Showing posts with label mobile. Show all posts
Showing posts with label mobile. Show all posts

Thursday, March 22, 2012

The New Mobile Landscapehome remodeling, Is Free Public Wi-Fi Safe? Keep Your Data Safe When Telecommuting.


The word "convergence" ( home remodeling ) won't mean quite the same thing to the next generation as it does to us. ( home remodeling ) That's because kids today will come of age in a time when phones were used to play video games, ( home remodeling ) computers could double as a private movie house, ( home remodeling ) and televisions were flipped on to browse the Web. Unlike us, they'll be living in a world where "ubiquity" is the word -- surrounded by devices. ( home remodeling )

Paring Down ( home remodeling )

The most interesting development of the ubiquity ( home remodeling ) age isn't that we're surrounded by screens and able to connect to the Internet in myriad ways, ( home remodeling ) from smartphones to televisions to tablets. Most fascinating is that no one device serves as the ultimate Swiss Army Knife, ( home remodeling ) acting as a substitute for all the rest.

Rather, we collect these devices the way golfers keep clubs. On the go, we check movie times on mobile phones. On the couch, we research that movie on a laptop PC or tablet, or we play a game of "Words With Friends" while our significant other watches the big game. Rather than seek a one-size-fits-all ( home remodeling ) solution for computing, consumer behavior indicates that there's a time and a place for every kind of screen. ( home remodeling )

All these screens mean that portability and power are both becoming major considerations. ( home remodeling ) Laptop shipments exceeded that of desktops in 2008, ( home remodeling ) and high-end "desktop replacements"  ( home remodeling )-- notebooks with large screens and enough horsepower to handle any computing task - ( home remodeling )- became the primary computers for many consumers. ( home remodeling ) And a new designation, the netbook, sought to lower the barrier of entry to mobile computing by offering compact laptop PCs at a fraction of the price.

New Device: Ultrabooks ( home remodeling )

Now, ( home remodeling ) there's a new category of portable PC ( home remodeling ) to compete with the upstart tablet PC ( home remodeling ) and other flavors of laptop ( home remodeling ). The ultrabook format is light, thin, fast and portable -- an antidote to the traditional laptop PC. Ultrabook PCs are less than .08 inch thick, ( home remodeling ) weigh around 3.1 ( home remodeling ) pounds and have a battery life of five to eight hours.

" ( home remodeling )The ultrabook is much more than just a product segment," ( home remodeling ) says Jim Wong, president of Acer Inc. "It's a new trend that will become the mainstream for mobile PCs." ( home remodeling )

The model for this new kind of laptop ( home remodeling ) is Apple's MacBook Air, which was introduced in 2008. ( home remodeling ) Apple sold 1.1 million units of their super-thin laptop, and they managed this feat at premium pricing. The next phase of the ultrabook ( home remodeling ) device is to build major appeal by offering similar benefits to Apple's machine at a consumer-friendly price. ( home remodeling )

Toshiba's Portege Z835, ( home remodeling ) which debuted in November of last year, dipped in price to $699 (after a $200 rebate) at Best Buy. Competing ultrabooks include the Hewlett-Packard Folio 13 and the Acer Aspire S3, which both run for about $900. The entry-level MacBook Air is $999. ( home remodeling )

Early Buzz ( home remodeling )

Initial reception to the new ultrabooks is positive ( home remodeling ). Rob Beschizza of Boing Boing called the new ASUS ZENBOOK  ( home remodeling )"very good," but he cautions against laptops that try to adopt the ultrabook ( home remodeling ) moniker but stray from the design specs that make the new class of computers so attractive in the first place. ( home remodeling )

Dilip Bhatia ( home remodeling ), vice president of Lenovo's ( home remodeling ) ThinkPad business unit, is excited about his company's contribution to the field. "The ThinkPad X1 Hybrid and T430u ultrabooks represent the next generation in thin and light computing, ( home remodeling)" he says. " ( home remodeling )From small businesses that literally live on the road to corporate professionals working in a managed environment, ( home remodeling ) these new crossover laptops fundamentally change the way people think about mobile computing technology." ( home remodeling )

Matt McRae, ( home remodeling ) Vizio's ( home remodeling ) chief technology ( home remodeling ) officer, recently told Business Week that his company's entry in the ultrabook game was meant to shake things up: "It's very similar to TV - ( home remodeling )- we want to get in there and disrupt it," says McRae. "We think most PCs have been designed for the small-business users, ( home remodeling ) that others have not done a very good job of making them entertainment devices. ( home remodeling )

With all the new ultrabook ( home remodeling ) models that appeared at CES recently, it's now just a matter of discovering just how the ultrabook ( home remodeling ) will find its place in our lives next to the televisions, tablets, smartphones and desktops many consumers already have. ( home remodeling ) Nobody could have predicted this 10 years ago, ( home remodeling ) but it seems pretty clear: There's still plenty of room for this light, new computing upstart. ( home remodeling )
If you work remotely or travel a lot for your job, ( home remodeling ) you probably take advantage of free public Wi-Fi ( home remodeling ) often.

Unfortunately, that probably means you're regularly opening up your devices and your data to serious security threats. And if you're a heavy user of cloud services, which often store your data on a remote server rather than your computer, Wi-Fi ( home remodeling ) security is even more crucial.

Most people these days have password-protected networks at home,  ( home remodeling )so it's unlikely that anybody is able to snoop on your data as it passes between your device and your router. But when you're surfing the Web via a free public Wi-Fi ( home remodeling ) at a cafe, library or airport, you should be suspicious of everyone, says technology consultant Leo Notenboom ( home remodeling ) of Ask-Leo.com ( home remodeling ). "It's trivially easy for any of them to be watching your unencrypted information flying by."home remodeling

Here's what you need to know to stay safe next time you're surfing on a free public Wi-Fi ( home remodeling ) connection.

