Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
01
CYBERTREND.COM
CHALLENGES OF
IT OUTSOURCING
HOW TO MAKE IT
WORK FOR YOUR
ORGANIZATION
WHOLE CHICKEN
Tecumseh Farms Smart Chicken is truly the most natural chicken in the United States. All Tecumseh Farms
products are raised without the use of animal by-products, antibiotics, or hormones, are 100% all-natural, and are
processed using puried cold air instead of adding non-potable waterthats the air-chilled difference.
WWW.SMARTCHICKEN.COM
41
IT OUTSOURCING CHALLENGES
& HOW TO FACE THEM
8 COVER STORY
IT outsourcing and its underlying complexities
12 BUSINESS
Xerox, its history and its expansion from offering photocopiers to a wide range of enterprise services
18 CLOUD
how cognizant computing stands to affect
future cloud services
20 MOBILITY
enterprise applications and how employees
use them
CONTACT US
P.O. Box 82545
Lincoln, NE 68501
or
120 W. Harvest Drive
Lincoln, NE 68521
26 ENERGY
the latest news and research into energyconscious tech
28 IT
benefits of managed service providers, overview of colocation services
54 STORAGE
storage management strategies
58 ELECTRONICS
the latest in premium consumer electronics
60 TIPS
smartphone and business travel tips
38 NETWORKING
software-defined networking, how the
Internet of Things affects enterprise security,
network virtualization solutions
46 SECURITY
how hackers crack make hardware vulnerable, managing enterprise risk, encrypting
endpoints
Copyright 2015 by Sandhills Publishing Company. CyberTrend TM is a trademark of Sandhills Publishing Company. All rights reserved.
Reproduction of material appearing in CyberTrend TM is strictly prohibited without written permission.
51% Security
47% Budget
41% Lack Of Talent To Implement Big Data
37% Lack Of Talent To Run Big Data & Analytics Ongoing
35% Integration With Existing Systems
33% Procurement Limitations On Big Data Vendors
27% Enterprise Not Ready For Big Data
0%
10%
20%
30%
40%
50%
60%
The IoT (Internet of Things) phenomenon is akin to the Internet in that it will
involve a massive number of connections
and mean many different things depending
on the myriad ways in which it will be
used. The latest forecast from research firm
IDC puts the worldwide IoT market at
$3.04 trillion in 2020 compared to $1.3
trillion last year. IDC also predicts that
by 2020 there will be 30 billion connected
things, including machine sensors and
computing devices. IDC expects government mandates and more openly eco-conscious cultures in Western Europe and
Asia/Pacific will cause IoT markets to grow
there faster than in North America.
29%
Empowered To
Take Action
17%
Courteous
33%
Efficient
14%
Human &
Personable
29%
Willing To Spend
5% More
18%
Dont Know
24%
Willing To Spend
10% More
16%
Willing To Spend
20% More
14%
Not Willing To
Spend More
7% Consultative
Which is more frustrating: a sluggish website or dealing with the Transportation Security Administration?
The answer, according to a study from
SOASTA and Switchfly, is the slow website, as 57% of those surveyed for the
study answered that they would rather
deal with the TSA than struggle with a
bad website or app. Surveyed over the
2014 holiday season, respondents said
their chief worries about booking travel
over websites were slow-loading sites
(18%), unresponsive sites (18%), sites
crashing (17%), and sites with poor interfaces (10%).
According to DisplaySearch, a market research firm focused on the display industry, the market for products
using flexible displays will increase
nine-fold between 2014 and 2015 as
consumers scoop up smart watches,
curvy smartphones, and other flexiblescreen devices. DisplaySearch points
out rapid flexible manufacturing capacity growth as spurring the flexible
display market value, indicating that the
market will exceed $2 billion in 2015,
$11 billion in 2018, and $21 billion in
2021, with a 119% compound annual
growth rate.
The seemingly non-stop growth in demand for faster cellular service goes hand-inhand with increasingly powerful devices for
speedy data transmissions, high-quality video
streaming, and more. Underscoring this demand, ABI Research forecasts that 676 million 4G LTE devices will ship in 2015, more
than triple the 204 million units shipped in
2014. The research firm anticipates no drop
in demand, expecting unit shipments to surpass 1.89 billion by the end of 2019. Cheri
Wong, research analyst at ABI Research, cites
the proliferation of larger-screen smart devices as driving up the insatiable appetites
for content and faster speeds.
