 PCs or more. Google is trying out a new Priority Inbox fea-
ture that aims to help keep incoming Gmail organ-
Apple Releases Security Update ized. The new Priority Inbox splits your inbox into
Apple has released Security Update 2010-005 for three sections: Important And Unread, Starred,
its Mac OS X Leopard and Snow Leopard operating and Everything Else. A built-in filter automatically

30 October 2010 / www.pctoday.com


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

determines how to categorize incoming mail based reporting and alert features. Jigsaw for Salesforce
on patterns such as the people you email fre- CRM starts at $29 per user per month.
quently and the messages you open and reply to.
You can re-categorize the messages as needed, and Lawson Software Offers Cloud-Based
tag important messages you have already read for ERP Disaster Recovery
the Starred section. Organizations with the Lawson Software introduced Lawson Disaster
“Enable pre-release features” option selected in the Recovery, a cloud-based disaster recovery service
designed to help its customers re-
cover from a technology-related dis-
Salesforce CRM customers can now aster. The new software service helps
organizations resume critical business
receive real-time updates on business processes, such as payroll, finance, ac-
counts receivable/payable, inventory
contact and company data with Jigsaw, management, and procurement. The
company states that the service pulls
an extensive directory of company data hourly and provides a two-hour
restore point, with a recovery taking
and contact information. 12 hours or less. Lawson Disaster
Recovery is available to Lawson S3
Management customers operating on
Google Apps control panel will have the chance to a Microsoft Windows environment.
try out the new Priority Inbox.
Security Updates For Adobe Reader
QuickBooks 2011 Release Available & Adobe Acrobat
This Fall Critical vulnerabilities have been identified in
Intuit announced availability of QuickBooks Adobe Reader 9.3.3 (and earlier) for Windows,
2011, scheduled for release this fall. The latest edi- Mac, and Unix and Adobe Acrobat 9.3.3 (and
tion of Quick-Books Pro and Premier offer new earlier) for Windows and Mac. These vulnerabili-
features such as enhanced views of important cus- ties could cause the application to crash and could
tomer and vendor details. Users can also take ad- potentially let an attacker take control of the af-
vantage of QuickBooks Connect, a new service fected system. The updates address issues dis-
that lets small businesses access key QuickBooks cussed at the Black Hat USA 2010 security
data remotely via the Internet or a mobile device. conference in July 2010. They also incorporate crit-
And the company states that a simplified startup ical updates to the Adobe Flash Player version
process makes it easier and fasterfor new small- 10.1.53.64 (and earlier). At press time, Adobe an-
business owners to get up and running. The sug- nounced that additional security updates were
gested retail price for QuickBooks Pro Edition pending for Adobe Reader 9.3.4 and Adobe
is $229.95. The QuickBooks Premier Edition (in- Acrobat 9.3.4.
cluding industry-specific versions) is priced
at $399.95. Dell Expands Security Solutions
Portfolio With Trend Micro
Salesforce.com Introduces Jigsaw Dell and Trend Micro have partnered to bring
For Salesforce CRM Trend Micro Worry-Free Business Security
Salesforce CRM customers can now receive Services to SMBs. Trend Micro security experts are
real-time updates on business contact and com- hosting the security solution, and Dell and Trend
pany data with Jigsaw, an extensive directory of Micro developed a customized user interface to
The newest version of
SMB accounting software, company and contact information. Integrated with simplify the management process for endpoint se-
QuickBooks Pro 2011, will Chatter, salesforce.com’s enterprise social collabo- curity. The service includes a centralized Web-
be available soon. ration technology, Jigsaw for Salesforce CRM can based management console and minimizes the
automatically identify changes to important con- impact to system performance. It also provides
tact and company data in Salesforce CRM, update pre-configured security parameters and global
the records, and publish the changes in Chatter neighborhood threat detection to identify new
in real time. Users can receive updates on their Web threats when they emerge and block dan-
mobile devices. The new service also includes gerous Web sites, viruses, and other threats. ▲

32 October 2010 / www.pctoday.com


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

Greenovations
Energy-Conscious Tech

by Nathan Lake

The electronic An Affordable EcoSmart Bulb


devices that make A primary issue with LED bulbs is their prohibitive costs, because many are priced at around $40 to $50
apiece. The Home Depot (www.homedepot.com) recently announced an EcoSmart LED bulb priced at $20
our lives easier also
that’s designed to have an average lifespan of approximately 50,000 hours (or about 5.7 years of continuous
produce some un- use). The EcoSmart LED emits 429 lumens, or about the equivalent of a 40 watt light bulb. Home Depot esti-
wanted side effects mates an energy savings of $200 over the course of the bulb’s life. The EcoSmart LED is also dimmable.
on the environment.
Fortunately, many A Green Apple Battery Charger
consumer elec- Apple designed a battery charger that senses when the batteries are
fully charged. When the Apple Battery Charger ($29; store.apple.com)
tronics manufac-
detects that full power has been reached, the charger automatically
turers are working to drops its power intake to 30mW (milliwatts); Apple indicates that the
create products that average battery charger continues to draw 315mW. Apple includes six
rechargeable AA batteries that are designed to retain high charge capac-
keep us productive
ities for hundreds of recharging cycles. The unit can recharge up to two
while reducing batteries at a time, and, although it’s optimized for Apple batteries, it
energy demands to can also work with other manufacturers’ NiMH batteries. The Apple
Battery Charger also features a removable AC plug, so you can replace
lessen our impact
it with foreign plugs if you travel internationally.
on our surround-
ings. Here, we take
Vibration Energy Cell
a look at the newest
At Techno-Frontier 2010, Brother Industries exhibited a prototype of its vibration-powered generating
environmentally battery that recharges itself when you shake the device in which the battery is stored. Using the vibration-
friendly technology powered generating battery means you would no longer need to replace batteries or bother to replenish a
rechargeable battery, because you could just shake the remote control to power a device. The AA-size proto-
initiatives.
type works with devices that have a maximum power consumption of 100mW and don’t continuously re-
quire electricity, such as remote controls or LED flashlights. Brother Industries created prototypes for both
AA and AAA battery sizes.

HP Printers That Power On Or Off Automatically


The HP LaserJet Pro P1100 Printer Series (ranging in
price from $129 to $149; www.hp.com) features HP’s
Auto-On/Auto-Off Technology, which reduces energy
consumption by turning the printer on or off based on the
amount of printer activity. The Auto-On/Auto-Off fea-
ture also works with HP’s Instant-On technology to
quickly awaken the printer when a job comes in. You can
configure the LaserJet Pro P1100 Printer to automatically
turn off after a set period of inactivity, as well as at a pre-
determined time each day. The P1100 line also features
HP’s EzPrintSaver, which lets business owners and IT
managers disable or enable printer functions, such as
forced two-sided printing, and set restrictions to save energy, paper, and toner.

34 October 2010 / www.pctoday.com


ESSENTIAL BUSINESS TECH
EXECUTIVES, PROFESSIONALS & ENTREPRENEURS

2TB Of Eco-Friendly Storage


Samsung’s 2TB EcoGreen F4EG ($119.99; www.samsung.com) offers 23% lower power consumption than
the 2TB F3EG, Samsung’s previous 2TB EcoGreen model. Samsung also states that the F4EG delivers 19%
better standby performance than the F3EG. Keeping with the eco-friendly theme, the hard drive is con-
structed of materials that don’t contain halogen compounds and brominated flame retardants, which are
toxic to the environment. The 2TB capacity is ideal for those who want to dramatically increase their PC’s
ability to store multimedia and personal files. Samsung also integrated its SilentSeek and NoiseGuard tech-
nologies into the F4EG to reduce noise levels in your PC.

Green In Color, Green In Concept


Motorola’s GRASP (www.motorola.com) features an outer shell that’s completely recyclable. Initially, the
GRASP will be available through MetroPCS, but no pricing was available at press time. The candy-bar style
phone features a 2.2-inch LCD screen and a full QWERTY keyboard you can use to quickly tap out text mes-
sages and email. Motorola added threaded messaging, so users can read text messages in an instant mes-
sage-like view. For multimedia, the GRASP offers a 1.3MP camera with a digital zoom, and there’s also a
built-in video player and MP3 player to provide a way to enjoy movies and music. You can also connect a
set of headphones to the 3.5mm jack or listen wirelessly via the Bluetooth connection.

A USB Power Strip


PowerUSB (www.pwrusb.com) created its PowerUSB power strip to help you control power running
to computer peripherals. Two of the four outlets are always on to provide constant power to your com-
puter and monitor, and you can turn the remaining two outlets on or off through provided software.
You can turn on the switchable outlets by pressing the CTRL-SHIFT-P key combination on your key-
board. You can use PowerUSB with your printer, for example, and configure the system so that the
printer turns on automatically as soon as your PC sends a print command. If it’s more convenient, you
can also configure the PowerUSB to automatically turn on the switchable outlets when you start up
your computer.

The Catalyst 3750-X


Cisco (www.cisco.com) created a stackable access
switch that pools power among switches in the stack
and reduces the cost of appliances and operations.
The 3750-X switches support PoE+ (Power over
Ethernet Plus) that improves upon the PoE standard
by powering Web cams, 802.11n access points, and
other devices that require more power than the pre-
vious PoE standard can handle. The switches also fea-
ture Cisco’s StackPower, which makes the wattage of the PoE+ available to any switch in the stack.
StackPower will save you energy on power and power supplies, and you can set up a prioritization scheme
that cuts power to lower-priority ports in the event of a power supply failure. This way, the most important
ports will continue to receive power.

Web-Based Power Management


New Boundary Technologies launched a PwrSmart Service that lets you schedule PC shutdowns, hi-
bernation, Wake On LAN, and other predetermined power management modes from a Web-based dash-
board. You can push your corporate power policy to all employee computers and remotely scan each
system to confirm that the PC conforms to that policy. You can also set up power management schemes
to work around critical applications and maintenance. The online dashboard offers built-in energy
auditing capabilities, and it also lists energy savings and comprehensive reports for energy rebate and
sustainability programs. ▲

PC Today / October 2010 35


The Mobile OS

Run Down
Competition Heats Up

by Tessa Warner Breneman

C
ompetition is often the basis of innovation,
and few industries are as competitive as the
smartphone operating system realm. The
rising demand for smartphones by both consumers
and business users has turned up the pressure on
mobile platform developers to rapidly churn out
products to satisfy everyone. User expectations are
high, and many new and updated mobile OSes
face fierce public scrutiny. But many companies
have risen to the challenge and produced winning
formulas for their mobile OSes. Others, however,
are struggling to find an identity and meet the
market demands.

Smartphone Uptake By The Numbers


Nielsen reported that U.S. smartphone penetra-
tion reached 25% in the second quarter of 2010,
and expects smartphones to overtake ordinary mo-
bile phones in sales by the end of 2011. Victoria
Fodale, a mobile devices senior analyst at ABI
Research, says her firm predicts global smartphone
penetration will hit 19% by the end of 2010. With
this type of growth, smartphone OS makers see a
huge value in delivering a strong product and cap-
turing market share early on.

36 October 2010 / www.pctoday.com


MOBILE OFFICE
BUSINESS ON THE ROAD

According to ChangeWave Research, smart- Android platform. While iOS 4 is limited to the
phone owners appreciate applications, easy-to-use iPhone (and tied down to AT&T for the time being),
interfaces, and Internet access the most out of all the Android platform can run on devices from a va-
the features their smartphones offer. It should be no riety of manufacturers and are sold through all the
surprise that Google’s Android and Apple’s iOS 4, major carriers.
which both offer thousands of applications and vi- Android also recently announced the Android
sual, intuitive interfaces, top the list as the most sat- 2.2 platform (also known by its code name Froyo,
isfying mobile operating systems. as in frozen yogurt), which will include Exchange
“The developers are pretty pragmatic,” Fodale capabilities, such as account auto-discovery and
says. “They’re going to go develop applications calendar sync. Additionally, Android 2.2 features a KEY POINTS
where they see the opportunity to make money. I Web browser equipped with V8 JavaScript to in- ▲ Google’s Android and
Apple’s iOS 4 are on
think that’s what’s going to drive folks who want crease performance, and apps that support two-
a roll with high cus-
to use the phone for more than just a phone.” way push sync capabilities. tomer satisfaction,
HTC put the new Android 2.2 platform on its and an interface that
Android On A Roll popular HTC Evo 4G phone (available from Sprint; users enjoy and want
With the release of popular new phones such as www.sprint.com) and an Android 2.2 update was to use.

the Motorola Droid 2 and Droid X (both available released for the Motorola Droid. ▲ Research In Motion’s
from Verizon; www.verizonwireless.com), Android Android has also benefitted from its open- BlackBerry 6 OS,
has catapulted forward to claim 13% of the overall source strategy. Developers took to creating appli- which is currently
featured on the Torch,
U.S. smartphone OS market share, according to cations for the Android platform right away, and
is trying to appeal
Nielsen’s Q2 2010 statistics. Last year at this time now it has more than 50,000 applications to choose to consumers with
Android had just 2% of the overall market. Nielsen from. Because many consumers are interested in a more visual and
also reported that 27% of all smartphones pur- the amount of applications they can download to fluid interface.
chased in the past six months run Android, which their phone, the Android Market is an asset to ▲ Microsoft’s Windows
is slightly more than iOS 4’s 23% share. Android’s platform overall. Phone 7 won’t be
Part of Android’s rise can be attributed to the di- available until the
versity in its distribution and the nature of the Apple iOS 4 Satisfies Customers holiday season, but
most early reports
Apple’s iOS 4 has helped Apple continue to chip
from critics have
away at Research In Motion’s lead in the overall been positive.
The Apple iPhone 4 from AT&T runs iOS 4 and tops the
charts for customer satisfaction, according to smartphone market share. According to Nielsen,
▲ Palm’s (and now HP’s)
ChangeWave Research. Apple has 28% of the market as of Q2 of this year
webOS, Nokia’s
(compared to 21% in Q2 2009). Apple, however, has Symbian, and other
recently lost ground to Android as Android sales Linux-based OSes
The Verizon Wireless
Motorola Droid 2 surpassed iPhone 4 sales over the past six months. (Android aside) lag at
includes Android 2.2 But that doesn’t indicate that iOS 4 is fading. the bottom of the
(aka Froyo) with market, without a clear
Nielsen also reported that 89% of iPhone users plan
enterprise features, path for the future.
to stick with the iPhone, while 21% of Android
including Exchange
users and 29% of BlackBerry owners are consid-
support.
ering an iPhone as their next purchase.
Apple’s iOS 4 introduced better multi-
touch and multitasking capabilities
and folders to help you organize your
apps. FaceTime, a video calling appli-
cation that works with a Wi-Fi con-
nection, was also introduced to
complement both of the iPhone 4’s
built-in cameras. The OS also in-
cludes features designed for enter-
prise use. For example, iOS 4
supports network encryption,
password protection, and remote
wipe. It also supports Microsoft
Exchange, over-the-air push
email, calendar, contacts, and
VPN protocols.

PC Today / October 2010 37


MOBILE OFFICE
BUSINESS ON THE ROAD

Windows Phone 7 will


offer a variety of “hubs”
that help you streamline
your business and
personal activities.