Free Public Wi-Fi ( home remodeling ) Tip No. 1: Turn on your firewall. ( home remodeling )

The cafe might use firewall software to protect your computer from outside attacks, but that doesn't protect you from other people surfing around the same Wi-Fi ( home remodeling ) network inside the cafe. Be sure your computer's firewall is turned on. ( macbook pro apple )

Free Public Wi-Fi ( home remodeling ) Tip No. 2: Protect your smartphone or tablet. ( home remodeling )

If your smartphone or tablet connects to Wi-Fi ( home remodeling ) networks, require it to ask your permission before joining any network. A lot of people never change the default network name, so if you logged on to your friend's "linksys" ( home remodeling ) network, your device will remember that and could automatically join any network of the same name in the future - ( home remodeling )- unless you tell it to ask your permission first.

Free Public Wi-Fi ( home remodeling ) Tip No. 3: Use strong encryption. ( home remodeling )

Encryption works by disguising data that your computer wirelessly sends to a router. ( home remodeling ) Without it, that person sitting near you at the cafe could use special software to intercept and see all the data that travels back and forth between your device and the router. ( home remodeling ) And that means everything: emails, passwords and things you search for. That's why it's imperative, says Notenboom, to use encrypted sites when possible. ( home remodeling )

How do you know when a site offers encryption?  ( home remodeling )Instead of "http" ( home remodeling ) at the beginning of the address, you'll see "https. ( home remodeling )" You'll also see a little padlock icon in your browser window, usually on the bottom right. ( home remodeling )

What else should you consider encrypting? ( home remodeling )

Your email. ( home remodeling )

If you use a locally installed email program such as Outlook or Entourage ( home remodeling ), you can protect your mail and passwords by using something called SSL (secure sockets layer ( home remodeling )) on each of your accounts. This encrypts all your data when you send and receive email. Not all email providers allow the use of SSL ( home remodeling ), though, so check your provider's help page.

Your Facebook ( home remodeling ) and Twitter pages ( home remodeling )

Facebook ( home remodeling ) and Twitter recently began offering encrypted sessions; just go into your account settings and find the option that says "Always use https."home remodeling

Your Google search ( home remodeling )

If you think the keywords you're searching could be embarrassing or you prefer to keep your privacy, try the secure version of Google search. Instead of going to Google.com ( home remodeling ), do all of your searching at Encrypted.Google.com. ( home remodeling )

Everything ( home remodeling )

Consider a VPN ( home remodeling ) service. VPN ( home remodeling ) stands for virtual private network and encrypts everything you send and receive. You can download free mobile VPN ( home remodeling ) software from such a site as Hotspot Shield and everything - ( home remodeling )- instant messages, passwords, emails and websites - ( home remodeling )- will be virtually impenetrable to prying eyes whenever you're using a free public Wi-Fi connection. Or if your employer offers its own VPN ( home remodeling ), always connect to it through your computer or mobile device.

"That guy in the corner of Starbucks with his laptop - ( home remodeling )- do you trust him with your private data?" asks Notenboom. Follow these Wi-Fi safety tips, and you won't ever have to ever wonder.
Thanks to the Web ( home remodeling ), more and more people are working remotely - ( home remodeling )- from home or anywhere.  ( home remodeling )But not commuting anymore doesn't mean you don't have the same security issues that your corporate-office counterparts do. ( home remodeling )

Here's how to protect your data, devices and computer without an IT department: ( home remodeling )

1.  ( home remodeling )Back up your data in the cloud. ( home remodeling )

It's easy to lose all your work: ( home remodeling ) One computer virus or hard-disk-drive meltdown ( home remodeling ), and your important files may vanish forever. That's why, when working from home, backup is crucial. Instead of depending on bulky hardware, try the many cloud services on the Web. They back up new content every night while you sleep, ( home remodeling ) keeping your files safe and allowing you access from any computer at any time. ( home remodeling )

"Backup used to be cost-prohibitive, ( home remodeling )" says Phil Montero, founder and CEO ( home remodeling ) of an online resource called You Can Work From Anywhere. But these days, many online services charge as little as $50 per year, ( home remodeling ) depending on your needs. Mozy even offers certain amounts of backup for free. ( home remodeling ) If you're only backing up documents, Google Docs is another good bet. ( home remodeling )

2.  ( home remodeling )Protect your computer and critical files ( home remodeling )

If your employer issues you a PC ( home remodeling ) or laptop ( home remodeling ) to use at home, they'll often install security software or a Web-based security service to block viruses or bar hackers. But if you are self-employed ( home remodeling ), the burden of protecting your computer and data from the increasing array of online security threats falls squarely on your shoulders. ( home remodeling )

When choosing a cloud-based ( home remodeling ) security service, be sure it protects your computer with antivirus, spyware and firewall programs. It should also constantly updates to protect you against evolving threats.

You should also limit your family members' access to your work computer.  ( home remodeling )"You have to be sure that the really critical stuff isn't made accessible to someone who shouldn't have access to it," says Jack M. Nilles ( home remodeling ), founder of JALA ( home remodeling ) International, a global telecommuting consulting company. ( home remodeling ) "That includes the kids getting on your computer and downloading something [harmful]."

Finally, keep passwords and ID ( home remodeling ) numbers private so they don't fall into the wrong hands. ( home remodeling )

3.  ( home remodeling )Seamlessly collaborate with others ( home remodeling )

Whether you work on your home computer ( home remodeling ) once a week or full time, ( home remodeling ) if you need to share files with colleagues, ( home remodeling ) synchronization tools can help ensure you (or your team) are working on the correct or latest version of a document ( home remodeling ). The "old" way to do this was to copy the files from your home computer onto an external hard drive,  ( home remodeling )CD or thumb drive and install them on your work computer ( home remodeling ). But this process sets you up for accidentally writing over the most recent files - ( home remodeling )- and what if this external backup device you were depending on is destroyed or lost? ( home remodeling )

Cloud services enable you to sync automatically to ensure speedy backups. ( home remodeling ) Or try Microsoft's FolderShare ( home remodeling ), which allows you to synchronize files with colleagues over the Web. (home remodeling )

There's no doubt to the benefits of Web to the home office worker ( home remodeling ). That said, you want to be smart about security issues. ( home remodeling ) To really cover your bases, in addition to backing up and securing your data,  ( home remodeling )Niles also says it's important to get a clear protocol from your company or clients: ( home remodeling )

" ( home remodeling )We recommend that telecommuters working for a company have a formal agreement specifically stating who is responsible for what. ( home remodeling )" This way, you can always fall back on the agreed-upon security plan for your best-quality ( home remodeling ) work away from your IT ( home remodeling ) department. ( home remodeling )

Tuesday, March 20, 2012

The New Mobile Landscapemacbook pro apple, Is Free Public Wi-Fi Safe? Keep Your Data Safe When Telecommuting.