8% No,
But Wish I Did
4% No
2% Dont Know
21%
Dont Know
11% No
79% Yes
75% Yes
STARTUPS
Startup Helps Enterprises
Better Control Their Files
KEY POINTS
Outsourcing IT operations is generally seen as being on the increase,
including due to companies seeking to
acquire newer technologies.
Cementing a solid customer-provider relationship with an IT outsource
provider is seen as a fundamental key
in outsourcing IT operations.
Although IT service providers possess technical expertise, some lack a
significant level of business knowledge
or understanding, which can impact
business-specific IT functions.
A primary complexity associated
with outsourcing IT involves integrating
the external providers services into
the organizations existing environment for managing services.
A Current Perspective
Organizations outsource IT operations for numerous reasons, including
to save costs and improve their technology foundation in an affordable
manner. Others seek to revamp their
infrastructure to launch a new business initiative or simply to place development, maintenance, support, and
management duties in someone elses
hands in order to concentrate their
expertise and resources on the businesss core competencies. Commonly,
The Complexities
IT-related headaches that outsourcing can alleviate can generally
fall into a few specific categories. One
is scalability. For many companies,
its easier to ramp up an IT services
department thats outsourced vs. one
thats in-house. Another headache is
that IT operations consume in-house
resources that could otherwise be devoted to the organizations core competencies. You cant be an expert on
all things, Weaver says. Running an
however, and are learning to translate the sometimes very technical into
a non-technical manner and explain
why what they do is very valuable,
he says.
Another complexity of outsourcing
IT is managing the relationship with
a provider. A company thats poor at
managing third-party relationships
may have difficulties with even the
best provider. Weaver stresses the importance of making the company-provider relationship the foundation of
IT outsourcing. What you see most
commonly are customers that arent
sure what the capabilities of the provider are, he says. For example, a provider may indicate what functions it
will perform for the company but it
doesnt end up being exactly what was
described. Thus, the company ends
up saying, We really didnt get what
we wanted, so were going to another
MSP, Weaver says. MSPAlliance is
seeing organizations now on their
third, fourth, and sometimes fifth MSP
for such reasons.
As a result, organizations are becoming more aware of how to validate
and qualify IT outsource providers to
their needs. Weaver sees this type of
educated consumer market as being
extraordinarily positive, including
because what providers do is highly
10
All vendors and client organizations know how to manage and set up servers or PCs and do this in the same
way. Application services are more client-individualized,
however, meaning more complexity for vendors in terms
of learning the application and other issues.
WOLFGANG BENKEL
Principal Analyst : Forrest Research
Specific To IT
Compared to outsourcing other types
of processes or roles, outsourcing IT
can be more complex, although Weaver
believes the differences are minute.
11
KEY POINTS
Xerox has been around for over
100 years in one form or another
and has flexed its innovation muscles with photocopiers, personal
computers, and much more.
The company built on its print
foundations by offering managed
print services, but it offers content
and transaction management services as well.
Xerox also offers IT outsourcing
services to help companies offload
some IT tasks and focus more on
business-critical projects.
Xerox helps companies improve
business processes either through
consulting or through outsourcing
services for HR, finance, and more.
12
Whats In A Name?
In the same way that Kleenex has
become synonymous with tissues,
Xerox was once a colloquialism that
many people used for the process of
photocopying. What some might not
know is that the name Xerox was actually derived from the term xerography
(also known as electrophotography),
which was the early process of photocopying invented by Chester Carlson in
1938. But Xeroxs foundations go back
even further than 1938 to 1903 when
the M.H. Kuhn Company was originally
founded and on to 1906 when it became the Haloid Company, which was
a predecessor to Xerox and sold photographic paper.
In 1936, the Haloid Company took
a huge step forward by offering public
company stock for the first time in an
effort to raise enough money to purchase the Rectigraph Company, which
was a manufacturer of photocopying machines. After inventing the xerography
process in 1938 and receiving the patent
for it in 1942, Chester Carlsons technology would eventually be fully unveiled at the Optical Society of America
Annual Meeting in 1948 and the term
Xerox was officially trademarked.
commercially available GUI, which included pop-up menus, icons, and overlapping windows that would essentially
become the backbone for all operating
systems today.