Despite early complaints about browsing experi-


dropped calls, most iPhone 4 users are sat- ence, and offers tabs
isfied with their device. ChangeWave so you can have
Research reported in July that 72% of multiple sites acces-
iPhone 4 users were “very satisfied,” and 21% of sible at one time. BB 6 OS also includes universal
users were “somewhat satisfied.” Still, iPhone 3GS search capabilities.
owners were more satisfied than iPhone 4 users, The new Torch combines a touchscreen with
with 82% of 3GS owners saying they were BlackBerry’s signature SureType keyboard to offer
very satisfied with their handset and 17% re- something for both veteran BlackBerry users and
portedly somewhat satisfied. customers that dropped the BlackBerry OS to pick
Although Android has bitten into Apple’s up the intuitive touchscreens offered by Android
slice of the market, Fodale says Apple and iPhone devices. The Torch also includes GPS,
shouldn’t be too worried. “Android has a lot 3G, and Wi-Fi.
of different devices, where the iPhone is the Although BlackBerry has lost some of its cus-
iPhone. In some cases a higher end smart- tomer base to Android and iOS 4, Fodale doesn’t
phone that runs Android will be competing expect BlackBerry to suffer too much. “It’s not a
head-to-head with the iPhone. But people sexy interface,” Fodale says. “They were late to the
who want to buy iPhones buy iPhones,” market with the touchscreen. They were late to the
Fodale says. market with integrating some of the social net-
working applications that are so popular. But
BlackBerry Catches Up BlackBerry does have a very strong presence in the
With its recently released BlackBerry Torch enterprise. What they do, they do it very well. The
9800 (available from AT&T; www.wire people that tend to carry BlackBerrys love it be-
less.att.com), which features the new cause the keyboard is very functional for texting
BlackBerry 6 OS, RIM is hoping to regain and email. So, looking at the forecast we have now,
ground lost to Android and iOS 4. Nielsen re- it looks like it will be fairly steady.”
ported that the BlackBerry has declined to
35% in Q2 2010 from 38% in Q4 2009. Windows Phone 7 Is On Its Way
BB 6 OS is designed to have a more fluid While Windows Mobile 6.5 phones are getting
interface with better integration of social net- dusty on the shelves and the WM market share
working applications such as Facebook and plummets, Microsoft is busily preparing for the re-
Twitter, and improved SMS (Short Message lease of Windows Phone 7 this holiday season.
Service) and MMS (Multimedia Messaging Some prototypes have already been released to
The AT&T BlackBerry Service) messaging. One of the more notable members of the press, and so far the reception has
Torch offers the new changes is the upgraded Web browser. BlackBerry been mostly positive. Windows Phone 7 is unlike
BlackBerry 6 OS, which
OSes had previously lagged behind Android and any earlier WM OS, but it plays nicely into the de-
includes new features
designed to draw in other platforms with a slow and outdated sires of both the consumer and business markets.
consumers and business BlackBerry Browser. BlackBerry’s new WebKit- Windows Phone 7 focuses on “hubs” designed
users alike. based browser produces a quicker and richer to combine information from certain realms, such

38 October 2010 / www.pctoday.com


MOBILE OFFICE
BUSINESS ON THE ROAD

as “People” for your contacts’ information and so- consumers. And there are no distinguishing fea-
cial networking status updates and “Messaging” tures that set webOS apart from those competitors.
for all your messages, among others. The hub-
based approach is intended to accomplish Symbian & Linux Smartphones
Microsoft’s goal of creating a device that stream- Nokia’s Symbian may be the most popular OS
lines professional and personal information and ac- globally, but it has yet to make a dent in the U.S.
tivities. For instance, not only does Windows market share with just 2% of the pie. Fodale says
Phone 7 pack full support for Microsoft Exchange Symbian struggles in the U.S. because it lacks the
and Mobile Office, it also includes Xbox LIVE distribution channels other OSes enjoy. Consumers
games and Zune music and videos. are less aware of Symbian, so there’s very little de-
When Windows Phone 7 is released, it will have mand for its devices. For example, Verizon Wireless
the same advantage as Android with regards to its does not carry any smartphone equipped with a
distribution model. Microsoft doesn’t manufacture Symbian platform. Instead, Symbian has found
its own hardware, so Windows Phone 7 will show success in emerging markets and in markets that
up on a variety of devices through multiple wire- demand lower-cost products.
less carriers. This could help Microsoft rebound at This doesn’t mean Nokia doesn’t want Symbian
least a little since losing 12% market share between to be in the U.S. or that some consumers aren’t
Q2 2009 and Q2 2010. using Symbian devices. You can find unlocked
Symbian phones on the Web, and earlier this year
What About webOS? Symbian released an open-source version of its
Palm introduced webOS on the Pre and the software with hopes that developers would start
Pixi, but it has failed to creating more apps for the
make an impact in the platform and increase de-
The Nielsen Company reports that BlackBerry-
market and HP an- mand. Symbian^4 is also
maker Research In Motion is still the market
nounced earlier this year it leader, but Apple and Google are quickly scheduled to be released
would acquire Palm. The catching up to it. sometime this year. The
The Sprint Palm Pre is webOS market share is OS reportedly will offer
one of four webOS down to 3% from 8% last improved touchscreen in-
phones; webOS has seen year. Some analysts have tegration and better appli-
a decline in market
share over the past year.
predicted that HP will use cation support.
the webOS for mobile de- Although Android is by
vices other than smart- far the most popular Linux-
phones in the future, such based OS on the market,
as a tablet PC. Samsung’s Bada and
Although the webOS Nokia’s and Intel’s jointly
has just a sliver of the developed Meego could
overall market share, it also make plays for new
could represent an option smartphone customers.
for those looking for an However, it appears that
affordable smartphone. these OSes are destined for
While many of the high- low-cost phones in
end—and highly cov- emerging markets and
eted—smartphones retail therefore, says Fodale,
for $199 after two-year “might not command at-
contract price reductions, tention in North America.”
the Pixi Plus and Pre Plus According to Nielsen, smartphone penetration
are free with a two-year in the U.S. reached 25% at the end of Q2 2010. Competition
contract from Verizon and Heats Up
AT&T, and the Pixi is just $49.99 with a two-year The smartphone operating system market will
contract from Sprint. (The Pre runs $149.99 with a only continue to get more competitive as both the
two-year contract from Sprint.) major and minor market players continue to evolve
Although webOS has many of the features con- and adapt to consumer demands. Windows Phone
sumers and business users are looking for, the ap- 7 is sure to shake up the market, while it’s still a
plication catalog has far fewer apps than its matter of time before we see if BlackBerry 6 OS has
competitors, making the platform less appealing to made an impact. ▲

40 October 2010 / www.pctoday.com


MOBILE OFFICE
BUSINESS ON THE ROAD

Touch
The Display Revolution Continues

by Christian Perry

F
KEY POINTS rom flexible screens to an innovation that input, creating a revolutionary user
▲ Projected capacitive creates the illusion of texture on touch- experience in which users simply
technology currently
screens, the mobile display market continues flick, glide, and pinch their way
reigns as the king of
mobile touchscreen to be a hotbed of invention. Seemingly outlandish across the handset’s user interface.”
innovation, thanks to depictions appearing in sci-fi movies of past years In early capacitive touchscreens,
its highly accurate are now commonplace in the displays of handheld manufacturers applied a conduc-
feedback and features devices, so perhaps it’s no surprise that we now tive layer to the glass and then de-
such as multitouch.
expect practically every wild prototype technology livered voltage to it. This process
▲ Increasingly powerful to appear in retail devices sooner or later. enabled users to run a finger across
application proces- In the meantime, the mobile market is teeming the uncoated side of the glass to create a capacitor,
sors are helping man-
with products that make handheld data navigation which worked in tandem with an integrated con-
ufacturers to push the
limits of capacitive both easy and enjoyable. Advances in capacitive troller to determine where the finger was located
technology for even displays continue to emerge at a steady pace as on the screen and where it was traveling. Although
more creative naviga- manufacturers strive to outpace their mobile com- revolutionary, these relatively limited touchscreens
tional abilities. petition. For mobile customers, these advances ul- were found best suited to kiosks and other basic
▲ Flexible mobile dis- timately contribute to a huge collection of display applications that didn’t involve complex opera-
plays aren’t quite choices that look to expand into interesting, pro- tions. The mobile market, on the other hand, gen-
ready for prime time, ductive realms in the near future. erated a need for more accurate touchscreen
but they’re nearing
technology—and that’s where
release and should
eventually grace the
Capacitive Creativity projected capacitive touch-
market with a wide According to Andrew Hsu, screens entered the picture.
range of unique technology strategist at Synap- Thanks to etching on the con-
form factors. tics (www.synaptics.com), the ductive layer that creates a
▲ Haptics-based re- most groundbreaking change in higher-resolution touch surface,
search in the mobile mobile touchscreens in recent these touchscreens now are
realm could result in years has been the adoption fueling a new generation of
retail mobile devices
of projected capacitive-based mobile touch-related technology.
with displays that em-
ulate textures or fric- touchscreens. Thanks to this ca- “More recently, there con-
tion on a flat screen. pacitive technology, touch- tinues to be wider adoption of
screens are now the status quo capacitive touchscreens in hand-
in more consumer-friendly de- sets due to ongoing improve-
vices than ever before, due to ments in supply chain efficiency
several reasons. as well as more cost-effective
“There continues to be wider
“First, this technology is adoption of capacitive touchscreens implementations. Additionally,
much more durable than the in handsets,” says Andrew Hsu, there continues to be innovation
older resistive technology, en- technology strategist at Synaptics. in the user interface as program-
abling designers to target touch- mers continue to explore im-
screens in handsets with more proving the user experience in
widespread appeal,” Hsu says. “Second, this tech- devices enabled with multitouch gestural input,”
nology enabled more industrial design options, en- says Hsu. “With increasingly more powerful applica-
abling the current generation of sleek handsets with tion processors designed into newer mobile phones,
wide aesthetic appeal. Finally, capacitive touch- touchscreen input enables much more efficient ways
screens are highly optimized for gestural finger to interact with a handset. Some notable examples

42 October 2010 / www.pctoday.com


MOBILE OFFICE
BUSINESS ON THE ROAD

ereaders that can mimic the feel of an actual maga-


zine; wearable display armbands that function like
a smartphone; or even cylindrical tubes that con-
tain a flexible display that users can pull out, much
Newer devices such as the Samsung Galaxy S
rely on projected capacitive technology to like a rollaway window shade.
deliver multitouch capability that can
accommodate up to a whopping 16 Into The (Near) Future
simultaneous touches. As the focus on mobile devices continues to shift
away from physical buttons and pads and more to-
ward the display, manufacturers are working to
emulate the texture-like feel delivered by those
physical components. Using a technology called
haptics, this concept aims to improve upon the typ-
ically flat, sterile nature of the glass touchscreen by
adding tactile feedback or even texture-like feeling
to mobile devices.
One example of augmenting touchscreens with
additional sensory input is the Synaptics Fuse, a
prototype mobile phone that not only includes
multitouch capacitive sensing, but also haptic feed-
back and force, grip, and proximity sensing. The
recently introduced are gestural text input systems general concept of the Fuse revolves around single-
like Swype and Android’s gestural search function.” hand operation—for example, using 2D navigation
on the back of the phone allows Fuse users to navi-
Flexing Mobile Muscle gate the primary display without obstructing it
The cutting edge of mobile display technology is with fingers on the front of the phone.
filled with display edges that don’t actually cut, but The Fuse also includes an active 3D environ-
they do fold, bend, and roll. Although flexible dis- ment, marking yet another advance in mobile dis-
plays aren’t yet available in the retail market, several play technology that’s expected to grow more
manufacturers continue to pump out prototypes that prominent in the future. For example, designers are
are perpetually more usable and working to create cubic user in- This Fuse concept
vibrant, giving hope to potential terfaces that users can rotate to phone from Synaptics
customers who’d like to simply navigate certain elements on a might look like a run-
of-the-mill phone, but
roll up their ereaders or other smartphone interface, such as a
behind its unassuming
mobile devices and hide them menu. Yet other research inte- façade is a wealth of
away in their front pocket. grates vibrating motors or even future-tech display
According to TechNavio, the electrical fields beneath the dis- technologies, such as
global market for flexible dis- play to simulate friction or tex- haptic feedback and
3D graphics.
plays is expected to rise from ture, which not only adds to the
$165 million in 2009 to well overall enjoyment of using a
over $2 billion in 2013, due in handheld device but also
part to the mounting avail- boosts efficiency by facilitating
ability of technologies needed vision-free navigation.
to make the displays. Further, “While capacitive sensing
while the research company currently offers the best mix-
Gesture innovations in mobile
notes that smaller vendors are displays now let users simply swipe ture of cost, usability benefits,
more quickly adopting the a letter or number on the screen to and device properties, there is
technology and driving the perform searches or other still much room to improve the
market, traditional display ven- productivity-enhancing activities. user interface hardware,” Hsu
dors (including LG Electronics, explains. “Certainly better
Samsung, and Sony) are also in the process of de- touchscreen performance will enable tomorrow’s
veloping flexible displays. touchscreen to take on an even more magical be-
Because of their ability to flex, bend, or even roll, havior in which the touchscreen enables a user to
flexible screens are expected to appear in a wide interact with the underlying user interface with
range of form factors, including wafer-thin no restrictions.” ▲

PC Today / October 2010 43


MOBILE OFFICE
BUSINESS ON THE ROAD

Printing From The Cloud


New Technologies Show Promise

by Rod Scher

A
KEY POINTS s software and infrastructure head into the As you would expect, companies—especially
▲ Given that so much
cloud, many SMB owners, executives, and those with an investment in cloud-based tech-
functionality is moving
to the cloud, the ability
managers are realizing significant benefits nology—are working feverishly to find a solution
to print—especially from from the shift: By working in the cloud, companies to the problem.
mobile devices—is find they need fewer IT workers to deploy, manage,
becoming an issue of and update software and servers. And by opting for Google Cloud Print
paramount importance.
“pay as you go” cloud services, businesses can avail One potential option is Google’s Cloud Print
▲ Some cloud-printing themselves of the applications and infrastructure service. Currently in development, Cloud Print en-
tools are already avail- they need without paying for more than they can visions “cloud-aware” printers. Simply select and
able, and companies
use. The bottom line, quite literally, is that SMBs are register a cloud-aware printer with Google’s
such as Google and HP
are prepared to make
finding that resources no longer dedicated to prop- service and it becomes accessible.
large investments to ping up creaking IT infrastructure can instead be The main impetus for the Google undertaking is
make large-scale cloud devoted to product development, marketing, or that the company needs printing technology that
printing a reality. other important but often neglected activities. will be compatible with its browser-based Chrome
▲ As with any other But the move to the cloud is not without its wrin- operating system. Because the company’s OS will
technology, you’ll want kles. For example, one seemingly simple question is not have native print drivers, Cloud Print is one
to keep security issues only now being addressed: If a company’s data, ap- approach to providing printer functionality.
in mind when consid-
plications, and infrastructure reside in the cloud, The ongoing development effort may pay off.
ering cloud-based
printing options.
how are you supposed to print—especially from the This summer Google noted on its blog, “We are
many mobile devices that are now so ubiquitous? working with a number of printer manufacturers
▲ Although promising,
After all, even if employees traveled with printers to bring cloud print capabilities to their printers.
the cloud printing land-
scape is currently im-
(which of course they do not), those devices gener- HP [has] announced a full suite of cloud-aware
mature, with few proven, ally do not provide printing services. The problem printers ranging from $99 consumer printers to
straightforward, enter- may become even more widespread, given that business-oriented printers. All these printers will
prise-class solutions OSes of the future (including Google’s much-antici- work with Google Cloud Print out of the box.”
widely available.
pated Web-based Chrome OS) may themselves re-
side in the cloud: If the OS does not live on my HP’s ePrint
computer, how do I send documents to a printer? In the meantime, HP has been working on ePrint,
its latest cloud-printing initiative.
This is aimed at releasing consumer
and SMB models of cloud-enabled
printers. (While the low-end ePrint-
enabled printer retails for just $99, the
recently released business-oriented
Officejet Pro 8500A e-All-in-One car-
ries an MSRP of $299.99. It offers ac-
cess to cloud-based apps designed
specifically for small-business cus-
tomers and includes the ability to
move files to and from the cloud.)
HP’s ePrint-enabled printers are es-
sentially “smart” printers with a Web
Cortado’s ThinPrint technology ($39.98; connection, access to cloud-based pro-
tinyurl.com/24r4car) provides tools that ductivity apps, and an email address:
let you print to any printer in which
Any document that you can email,
your RIM BlackBerry can establish a
Bluetooth or Wi-Fi connection. you can send through the cloud to be
rendered and then “delivered” (that

44 October 2010 / www.pctoday.com


MOBILE OFFICE
BUSINESS ON THE ROAD

is, printed) at the selected ePrint-enabled printer.