The word "convergence" ( macbook pro apple ) won't mean quite the same thing to the next generation as it does to us. ( macbook pro apple ) That's because kids today will come of age in a time when phones were used to play video games, ( macbook pro apple ) computers could double as a private movie house, ( macbook pro apple ) and televisions were flipped on to browse the Web. Unlike us, they'll be living in a world where "ubiquity" is the word -- surrounded by devices. ( macbook pro apple )

Paring Down ( macbook pro apple )

The most interesting development of the ubiquity ( macbook pro apple ) age isn't that we're surrounded by screens and able to connect to the Internet in myriad ways, ( macbook pro apple ) from smartphones to televisions to tablets. Most fascinating is that no one device serves as the ultimate Swiss Army Knife, ( macbook pro apple ) acting as a substitute for all the rest.

Rather, we collect these devices the way golfers keep clubs. On the go, we check movie times on mobile phones. On the couch, we research that movie on a laptop PC or tablet, or we play a game of "Words With Friends" while our significant other watches the big game. Rather than seek a one-size-fits-all ( macbook pro apple ) solution for computing, consumer behavior indicates that there's a time and a place for every kind of screen. ( macbook pro apple )

All these screens mean that portability and power are both becoming major considerations. ( macbook pro apple ) Laptop shipments exceeded that of desktops in 2008, ( macbook pro apple ) and high-end "desktop replacements"  ( macbook pro apple )-- notebooks with large screens and enough horsepower to handle any computing task - ( macbook pro apple )- became the primary computers for many consumers. ( macbook pro apple ) And a new designation, the netbook, sought to lower the barrier of entry to mobile computing by offering compact laptop PCs at a fraction of the price.

New Device: Ultrabooks ( macbook pro apple )

Now, ( macbook pro apple ) there's a new category of portable PC ( macbook pro apple ) to compete with the upstart tablet PC ( macbook pro apple ) and other flavors of laptop ( macbook pro apple ). The ultrabook format is light, thin, fast and portable -- an antidote to the traditional laptop PC. Ultrabook PCs are less than .08 inch thick, ( macbook pro apple ) weigh around 3.1 ( macbook pro apple ) pounds and have a battery life of five to eight hours.

" ( macbook pro apple )The ultrabook is much more than just a product segment," ( macbook pro apple ) says Jim Wong, president of Acer Inc. "It's a new trend that will become the mainstream for mobile PCs." (macbook pro apple )

The model for this new kind of laptop ( macbook pro apple ) is Apple's MacBook Air, which was introduced in 2008. ( macbook pro apple ) Apple sold 1.1 million units of their super-thin laptop, and they managed this feat at premium pricing. The next phase of the ultrabook ( macbook pro apple ) device is to build major appeal by offering similar benefits to Apple's machine at a consumer-friendly price. ( macbook pro apple )

Toshiba's Portege Z835, ( macbook pro apple ) which debuted in November of last year, dipped in price to $699 (after a $200 rebate) at Best Buy. Competing ultrabooks include the Hewlett-Packard Folio 13 and the Acer Aspire S3, which both run for about $900. The entry-level MacBook Air is $999. ( macbook pro apple )

Early Buzz ( macbook pro apple )

Initial reception to the new ultrabooks is positive ( macbook pro apple ). Rob Beschizza of Boing Boing called the new ASUS ZENBOOK  ( macbook pro apple )"very good," but he cautions against laptops that try to adopt the ultrabook ( macbook pro apple ) moniker but stray from the design specs that make the new class of computers so attractive in the first place. ( macbook pro apple )

Dilip Bhatia ( macbook pro apple ), vice president of Lenovo's ( macbook pro apple ) ThinkPad business unit, is excited about his company's contribution to the field. "The ThinkPad X1 Hybrid and T430u ultrabooks represent the next generation in thin and light computing, ( London macbook pro appleJobs )" he says. " ( macbook pro apple )From small businesses that literally live on the road to corporate professionals working in a managed environment, ( macbook pro apple ) these new crossover laptops fundamentally change the way people think about mobile computing technology." ( macbook pro apple )

Matt McRae, ( macbook pro apple ) Vizio's ( macbook pro apple ) chief technology ( macbook pro apple ) officer, recently told Business Week that his company's entry in the ultrabook game was meant to shake things up: "It's very similar to TV - ( macbook pro apple )- we want to get in there and disrupt it," says McRae. "We think most PCs have been designed for the small-business users, ( macbook pro apple ) that others have not done a very good job of making them entertainment devices. ( macbook pro apple )

With all the new ultrabook ( macbook pro apple ) models that appeared at CES recently, it's now just a matter of discovering just how the ultrabook ( macbook pro apple ) will find its place in our lives next to the televisions, tablets, smartphones and desktops many consumers already have. ( macbook pro apple ) Nobody could have predicted this 10 years ago, ( macbook pro apple ) but it seems pretty clear: There's still plenty of room for this light, new computing upstart. ( macbook pro apple )
If you work remotely or travel a lot for your job, ( macbook pro apple ) you probably take advantage of free public Wi-Fi ( macbook pro apple ) often.

Unfortunately, that probably means you're regularly opening up your devices and your data to serious security threats. And if you're a heavy user of cloud services, which often store your data on a remote server rather than your computer, Wi-Fi ( macbook pro apple ) security is even more crucial.

