profile

IOS updates

When installing your iPhone,  iPad, iTouch updates make sure iTunes is updated and that the host PC has at least 60 Gig of free disk space.

Start iTunes prior to connecting your device to ensure you are running the latest version.

Without sufficient disk space the backup will fail,  potentially meaning you will loose files on your device during the upgrade process.

Tethering

What is tethering? Tethering is using your smartphone as a modem so that your laptop, can access the Internet. Tethering is different than HotSpotting. Creating a HotSpot on your phone allows multiple laptops, iPads, game consoles, etc. to access the Internet through your phone. Hotspotting in affect turns your phone into a wireless router.

Tethering typically requires a cable and uses your data plan. Typically there is no additional charge for tethering.

Hotspotting a phone typically results in additional fees; from $29 per month on up. Additional fees can be avoided by "rooting" or "jailbreaking" your smartphone.

Rooting or jackbreaking a phone means removing the restrictions cell phone vendors place on a phone. Lots of new features become available once a phone is jailbroken or rooted. Cell Phone providers will typically not service a phone that has been jailbroken or rooted - so the best time to perform the procedure is after the phone warranty has expired.

Jailbreaking a phone refers only to iPhones, rooting a phone only refers to Android phone; both procedures are identical; they remove the restrictions phone vendors place on phones.

It is not possible at this moment to root a Blackberry.

To tether a blackberry - visit tether.com - to tether an Android phone visit http://www.mobile-stream.com/easytether/android.html or http://junefabrics.com/android/ and to tether an iPhone visit http://junefabrics.com/android/mac.php. There are many other vendors that offer tethering software - these are the ones we have tried and they work.

False Security

NYTimes: Stolen Data Is Tracked to Hacking at Lockheed http://nyti.ms/iUvWpp

Companies spend billions on security systems, the problem is the use the same security and the same system so those systems become the weak link.   This article is an example of the weakness of centralized security authentication.  A better approach is to use rotating passwords or user specific authentication, for example the year someone is born and the last four digits of their social security number.

Death of Windows XP

IE 9 recently came out and guess what - it no longer supports Windows XP. Microsoft is using IE9 to push users to stop using Windows XP and migrate to Windows 7 or upcoming 8.

Should you upgrade?

Windows Vista was a disaster - both from a marketing and from a technical viewpoint. It was slower and less stable than Windows XP - while offering little improvement.

With Windows 7, Microsoft understood the mistake they made with Vista and increased and improved the amount of testing done, while improving actual usable features.

So is it time to migrate? I tell our clients that is up to them. If their computer is 4 or 5 years old, we generally recommend not upgrading the computers. Windows 7 is different than Windows XP - it looks and functions differently and the transition cost rarely is justified on an old machine. A new machine is a different story. Since a new machine requires a learning curve, by definition, it makes sense to install Windows 7 on a new machine.

Should the entire company convert?

For companies, we prefer a centralized server - using the server equivalent to Windows 7 - Server 2008 R2. Regardless of the number of PCs in an organization - one or two centralized servers is always easier and cheaper to maintain.

Android Problems

Google has to be very careful about Android. I was working with a Motorola Phone and then an HTC phone and they were both running Android 2.2 - but they were very different. I understand the need for open source - but Android is now at a point that once a atypical user will have to retrain themselves going from one brand to another.