Because the actual processing takes place in the cloud,
your mobile device has to do very little; the result is a HP has released a
fast, easily accessible, cloud-based printing service line of Web-aware
that can be updated and enhanced in the cloud. ePrint printers,
such as its
Jeff Walter, HP’s director of outbound marketing
Photosmart
for the company’s Inkjet & Web Services Division, e-series
comments on the advantages of printers that offer ac- All-in-One.
cess to cloud-based apps: “Imagine a scenario where
a small-business owner signs a contract with a cus-
tomer. They come into their office, load up Google
Docs on the printer, and scan the document directly
to a Google Docs folder in the cloud; no worries
about a PC, just lay the contract on the scan bed, hit for an important presentation. (When that level of
the printer’s Google Docs app, scan, and all of a desperation strikes, most business users fall back on
sudden it’s in the cloud.” Later, the owner could use the tried-and-true low-tech approach: Email the docu-
a mobile phone to see the document on Google Docs ment to yourself or to the hotel at which you’re
or send the print job to an ePrint-enabled printer. staying, and then print it in the hotel’s business
At the same time, HP’s original CloudPrint part- center. Clumsy, to be sure, but often effective.)
nership with RIM continues, with BlackBerry de-
vices able to print directly to known ePrint-enabled Not Without Risks
printers and to search for nearby ePrint printers When it comes to cloud-based printing, it’s impor-
when a user is on the go. (For a listing of providers tant to keep in mind some security-related issues.
and to download the HP BlackBerry app, go to Especially with solutions that use the public cloud,
tinyurl.com/32233zn.) some analysts are concerned about potential loss of
The ultimate goal, says Walter, is to expand the data, malicious attacks by cybercriminals, a lack of
ability to print on the go from any mobile device. awareness among employees, and obsolete internal
“It’s about enabling print anywhere, anytime capa- security policies governing this sort of print service.
bilities. And it’s definitely the future of printing.” And if printers do become email-oriented, Web-aware
devices, anti-spam appliances may have to work
Other Mobile Device/ harder to prevent spammers from targeting printers
Cloud Printing Options the way that they have recently attacked fax machines.
There are other printing options designed espe-
cially for mobile devices that would otherwise lack Almost Ready For Prime Time
the ability to print. EuroSmartz’s PrintBureau Because everyone—and everything—seems to be
($12.99; www.eurosmartz.com) lets iPad and moving to the cloud, straightforward, ubiquitous
iPhone users print to most Wi-Fi or shared net- cloud-based printing is only a matter of time. As com-
work printers. Similarly, ActivePrint Pro ($3.99; panies such as Google, HP, RIM, and others work
www.activeprint.net) works with iPhone or Win- (separately and together) to build cloud-based
dows Mobile devices. For Android or Apple de- printing capabilities, we’ll soon find that we can print
vices, PrinterShare Premium ($9.95 per month; whatever we need from wherever we happen to be, Google’s Cloud Print
www.printershare.com) lets users print to any with whatever device we happen to have on hand. ▲ initiative envisions
shared printer, once you in- Web-based apps
sending data through
stall the appropriate soft- the cloud directly to
ware on the PC to which PCs, to “cloud-aware”
that printer is connected. printers, and to
Of course, all of these solu- legacy printers.
tions are limited: You can (Image courtesy of
Google.)
only print to your own net-
work printers or to printers
configured to share with your
particular application. Such
tools can be useful, but not
when you’re 1,000 miles away
from your office, preparing

PC Today / October 2010 45


MOBILE OFFICE
BUSINESS ON THE ROAD

Femtocell Technology
Business Bonanza Or Overhyped Add-On?

by Jennifer Farwell

L
ong touted as the panacea for poor mobile finish line. These devices are attractive to carriers
phone coverage, femtocells are small cel- and consumers, not only because they enhance
lular base stations that provide a strong spotty service, but also because they move traffic off
signal where you wouldn’t otherwise have the carrier’s wireless network, increasing Internet
one. They connect to the cellular carrier’s network speeds and reducing dropped calls for other users.
via a broadband connection, routing calls over the Many companies (with networking and commu-
Internet in much the same way that VoIP (Voice nications giant Cisco leading the charge) are also
over Internet Protocol) technologies do. They then working to make femtocells workable for larger
broadcast that signal over the air like cellular business environments, from national retailers to
KEY POINTS towers, but with a much smaller (typically 30- to 1000-plus employee enterprises. However, practical
▲ Femtocells are rolling 50-foot) range. considerations have made—and are still making—
out across the consumer
Right now, femtocells are rolling out for con- conquest of the business landscape a challenge
and very small office
landscape, but chal-
sumer and home/small office use, with Alcatel- (more about that in a moment).
lenges remain for Lucent (whose Bell Labs formulated the concept of
widespread busi- femtocells in 2000), Cisco Systems, Qualcomm, Base Camp
ness adoption. NEC, Ubiquisys, and other companies racing to the AT&T, Sprint, and Verizon all offer femtocell
▲ The technology is products with support for three (Sprint and
limited by the number Verizon) or four (AT&T) concurrent voice calls.
of channels available for Users can authorize specific numbers to access the
dedicated voice calls,
device: 10 with AT&T; 50 with Sprint or Verizon.
but capacity will
quadruple next year.
Note that Verizon’s is a 2G offering, and its author-
ized number restriction is for priority rather than ac-
▲ Software integration
cess control. When no cellular signal is available,
will be a major issue,
as femtos don’t cur-
any Verizon customer in range can use the femtocell
rently interface with if there is a free channel. This model may appeal to
unified communica- business users who want their access points to
tions and complex allow every potential visitor to make cellular calls.
security systems used
In theory, with a good broadband connection, a
by businesses.
femtocell signal should always be excellent over its
▲ Current femtocells range, but as with Wi-Fi, this is dependent upon in-
run only on one carrier
tervening obstacles. If you start a call on a femtocell
network, so in environ-
ments (like businesses)
and leave your home or office, the device hands the
where users employ call off to the strongest network signal it senses. (If
more than one carrier, a there is intervening dead air, the call will drop, and
model will have to be users report this has occurred with the devices.)
worked out to enable
The reverse (cellular-to-femto handoffs) is cur-
roaming or multiple-
carrier devices.
rently not possible. Another issue for businesses is
femto-to-femto handoffs, letting someone con-
tinue a call across multiple femto access points.
Nick Karter, senior director of business develop-
ment for chip giant Qualcomm, says his firm has
developed the technology to support these capa-
AT&T’s new
3G Microcell bilities efficiently.
supports four
simultaneous Standard Bearer
voice or 3G One of the wild cards regarding femtocell de-
data connections.
ployment has been standardization. As most mobile

46 October 2010 / www.pctoday.com


MOBILE OFFICE
BUSINESS ON THE ROAD

users recognize, U.S. carriers employ different and


incompatible network standards (AT&T and T-
Ubiquisys, named the
Mobile use one; Verizon and Sprint use another). To No. 1 femtocell vendor
simplify and standardize the development by ABI Research, has
roadmap, Qualcomm in June debuted its newest debuted the 3G-mini
FSM series of femtocell chipsets, which can be fac- family of femtocells,
tory programmed to work with either of the U.S. which handle up to
eight calls and support
network protocols, running on the 3G frequency download speeds up
supported by the particular carrier. to 14.4Mbps.
The chip has other compelling characteristics
that Karter asserts make it both unique and busi-
ness worthy. The chip uses the 1GHz Snapdragon-
based processor, which enables the implementation Additionally, with femtocells being carrier-spe-
of advanced features such as interference manage- cific, what happens when employees—not to men-
ment. A device using a chip with this capability tion customers and vendors—use multiple carriers?
could “sense the environment and adapt the power “This is not trivial,” says Tavares. “We need to ex-
according to the mobile devices it is serving and the tend this technology to roamers as well as carriers.”
power level and proximity of the macro [cellular] Carriers, he says, have to decide if they want an-
network,” says Karter. This trait is important to the other level of roaming agreements, or if they want
success of femtocell technology, as some consumers to restrict the network to their customers only. He
report that femtocell devices switch back and forth thinks businesses may drive some of the decisions,
too often between the femtocell connection and the because they are carrying the signal over their own
cellular network, resulting in dropped calls. broadband lines.
The chip also incorporates onboard, assisted Karter says, “Manufacturers could put all the “Carriers will want to use
femtocells to lock in the
GPS, which Karter says will make femto a big boon carriers on multiple chips within a single femtocell,
most lucrative customers,
for business environments wishing to implement sort of like tower sharing is done now with cellular and business customers
location-based services. “Based upon proximity networks. Ultimately, a chip could be flexible are going to want to get
and location, you could provide a user with dis- enough to support multiple carriers; however, that significant discounts for
counts and other special offers,” says Karter. The is way into the future, quite honestly. There has to using femtocells as
opposed to the more
femtocell, he says, shrinks the coverage area to the be support for the technology.”
expensive macro
point where “you can deliver a lot of proximate The final question is pricing, as carriers currently network,” says Jim Tavares
content to the user.” charge customers (either by charging for minutes or of Cisco Systems.

Future Thinking
These possibilities sound interesting, but Jim
Tavares, Cisco’s director of strategy and business
Ultimately, a chip could be flexible enough
development, says other issues must be resolved to support multiple carriers, or manufacturers
before femtocells will have broad applicability in
business environments. First, he notes, is that large could put all the carriers on multiple chips
enterprise businesses will want as many as 32 or
64 voice channels. (Karter says that based on ex- within a single base station.
tensive coverage analysis, Qualcomm has con-
cluded that the “sweet spot“ is at 16 channels, and requiring an unlimited plan) for sending and re-
his firm has developed a 16-channel chip.) ceiving calls across their own broadband connec-
Second and more significant, says Tavares, is soft- tions. “Business and home customers say they
ware integration. “In the home, the femto doesn’t in- cannot be without coverage,” Tavares notes.
tegrate with other products beyond the broadband “Carriers are seeing that the only way they are
router,“ he notes. “Businesses want to integrate with going to make 3G coverage completely pervasive is
their unified communications system, so they get the to put femtos everywhere. Everyone is looking for
same experience they get on the desktop. Or they leverage. Carriers will want to use femtocells to lock
may have sophisticated security systems with fire- in the most lucrative customers, and business cus-
walls. You can’t have the security system taking tomers are going to want to get significant dis-
down the femtos. Before we can meet the require- counts for using femtocells as opposed to the more
ments of these customers, we have to look at what expensive macro network. The business models are
applications and hardware we need to integrate.” going to evolve to balance all that leverage out.” ▲

PC Today / October 2010 47


MOBILE OFFICE
BUSINESS ON THE ROAD

For Your Smartphone


The Latest Software & Updates

by Nathan Lake

Y
ou probably rely on your smartphone for
many things, but with new software and
updates, you can improve both the effi-
ciency and functionality of your mobile phone. NDrive is a
We’ll detail the most popular newly released soft- full-featured
navigation app
ware and key updates to help you maximize your
for Android-
smartphone’s ability to help you on the road. based phones.

New For Android


Yahoo! (www.yahoo.com) jumped into
the Android platform with apps for Yahoo!
Mail (free) and Yahoo! Messenger (free), as
well as a Yahoo! Search Widget (free). The
Yahoo! Mail app lets Android owners re-
ceive real-time notification of emails and
then send emails to contacts from their example, NDrive offers turn-by-turn voice instruc-
Yahoo! Address Books or the phone’s ad- tions, on-screen directions, millions of points of in-
dress book. Yahoo! Mail for Android also terest, and more. Other advanced features include
lets you view and download attachments. 3D Landmarks, Lane Assistance, Signposts, and
With the Yahoo! Messenger app, you can Alternative Routes. Live traffic is provided to help
send instant messages to friends using you avoid busy streets, and with NDrive’s auto-
SMS. Yahoo! Messenger can work as a matic route recalculation, your phone can figure out
background application to immediately de- the fastest way without any intervention on your
liver new messages. You can send photos part. And pedestrian navigation lets you find the
directly from the Android phone’s camera fastest walking route to your next destination.
or from the photo gallery. The Yahoo! With football season in full swing, Sprint updated
Search Widget provides a quick way to its Football Live (free with an Everything Data plan;
enter Yahoo! searches. www.sprint.com) to include live game telecasts from
One of Google’s most requested fea- ESPN Mobile TV and a real-time game center for
tures was synchronization with Outlook every pro and college game. Summaries include live
2010, so Google made it happen. Just game stats, information on how teams scored, and
download Google Calendar Sync (http:// play-by-play updates. You can also set customizable
tiny.cc/4zvsg) on your desktop PC and alerts for specific teams, updates at a quarter, or at the
With the Yahoo! follow the installation instructions. Once installed, end of the game.
Messenger App, you enter your email address and password, and then If you’re a news hound, you’ll like the Pulse
can instant message click the Google Calendar Sync Settings in your News Reader ($1.99; www.alphonsolabs.com) from
your friends from your Windows System Tray. The changes to your Alphonso Labs. Pulse is a visual news reader—it
Android phone. displays a large thumbnail image for each story—
Google Calendar should be reflected in the Google
Calendar on your phone. that can display up to 20 news feeds. You can switch
NDrive ($78 USD; www.ndriveweb.com) is a between a text summary of the article or visit the
full-featured GPS navigation app for Android. For Web site directly. For reading at times when you’re

NDrive offers turn-by-turn voice instructions, on-screen


directions, millions of points of interest, and more.