Most people these days have password-protected networks at home,  ( macbook pro apple )so it's unlikely that anybody is able to snoop on your data as it passes between your device and your router. But when you're surfing the Web via a free public Wi-Fi ( macbook pro apple ) at a cafe, library or airport, you should be suspicious of everyone, says technology consultant Leo Notenboom ( macbook pro apple ) of Ask-Leo.com (macbook pro apple ). "It's trivially easy for any of them to be watching your unencrypted information flying by."macbook pro apple

Here's what you need to know to stay safe next time you're surfing on a free public Wi-Fi ( macbook pro apple ) connection.

Free Public Wi-Fi ( macbook pro apple ) Tip No. 1: Turn on your firewall. ( macbook pro apple )

The cafe might use firewall software to protect your computer from outside attacks, but that doesn't protect you from other people surfing around the same Wi-Fi ( macbook pro apple ) network inside the cafe. Be sure your computer's firewall is turned on. ( macbook pro apple )

Free Public Wi-Fi ( macbook pro apple ) Tip No. 2: Protect your smartphone or tablet. ( macbook pro apple )

If your smartphone or tablet connects to Wi-Fi ( macbook pro apple ) networks, require it to ask your permission before joining any network. A lot of people never change the default network name, so if you logged on to your friend's "linksys" ( macbook pro apple ) network, your device will remember that and could automatically join any network of the same name in the future - ( macbook pro apple )- unless you tell it to ask your permission first.

Free Public Wi-Fi ( macbook pro apple ) Tip No. 3: Use strong encryption. ( macbook pro apple )

Encryption works by disguising data that your computer wirelessly sends to a router. ( macbook pro apple ) Without it, that person sitting near you at the cafe could use special software to intercept and see all the data that travels back and forth between your device and the router. ( macbook pro apple ) And that means everything: emails, passwords and things you search for. That's why it's imperative, says Notenboom, to use encrypted sites when possible. ( macbook pro apple )

How do you know when a site offers encryption?  ( macbook pro apple )Instead of "http" ( macbook pro apple ) at the beginning of the address, you'll see "https. ( macbook pro apple )" You'll also see a little padlock icon in your browser window, usually on the bottom right. ( macbook pro apple )

What else should you consider encrypting? ( macbook pro apple )

Your email. ( macbook pro apple )

If you use a locally installed email program such as Outlook or Entourage ( macbook pro apple ), you can protect your mail and passwords by using something called SSL (secure sockets layer ( macbook pro apple )) on each of your accounts. This encrypts all your data when you send and receive email. Not all email providers allow the use of SSL ( macbook pro apple ), though, so check your provider's help page.

Your Facebook ( macbook pro apple ) and Twitter pages ( macbook pro apple )

Facebook ( macbook pro apple ) and Twitter recently began offering encrypted sessions; just go into your account settings and find the option that says "Always use https."macbook pro apple

Your Google search ( macbook pro apple )

If you think the keywords you're searching could be embarrassing or you prefer to keep your privacy, try the secure version of Google search. Instead of going to Google.com ( macbook pro apple ), do all of your searching at Encrypted.Google.com. ( macbook pro apple )

Everything ( macbook pro apple )

Consider a VPN ( macbook pro apple ) service. VPN ( macbook pro apple ) stands for virtual private network and encrypts everything you send and receive. You can download free mobile VPN ( macbook pro apple ) software from such a site as Hotspot Shield and everything - ( macbook pro apple )- instant messages, passwords, emails and websites - ( macbook pro apple )- will be virtually impenetrable to prying eyes whenever you're using a free public Wi-Fi connection. Or if your employer offers its own VPN ( macbook pro apple ), always connect to it through your computer or mobile device.

"That guy in the corner of Starbucks with his laptop - ( macbook pro apple )- do you trust him with your private data?" asks Notenboom. Follow these Wi-Fi safety tips, and you won't ever have to ever wonder.
Thanks to the Web ( macbook pro apple ), more and more people are working remotely - ( macbook pro apple )- from home or anywhere.  ( macbook pro apple )But not commuting anymore doesn't mean you don't have the same security issues that your corporate-office counterparts do. ( macbook pro apple )

Here's how to protect your data, devices and computer without an IT department: ( macbook pro apple )

1.  ( macbook pro apple )Back up your data in the cloud. ( macbook pro apple )

It's easy to lose all your work: ( macbook pro apple ) One computer virus or hard-disk-drive meltdown ( macbook pro apple ), and your important files may vanish forever. That's why, when working from home, backup is crucial. Instead of depending on bulky hardware, try the many cloud services on the Web. They back up new content every night while you sleep, ( macbook pro apple ) keeping your files safe and allowing you access from any computer at any time. ( macbook pro apple )

"Backup used to be cost-prohibitive, ( macbook pro apple )" says Phil Montero, founder and CEO ( macbook pro apple ) of an online resource called You Can Work From Anywhere. But these days, many online services charge as little as $50 per year, ( macbook pro apple ) depending on your needs. Mozy even offers certain amounts of backup for free. ( macbook pro apple ) If you're only backing up documents, Google Docs is another good bet. ( macbook pro apple )

2.  ( macbook pro apple )Protect your computer and critical files ( macbook pro apple )

If your employer issues you a PC ( macbook pro apple ) or laptop ( macbook pro apple ) to use at home, they'll often install security software or a Web-based security service to block viruses or bar hackers. But if you are self-employed ( macbook pro apple ), the burden of protecting your computer and data from the increasing array of online security threats falls squarely on your shoulders. ( macbook pro apple )

When choosing a cloud-based ( macbook pro apple ) security service, be sure it protects your computer with antivirus, spyware and firewall programs. It should also constantly updates to protect you against evolving threats.

You should also limit your family members' access to your work computer.  ( macbook pro apple )"You have to be sure that the really critical stuff isn't made accessible to someone who shouldn't have access to it," says Jack M. Nilles ( macbook pro apple ), founder of JALA ( macbook pro apple ) International, a global telecommuting consulting company. ( macbook pro apple ) "That includes the kids getting on your computer and downloading something [harmful]."