In the early to mid-1980s, Xeroxs efforts shifted a bit away from its PARC
innovations and back to its copying
products. In 1982, the company released
a line of more energy-efficient servers
with power down modes to help save
energy, which Xerox points out was developed nearly 10 years before the wellknown Energy Star program that many
manufacturers participate in today. Also
in 1982, Xerox also released its 10 Series
smartphones and tablets. This is important to keep in mind because a few years
later, in 1995, the Xerox PARC team developed and patented touchscreen technology for palm-sized mobile devices.
13
led through to the many PARC innovations that helped inform where we are
today in the technology industry, and
now Xerox remains solidly focused on
putting helpful tools in the hands of its
customers.
Even though the focus has shifted
somewhat from more physical systems
over to software- and Internet-based
14
help better manage and maintain sensitive customer data, as well as regulatory
compliance and brand compliance tools
to ensure all of a companys initiatives align with that companys policies
and agendas.
Its on the automation side that
Xeroxs Centralized Print Services
perhaps stand out more than its MPS
offerings. CPS can be used to tailor documents to be more suitable for mobile
devices and support digital policies, and
can also help companies customize the
print and document workflow experience at every level of business. For example, Xeroxs multi-channel delivery
research documents to scientist notebooks and converted them into PDF files
before transferring them to
CD-ROMs. In the end, Xerox
was able to meet Dows
requirements and give its
scientists access to decades
of critical information in an
easy-to-use digital format.
This required the digitization
of over 5.5 million pages
worth of documents. Xerox
was also able to support
Dows disaster recovery
initiatives by providing a
solid record of its legacy
research. And by minimizing
duplications, Xerox was also
able to help Dow lower its
overall storage costs.
15
there is a solid record for long-term archiving purposes. Companies also take
advantage of Xeroxs Mobile Scanning
Services, which involves having Xerox
professionals visit onsite and convert
content into a digital format.
For smaller businesses that may not
have as many resources as larger corporations, Xeroxs Mobile Scanning
Services can help save important data
quickly and at a much more affordable
cost. Once data is captured, Xerox can
also take care of the next step in terms
of processing and validation. Everything
is automated and uses a remote Xerox
server to process captured images much
more quickly than organizations can do
with a manual process.
IT OUTSOURCING
IT Outsourcing Services
One way that companies are looking
to save money and cut down on physical
infrastructure is to outsource certain IT
functions, which is an option that Xerox
offers to its customers. In fact, the company now has 6,000 employees that focus
specifically on such services and Xerox
supports more than 350,000 desktops and
manages 28,000 servers. All of these different services and solutions are designed
to take some of the burden off of IT teams
and, once again, help them focus on projects that will help the company grow and
earn more customers.
As far as pure managed IT services go,
Xerox covers nearly every aspect of running a data center from the physical infrastructure to the network, security, and
cloud solutions running on it. And for
companies that want to completely outsource a large chunk of infrastructure,
Xerox offers data center services whereby
IT assets are essentially offloaded to data
centers where Xerox manages and runs
those assets. Also, applications, databases,
and Web servers can be placed under
Xeroxs 24/7 monitoring.
For those that want to keep a little bit
more control and still have in-house infrastructure, Xerox offers management services for mainframe systems, services that
16
data is not only safe and secure, but available whenever it is needed regardless of
whether theres an outage or system failure.
Industry-Specific IT Solutions
As with some of the companys other
offerings, Xerox also offers IT outsourcing
services specifically targeted at certain industries, including retail, health care, manufacturing, finance, and the public sector.
Xerox understands that certain industries
have unique needs and equally unique processes that require extra attention when
it comes to engaging with managed IT
that will provide a proper return on investment. All of these solutions work
together to make sure customers understand the business and that their experience is seamless regardless of how they
choose to interact with the business.
17
Cognizant Computing
BIG DATA, INTERNET OF THINGS & THE EVOLUTION OF THE PERSONAL CLOUD
18
19
KEY POINTS
An organizations internal app
store can include both internal and
third-party apps, selected for use
by employees.
Increased control over app usage
is one of the primary benefits of deploying and maintaining an internal
app store.