48 October 2010 / www.pctoday.com


MOBILE OFFICE
BUSINESS ON THE ROAD

not connected to the Internet, Pulse loads the news may allow viruses to run on your iPhone. The
onto your Android phone. patch is also designed to stop malicious code that
can access and alter system privileges. The update
New For BlackBerry also blocks the JailbreakMe exploit that made it
Mr. Number (free; mrnumber.com) is a caller ID possible to unlock the iPhone.
and contact backup service for your BlackBerry. There’s an updated version of Flickr For iPhone
In the new version, Mr. Number (free; www.flickr.com) from
lets you perform a reverse Yahoo!. Version 1.2 gives you
lookup of any U.S. number, multitasking capabilities that
which is handy if you see a let you upload photos and
business number and want to videos while doing something
know where a caller is calling else in the application. Previ-
from. The application uses ously, you couldn’t do any-
caller ID information from the thing until the progress bar had
service’s more than 250,000 filled. The Flickr app also intro-
users, which has the ability to duces a Twitter sharing feature,
flag numbers from automated so you can simultaneously
dialers and telemarketers. Thus, post a Flickr address to Twitter
Mr. Number can help you avoid when you upload a photo or
calls from people trying to sell video. Note that you’ll need to
you things. Mr. Number can re- link your Flickr account to your
turn a name for nearly 70% of Twitter account to perform a
mystery number searches. ReaddleDocs gives you a way to dual update.
Interested in streaming both view and manage documents Looking for a utility to man-
videos and music from your on your iPhone. age the documents on your
BlackBerry to a PC? What about iPhone? ReaddleDocs ($4.99;
streaming media from a PC or Xbox 360 to your readdle.com) from Readdle offers a built-in docu-
BlackBerry? Hypoxia Media Player ($7.99; www ment viewer and also works as a file manager that
.hypoxiaplayer.com) from mblware does both, and lets you save documents from the Web, email at-
it serves as a media player for the video, images, tachments, and download and upload files from
and music stored on your phone. Using your MobileMe iDisk and other popular online storage
BlackBerry’s Wi-Fi connectivity, Hypoxia can con- services, such as Filesanywhere. The app supports
nect to your home or work wireless network and the transfer of files using an EDGE or 3G network
stream music stored in your Windows Media rather than just Wi-Fi. You can even exchange
Player library. On the flip side, Hypoxia can stream files with other iPhone users or email files stored
multimedia content to a PC with Windows Media in ReaddleDocs to colleagues. You can use
Player, an Xbox 360, or another BlackBerry con- ReaddleDocs to open Microsoft Office documents
nected to the Wi-Fi network. created in Word, Excel, and PowerPoint. The 1.6
Yougetitback.com offers Mobile Superhero update provides a new PDF reader utility that of-
($19.99 a year or $1.99 a month; www.yougetit fers horizontal scrolling and support for high-
back.com) to provide security for your BlackBerry. lighting and note annotations. You can save your
Mobile Superhero provides remote phone lock ca- annotations in the PDF and transfer them to Apple
pability if you lose your phone, and it lets you au- Preview or Adobe Acrobat Reader on a Mac. ▲
tomatically lock your BlackBerry after a change to
the SIM card—which is what a thief is most likely
to do after taking your phone. If you do lose your
mblware’s Hypoxia
BlackBerry, Yougetitback.com can use Mobile
Media Player is an
Superhero to map your phone’s location using ei- application that
ther the BlackBerry’s GPS or Cell ID towers. acts as both a
media player and
New For iOS streaming utility
that lets you play
Apple released iOS 4.0.2 (www.apple.com) to
content to an Xbox
fix security vulnerabilities that could occur when 360, a PC, or ano-
viewing PDF files. For example, Apple indicates ther BlackBerry.
that loading a PDF with malicious embedded fonts

PC Today / October 2010 49


MOBILE OFFICE
BUSINESS ON THE ROAD

IPHONE APPS

RingCentral Mobile Codebook iFlight


Free • 2.2MB $2.99 • 2.3MB $3.99 • 2MB
RingCentral Mobile (Rel. July 8, 2010), from Zetetic’s Codebook app (Rel. July 20, 2010) safe- Stay up-to-date on your travel plans with iFlight,
RingCentral, lets you control your business guards your data and personal information from by Nanjing Imohoo (Rel. July 16, 2010). You can ac-
phone system via your iPhone. Make and receive unauthorized users by providing your iPhone or cess information regarding worldwide flights, in-
calls using your RingCentral business number iPod touch with secure password protection. cluding the weather, the predicted on-time arrival
and filter business-related voice messages. Keeps information safe if you lose your device. rate, and the flight’s route to your destination.

UltraList Plus Business Card Box Smart Plans 4


$5.99 • 4.2MB Free Trial • 0.8MB $2.99 • 1.1MB
Garner Labs’ UltraList Plus (Rel. July 13, 2010) Business Card Box by Pantha (Rel. July 20, 2010) Left Coast Logic’s Smart Plans 4 (Rel. July 6, 2010)
helps you stay organized by providing eight lists lets you scan business cards and save the contact provides a project planner, task list, plans man-
that you can update regularly. You can set To Do information to your iPhone address book. After ager, time logger, contacts manager, and life goals
lists with deadlines, create shopping lists by cate- the first two, there is a fee for scans. You can also manager to track your productivity and how you
gory, track expenses, and more. sync the information with your computer. spend your time.

50 October 2010 / www.pctoday.com


MOBILE OFFICE
BUSINESS ON THE ROAD

BLACKBERRY APPS

SmrtGuard Mobile buzzd EngageTrax


Security Free • 764KB Free • 598KB
Free • 385KB A helpful app for travelers looking for the most Alpha Concepts’ EngageTrax (Rel. March 22,
For protection from theft, unwanted calls, and popular restaurants and attractions, buzzd (Rel. 2010) is geared toward helping event and trade
more, try SmrtGuard Mobile Security (Rel. Sept. April 30, 2010) tracks real-time results from show attendees track new leads via BlackBerry.
3, 2010) from Smrtphone Solutions free for 30 Twitter and other social networking sites to pro- The app, which is free for 30 days, also includes
days. Subs start at $19.99 for six months. vide the local results receiving the most “buzz.” sync, export, and email prompt features.

Where Lister GPS Tracker


Free • 1.3MB Free • 144KB Free • 20KB
Think of Where (Rel. Aug. 25, 2010) as a search en- Whether you need to keep lists for business ref- After you download and install InstaMapper’s
gine for places to go when you’re out and about. If erence, personal use, or both, Lister (Rel. July GPS Tracker (Rel. Feb. 8, 2010) and register to use
you use Where.com on your computer’s browser, 23, 2010) from TGQE will let you create and the associated free service, you can use the app to
you can sync results with the app to quickly find maintain them on your BlackBerry. This up- track your BlackBerry’s location and, if necessary,
what you need when you’re on the go. dated app includes new prioritization features. recover your phone if it’s stolen.

52 October 2010 / www.pctoday.com


SMARTPHONE Add Function,
Efficiency & Fun

Tips
by Andrew Leibman

■ Android
MOVE APPS TO EXTERNAL MEMORY
With one of the latest revisions to Google’s Android platform, version 2.2 (codenamed
Froyo), you can now transfer apps to your microSD card and run them from external
memory. This is particularly handy for those whose appetite for apps exceeds their Android-
based phone’s internal memory. You can also use this new capability to craft profiles based
Got the latest version of on swapping multiple SD cards. For instance, you could offload all your games and enter-
Android? Find out for yourself.
tainment apps to one SD card, and load up another with business and productivity apps.

54 October 2010 / www.pctoday.com


MOBILE OFFICE
BUSINESS ON THE ROAD

To begin moving your apps over,


first make sure you’re running Android
version 2.2 or later. To check your cur-
rent version, access the Home
screen, push the Menu button, tap

BLACKBERRY
Settings, scroll to the bottom of the BlackBerry App World
list and select About Phone, and icon and press the track
then scroll toward the bottom of this pad, select the Search icon,
list and look for Android Version. type app world into the
(In earlier builds, this is referred to text box, press the Menu
as the Firmware Version.) If you see key, and then select Search.
version 2.2 or higher, you’re all set The BlackBerry App World
to start moving apps. BlackBerry App World 2.0 has should be one of your top
To move an app, start by making a few notable features you results, so select it and select the Upgrade
sure you’re on the Home screen don’t want to miss out on. button. Simply follow the onscreen in-
and press the Menu button. Tap structions to download the latest revi-
Settings, Applications, and Manage GET BLACKBERRY APP WORLD 2.0 sion, and then select it to begin the
Applications. On the Downloaded It seems like you can’t swing a bricked installation process.
tab, you will see all apps currently smartphone without hitting an app store To download the latest App World
installed on your handset’s in- these days. To make sure you keep up OTA, press the Menu key, select the
ternal memory. with the iJoneses, now you can down- Browser icon to launch it, press the Menu
Next, select an app you want to load the latest version of the BlackBerry key, select Go To, type www.blackberry
move and look for the Move To SD App World, which features a streamlined .com/appworld, and then press the track
Card option. If this option is avail- interface, lets you pay for apps using a pad to navigate to the site. Scroll to and
able (not all apps support this credit card or by adding to your wireless click the Download Now icon, select
feature), tap it to complete the opera- bill, enables wireless barcode scanning, your language, click Next, and then se-
tion. Repeat these steps for each app offers free apps and paid apps starting at lect Download. Follow the onscreen in-
you want to move. Note, however, 99 cents, and lets you access Top 25 lists structions to complete the download and
that apps requiring regular updates to find the most popular apps. install the utility. Upon launching the re-
from the Web will run very slowly You can download BlackBerry App tooled BlackBerry App World, you’ll be
when installed on an external World 2.0 in one of two ways: using the prompted to accept the terms and condi-
memory card, and many will fail to App World or OTA (over the air), by vis- tions, after which you’ll be at the new, if
run at all. Don’t move apps that run iting www.blackberry.com/appworld somewhat familiar, BlackBerry App
in the background at boot, such as al- using the BlackBerry Browser. To down- World interface.
ternative Launchers and live wallpa- load the new App World using the old
pers; they won’t work as intended way, press the Menu key, highlight the
and would need to be manually
launched each time you restarted
your device. Also, when your Android-based phone Wi-Fi connections wherever
is connected to the PC, you won’t have access to you go, chances are you’re
any apps installed on the toting around countless Wi-
memory card. Fi credentials you’ll never
use again.
MANAGE YOUR WI-FI You’re probably readily
CONTACTS familiar with how to add
Get the latest version of the
Wi-Fi is a godsend for a Wi-Fi network to your
BlackBerry App World from the
those of us who require a phone; just access the Home BlackBerry App World.
nearly constant data con- screen, press the Menu but-
nection. But if you’ve ton, tap Settings, tap Wireless
made a habit of adding & Networks, and then tap Wi-Fi Settings. The sub-
menu lets you turn on Wi-Fi, add Wi-Fi networks, and
enable or disable open network notifications.
However, to delete a disused Wi-Fi connection,
Access the Move To SD Card
command from the Manage you’ll need to press and hold your finger on the un-
Applications submenu. wanted connection SSID (Service Set Identifier) until

PC Today / October 2010 55


MOBILE OFFICE
BUSINESS ON THE ROAD

a context menu appears. Then, simply tap Forget.


Do this for each connection you no longer need.

■ BlackBerry
FUN WITH ALARMS & APPOINTMENTS
You may have experimented with your The Maps app gives
you all the directions
BlackBerry’s ability to schedule alarms while on
you need.
the road, but alarms can be used for more than
just a DIY wakeup call. To schedule multiple
alarms to remind you of tasks throughout the the Contacts button
day, start by pressing the Menu from the bottom of
key and selecting the BlackBerry the screen, and then
Calendar application icon. The app selecting a contact
displays today’s date automatically, (address data must
but you can access the rest of the week be available for the contact).
by scrolling to the right. Press the If you tap the Recents button from the bottom of
Menu key to get options including the screen, you can select from the list of recent
View Week and View Month. View location searches you’ve made. Tapping the
Agenda displays all Calendar entries Bookmarks button lets you choose from a list of
for the current week. To set an alarm, bookmarked locations. When you’ve selected your
choose the day, scroll to the hour of the Start and End locations, tap the Done button and
You can define several parameters
appointment, and press the track pad. The fol- the iPhone will display the map view with the
for each appointment.
lowing screen lets you send a reminder to your highlighted route, a green pushpin at the origin
email or Facebook accounts, input a subject and and a red pushpin at the destination.
location, set a start and end time, confirm the To view your route as a text list, tap the icon in
Time Zone, relate the type of appointment, provide the lower-right corner to reveal a context-sensitive
reminders, set recurrence, and mark as private. You menu. Tap List to get turn-by-turn directions. Select
can also add notes at the bottom of the screen. any of the list items to see a zoomed view of that
Once you have set an appointment, press the portion of the trip on the map, and advance the
Escape key and select Save. Back in the main focus on the route to the next turn by tapping the
Calendar screen, you can set Alarms, as well, which right arrow in the upper-right corner of the screen.
are basically just nondescript appointments. To set If you tap the lower-right icon again, you can tap
an alarm, press the Menu key, select New
Alarm, input a Subject, select the Recurrence

IPHONE
and end date, press the Escape key, and then USE THE HORIZONTAL KEYBOARD IN SAFARI
select Save. As onscreen keyboards go, the iPhone has one of
the best, but when held vertically, the cramped key-
■ iPhone board makes it easy to make mistakes. However, if you
GET DIRECTIONS rotate your iPhone horizontally, the keyboard appears
The iPhone’s Maps application can give across the bottom half of the wider screen, with larger
you GPS-accurate directions whether trav- letters and characters, which makes typing a much less
eling by car, using public transit, or on foot. typo-prone endeavor. If you’re planning to use the
To get started, tap the Maps icon on the keyboard in Safari, make sure you rotate the iPhone
Home screen and then tap the Directions before summoning the keyboard (by tapping a text
button at the bottom of the screen. The box, such as the address bar). Once the keyboard is
utility’s Start field defaults visible, the aspect ratio is
to your current location, locked until you close
but you can change this by the keyboard again.
tapping and typing an
alternate address. Next,
input your destination ad- The horizontal keyboard is
significantly more spacious
dress in the End field. You
than the keyboard in the
can also add locations to vertical orientation.
either field by tapping the
address book icon, tapping

56 October 2010 / www.pctoday.com


MOBILE OFFICE
BUSINESS ON THE ROAD

the Map button to see the route on a plain, feature- To mark a message as
less map; tap the Satellite button from this menu to unread, tap the message
see your route on a satellite image, or tap the Hybrid to view it, press and
button to see satellite images with the map overlay. hold a finger anywhere
To reverse the directions, just tap the S-shaped in the gesture area, and
arrow between the Start and End fields at the top of then press the K key.
the screen. The car, bus, and walking icons at the top Swipe right-to-left in the
of the screen let you view your route and travel gesture area to return to
times by car, public transit (if available), or on foot, the main message card,
respectively. If transit directions are available, you’ll and the email you just
see appropriate times for each bus or train stop at viewed will be bolded as
the top of the screen, as well as the estimated arrival though you had not
time and total fare. If transit directions are available, opened it yet.
you can tap the clock icon in the upper-right corner To set a flag, tap the
You can use gestures
of the screen to set departure and arrival times or message to view it, press and
in the Email app to
tap Load More Times to open up more options. hold a finger anywhere in the perform some
gesture area, press the G key, advanced functions.
■ webOS and then swipe right-to-left to
EMAIL GESTURE SHORTCUTS return to the main email menu.
The gesture area on webOS-based phones such Now the message you just viewed will be flagged.
as the Palm Pre and Pixi give you the ability to do To move an email message to another folder, tap
some pretty basic functions, including navigating the message you want to move, press and hold a
forward and backward through applications and finger anywhere in the gesture area, press the M
key, and then select the folder into which you want
to deposit the message. Swipe right-to-left to return
SYMBIAN

ADD PHOTOS TO YOUR CONTACTS to the main email menu and navigate to the new lo-
If you want to see a friendly face whenever you receive a call from cation to find your moved message.
someone in your contacts list, assign a photo to each contact. First make To view the recipients of a particular email mes-
sure you have a photo of the contact stored on your phone (if not, you sage, tap the message from which you want to
can always take a quick snapshot of them with your device or add an view the recipients, press and hold a finger any-
image the next time you sync your device). Next, press Menu, select the where in the gesture area, press the S key, and then
Communic (Communications) folder, and then select Contacts. Select you’ll see the number of recipients followed by
the contact to which you want to add a picture, press the Options their contact names. Swipe right-to-left to return to
softkey, select Edit, press the Options softkey again, and then select the main email menu.
Add Thumbnail. Scroll through the images and select the one you want
to add. Press the Done softkey to return to the Contacts menu; you’ll ■ Windows Mobile
see the image you added beneath the contact name. FIND DOWNLOADED FILES
To take a photo of someone in your contacts list with your If you’ve ever struggled to find a file you just
Symbian S60 3rd Edition-based phone, press the Menu key, select downloaded onto your Windows Mobile phone,
Media, select Camera, and then just take the photo by pressing the then chances are you’re not alone. The device
Navi-scroll key. Next, press the Options softkey, select Set As Contact downloads files to different locations depending on
Call Img, select Assign To Contact, select the appropriate contact, the file type and the download method.
and then choose OK. To locate files on your device that you put there
using ActiveSync (Windows XP), Windows Mobile
Device Center (Vista), or Sync Center (Windows 7),
messages. You may not know, however, that look in the My Device folder first. If the files aren’t
holding your finger in the gesture area and there, it’s possible that an application you down-
pressing a letter key can execute a number of ac- loaded moved them elsewhere.
tions depending on the application you’re using. To find a media file, such as a song, ringtone, or
Some of the most useful gesture-based shortcuts video from a Web site, explore the associated My
are reserved for use in the Email application. Music, My Ring Tones, and My Videos folder.
To perform the email-related shortcuts, first When you download and install applications,
launch the Email application by tapping the enve- the new application will be located in another pro-
lope icon on the bottom of the Home screen. (If gram-specific folder. For instance, games will be lo-
you’re using a Palm Pre, slide open the keyboard.) cated in the Games folder. ▲

58 October 2010 / www.pctoday.com


MOBILE OFFICE
BUSINESS ON THE ROAD

WEB Web Notes


New & Updated Sites & Services

by Blaine Flamig

When you’re away from the office, your productivity doesn’t have to stop.
The Web is exploding with mobile sites and online services, including office
tools, news alerts, entertainment, and any number of other useful items.
Just as quickly, it seems, others go under, are bought by larger companies,
or simply evolve into something different. We’ve found some of the freshest
and most useful sites, services, and updates for you to consider.