Finally, keep passwords and ID ( macbook pro apple ) numbers private so they don't fall into the wrong hands. ( macbook pro apple )

3.  ( macbook pro apple )Seamlessly collaborate with others ( macbook pro apple )

Whether you work on your home computer ( macbook pro apple ) once a week or full time, ( macbook pro apple ) if you need to share files with colleagues, ( macbook pro apple ) synchronization tools can help ensure you (or your team) are working on the correct or latest version of a document ( macbook pro apple ). The "old" way to do this was to copy the files from your home computer onto an external hard drive,  ( macbook pro apple )CD or thumb drive and install them on your work computer ( macbook pro apple ). But this process sets you up for accidentally writing over the most recent files - ( macbook pro apple )- and what if this external backup device you were depending on is destroyed or lost? ( macbook pro apple )

Cloud services enable you to sync automatically to ensure speedy backups. ( macbook pro apple ) Or try Microsoft's FolderShare ( macbook pro apple ), which allows you to synchronize files with colleagues over the Web. ( macbook pro apple )

There's no doubt to the benefits of Web to the home office worker ( macbook pro apple ). That said, you want to be smart about security issues. ( macbook pro apple ) To really cover your bases, in addition to backing up and securing your data,  ( macbook pro apple )Niles also says it's important to get a clear protocol from your company or clients: ( macbook pro apple )

" ( macbook pro apple )We recommend that telecommuters working for a company have a formal agreement specifically stating who is responsible for what. ( macbook pro apple )" This way, you can always fall back on the agreed-upon security plan for your best-quality ( macbook pro apple ) work away from your IT ( macbook pro apple ) department. ( macbook pro apple )

Monday, March 19, 2012

The New Mobile Landscapemacbook pro apple, Is Free Public Wi-Fi Safe? Keep Your Data Safe When Telecommuting.


The word "convergence" ( macbook pro apple ) won't mean quite the same thing to the next generation as it does to us. ( macbook pro apple ) That's because kids today will come of age in a time when phones were used to play video games, ( macbook pro apple ) computers could double as a private movie house, ( macbook pro apple ) and televisions were flipped on to browse the Web. Unlike us, they'll be living in a world where "ubiquity" is the word -- surrounded by devices. ( macbook pro apple )

Paring Down ( macbook pro apple )

The most interesting development of the ubiquity ( macbook pro apple ) age isn't that we're surrounded by screens and able to connect to the Internet in myriad ways, ( macbook pro apple ) from smartphones to televisions to tablets. Most fascinating is that no one device serves as the ultimate Swiss Army Knife, ( macbook pro apple ) acting as a substitute for all the rest.

Rather, we collect these devices the way golfers keep clubs. On the go, we check movie times on mobile phones. On the couch, we research that movie on a laptop PC or tablet, or we play a game of "Words With Friends" while our significant other watches the big game. Rather than seek a one-size-fits-all ( macbook pro apple ) solution for computing, consumer behavior indicates that there's a time and a place for every kind of screen. ( macbook pro apple )

All these screens mean that portability and power are both becoming major considerations. ( macbook pro apple ) Laptop shipments exceeded that of desktops in 2008, ( macbook pro apple ) and high-end "desktop replacements"  ( macbook pro apple )-- notebooks with large screens and enough horsepower to handle any computing task - ( macbook pro apple )- became the primary computers for many consumers. ( macbook pro apple ) And a new designation, the netbook, sought to lower the barrier of entry to mobile computing by offering compact laptop PCs at a fraction of the price.

New Device: Ultrabooks ( macbook pro apple )

Now, ( macbook pro apple ) there's a new category of portable PC ( macbook pro apple ) to compete with the upstart tablet PC ( macbook pro apple ) and other flavors of laptop ( macbook pro apple ). The ultrabook format is light, thin, fast and portable -- an antidote to the traditional laptop PC. Ultrabook PCs are less than .08 inch thick, ( macbook pro apple ) weigh around 3.1 ( macbook pro apple ) pounds and have a battery life of five to eight hours.

" ( macbook pro apple )The ultrabook is much more than just a product segment," ( macbook pro apple ) says Jim Wong, president of Acer Inc. "It's a new trend that will become the mainstream for mobile PCs." (macbook pro apple )

The model for this new kind of laptop ( macbook pro apple ) is Apple's MacBook Air, which was introduced in 2008. ( macbook pro apple ) Apple sold 1.1 million units of their super-thin laptop, and they managed this feat at premium pricing. The next phase of the ultrabook ( macbook pro apple ) device is to build major appeal by offering similar benefits to Apple's machine at a consumer-friendly price. ( macbook pro apple )

Toshiba's Portege Z835, ( macbook pro apple ) which debuted in November of last year, dipped in price to $699 (after a $200 rebate) at Best Buy. Competing ultrabooks include the Hewlett-Packard Folio 13 and the Acer Aspire S3, which both run for about $900. The entry-level MacBook Air is $999. ( macbook pro apple )

Early Buzz ( macbook pro apple )

Initial reception to the new ultrabooks is positive ( macbook pro apple ). Rob Beschizza of Boing Boing called the new ASUS ZENBOOK  ( macbook pro apple )"very good," but he cautions against laptops that try to adopt the ultrabook ( macbook pro apple ) moniker but stray from the design specs that make the new class of computers so attractive in the first place. ( macbook pro apple )

Dilip Bhatia ( macbook pro apple ), vice president of Lenovo's ( macbook pro apple ) ThinkPad business unit, is excited about his company's contribution to the field. "The ThinkPad X1 Hybrid and T430u ultrabooks represent the next generation in thin and light computing, ( London macbook pro appleJobs )" he says. " ( macbook pro apple )From small businesses that literally live on the road to corporate professionals working in a managed environment, ( macbook pro apple ) these new crossover laptops fundamentally change the way people think about mobile computing technology." ( macbook pro apple )

Matt McRae, ( macbook pro apple ) Vizio's ( macbook pro apple ) chief technology ( macbook pro apple ) officer, recently told Business Week that his company's entry in the ultrabook game was meant to shake things up: "It's very similar to TV - ( macbook pro apple )- we want to get in there and disrupt it," says McRae. "We think most PCs have been designed for the small-business users, ( macbook pro apple ) that others have not done a very good job of making them entertainment devices. ( macbook pro apple )

With all the new ultrabook ( macbook pro apple ) models that appeared at CES recently, it's now just a matter of discovering just how the ultrabook ( macbook pro apple ) will find its place in our lives next to the televisions, tablets, smartphones and desktops many consumers already have. ( macbook pro apple ) Nobody could have predicted this 10 years ago, ( macbook pro apple ) but it seems pretty clear: There's still plenty of room for this light, new computing upstart. ( macbook pro apple )
If you work remotely or travel a lot for your job, ( macbook pro apple ) you probably take advantage of free public Wi-Fi ( macbook pro apple ) often.