With internal apps, the enterprise
app store makes it easy for IT staff
to push out updates to employees
devices.
Enterprise app stores can be part
of an MDM (mobile device management) suite or a best-of-breed
solution, such as from an app store
specialist, system integrator, or
wireless carrier.
20
What Is An Enterprise
App Store?
At the most basic, its a delivery
mechanism for an organization to
share and distribute private and curated apps to its employees and/or subcontractors in a secure fashion, says
Philippe Winthrop, global mobility
evangelist at CSC. The apps could
consist of custom-built tools designed
21
app store. Once you find the best solution, youll need to determine which
apps the enterprise should deploy and
recommend via the store.
Of course, youll also need to work
with IT to make sure everything goes
smoothly. The IT staff are typically the
ones who will be leveraging the back
end of the enterprise app store, via the
policies dictated by the organization,
to figure out who will have access to
22
KEY POINTS
Whether or not organizations are
prepared for them, mobile devices
are being used to access corporate
data, and doing nothing invites risk.
MDM (mobile device management) and MAM (mobile application management) are powerful
methods for controlling data flow
and maximizing mobile benefits.
MDM and MAM platforms can
bolster security, ensure compliance, increase productivity, and
improve internally-developed apps.
For greater mobile control, start
small, focus on the user experience, and make sure employees
know how to handle corporate data
and mobile devices.
23
email attachments using a commercially available note-taking application, but blocking that apps ability
to share or upload data to consumergrade cloud storage services. MAM
also lets organizations monitor usage
to streamline their processes and improve the user experience wherever
possible. Together, MDM and MAM
are important for any organization that
is seeking to implement a new mobile
device strategy or to secure and enhance an existing one.
The Necessity Of A
Management Platform
Today, youd be hard pressed to find
an industry or even a specific company
that wouldnt benefit from mobilizing
its workforce, at least a to a small extent. And whether or not you want to
allow these devices into your corporate
network, the fact is, theyre probably
already there, and doing nothing about
them is taking a risk that organizations of any size cant afford. MDM
and MAM are all about limiting exposure to the negatives of mobility while
capitalizing on its strengths.
Christian Kane, Forrester Research
analyst for enterprise mobility, infrastructure, and operations, says, For
many companies, its basically looking
to be able to say, Yes, lets embrace
some of these trends, but not expose
ourselves to additional risks, [and] at
least put up some basic protections and
security around both mobile device
usage and mobile application usage as
a whole.
Ensuring device security, logging
activity, and email tracking, although
core concepts within modern MDM
and MAM solutions, are nothing new.
Indeed, organizations dont need such
24
Benefits Of Implementing
Mobility Management
There are lots of reasons to look into
a management platform. Obviously
security is touted quite a bit within this
context, but we also see that companies
are thinking about employee productivity, flexibility, and choice. Kane
also suggests that by taking a close
look at the applications employees are
using, the organization can glean valuable information about features that
are lacking in their current suite of
apps, and get ideas for any commercial
apps that may make good candidates
for vetting and addition. But being
able to secure corporate and customer
data as its displayed on such apps,
and being able to monitor how theyre
being used, is important too.
Kane suggests that having such a
system in place can even lighten ITs
workload. To get a corporate device,
Kane says, Traditionally an employee
would have to contact IT, get enrolled in the right group, have policies
pushed out to them, have everything
configured, and have the right applications pushed to them as well. But
what were seeing is a lot of these tools
also include an enterprise app store
that gives you the ability to see all of
the corporate apps available for your
platform and you can just go download
them like you can with a consumer app
store. Other benefits of these tools
include simplified password resets, the
ability to track your devices location,
or lock it and wipe it remotely if its
ever lost or stolen.
Dulaney uses health care as an example of how tracking behavior can
25
Greenovations
ENERGY-CONSCIOUS TECH
The technologies
that make our
lives easier also
produce some
unwanted side
effects on the
environment.
Fortunately, many
researchers,
manufacturers,
and businesses
are working to
create solutions
that will keep us
productive while
reducing energy
demands to lessen our impact on
the environment.
Here, we examine some of the
newest green
initiatives.
The 2015 Mirai is Toyota's newest vehicle powered by alternative fuels. The car uses hydrogen as fuel; when combined with oxygen in the car's fuel cells, the cells generate electricity to power the vehicle and exhaust only water.