Google Finance Now Playing: Phone Call From


Takes To The Road Within Gmail
Google’s Finance Team If you were already happy with Google’s Gmail,
states on its blog that it’s chances are you’re now downright ecstatic fol-
“always looking for new lowing the late-August addition of support to
ways to help you access make free phone calls “to any phone” in the
the finance data, charts, United States and Canada from Gmail. Free calls
and reports that you need will last until at least year’s end, and Google is also
in the blink of an eye.” making available paid international calls, with
To that end, it recently calls to China, France, Germany, Japan, the UK,
launched new mobile edi- and other countries starting at 2 cents per minute.
tions of Google Finance for Android and Those with a Google Voice account can receive in-
iPhone devices that aim to provide a “uni- bound calls in Gmail, while outgoing calls will dis-
fied experience across desktop and Android play your Voice phone number as the caller ID.
or iPhone phones.” Google has also made Making calls requires installing a video/voice
the same information available from a plug-in (which also adds free video chat support)
Google Finance app available in the for those who haven’t previously. Reportedly,
Android Market. Expect nearly all the Google plans to provide calling abilities to interna-
same features and abilities in the mobile tional Gmail users and businesses down the road.
version as you’ve been getting from the Elsewhere, Google recently added Gmail voice
desktop version, Google states, including news, and video chat support for Linux users, specifi-
real-time quotes, and portfolio access. To reach the cally those using Ubuntu and other Debian-based
site, just tap the Finance tab from the Google mo- distributions. A plug-in making chats available
bile site’s home page or search a specific company from Gmail, iGoogle, and orkut is available at
name or stock ticker and you’ll find the Google gmail.com/videochat.
Finance mobile site listed among the results.
In related news, Google has also tweaked the
Google Finance charts experience by adding the
ability to expand individual and market charts to
fill an entire Web page for easier viewing and ma-
nipulation. Clicking the arrow in a chart’s upper-
right corner will expand it. Additionally, you can
also customize chart content to include/exclude
via the Setting tab, customize news annotations in
charts via Plot Feeds, and add various technical
data for advanced tracking via the Technicals tab.

60 October 2010 / www.pctoday.com


MOBILE OFFICE
BUSINESS ON THE ROAD

way of photos, case studies, fact sheets, video, and


other resources on devices, data plans, and other
Sprint services into one area. “We want this site to be
'the place' that small businesses go to research and
buy communications services," says Judy Train,
Sprint VP, Small Business and Alternate Channels.

KnowEm Enterprise Dashboard


Increasingly, the world is becoming one big social
network, and we’re all just a part of it. KnowEm
Parking Assistant Shows The Way (knowem.com), a company that
This Web app from Anagog (www.anagog.com) “helps businesses protect their
does exactly what its name suggests for Apple, identity on the Web,” seems to
Android, and Windows Mobile device owners using realize as much, which is why it
data gathered from the OpenStreetMap Project recently released its Enterprise
(www.openstreetmap.org). On the iPhone, for ex- Dashboard, which essentially
ample, just direct your browser to www.anagog provides a central location
.com/wa and click Find A Parking Lot. The app uses from which companies can
your current location to show you on a Google map monitor and control how their
the lots other users indicate as being free via green identities, trademarks, and so
balloons and those that are paid via red balloons. on are being used in social net-
working circles. Further, the dashboard provides the
Passport Photos In A Pinch ability to automatically secure the trademarks, user-
Every Web user worth her salt has a folder of names, and related information that have yet to be,
Web sites she can turn to for those just-in-case mo- as well as create company profiles on the given social
ments. Idphoto4you.com is such a site. The site networking service.
freely lets you upload up to a 10MB photo (JPEG, KnowEm states that its database contains infor-
PNG, or BMP) of yourself for use in a passport, visa, mation concerning more than 5,000 global social net-
or citizen ID. Standard photo sizes for 63 countries works that companies can track for each mention of
are included, and the service even uses face-detec- their brand names, usernames, or keywords. Further,
tion and angle-correction technologies to properly you can organize that information into network-, au-
crop and position photos. Further, other helpful thor-, and location-specific charts companies can re-
hints concerning proper photo use are included. ceive hourly, daily, or weekly. KnowEm recently
tested the dashboard during a beta phase with
Sprint Welcomes Yahoo!, Flickr, and Continental Airlines. To date, the
Small-Business Owners company says it has helped reserve 500,000-plus pro-
With its new Sprint Small Business Web site files it reported to clients relating to 60,000-plus cases
(smallbiz.sprint.com), Sprint aims to make “the of squatting or misrepresentation of brands, user-
small-business owner’s reluctant trudge through names, or trademarks.
overly complicated Web sites in search of the right
communications solution a thing of the past.” Nokia’s Ovi Blog Goes Mobile
Launched in August, the site is tied to Sprint’s As Nokia stated in mid-August, if you love the
Business (www.sprint.com/business) site and com- company’s official Ovi Blog (blog.ovi.com), you love
bines research, reviews, comparisons, and product surfing the Web on your mobile device, and you want
information in the to read the blog on said device in a lightweight ver-
sion, you’re now in luck as the “Ovi Blog is now 100%
more mobile friendly.” What this means is less waiting
time, fewer data charges, and less zooming to read
blog posts on your device. (Nokia has noted that some
Opera 10 users may still see the blog’s heavy version
on devices, though the company was looking into the
issue at press time.) The blog’s mobile version sup-
ports leaving comments, taking part in polls, and ac-
cessing other features just as you would with the
desktop version. ▲

PC Today / October 2010 61


P E R S O NA L E L E C T R O N I C S
TECH FOR HOME & LEISURE

Audio & Video by Blaine Flamig

APPLE SPRUCES UP year’s edition at roughly half the size and weight. The new
I P OD L INEUP nano also forgoes the traditional clickwheel in favor of a touch-
■ Knowing what to make screen with multitouch support. Volume buttons and a built-in
of the September press clip are present, as are an FM radio, VoiceMemos, Photos app,
conference Apple held to and 24-hour battery life. What’s gone is the video recording/
debut its new iPod lineup playback ability Apple added to last year’s nano.
is tricky. That’s because Elsewhere, the iPod touch—8GB ($229), 32GB ($299), and
beyond launching new 64GB ($399) models—is now slimmer but adds the same high-
nano, touch, and shuffle models characterized as representing res Retina display (960 x 640) the iPhone 4 includes. The touch
the most significant overhaul to the lineup ever, Apple touched also bears the same front- and rear-facing cameras to conduct
on numerous other media fronts, including debuting Ping, a video chats via Apple’s FaceTime software over Wi-Fi. HD-
social networking service built into iTunes. quality video recording is also onboard, as is a new A4 processor
iPod-wise, the new 2GB shuffle ($49) brings back the button- to add gaming muscle to the touch, which includes Game
based navigation of the second-gen shuffle while retaining mul- Center software for multiplayer gaming support. Apple also re-
tiple playlist support and VoiceOver, which speaks song, artist, vamped the Apple TV ($99), which is now smaller, easier to use,
and album titles. Available in five colors, the shuffle touts 15 and makes HD television (99 cents) and first-run HD movies
hours of battery life. The new 8GB ($149) and 16GB ($179) nano (starting at $3.99) available but only as rentals. Netflix streaming
models, meanwhile, sport a radically different design than last is also integrated.

“DON’T GO ANOTHER DAY WITH BAD HEADPHONES!”


■ V-Moda directly responded to an amazing.” Stuff your “cheap” ear-
August article from Gizmodo (www buds in a padded envelope, ship
.gizmodo.com) that essentially labeled them to V-Moda with your email
the $50-and-under headphone market address included, and V-Moda will
a “scam” by launching an Earbud give you a $35 voucher to use on
Upgrade Program (v-moda.com/up its Vibe, Vibe duo, Vibe ii, Remix
grade). Through the program V-Moda is Audio, Remix Remote, or Crossfade
giving buyers an “opportunity to up- LP headphones (shop.v-moda.com).
grade to headphones we’ve designed Alternatively, you can keep your current V-Moda’s models using the “upgrade”
and engineered to look and sound earbuds and still get a $10 discount on coupon code.

62 October 2010 / www.pctoday.com


P E R S O NA L E L E C T R O N I C S
TECH FOR HOME & LEISURE

INSTANTENCORE GETS CLASSY content saved to a personal


■ Classical music has gotten the short end of the baton where Instant queue, you can search
online digital music is concerned to date. InstantEncore (www for content by genre, in-
.instantencore.com) aims to change that by giving fans of the cluding new arrivals.
genre “live classical music anywhere and anytime.” The site also
has tools for concert presenters, ensembles, composers, and edu- “BOOM!” GOES THE
cators to “connect, enhance, and extend the concert experience.” NIKE APP
The site is backed by some heavy hitters, including President and ■ If you found that you’re not giving your all lately the way you
CEO Bill Stensrud, an MIT grad and past San Diego Opera presi- used to in your workouts, perhaps it’s time for a little third-
dent. As of early September, the site listed roughly 106,000 con- party motivation, say, in the form of Coach K barking at you or
certs, 1,300 hours of music, and 6,620 videos. A Become A Fan even King LeBron himself lending some inspiration. Such is the
tool, meanwhile, helps track favorite artists via a Facebook-like aim of the Nike Boom app (free) for Apple and Android devices.
personal Fan Feed area packing alerts concerning news, reviews, In addition to “blasts of motivation from the best in the game,”
music, and more. Elsewhere, an Upcoming Concerts database is the app syncs one of the included training workouts available
searchable by city, and a Buzz section contains content in Today, for basketball, football, and other sports to your own music
This Week, and This Month timelines. playlist. Select the training intervals and time you want to spend
on them and you’re ready. Real-time Facebook integration is also
I P HONE DATA RECOVERY IS A STICK AWAY built in, allowing friends to urge you on while you’re actually
■ We can’t vouch for its effectiveness, but Proofpronto.com sweating away.
says its iPhone Recovery Stick ($197.95) can retrieve
deleted text messages, call and Web history, con-
tacts, photos, voice notes,
THE SPHEAR IS HERE
calendar entries, and more
■ The audio devices that
from iPhones using iOS 3.2.1
OrigAudio (www.origaudio
or earlier. (iOS 4 support is
.com) turns out are anything
reportedly coming.) Touted
but conventional, which is a
as a tool for “private investi-
good thing if you value inge-
gators, concerned parents,
nuity. Although the company
school and security person-
has arguably gotten the most
nel, and suspecting spouses,”
attention to date from its self-
the Recovery Stick could also
powered Fold n’ Play Recycle
come in handy in business
Speakers ($19.99 each), which fold
use. Using it boils down to connecting your iPhone
into a cube when in use and flat
to a Windows PC via USB port and plugging the
when not, and its Rock-It ($49.99), a
Recovery Stick into a separate USB port. You can
portable vibration speaker system that turns any “object into a speaker,” we’re
then perform advanced searches for specific data,
especially keen on the Sphear ($29.99). The ball-shaped Sphear comes in one
bookmark data, and output data to reports. How
piece but actually separates into two 1W speakers that can connect to any de-
much data you can retrieve, however, “depends on
vice with a 3.5mm headphone jack. The speakers angle upward at 38 degrees,
how much new information has been written to the
which the company says is perfect for optimizing your sense of hearing and
phone since the data you need to recover was
creating a stereo sound environment. What the blue-and-white Sphear lacks in
deleted.” Thus, if you’ve deleted a text message and
overall power it definitely makes up for in convenience.
immediately received another, “you will likely not
be able to recover the old message,” although you
retrieve a portion of it if the new message takes up
less space than the deleted one. ONE DOCK TO DOCK THEM ALL
■ We have a penchant for multitasking devices. Thus, our fond-
NETFLIX GRACES IPHONE & IPOD TOUCH ness for the very unique iPADock from Japanese company
■ If you don’t mind the hit your iPhone or iPod touch’s battery PhotoFast is easy to understand. The dock sports enough slots to
life is going to take or the fact that you’ll be doing your watching hold either two iPads, four iPhones or iPod touch models, one
on a small screen, Netflix subscribers with a subscription plan iPad and two iPhones/iPod touch models, or six iPod nanos
that starts at $8.99 monthly can now stream movies and TV simultaneously. Further, the dock also offers seven USB ports
shows to their devices via a free app available in the App Store. on its backside (four powered), as well as a plethora of
Netflix previously made the ability available to iPad owners CompactFlash, SD, and MemoryStick memory card reader op-
upon that device’s release. iPhone and iPod touch streaming is tions. Perhaps best of all, the multitalented dock only runs about
available over 3G and Wi-Fi connections. Beyond accessing $80 and should be available as you read this. ▲

PC Today / October 2010 63


P E R S O NA L E L E C T R O N I C S
TECH FOR HOME & LEISURE

Ereaders
By The Numbers
More Choices, Lower Prices
With ebook
support, a color
display, and a
by Carmen Carmack
wide range of
additional
capabilities, the
Apple iPad is