Unfortunately, that probably means you're regularly opening up your devices and your data to serious security threats. And if you're a heavy user of cloud services, which often store your data on a remote server rather than your computer, Wi-Fi ( macbook pro apple ) security is even more crucial.

Most people these days have password-protected networks at home,  ( macbook pro apple )so it's unlikely that anybody is able to snoop on your data as it passes between your device and your router. But when you're surfing the Web via a free public Wi-Fi ( macbook pro apple ) at a cafe, library or airport, you should be suspicious of everyone, says technology consultant Leo Notenboom ( macbook pro apple ) of Ask-Leo.com (macbook pro apple ). "It's trivially easy for any of them to be watching your unencrypted information flying by."macbook pro apple

Here's what you need to know to stay safe next time you're surfing on a free public Wi-Fi ( macbook pro apple ) connection.

Free Public Wi-Fi ( macbook pro apple ) Tip No. 1: Turn on your firewall. ( macbook pro apple )

The cafe might use firewall software to protect your computer from outside attacks, but that doesn't protect you from other people surfing around the same Wi-Fi ( macbook pro apple ) network inside the cafe. Be sure your computer's firewall is turned on. ( macbook pro apple )

Free Public Wi-Fi ( macbook pro apple ) Tip No. 2: Protect your smartphone or tablet. ( macbook pro apple )

If your smartphone or tablet connects to Wi-Fi ( macbook pro apple ) networks, require it to ask your permission before joining any network. A lot of people never change the default network name, so if you logged on to your friend's "linksys" ( macbook pro apple ) network, your device will remember that and could automatically join any network of the same name in the future - ( macbook pro apple )- unless you tell it to ask your permission first.

Free Public Wi-Fi ( macbook pro apple ) Tip No. 3: Use strong encryption. ( macbook pro apple )

Encryption works by disguising data that your computer wirelessly sends to a router. ( macbook pro apple ) Without it, that person sitting near you at the cafe could use special software to intercept and see all the data that travels back and forth between your device and the router. ( macbook pro apple ) And that means everything: emails, passwords and things you search for. That's why it's imperative, says Notenboom, to use encrypted sites when possible. ( macbook pro apple )

How do you know when a site offers encryption?  ( macbook pro apple )Instead of "http" ( macbook pro apple ) at the beginning of the address, you'll see "https. ( macbook pro apple )" You'll also see a little padlock icon in your browser window, usually on the bottom right. ( macbook pro apple )

What else should you consider encrypting? ( macbook pro apple )

Your email. ( macbook pro apple )

If you use a locally installed email program such as Outlook or Entourage ( macbook pro apple ), you can protect your mail and passwords by using something called SSL (secure sockets layer ( macbook pro apple )) on each of your accounts. This encrypts all your data when you send and receive email. Not all email providers allow the use of SSL ( macbook pro apple ), though, so check your provider's help page.

Your Facebook ( macbook pro apple ) and Twitter pages ( macbook pro apple )

Facebook ( macbook pro apple ) and Twitter recently began offering encrypted sessions; just go into your account settings and find the option that says "Always use https."macbook pro apple

Your Google search ( macbook pro apple )

If you think the keywords you're searching could be embarrassing or you prefer to keep your privacy, try the secure version of Google search. Instead of going to Google.com ( macbook pro apple ), do all of your searching at Encrypted.Google.com. ( macbook pro apple )

Everything ( macbook pro apple )

Consider a VPN ( macbook pro apple ) service. VPN ( macbook pro apple ) stands for virtual private network and encrypts everything you send and receive. You can download free mobile VPN ( macbook pro apple ) software from such a site as Hotspot Shield and everything - ( macbook pro apple )- instant messages, passwords, emails and websites - ( macbook pro apple )- will be virtually impenetrable to prying eyes whenever you're using a free public Wi-Fi connection. Or if your employer offers its own VPN ( macbook pro apple ), always connect to it through your computer or mobile device.

"That guy in the corner of Starbucks with his laptop - ( macbook pro apple )- do you trust him with your private data?" asks Notenboom. Follow these Wi-Fi safety tips, and you won't ever have to ever wonder.
Thanks to the Web ( macbook pro apple ), more and more people are working remotely - ( macbook pro apple )- from home or anywhere.  ( macbook pro apple )But not commuting anymore doesn't mean you don't have the same security issues that your corporate-office counterparts do. ( macbook pro apple )

Here's how to protect your data, devices and computer without an IT department: ( macbook pro apple )

1.  ( macbook pro apple )Back up your data in the cloud. ( macbook pro apple )

It's easy to lose all your work: ( macbook pro apple ) One computer virus or hard-disk-drive meltdown ( macbook pro apple ), and your important files may vanish forever. That's why, when working from home, backup is crucial. Instead of depending on bulky hardware, try the many cloud services on the Web. They back up new content every night while you sleep, ( macbook pro apple ) keeping your files safe and allowing you access from any computer at any time. ( macbook pro apple )

"Backup used to be cost-prohibitive, ( macbook pro apple )" says Phil Montero, founder and CEO ( macbook pro apple ) of an online resource called You Can Work From Anywhere. But these days, many online services charge as little as $50 per year, ( macbook pro apple ) depending on your needs. Mozy even offers certain amounts of backup for free. ( macbook pro apple ) If you're only backing up documents, Google Docs is another good bet. ( macbook pro apple )

2.  ( macbook pro apple )Protect your computer and critical files ( macbook pro apple )

If your employer issues you a PC ( macbook pro apple ) or laptop ( macbook pro apple ) to use at home, they'll often install security software or a Web-based security service to block viruses or bar hackers. But if you are self-employed ( macbook pro apple ), the burden of protecting your computer and data from the increasing array of online security threats falls squarely on your shoulders. ( macbook pro apple )

When choosing a cloud-based ( macbook pro apple ) security service, be sure it protects your computer with antivirus, spyware and firewall programs. It should also constantly updates to protect you against evolving threats.