26
27
KEY POINTS
Your MSP should be able to help
you save money and improve performance, but it should also provide a
certain level of support, depending on
its relationship with other providers.
Assess your current IT functions
and listen to employee complaints
to determine what types of services
might be good candidates for an MSP.
Consider moving functions like OS
updates, desktop management, and
patching over to an MSP, but think
about managed print and security
as well.
Make sure you fully understand
how moving certain services over
to an MSP will affect the end-user
experience.
28
Ultimately, what remote IT management and monitoring has done is allow MSPs to reduce the cost of service
operations while improving performance, and the added
benefit, especially for SMBs, is that it gave them access
to enterprise-grade tools and the reporting and analytics
from these tools, that they never would have been able
to afford.
ERIC GOODNESS
Research Vice President : Gartner
THE KEY IS FINDING AN MSP THAT IS EXPERIENCED WITH HANDLING THE SPECIFIC IT
MANAGEMENT FUNCTIONS YOU NEED TO
OUTSOURCE, BECAUSE IT WILL ENSURE A
SEAMLESS TRANSITION OF RESPONSIBILITY.
control of these types of mission-critical
services, you need to know where they
stand with those other service providers.
One of my customers had a problem
with their underlying infrastructure,
says Stahl. The MSP put in a ticket to
the base provider of the facility and
the colocation, but they were at a silver
level. Because there are platinum, gold,
and silver levels to this, their ticket went
in and then sat there and languished
for quite some time while other tickets
that were prioritized around gold or
functions, such as capacity management, that MSPs offer, you should not
only see a reduction in OPEX, but in
CAPEX, as well.
Another benefit you should expect
to receive from an MSP is improved
performance. The other value of these
managed services is that through 24/7
real-time remote monitoring, youre
able to provide proactive threshold identification to avoid service impacting
events, says Goodness. A good MSP
will be able to show you how hiring it
29
access to enterprise-grade tools and reporting, and analytics from these tools,
that they never would have been able
to afford, Goodness says. Using MSPs,
smaller organizations can save money
by offloading certain management
tasks, but also take advantage of more
advanced services and thereby become
more competitive.
MSPs can also help manage entire
systems for their clients, such as managing a fleet of printers. One significant offering companies may want to
consider, according to Stahl, is security. Some companies simply dont have
the onsite expertise to handle security
monitoring and intrusion detection, because this level of security is a specialized field that takes a lot of tools to do
well, Stahl says. But with MSPs, you
can get the benefit of these more indepth security tools, and get the personnel to manage them, included in
your contract. Its not that companies
themselves cant do this, but its often a
cost-benefit analysis of saying, I dont
have all the expertise, I cant afford all
of these tools, and more importantly,
Im not able to aggregate lessons from a
bunch of different customers into threat
detection, Stahl says.
Other Considerations
Dont just take an MSPs word for it
and assume that when you hand over
management responsibilities that everything will improve. You really need to
think about how this impacts your end
users and what that end-facing service
delivery looks like with the MSP, Stahl
says. Goodness says that customers
also need to find ways to future-proof
how they deal with MSPs. You have to
consider what types of solutions your
company will be using in the future,
but also where technology is moving in
general. Make sure the MSP you choose
can keep up with your needs now and in
the future.
USING MSPS, SMALLER ORGANIZATIONS CAN SAVE MONEY BY OFFLOADING CERTAIN MANAGEMENT TASKS, BUT ALSO TAKE ADVANTAGE OF
MORE ADVANCED SERVICES AND THEREBY BECOME MORE COMPETITIVE.
30
Document Management
BEST PRACTICES TO HELP YOU PLAN AHEAD
KEY POINTS
A high-level DMS (document
management system) can return
cost savings, improved efficiency,
paper reduction, less storage, and
numerous other benefits.
One way companies fall short
is by not appropriately investing in
document-asset or ECM (enterprise
content management) technologies.
Outsourcing document management tasks reduces hardware and
other IT responsibilities, providing
more focus time for core goals.
In coming years, its expected
that document management will
become easier to use and more intertwined with file sync and sharing
abilities.
Reach Success
Among the benefits of planning,
implementing, and maintaining a
high-level document management
31
Angle Boyd, IDC group vice president, cites benefits that include increased
intellectual property security; quickened
time to revenue; improved customer experience, satisfaction and loyalty; and
more time for innovation due to increased employee productivity.