S
ince Apple launched the iPad in April, the heating up the
ereader and ebook industries have an- competition in
nounced a steady stream of enhanced tech- the ereader
nologies, lower prices, and new devices. Sales for market.
ereaders and ebooks have increased. And debates
rage over the benefits of dedicated ereader devices multifunction capabilities, E Ink ereaders such as
with electronic-ink technology from E Ink (such as Amazon’s Kindle, the Barnes & Noble nook, and
the Amazon Kindle and Barnes & Noble nook) the Sony Reader line have dropped in price. When
compared to multi-use devices that include ebook the iPad hit the market earlier this year, the
capabilities and offer color LCD screens (such as Amazon Kindle 2 cost $259. Amazon lowered the
the iPad and tablet PCs). Here’s a sampling of re- price to $189 in July (now dropped further to
cent developments in the world of ereaders. $139)—after Barnes & Noble decreased the price of
the nook to $199.
New Kindles Outpace Past Sales Not to be outdone, Borders currently offers the
Amazon released its third Kindle version in July. Kobo ereader (which also uses E Ink) for $129.99.
The company says that the newest Kindle has an The bookseller is also selling the LCD Aluratek
enhanced electronic-ink screen with improved con- Libre and the Sony Pocket for $99.99 and $109.99,
trast, a new design with a 21% smaller body with respectively. Both the Libre and the Pocket offer 5-
the same 6-inch display, 15% lighter weight at just inch displays and downloadable ebooks through a
8.5 ounces, faster page turns, up to one month of computer connection, while the Kobe ereader of-
According to Amazon, battery life with wireless off, double the storage to fers a 6-inch display and Bluetooth connectivity.
its newest Kindle is 3,500 books, and no glare even in bright sunlight.
selling better than ever. Sony Updates Reader Product Line
The Wi-Fi version is priced at $139, while the 3G
The Wi-Fi model is
priced at $139 and the wireless with free 3G connectivity is $189. Sony has restyled all three of its ereader devices,
3G version costs $189. According to Amazon, more of the reduced their size and weight, and made new
new Kindles were or- touchscreens available across the entire line. The
dered in the first four Reader Pocket Edition ($179.99) includes the new 5-
weeks of availability inch touchscreen, multiple color choices, and 2GB
than in the same time- of onboard memory to store as many as 1,200
frame following any other Kindle books. The 6-inch display Reader Touch Edition
launch. “Kindle is the best-selling ($229.99) offers 2GB of onboard memory and dual
product on Amazon.com for two years expansion slots for up to 32GB of added memory; it
running and our new-generation Kindles can also play audio files. The 7-inch display Reader
are continuing that momentum,” says Steven Daily Edition ($299.99) includes 3G/Wi-Fi connec-
Kessel, senior vice president, Amazon Kindle. tivity, a Web browser, and the same memory capa-
bilities as the Reader Touch Edition.
iPad Rocks The Price Boat
Since Apple introduced the $499 iPad, prices for New Ereaders Announced
dedicated ereaders have dropped significantly. The Sharper Image announced its new Literati
Perhaps in an effort to compete with the iPad’s color display ereader, which it is planning to ship in

64 October 2010 / www.pctoday.com


P E R S O NA L E L E C T R O N I C S
TECH FOR HOME & LEISURE

October to more than 7,000 retailers, including Best with a 118.9% increase over June 2009 ($29.8 mil-
Buy and Macy’s. The 7-inch display ereader sup- lion). Year-to-date ebook sales were up 204.2%.
ports Wi-Fi connectivity and the Kobo ebook soft- In July, Amazon announced that over the pre-
ware. Its estimated cost is $159 or less through vious three months, it sold 143 Kindle books for
rebates and special offers. every 100 hardcover books. And in the month prior,
Borders is upping its collection of ereaders, the rate increased to 180 Kindle books for every 100
with the addition of the 7-inch color display hardcovers. The numbers include Amazon.com’s en-
Velocity Micro Cruz Reader ($199.99) and the tire U.S. book business and sales of hardcover books
Velocity Micro Cruz Tablet ($299.99). Both include where there is no Kindle edition. Free Kindle books
were excluded. Amazon also noted that it had sold
more than three times as many Kindle books in the
first half of 2010 as in the first half of 2009.

Ebook Price Deals Challenged


Amazon and Apple have reached agreements
with the largest ebook publishers that ensure both
will receive the best prices for ebooks over any com-
petitors. The contract provisions are known as “most
favored nation” clauses, and the Attorney General of
Connecticut, Richard Blumenthal, is calling on the
companies to meet with his office to address con-
cerns about competition and ebook pricing.
According to the Attorney General’s office, pub-
lishers that have reached agreements with Amazon
and Apple include Hachette, HarperCollins,
Macmillan, Penguin, and Simon & Schuster. “These
agreements among publishers, Amazon, and Apple
A recently announced ereader is the Literati from appear to have already resulted in uniform prices
Sharper Image. Due to come out in October, the for many of the most popular ebooks—potentially
Literati will be available at more than 7,000 retailers. depriving consumers of competitive prices,”
Blumenthal says. “The ebook market is set to ex-
plode—with analysts predicting that ebook readers
will be among the holiday season’s biggest elec-
tronic gifts—warranting prompt review of the po-
tential anti-consumer impacts.”

E Ink Introduces Pearl


Leading electronic paper developer E Ink recently
released its next-generation technology, Pearl.
According to Lawrence Schwartz, E Ink marketing
director, “E Ink improved the contrast of its epaper
displays [with Pearl] by 50%. This was achieved by
The Velocity Micro Cruz Reader and the Velocity improving the core chemistry in the microcapsules
Micro Cruz Tablet are coming on the market that comprise the electrophoretic display.”
with 7-inch color displays. They are available for “As the electronic reading market continues to
order online at Borders.com. expand,” says E Ink Chairman Felix Ho, “there are
more opportunities for expansion not only in the
an SD card slot for additional storage, Wi-Fi sup- ebook space, but also for eNewspapers, eMagazines
port, and a Web browser. The Velocity devices will and eTextbooks. E Ink Pearl enables further adoption
also be available at electronics retailers. with a next-generation product that is a more light-
weight and eco-friendly product than ordinary
Ebook Sales Rise paper, with less eye strain and longer battery life
According to the Association of American than an LCD.” Battery life with E Ink, says Schwartz,
Publishers, ebook sales continued to grow in June, “is measured in weeks instead of hours.” ▲

PC Today / October 2010 65


P E R S O NA L E L E C T R O N I C S
TECH FOR HOME & LEISURE

Apps For Reading


Your Mobile Device As Ereader

by Rod Scher

W
e’ve seen the future of books—and it’s not every reader will run on every phone or PDA. Many,
Apple’s iBooks bookstore ink on paper. The ebook is the wave of the in fact, run on only one or two devices.
(running here on an future, and while Amazon’s Kindle and Having acquired an ereader app, you will typi-
iPhone) lists books in Barnes & Noble’s nook lead the dedicated ereader cally start the app (which often comes with a free
various categories, and it pack, the smartphone, PDA, or other mobile device sample book or two), and then click a Store, Shop
also lets you search for a
you already own can almost certainly run an ereader For Books, Find Books, or similar button. Generally,
particular book.
app that will bring a world of books right to you. this takes you to an online store at which you have
previously set up an account, and from which you
Content Is Still King can now purchase and download one or more
The ereader landscape can be confusing, so we’ll books. (Note that there are almost always free or in-
give you an overview of what’s available in the expensive books available, either classic works in the
way of readers for mobile devices and the sorts of public domain or loss-leader backlist titles the pub-
functionality you can expect from them. But the lisher is giving away to encourage interest in the au-
first thing to wrap your head around is that there is thor’s newer books.)
normally a difference between content (that is, the
books themselves) and the software that you use to What To Look For In An Ereader
acquire and display that content. Simply put, in Here are some things you’ll want to consider
most cases, the book and the ereader are not the when shopping around for an ereader:
same thing. Most ereaders are free and may work User interface. When you start looking at
on one or several devices. The software will down- ereader apps, you’ll want to keep four criteria in
load and display books in a particular file format, mind: First and foremost, you need an app that will
although that file format is usually no concern of run on your device and that offers a user interface
Seen here running on yours; all you care about is that a particular reader with which you’re comfortable. Does it include
a Palm Pre, the Kobo lets you access some sort of online store that in turn useful search features? Do you like the way you
reader lacks some features, allows you to download and read a book. “turn” pages? Are the brightness levels and colors
but is easy to use.
appropriate? How about the direction in which the
The Typical Process pages are oriented? (And if these are not to your
The first thing you need, of course, is an ereader liking, can you change them?)
app for your device. There are dozens of them: Content acquisition. The content-acquisition
Some excellent ones are published by the same folks experience should be as painless as possible. For
who sell the most popular purpose-built ereader de- example, although the eReader Pro interface is ex-
vices, the aforementioned nook and Kindle. Don’t cellent in many respects, we found that content ac-
assume that these are your only options, though. quisition was clumsy and frustrating, requiring the
There are other excellent mobile ereader apps that user to go to multiple sources and enter unlock
you’ll want to consider, including the Aldiko, codes for each purchase.
Stanza (now owned by Amazon), eReader Pro, and Pricing. Many ereaders are free, but most books
Kobo readers. On Apple devices (iPad, iPhone, iPod cost money—after all, publishers and authors have
touch), Apple’s iBooks reader is also popular. to make a living. But prices vary; in our experi-
But don’t assume that you’re limited to one ence, Amazon and nook prices tend to be a bit
reader, or even two. Given the competition in book lower than prices at the iBooks store, but it pays to
offerings and the fact that some vendors provide ac- shop around. Just as with any other retailer, dif-
cess to publications that other vendors lack, many ferent ebook vendors are constantly offering sales
The iPhone nook is full-fea-
people read multiple books on multiple readers. and giveaways. For the moment, the typical price
tured and allows access to
Barnes & Noble’s catalog of Of course, depending on which mobile device for a digital bestseller seems to have settled in at
more than 1 million books. you use, your options may be somewhat limited; not between $9.99 and $13 or so.

66 October 2010 / www.pctoday.com


P E R S O NA L E L E C T R O N I C S
TECH FOR HOME & LEISURE

Content. Finally, keep selection in mind. The


Kindle and nook currently have the largest selection, Multimedia “Books” Are Coming
but others are working hard to catch up to the fron- Currently, most digital books are static presen-
trunners. Again, if you have two or three ereader tations of words and images, but a new world
apps, checking multiple on- of “multimedia books” is
line stores is no real trouble; if dawning. In this world,
you can’t find a book you books are interactive; they
want at one, try another—it’ll may contain video and
only take you a minute. audio, and the pages them-
selves may be animat-
Features To Look For ed. Obviously, such “books”
Most mobile ereader apps will be more demanding of
The eReader Pro app
offer a wide range of useful the devices on which they (running on an iPhone
features, including integrated run. For now, though, most here) provides several
dictionaries, in-book searches, of us agree with Amazon’s helpful features, including
The Kindle ereader (running on an Apple the ability to select and
and the ability to highlight iPad) includes an integrated dictionary, Jeff Bezos: In a recent Wall
highlight text.
and make notes about what additional links to related topics on Street Journal interview he
you’re reading. Some apps Wikipedia and Google, and access to commented, “For the vast
are spare and simple, but approximately 700,000 publications. majority of books, adding
many are quite sophisticated: video and animation is not
Most readers come to appreciate being able to going to be helpful. It is distracting rather than en-
double-click to check a word’s meaning or to high- hancing. You are not going to improve Hemingway
light a word or phrase; and the ability to modify by adding video snippets.”
font size, screen colors, and brightness can make Which brings up a seemingly contradictory no-
reading on a small device much easier on the eyes. tion: Can one be both a bibliophilic traditionalist and
See the “Ereader Feature Set” sidebar to see which a devoted reader of ebooks? Apparently, the answer
readers offer which features. may turn out to be yes. ▲

Most ereader apps offer similar functionality, though how you


EREADER FEATURE SET access the functionality may differ from one to another.

EREADER FEATURES
search change adjust integrated highlights & table of search Google
book adjust font colors brightness dictionary notes bookmarks copy contents or Wikipedia
Aldiko x x x x x
B&N/nook x x x x x x x x x
eReader Pro x x x x x x x
iBooks x x x x x x x x x x
Kindle x x x x x x x x x
Kobo x x x x
Stanza x x x x x

EREADERS & COMPATIBLE Not all devices will run all ereader apps. Here's a list of some of the
MOBILE DEVICES more popular mobile devices and ereader apps that run on them.

DEVICE READER
Adobe eReader
Reader Aldiko B&N/nook Pro Kobo Kindle Mobipocket MS Reader Stanza Wattpad
Android-based x x x x x
BlackBerry x x x x x x
iPhone/iPod touch x x x x
Palm Pre/Pixi x
T-Mobile HTC x
Windows x x x x
Mobile-based

PC Today / October 2010 67


B U S I N E S S T R AV E L 9 1 1
ON-THE-GO TECH SUPPORT

Solve Remote Network


Connection Problems
Resolving remote network issues often goes beyond common
fixes you may have used to fix your Internet connection. Fortunately,
you can quickly eliminate a number of possibilities using a CLI (command-line interface; a text-based
command window that is a holdover from the early days of computing), which is still available in
Windows XP/Vista/7.
All these suggestions assume that the network is up and operating. It also assumes you are connected to
the Internet. Before you proceed, you’ll need to know how to open the CLI window. In WinXP, click Start, se-
lect Run, type CMD in the Open field, and press ENTER. In Vista/Win7, click the Start button and type
CMD into the Start Search field, and then click the CMD icon that appears in the results.

Ping It see a time-out message, wait a few seconds. A


All Internet or network hosts, computers, time-out alert appears if the reply takes longer
routers, and other Internet-enabled devices use an than a second.
IP address (a string of four groups of numbers sep- If the response indicates the data packets were
arated by periods, such as 233.122.0.2) to uniquely sent and received, your machine is exchanging
identify themselves. You may have used this data with the network address. You can skip to
number to access a network login. This can also be “Get Connected” to set up a dedicated connection
a Web address (called a host name) or DNS name to and edit settings. If you have been accessing the
access a login. IP addresses and DNS names are in- site via a Web address, go to “Look It Up” before
terchangeable. With either, a ping command can heading to “Get Connected.”
determine whether the computer and network can If you receive a response that contains something
exchange basic data. about a nonexistent domain, you are likely using the
From the command line window, type ping fol- wrong IP address or DNS name to log in. Double-
lowed by a space and the IP address or DNS name check the address and try to connect normally. (If
(examples would be ping 167.154.16.27 or ping you are logging in with an IP address, skip to “Look
www.corporatenetwork.com). Press ENTER. If you It Up” for a quick way to check its validity.)