You should also limit your family members' access to your work computer.  ( macbook pro apple )"You have to be sure that the really critical stuff isn't made accessible to someone who shouldn't have access to it," says Jack M. Nilles ( macbook pro apple ), founder of JALA ( macbook pro apple ) International, a global telecommuting consulting company. ( macbook pro apple ) "That includes the kids getting on your computer and downloading something [harmful]."

Finally, keep passwords and ID ( macbook pro apple ) numbers private so they don't fall into the wrong hands. ( macbook pro apple )

3.  ( macbook pro apple )Seamlessly collaborate with others ( macbook pro apple )

Whether you work on your home computer ( macbook pro apple ) once a week or full time, ( macbook pro apple ) if you need to share files with colleagues, ( macbook pro apple ) synchronization tools can help ensure you (or your team) are working on the correct or latest version of a document ( macbook pro apple ). The "old" way to do this was to copy the files from your home computer onto an external hard drive,  ( macbook pro apple )CD or thumb drive and install them on your work computer ( macbook pro apple ). But this process sets you up for accidentally writing over the most recent files - ( macbook pro apple )- and what if this external backup device you were depending on is destroyed or lost? ( macbook pro apple )

Cloud services enable you to sync automatically to ensure speedy backups. ( macbook pro apple ) Or try Microsoft's FolderShare ( macbook pro apple ), which allows you to synchronize files with colleagues over the Web. ( macbook pro apple )

There's no doubt to the benefits of Web to the home office worker ( macbook pro apple ). That said, you want to be smart about security issues. ( macbook pro apple ) To really cover your bases, in addition to backing up and securing your data,  ( macbook pro apple )Niles also says it's important to get a clear protocol from your company or clients: ( macbook pro apple )

" ( macbook pro apple )We recommend that telecommuters working for a company have a formal agreement specifically stating who is responsible for what. ( macbook pro apple )" This way, you can always fall back on the agreed-upon security plan for your best-quality ( macbook pro apple ) work away from your IT ( macbook pro apple ) department. ( macbook pro apple )

Sunday, November 14, 2010

ALL About Mobile Games and mobiles

A mobile games is a video game ( mobile games ) played on a mobile phone, smartphone, PDA, handheld computer or portable media player. This does not include games ( mobile games ) played on handheld video game ( mobile games ) systems such as PlayStation Portable or Nintendo DS.
The first mobile games that was pre-installed onto a mobile phone was Snake on selected Nokia models in 1997. Snake and its variants have since become the most-played video game ( mobile games ) on the planet, with over a billion people having played the game ( mobile games ).
Mobile games are played using the technologies present on the device itself. For networked mobile games, there are various technologies in common use. Examples include text message (SMS), multimedia message (MMS) or GPRS location identification.
However, there are non networked applications, that simply use the device platform to run the game ( mobile games ) software. The mobile games may be installed over the air, they may be side loaded onto the handset with a cable, or they may be embedded on the handheld devices by the OEM or by the mobile operator.
Mobile games are usually downloaded via the mobile operator's radio network, but in some cases are also loaded into the mobile handsets when purchased, via infrared connection, Bluetooth, or memory card.

History of mobile games

With the creation of the cell phone, one was easily impressed with the fact that the phone required no cables. However, towards the end of the 20th century, cellular phones started to modernize, and people wanted more out of their cell phones.
With the introduction of the "candy bar" style cell phone, the appearance of a cell phone as well as its features and calling capabilities became a lot more important to people. Mobile games were among the many new features that could be expected in this new type of cell phone.
Older mobile games were not as expansive or as popular as console games ( mobile games ), as the phone's hardware was not suited to high-color screens or sounds beyond differently pitched beeps. The mobile games were usually animated with black squares. A good example of an early mobile games is Snake. Unlike today's mobile games, which usually have to be purchased, these mobile games came pre-installed on the cell phone, and could not be copied off or removed.
When the camera phone was introduced to the public, cell phones started to become a lot more common. The storage and graphic capabilities on these new phones were a lot better than the older candy bar style phone, which meant that higher quality mobile games could be created. This of course also meant that companies could make a profit off these mobile games.
Nokia tried to create its own mobile gaming ( mobile games ) platform with the N-Gage in 2003 but this effort failed mainly because, at the time, the convergence of a cell phone and a handheld gaming platform did not mix. Many users complained of having to talk on the phone 'taco-style' by tilting it sideways in order to speak and hear. There were hardware issues as well, and though some quality games came out, support for the platform was anemic.
Today, mobile games have come a very long way. Their graphics are about the same as you would expect on a 4th or 5th generation game console (which may not seem like a very big improvement yet is considered one because the game ( mobile games ) is being played on a cell phone). Mobile games now tend to take up a large amount of memory on cell phones, which is part of the reason why they still are not too popular. Still, certain mobile games such as "Tetris" and "Solitaire" are somewhat popular mobile games.

Industry structure of mobile games

Total global revenues from mobile games were estimated at $2,600 million in 2005 by Informa Telecoms and Media.the total revenue generated in the year 2008 ia 5800 million US dollar.

Different platforms

Mobile games are developed using platforms and technologies such as Windows Mobile, Palm OS, Symbian OS, Adobe's Flash Lite, DoCoMo's DoJa, Sun's Java ME, Qualcomm's BREW, WIPI, iPhone OS or Google Android platforms. Other platforms are also available, but not as common.
Java is the most common platform for mobile games, however its performance limitations lead to the adoption of various native binary formats for more sophisticated mobile games.