68 October 2010 / www.pctoday.com


B U S I N E S S T R AV E L 9 1 1
ON-THE-GO TECH SUPPORT

If you receive a transmission error, the ping press ENTER. Lines will appear with access times
data is not leaving your PC. Your firewall is likely and IP addresses. The final few hops should show
blocking you from accessing the network. You’ll domain names—the last one being your network.
want to add the site to your firewall as an allowed This is the route—and the time the trip is taking—
exception (refer to your firewall’s help documenta- between nodes on the Internet.
tion for instructions) and try again. If an early hop takes a long time or causes
If you receive a response after an excessive the trace to hang (a flood of timeouts), contact
number of time-outs, the network’s response to your ISP. If you reach many hops before things
your connection may be slow and your browser go awry, the problem may be with a gateway or
or other network access utility may be giving up router at or near the location of the remote net-
▲ If you can send data
before it connects. Lengthen the response time by work. Check with the network administrator for
packets but none are
adding a -t switch (ping -t followed by the IP ad- assistance. returned, it generally
dress or DNS name). This will ping the address means the network is
indefinitely. After a dozen pings, press CTRL- Get Connected refusing to acknowledge
Break to view the packet data. If there is no re- Setting up a direct VPN connection gives you your request.
sponse yet, continue awhile longer, and then press a dedicated login interface and lets you avert
CTRL-C. If you never get a response or the DNS issues. To set up the connection in WinXP,
number of pings to get a response is considerable, select Control Panel on the Start menu. Click
skip to “Trace the Route” for assistance. Network And Internet Connections and then se-
If you get a message saying the ping request lect Create A Connection To The Network At
could not find the host or the response indicates Your Workplace. In Vista/Win7, click Control
the number of data packets sent is zero, the net- Panel on the Start menu and click Network And
work is not acknowledging your ping. Changes Internet (in Category view), then Network And
to the network or configuration may now be pre- Sharing Center. Click Set Up A Connection Or
venting access. Contact the network adminis- Network (Vista) or Set Up A New Connection Or
trator for further assistance. Network under Change Your Network Settings ▲ Obtaining the
(Win7). Select Connect To A Workplace, then Use DNS name and IP
Look It Up My Internet Connection. (Vista/Win7 offers address and comparing
You can look up a DNS name from an IP ad- smart card as a connection option. We won’t dis- access times between
dress and vice versa. From the command line cuss that here.) the two can determine
whether Windows is
window, type nslookup followed by a space and Select Virtual Private Network Connection, experiencing DNS
either the DNS name or the IP address and press name the connection, and provide the host (DNS) resolution issues.
ENTER. name or IP address. If you are asked if you would
Write down the DNS name and numeric se- like to dial a connection, click No (unless you only
quence you see in the lines that begin with Name: have dial-up Internet) and click Finish (WinXP) or
and Address: (ignore aliases). If you are checking Connect (Vista/Win7). The OS will attempt to con-
an IP address, the DNS name should help con- nect you without configuring any settings. If this
firm it. If you recognize nothing, contact the net- solution does not work, or if you are using WinXP,
work administrator to confirm the IP address. proceed with the following instructions.
If you are using a DNS name, Windows may Return to the Network Connections window in
be having a problem with DNS name resolution WinXP or the Network and Sharing Center in
(translating the DNS name into an IP address). Vista/Win7 and click the option to manage network
Perform two pings from the same command line connections. Right-click your VPN network icon
window, first using the DNS name you wrote and select Properties. Next, click the Networking ▲ The point at which
down and then using the IP address. Compare tab, click Internet Protocol (in Vista/Win7, you’ll a route trace hangs
the access times and packets you sent and re- need to do this for TCP/IP V4 and TCP/IP V6), and can help you
determine where
ceived. If there is a big difference in behaviors click Properties. Override automatic configuration
your request for
pinging the DNS name vs. the IP address, skip to and provide the exact IP address and DNS names network attention is
“Get Connected.” for the network. Exit the Properties interface, right- being disrupted.
click the VPN icon, and click Connect. Provide your
Trace The Route login information if prompted.
Tracing the path data packets take going to If you cannot connect, Windows can provide
the network will help pinpoint problems. From the some assistance, but you may need more ad-
command line window, type tracert followed vanced configuration information. Contact the net-
by a space and the DNS name or IP address, and work administrator for detailed information. ▲

PC Today / October 2010 69


B U S I N E S S T R AV E L 9 1 1
ON-THE-GO TECH SUPPORT

Use Wi-Fi
Hotspots Wisely
Wi-Fi hotspots are everywhere these days, from airport
concourses to the local coffee shop or burger joint.
Unfortunately, warnings about using hotspots also abound. Don’t worry—with a little effort and a modicum
of care, you can locate and use Wi-Fi hotspots safely, making life a little easier when you travel.

Ask For Oomph If you want to be cutting-edge, look for


If you need wireless capabilities or want adapters, such as Cisco’s Aironet 802.11a/b/g
a speedier solution, then look for network adapters Wireless CardBus adapter (www.cisco.com), that
that support 802.11n, the latest, fastest, fully ap- support the WPA2 (Wi-Fi Protected Access 2) secu-
proved (and backward-compatible) wireless pro- rity standard. WPA2 encrypts network data that
tocol. If you’re looking for extreme portability, look moves over the network using AES (Advanced
for a device that at least supports 802.11g. One nifty Encryption Standard). Some WPA2 products also
solution is Netgear’s WG111 (www.netgear.com), a offer Fast Roaming, which lets the adapter roam
USB-based adapter the size of your finger. among available access points to locate the
strongest signal.
Windows XP SP2 (Service Pack 2)/Vista/Win7
support WPA2. Public networks generally do not
The Netgear
use WPA2 access points yet, but it is likely many
WG111 is a
compact and will eventually. In the meantime, you’ll be able to
functional locate and use private WPA2 networks for which
802.11g adapter. you have credentials.

70 October 2010 / www.pctoday.com


B U S I N E S S T R AV E L 9 1 1
ON-THE-GO TECH SUPPORT

If you don’t get the range you expect, con- Best Practices
sider using a range-enhancing antenna or an- In WinXP
tenna extender. Some adapters include a ▲ Keep your notebook
updated with security
built-in external antenna. If yours doesn’t but
fixes and other releases.
has the appropriate connectors, you can buy
Having the most recent
an add-on device such as RadioLabs’ (radio security pack is particu-
labs.com) Laptop WiFi Antenna or Xterasys’ larly important. If you
(www.xterasys.com) External 2.4GHz IEEE don’t automatically up-
date WinXP, use the
802.11b/g Wireless Antenna Extension.
Windows Update site
(update.microsoft.com)
Avoid Evil Twins to search for and install
Free municipal and college hotspots are available updates.
popping up everywhere, and data thieves
Vista will warn you if you try to connect to an unsecured net- ▲ When you run
are taking advantage of them to lift your in- work, but you can override the recommendation. Windows Update, also
formation. Hackers establish open networks check for driver updates.
with official-sounding names, such as Click the Custom button
before you run the up-
SeattleFreeWiFi, and then monitor those networks the network is secure (a few are), in which case you
date engine and then see
and access users’ information at will. Beware a need a network key or code. (You’ll need to speak what items appear under
public network unless you can confirm its SSID to a network administrator about this.) Hardware (Optional). A
(Service Set Identifier; its public name) or you are With unsecure networks or networks with secu- final best practice is to
at a reputable business with Wi-Fi access and rity protocols that Windows doesn’t recognize, turn off or manage file
sharing before you con-
only that network is within range. both WinXP and Vista will attempt to block the
nect to a public network.
connection. In WinXP, if you want to connect
Hotspot 101: Find ’Em anyway, select the Allow Me To Connect To The
To find wireless hotspots along your route, re- Selected Wireless Network Even Though It Is Not
search online or use a Wi-Fi sniffer (hotspot de- Secure checkbox. (This option is not present in all
tector). For online research try the Wi-Fi locator on versions.) In other versions of WinXP and in Vista, Best Practices
the PCToday.com home page. Other sites we like are the OS will warn you of the dangers but lets you In Vista/Win7
▲ As with WinXP, it’s im-
Wi-FiHotSpotList.com and the Wi-Fi-FreeSpot override its recommendations.
portant to keep your
Directory (www.wififreespot.com). If Wi-Fi access is Some networks also hide their network names. Windows Vista/Win7 and
a primary consideration in your choice of hotels, Vista and some versions of WinXP can see the networking drivers up-
check out the Annual Hotel Wi-Fi link on Hotel- name of the network but title them Unnamed. If dated. In particular, users
Chatter’s Web site (www.hotelchatter.com). you can obtain and supply the network SSID, you report that they often re-
solve connection drops
If you lack the time or desire to map a wireless can make the connection.
through driver updates.
route, sniff it out as you go. WinXP and Vista have If nothing seems to be working but you think Vista/Win7 also have ex-
built-in sniffer utilities. Right-click the icon for your you are connected, ping a known Web site, such as cellent troubleshooting
wireless connection in the System Tray and select Yahoo! (www.yahoo.com) to see if it responds. To utilities. Open the Net-
View available Networks (WinXP) or Connect To A do this, you need to open the Start menu in WinXP work And Sharing Center
and click Diagnose And
Network (Vista). You can also purchase third-party or Vista, select Run, type cmd in the Open field,
Repair to start resolving
sniffer software, or your network adapter’s soft- and press ENTER. Type ping www.yahoo.com (or your issues.
ware may include one. whatever URL you want). If you get a response,
▲ You don’t have to turn
To scan for a Wi-Fi network before you set up your machine is connected to the Internet, so the
off file sharing when you
your notebook, consider a Wi-Fi hotspot-finding problem is with your PC or browser. If you receive connect to public net-
device from a manufacturer such as Canary Wire- notification that the connection has timed out, the works that are unsecure.
less (www.canarywireless.com). There are also de- problem is with the network. The Network Awareness
vices designed to help you find information about feature disables file and
signal strength, security, and other details that will The Power Is Yours printer sharing, including
public folder and media
help you determine which hotspot to choose. In the end, how safely and fruitfully you use sharing, as well as Net-
Wi-Fi access is up to you. As a final precaution, work Discovery. It also
Hotspot 102: Connect To ’Em whenever you are not using your wireless adapter, turns Windows Firewall
To connect to a fee-based public network, you turn wireless off. This completely prevents anyone on. If you want to share
files, you can update
will provide (or choose) a user ID and/or else from connecting to your computer and saves
these settings using the
access code at connection or when you open your precious battery life. To turn wireless off, right- options in the Network
browser. Connecting to a free wireless network click the icon for your wireless connection in the And Sharing Center, but
should require only opening your browser, unless System Tray and select Disable. ▲ we advise against it.

PC Today / October 2010 71


B U S I N E S S T R AV E L 9 1 1
ON-THE-GO TECH SUPPORT

Revive A Crashed
Notebook
Someday you will face the inevitable notebook failure. You’ll be working
diligently on the documents you need for your three o’clock meeting or be right in the middle of composing
a lengthy email describing the highlights of your previous business trip, and your Windows notebook will
freeze, suddenly shut down, or reboot itself. Or perhaps your Web browsing is halted by an unexpected blue
screen bearing an ominously lengthy error message.
Unfortunately, these common errors could be the result of several different issues, so it can be difficult to
pinpoint the cause of a failure. But luckily there are also many common solutions that often yield positive re-
sults. Next time your notebook experiences an error, remember these tips.

Notebook With A Blue Screen ample, an attached external hard drive left on be-
The cryptic error message on a BSOD (blue fore the notebook powered up may cause a blue
screen of death) can make it difficult to determine screen at startup; you have to wait as Windows
the problem’s origin. But the BSOD, also called a scans the external drive before completing startup.
stop error, is actually a safeguard. When Windows Restarting the notebook will often solve
detects a serious problem, it stops what it’s doing the issue. However, if a particular BSOD error ap-
and reverts to a blue screen to protect your OS pears repeatedly, write down the stop error mes-
from damage. Most often, Windows will display sage, such as “STOP: 0x0000007E.” This will tell
the error when there is a hardware issue or a con- you which error has occurred so you can
flict with device drivers. It doesn’t always mean investigate a solution at Microsoft Help And
serious trouble, but it slows you down; for ex- Support (support.microsoft .com).

72 October 2010 / www.pctoday.com


B U S I N E S S T R AV E L 9 1 1
ON-THE-GO TECH SUPPORT

Spontaneous Reboot or Shutdown for five to 10 seconds until your notebook turns off. Back To Normal
Without warning, your notebook may reboot itself When you start your notebook once again, chances ▲ If your notebook
or shut down completely. Although numerous issues are everything will run smoothly. problems persist, you’ll
obviously have to resort
could be the cause, there are three common possibili- If the freeze occurs each time you open a specific
to consulting your
ties. First, if you or your IT staff upgraded the hard- program, make sure you have installed any up-
IT staff, local computer
ware in your notebook, some components may be dates or patches that the program might need. If a repair store, or the
incompatible, causing the system to shut down to program is out-of-date, it may cause your notebook manufacturer. But take
avoid damage. You or your IT staff may try re- to freeze each time you open it because it is incom- heart: Unless your
notebook has undergone
moving or replacing a newly installed component to patible with another program or the OS. If a spe-
physical duress or your
see if the shutdown error persists. If you are certain cific program doesn’t seem to be causing the
hard drive has become
that the failure is not hardware-related, check to problem, try defragmenting your hard drive. damaged, your data is
make sure that the air intake fans are not impeded. Defragmenting combines fragmented files and most likely retrievable.
Blocked fans decrease the amount of cool airflow into cleans up your hard drive so that your notebook
your notebook, and if the computer gets too hot, it can access files faster. If it takes less effort to find
will shut itself down as a precautionary measure to and access files, your notebook will use a smaller
prevent component damage. amount of its memory capacity and thereby gain
Automatic reboots or shutdowns could also be the ability to perform more actions simultane-
the result of a virus. If you have an antivirus pro- ously. If your notebook still suffers from regular
gram installed on your notebook, make sure it is freezes, notify your IT department; you may
up-to-date and then run a full scan of the hard need to reinstall the OS.
drive. If you don’t have an antivirus program, buy
one or download a free program such as AVG Free Inability To Shut Down
Anti-Virus (free.avg.com). Once your antivirus pro- The inability to turn off a notebook is often
gram is ready to go, run a full scan to search for caused by a software (not hardware) error. A
any malware. When the scan is complete, follow program may be unable to close, and because
the program’s instructions to remove or quarantine it’s still running, Windows can’t exit. If your
any discovered malware. notebook refuses to turn off each time you shut
down, begin by determining which program ▲ You can use the Task
Frozen Notebook might be causing the problem. Note any “end pro- Manager to diagnose a
gram” or “program not responding” messages or problematic program.
You’re undoubtedly familiar with this scenario:
Things are going fine with your notebook when press CTRL-ALT-DELETE to check the Task Mana-
suddenly you can’t switch between multiple appli- ger for programs running in the background.
cations or a program hangs when you try to open If you recently made a change
it. The mouse and keyboard may or may not re- to that program, make sure that
spond, and you usually have to restart the com- updates aren’t available for the
puter, which is an inconvenience that can turn into program. Otherwise try System
a disaster if you haven’t saved your work. Restore to return your PC to the
Freezes are often the result of memory overload. state it was in prior to the
The memory in your notebook has a certain capacity, change. To do this in Windows 7,
and if there are too many processes running simulta- click Start, type system restore,
neously, your notebook may freeze because it can’t click System Restore; in Win-
keep up. Malware is a common culprit in causing dows Vista, click Start, Control
freezes, and sometimes two programs in conflict Panel, System And Maintenance,
with each other can freeze your computer, especially Backup And Restore Center, and ▲ With the Add And
if the computer doesn’t have sufficient processing Restore Computer; in Windows XP, click Start, All Remove Programs
power or memory. If the keyboard or mouse is re- Programs, Accessories, System Tools, and System feature in Windows, you
can determine which
sponsive, start troubleshooting by pressing CTRL- Restore. If the problem persists, you may have to
program is causing an
ALT-DELETE. Enter the Task Manager and end the remove the program. error by removing it and
program you believe may have caused the freeze To uninstall a program in Vista, click Start, seeing if the problem is
(usually the last you attempted to open). A problem- Control Panel, and Uninstall A Program to get resolved.
atic application name may be labeled “not re- started; in WinXP, click Start, Control Panel, and
sponding,” which helps you identify which program choose Add Or Remove Programs. Locate the ap-
is causing the trouble. If the keyboard or mouse does propriate program in the list and choose Remove.
not respond, you may have to perform a hard (aka Don’t remove a program unless you have the exe-
cold) shutdown by holding down the power button cutable file or the installation discs on hand. ▲

PC Today / October 2010 73


B U S I N E S S T R AV E L 9 1 1
ON-THE-GO TECH SUPPORT

Revive A Dead
Smartphone Emergency CPR Techniques

What should you do when your smartphone decides to play dead?


Resist the urge to throw it against the nearest wall and try one of these techniques instead.

Soft Reset HTC FUZE, Touch Cruise, Touch Diamond.


All phones have a soft reset function, which Insert the tip of the phone’s stylus into the reset
is similar to restarting your computer. Beware hole on the bottom of the device.
that performing a soft reset will cause you to lose HTC HD2, Touch Pro, Touch Pro2. Use a small
any data that you don’t have saved, but you object, such as a toothpick or stylus, to press the
will retain information previously stored on reset button, located below the battery and SIM
your smartphone. card slot.
T-Mobile G1. With the G1 powered off, hold iPhone (all models). Press and hold the Sleep/
the Home and End keys simultaneously. When you Wake button on the top of the iPhone and the
see a triangle with an exclamation point, press the Home button. Continue to hold both buttons (ap-
Home and Back keys. proximately 10 seconds) until the screen goes
Motorola Backflip. Power the phone off. blank. You will see the white Apple logo as the
Remove and reinsert the battery, and then power iPhone reboots.
the phone back on. Nokia (all models). Power the phone off and
Android (Other). All remaining Android remove the battery for 30 seconds. Reinstall the
models use a simple power cycle to perform a battery and power the phone on. Alternately, you
soft reset. Just turn the phone off and then back can enter the code *#7380# and select Yes.
on again. Palm Pre. If the phone’s menus are still active, se-
BlackBerry (QWERTY keyboard). Press and lect Device Info, Reset Options, and then select Soft
hold the ALT-CAP-Delete key combination. The Reset. If the Palm Pre is locked up or frozen, hold the
display goes black for a second, and your power button and cycle the ringer button on and off
BlackBerry resets. three times. If that doesn’t work, press and hold the
BlackBerry (SureType keyboard). Press the Orange, Sym, and R keys until the device reboots.
ALT-CAP and Right Shift-Delete keys. When the Turn the phone off, remove the battery for 10 sec-
screen goes blank, release the keys. onds, reinstall the battery, and power the phone up.
BlackBerry (touchscreen). Turn the Black- Palm Centro and Treo. Press and hold the
Berry off and remove the battery for at least 30 Power/End key. Remove the battery from the
seconds. Reinstall the battery and turn the de- phone for 30 seconds and then reinstall the battery
vice back on. and power on your phone.

74 October 2010 / www.pctoday.com


B U S I N E S S T R AV E L 9 1 1
ON-THE-GO TECH SUPPORT

All other smartphones. You can generally per- BlackBerry (all models). Remove the battery
form a soft reset by powering the phone off, re- for 30 seconds. Reinstall the battery and turn the
moving the battery for 30 seconds, and powering phone back on.
the phone back on. HTC FUZE. With the device turned on, press
and hold the Left and Right soft keys. While holding
Hard Reset the keys, use the stylus to press and hold the Reset
A hard reset is a last-ditch option that returns button on the bottom of the device near the USB
your phone to its factory settings, which means port. Text on the display will ask you to confirm
you will lose all the data and installed appli- the reset.
cations. Before performing a hard reset, you will HTC HD2. With the device powered off, press
want to remove the memory card from your and hold the Volume Up and Volume Down but-
phone; that way, you can recover data from tons. With the volume buttons depressed, press and
the card later. release the End/Power button. When a warning ▲ Don’t worry if it takes
Android (all models with functioning menu message displays, release the volume buttons. Next, your BlackBerry several
systems). One of the following menu-based sys- press the Volume Up button to perform the reset. minutes to start up after
tems for performing a hard reset should work, de- Pressing any other button cancels the reset. a reset; this is normal.
pending on the phone and version of Android. HTC Touch Pro, Touch Pro2, Touch Diamond.
Open the application menu. Tap Settings, SD With the device turned on, press and hold the
and Card Storage, Factory Data Reset, and follow Volume Down and Enter buttons. While holding
the on-screen instructions. the keys, use the stylus to press the Reset button,
From the Home screen, tap Menu, Settings, located under the battery cover. Continue to hold
Privacy, and Factory Data Reset, and then follow the Volume Down and Enter keys until a warning
the on-screen instructions. message displays. Release the Volume Down and
From the Home screen, tap Menu, Settings, Enter keys, and then press the Volume Up key to
Security, and Factory Data Reset, and then follow reset the phone. Pressing any other button cancels
the on-screen instructions. the reset.
When the menu system isn’t functional, follow iPhone (all models). From the Home screen,
these phone-specific options to perform a hard reset. tap Settings, General, Reset, and Reset All Settings.
Google Nexus One. Turn your phone off. Next, This action resets all preferences but retains ap-
hold the Volume Down button and press the plications and data. If that doesn’t work, from the
Power button. Use the Volume Down button to se- Home screen, tap Settings, General, Reset, Erase ▲ The hard reset and
lect Clear Storage from the list of options. Press All Content, and Settings. This will delete all soft reset procedures are
the Power button and confirm your selection by data and applications and return the iPhone to fac- the same for all iPhones.
pressing the Volume Up button. tory conditions.
T-Mobile G1. With the G1 powered off, press and Nokia (all models). With your phone powered
hold the Home-End keys until you see a triangle on or in standby mode, type *#7370# and select Yes
with an exclamation point. Open the QWERTY key- when prompted. You may need your Lock Code for
board and press ALT-W. confirmation. The default lock code is 12345.
Motorola Droid. Turn the phone off. Press and If your phone doesn’t turn on, try pressing the
hold the Power-X keys to force the phone into re- On/Off button, *, and 3 simultaneously.
covery mode. Next, press and hold the Volume Up- Palm Pre. Open Device Info, tap Phone Reset
Camera key to display the recovery menu. Select Options, and then tap Full Erase twice. If your
Wipe Data/Factory Reset from the menu, and then Palm Pre is frozen and you’re unable to use the
select Reboot Phone. menus to perform a reset, try running the latest
Motorola Backflip. Power the phone off. Press version of webOS Doctor (www.palm.com/us
and hold the Power and Camera buttons. When /support/downloads/pre/recoverytool/webos
the phone turns on, you need to release the _java_sprint) to troubleshoot and reset the device.
Power button but continue to hold the camera Follow the on-screen instructions.
button until prompted to release it. Next, press Palm Centro and Treo. Press and hold the
▲ If your Nokia smart-
the Volume Down button. After 15 seconds, a Power On/Off button. While holding the button,
phone doesn’t turn on
yellow triangle with an exclamation point will remove the battery, wait 10 seconds, and then rein- after you perform a hard
appear. With your phone closed, tap the bottom- stall the battery. Continue to hold the Power button reset, try pressing the
right corner of the display, and select Wipe until you see the Palm Powered screen. Release the On/Off button, *, and
Data/Factory Reset. Press OK and follow the on- Power button. When the screen displays the “Erase 3 simultaneously.
screen instructions. all data?” query, press the Up button. ▲

PC Today / October 2010 75


B U S I N E S S T R AV E L 9 1 1
ON-THE-GO TECH SUPPORT

Spirit Airlines

The Traveler’s www.spiritair.com


(800) 772-7117

911 Directory US Airways


www.usairways.com
Reservations to U.S. and Canada
destinations (800) 428-4322

AIRLINES Reservations to U.S. and Mexico


destinations (800) 523-3273
Reservations to international
destinations (800) 622-1015
Reservations to international TDD (800) 245-2966
Air Canada destinations (800) 231-0856 Customer service (800) 943-5436
www.aircanada.com TDD (800) 343-9195
Information and reservations Flight information (800) 784-4444 United Airlines
(888)247-2262 Baggage information www.united.com
Baggage information (800) 335-2247 www.ua2go.com (mobile)
(888)689-2247 OnePass frequent flyer Reservations (800) 864-8331
assistance (713) 952-1630 International reservations
American Airlines (800) 538-2929
www.aa.com; mobile.aa.com Delta Air Lines TDD (800) 323-0170
Reservations (800) 433-7300 www.delta.com
TDD (800) 543-1586 mobile.delta.com
Flight information (800) 223-5436
Baggage delayed less than five
Reservations (800) 221-1212
Flight information (800) 325-1999
VEHICLE
days (800) 535-5225
Ticket refund requests
Baggage information RENTALS
(800) 325-8224
(918) 254-3777 SkyMiles members Advantage Rent A Car
(800) 323-2323 www.advantage.com
British Airways Reservations (866) 661-2722 or
www.britishairways.com Frontier Airlines (210) 344-4712 outside the U.S.
ba2go.com (mobile) www.frontierairlines.com Customer service
Information and reservations Reservations (800) 432-1359 (800) 777-5524
(800) 247-9297 Customer relations
(800) 265-5505 Alamo Rent A Car
Continental Airlines www.alamo.com
www.continental.com JetBlue Airways (800) 462-5266
pda.continental.com www.jetblue.com TDD (800) 522-9292
mobile.jetblue.com (800) 538-2583
Avis
Lufthansa www.avis.com
www.lufthansa.com mobile.avis.com
mobile.lufthansa.com Reservations (800) 331-1212
Information and reservations TDD (800) 331-2323
(800) 399-5838 Customer service (800) 352-7900

Midwest Airlines Budget Rent A Car System


www.midwestairlines.com www.budget.com
Reservations (800) 452-2022 mobile.budget.com
TDD (800) 872-3608 Reservations in the U.S.
(800) 527-0700
Southwest Airlines Reservations outside the U.S.
www.southwest.com (800) 472-3325
mobile.southwest.com TDD (800) 826-5510
(800) 435-9792 Roadside assistance (800) 354-2847
TDD (800) 533-1305 Customer service (800) 214-6094

76 October 2010 / www.pctoday.com


B U S I N E S S T R AV E L 9 1 1
ON-THE-GO TECH SUPPORT

Dollar Rent A Car Hotwire mobile.crowneplaza.com Hyatt Summerfield Suites


www.dollar.com www.hotwire.com (877) 227-6963 (866) 974-9288
Reservations (800) 800-3665 (866) 468-9473
Reservations outside the U.S. OCS (Overseas Citizens Doubletree Hotels Marriott
(800) 800-6000 Services) traveler’s hotline www.doubletree.com www.marriott.com
TDD (800) 232-3301 (202) 647-5225 or doubletree.mobi marriott.mobi
24-hour roadside assistance (888) 407-4747 (800) 222-8733 (888) 236-2427
(800) 235-9393 After-hours emergencies
(202) 647-4000 Embassy Suites Hotels Radisson Hotels & Resorts
Enterprise Rent-A-Car www.embassysuites.com www.radisson.com
www.enterprise.com Orbitz embassysuites.mobi (888) 201-1718
Reservations (800) 261-7331 www.orbitz.com (800) 362-2779
TDD (866) 534-9270 mobile.orbitz.com Ramada Worldwide
(888) 656-4546 Four Seasons www.ramada.com
Hertz Hotels & Resorts (800) 272-6232
www.hertz.com Priceline www.fourseasons.com
hertz.mobi www.priceline.com mobile.fourseasons.com Renaissance
Reservations (800) 654-3131 priceline.mobi (800) 819-5053 Hotels & Resorts
Reservations outside the U.S. (800) 774-2354 www.renaissancehotel.com
(800) 654-3001 Hampton Inn Hotels & Suites (888) 236-2427
TDD (800) 654-2280 Travelocity www.hamptoninn.com
Extend rental (800) 654-4174 www.travelocity.com hamptoninn.mobi Residence Inn
Billing information mobile.travelocity.com (800) 426-7866 www.residenceinn.com
(800) 654-4173 (888) 872-8356 residenceinn.mobi
Customer relations Hawthorn Suites (888) 236-2427
(888) 777-6095 www.hawthorn.com
HOTELS (800) 527-1133 Ritz-Carlton
National Car Rental Hotels & Resorts
www.nationalcar.com Candlewood Suites Hilton Hotels www.ritzcarlton.com
(800) 227-7368 www.candlewoodsuites.com www.hilton.com (800) 542-8680
TDD (800) 328-6323 mobile.candlewoodsuites.com hilton.mobi
(888) 226-3539 (800) 445-8667 Sheraton Hotels & Resorts
Payless Car Rental www.sheraton.com
www.paylesscarrental.com Chase Suite Hotels (800) 325-3535
Holiday Inn
(800) 729-5377 www.woodfinsuitehotels.com
www.holidayinn.com
(800) 966-3346 Staybridge Suites
mobile.holidayinn.com
Thrifty Car Rental www.staybridge.com
(888) 465-4329
www.thrifty.com Choice Hotels International mobile.staybridge.com
Reservations (800) 847-4389 (Cambria Suites, Comfort (877) 238-8889
Inn, Comfort Suites, Holiday Inn Express
Emergency (877) 283-0898
Quality Inn, Sleep Inn, www.hiexpress.com Westin Hotels & Resorts
Clarion, MainStay Suites, mobile.hiexpress.com www.westin.com
(888) 465-4329
TRAVEL Suburban Extended Stay
Hotel, Econo Lodge, and
(800) 937-8461

SERVICES Rodeway Inn) Homewood Suites Wingate Inns


www.choicehotels.com www.homewoodsuites.com www.wingateinns.com
AAA (877) 424-6423 homewoodsuites.mobi (800) 228-1000
www.aaa.com (800) 225-5466
aaa.mobi Courtyard Hotels Wyndham Hotels & Resorts
Roadside assistance www.courtyard.com Hyatt Hotels & Resorts www.wyndham.com
(800) 222-4357 courtyard.mobi www.hyatt.com (877) 999-3223
(888) 236-2427 Hyatt Hotels & Resorts
Expedia (888) 591-1234 Woodfin Suite Hotels
www.expedia.com Crowne Plaza Hotels & Resorts TDD (800) 228-9548 www.woodfinsuitehotels.com
(800) 397-3342 www.crowneplaza.com Hyatt Place (888) 492-8847 (800) 966-3346

PC Today / October 2010 77


Happy
Trails
I n t r i g u i n g G e a r, N e w & A r o u n d Th e B e n d
by Joanna Clay

Rugged Design Meets Fresh OS


■ Motorola is offering its “virtually lifeproof” Android smartphone to
a European audience very soon. The new Motorola Defy is dustproof,
and water- and scratch-resistant, so you can do business from your mo-
bile handset with more confidence in its durable design. In addition to
these physical defenses, the Defy meets the IP67 standard, which in-
creases the phone’s degree of exterior protection. Powered by an
800MHz OMAP 3610 chip, the Defy runs on the Android 2.1 OS (aka
Éclair) and is enhanced with the MOTOBLUR interface, a feature that
automatically and continually syncs your social media posts, texts,
emails, and messages. The Defy’s 5MP digital zoom camera features
autofocus, an LED flash, real-time color effects, scene modes, and geo
tags. In terms of connectivity, this model supports Bluetooth 2.1, Wi-Fi
802.11b/g/n, WCDMA/HSDPA (900/2100MHz) and quad-band
GSM/EDGE networks. T-Mobile customers in the U.S. will be able
to purchase the Defy in time for the holidays.

An HD GPS Knows Best


■ Though only available in Europe at press time, the TomTom GO
LIVE GPS unit is going HD. Featuring HD Traffic information (free for
one year) that is intended to provide up-to-date traffic data based on
the LIVE Services bundle, TomTom announced two GO LIVE models,
the smaller 1000 and the 1005 with a 5-inch display. TomTom’s LIVE
Services include Speed Cameras (traffic cam-based alerts), Google
Local Search, and TomTom Weather. The Fluid Touch capacitive dis-
play should make navigating the interface easier because it rapidly re-
sponds to a tip-of-the-finger, feathery touch. When you’re packing the
TomTom GO LIVE in your carry-on, you can undock from your car
windshield using the Easy Click magnetic mount. TomTom has yet to
launch the 1000 or 1005 in the U.S.

78 October 2010 / www.pctoday.com

Das könnte Ihnen auch gefallen