Common limitations of mobile games

Mobile games tend to be small in scope and often rely on good gameplay over flashy graphics, due to the lack of processing power of the client devices. One major problem for developers and publishers of mobile games is describing a game ( mobile games ) in such detail that it gives the customer enough information to make a purchasing decision. Currently, mobile games are mainly sold through Network Carriers / Operators portals and this means there are only a few lines of text and perhaps a screen shot of the game to excite the customer. Two strategies are followed by developers and publishers to combat this lack of purchasing information, firstly there is a reliance on powerful brands and licenses that impart a suggestion of quality to the game ( mobile games ) such as Tomb Raider or Colin McRae and secondly there is the use of well known and established play patterns (game play mechanics that are instantly recognisable) such as Tetris, Space Invaders or Poker. Both these strategies are used to decrease the perceived level of risk that the customer feels when choosing a game ( mobile games ) to download from the carrier’s deck.
Recent innovations in mobile games include Singleplayer, Multiplayer and 3D graphics. Virtual love games ( mobile games ) belong to both of singleplayer and multiplayer games ( mobile games ). Multiplayer games ( mobile games ) are quickly finding an audience, as developers take advantage of the ability to play against other people, a natural extension of the mobile phone’s connectivity. With the recent internet gambling boom various companies are taking advantage of the mobile market to attract customers, Ongame the founders of PokerRoom developed in 2005 a working mobile version of its poker software available in both play money and real money. The player can play the game ( mobile games ) in a singleplayer or multiplayer mode for real or play money. As well, the MMORPG boom seems to hit the world of mobile games. According to their website CipSoft has developed the first MMORPG for mobile phones, called TibiaME.
Often trivia or quiz games ( mobile games ) will run out of questions on mobile devices. Some publishers like MobileQs will offer expansion packs to the original game ( mobile games ) to get around this problem.

Location-based mobile games

Mobile games played on a mobile device using localization technology like GPS are called location-based mobile games. These are not only played on mobile hardware but also integrate the player's position into the game ( mobile games ) concept. In other words: while it does not matter for a normal mobile games where exactly you are (play them anywhere at anytime), the player's coordinate and movement are main elements in a Location-based mobile games. The best-known example is the treasure hunt game Geocaching, which can be played on any mobile device with integrated or external GPS receiver. External GPS receivers are usually connected via Bluetooth. More and more mobile phones with integrated GPS are expected to come.
Besides Geocaching, there exist several other location-based mobile games which are rather in the stage of research prototypes than a commercial success.

Multiplayer mobile games

A Multiplayer mobile games is often a re-branding of a multiplayer game ( mobile games ) for the PC or Console. Most mobile games are single player mobile games perhaps with artificially intelligent opponents. Multiplayer functionality is achieved through:
  • Infrared
  • Bluetooth
  • GPRS
  • 3G
  • Wi-Fi
  • AI
  • MMS
  • Wireless LAN
Some "community" based mobile games exist where players use their cellphones to access a community website where they can play browser-based mobile games with thousands of players. Such mobile games typically have limited graphical content so that they can run on a cellphone, and the games ( mobile games ) focus on the interaction between a large number of participants.

Infrared connectivity

Older mobile phones supporting mobile games have infrared connectivity for data sharing with other phones or PCs. This connectivity is not practical as any disturbances in the infra-reds line of sight could cause loss of connection, hence this technology was seldom used in mobile games.

Bluetooth multiplayer mobile games

Mobiles are connected through a wireless protocol called Bluetooth using special hardware. The mobile games are designed to communicate with each other through this protocol to share game ( mobile games ) information. The basic restriction is that both the users have to be within a limited distance to get connected. A bluetooth device can accept up to 7 connections from other devices using a client/server architecture.

WAP / GPRS / UMTS / HSDPA multiplayer mobile games

A GPRS connection which is common among GSM mobile phones can be used to share the data globally. Developers can connect a mass number of mobile games with a single server and share data among the players. Some developers have achieved cross platform games ( mobile games ), allowing a mobile player to play against a PC. WAP and GPRS best supports turn based mobile games and small RPG games. (Most of the counties have a weak GPRS speed in their carriers. In these types of games, the game ( mobile games ) communicates with a global server which acts like a router between the mobile phones. Faster connections like UMTS and HSDPA allow real time multiplayer gaming though speeds will still give some level of lag. Currently, there are a lot of multiplayer  mobile games entering the market.

3G and WiFi

3G allows in most cases realtime multiplayer gaming ( mobile games ) and is based on technologies faster than GPRS. Wi-Fi is often used for connecting at home. Not every mobile device allows games ( mobile games ) to use the wifi connection.

Distribution of mobile games

Mobile games can be distributed in one of four ways:
  • Over the Air (OTA) - a mobile games binary file (usually BREW or Java) is delivered to the mobile device via wireless carrier networks.
  • Sideloaded - a mobile games binary file is loaded onto the phone while connected to a PC, either via USB cable or Bluetooth.
  • Pre-installed - a mobile games binary file is preloaded onto the device by the Original Equipment Manufacturer (OEM).
  • Mobile browser download - a game ( mobile games ) file (typically Adobe Flash Lite) is downloaded directly from a mobile website.
In the US, the majority of mobile games are sold by the US wireless carriers, such as ATT, Verizon, Altel, Sprint and T-Mobile. In Europe, mobile games are distributed equally between carriers, such as Orange and Vodafone, and off-deck, third party stores such as Jamba, Jamster, Kalador and Gameloft. Third party, off-deck game stores have not yet taken off (as of 2007) in the US, as the US based carriers use a 'walled garden' approach to their business models.
The popularity of mobile games has increased in the 2000s, as over $3 billion USD worth of games were sold in 2007 internationally, and projected annual growth of over 40%.
In recent years, there has been a move towards mobile games which are distributed free to the end user, but carry prominent, paid advertising.