Document management can also
provide greater confidence that contents of files are complete, something especially helpful when the
documents are part of a defined
workflow, says Diane Carlisle,
deputy executive director for ARMA
(Association of Records Managers
and Administrators) International.
Other advantages include improved
backup processes, increased physical
space savings and digital capacity,
and workers having greater confidence that they are working with the
most recent versions of documents.
Where storage is concerned,
Christopher Wynder, senior consulting
analyst with Info-Tech Research Group,
says Info-Tech analysis suggests enhanced document management with
version control and retention/disposition rules can cut overall storage growth
by 60 percent.
Avoid Failure
Its possible to have a good DMS
without possessing an application platform, Wynder says, if clear, logical rules
around file-type naming conventions,
folder structure, and duplication deletion
are present. An ECM (enterprise content
management) platform or DMS doesnt
guarantee you success, he says. Overall,
companies generally struggle with document management in several areas, including effort, he says. Although many
organizations assume workers have a
logical system for managing documents,
many workers assume technology
will save them, Wynder says. Further,
companies may not make the effort to
explain how to best save and label documents or invest in ECM or DAM (digital
asset management) technology.
Wynder cites appropriate control and
users needs as other challenging areas.
Many companies assume the best way
32
Regulatory compliance aside, outsourcing allows organizations to focus on their core business of developing new
products and services that generate revenues.
BOB LARRIVEE
Director Of Custom Research
Association for Information and Image Management
means before printing. Use multifunction devices for print and as a capture
device tied to the DMS to maximize
their value, he says. Imaging, he says,
remains a staple due to the number of
paper-based documents still out there.
Also plan for what the organization really needs to have online. Formulate a
plan for when to scan documents on
a day-forward/as-need basis, and consider whether centralized or distributed
scanning makes the most sense based on
business requirements, Larrivee says.
Storage best practices, meanwhile, can
vary among organizations, with regulatory and industry guidelines being
factors. Media usage may also vary.
Sensitive information may have to be
stored locally, while marketing materials
that arent of a sensitive nature can be
stored in a cloud app hosted offshore,
he says.
Looking Ahead
Moving forward, Chin expects ECM
will take shape in terms of document
management usage becoming easier via
friendlier user interfaces, lightweight
Web clients that can access information,
an ability to go across multiple content
repositories, and having multiple products to access silos of documents that
may sit in different applications, he says.
Chin says were beginning to see
ECM vendors provide enterprise file
sync and share capabilities, and therefore, those capabilities are being intertwined with a DMS, providing different
ways to access and share content. I
think thats what is really going to take
hold over the next year or so. Really,
every vendor in the document management area will need to provide some
sort of enterprise file sync and share
capability to complement that.
33
KEY POINTS
Managed colocation services
providers can take control of such
things as an organizations security
or networking monitoring tasks.
More colocation providers are
providing interconnectivity abilities
in which they manage direct connections between tenants within
the same facility.
Many organizations use managed colocation services after
choosing a facility and, over time,
seeing the benefits of services.
Communities of interest within
a facility enable companies in a
specific industry or sector to colocate for mutual benefit.
34
services, including those that help organizations actually move into colocation
environments. The term can also refer to
the managed services a colocation provider offers to organizations after they
have moved some of their IT operations
into the providers facility.
From a pure play perspective, says
Sophia I. Vargas, Forrester Research
researcher, colocation refers to providing organizations fully outfitted and
managed data center space that includes
all mechanical and electrical equipment
(power, cooling, power distribution
units, universal power supplies, generators, security, etc.). In other words,
Vargas says, all the IT hardware is
supported up to the rack space. Basic
colocation services may also entail remote hands in which the provider, say,
reboots a server on behalf of the organization. Some colocation providers,
however, go all the way up the stack,
Vargas says, to offer hosted and managed services for storage, compute,
The Possibilities
While all colocation providers provide space and basic power, cooling,
and network distribution systems,
services can vary widely thereafter.
Higher-margin services is one example, says Lynda Stadtmueller, Frost
& Sullivan program director, cloud
computing. Common among these is
remote hands support to dispatch colocation personnel to install a server,
reset a router, or perform other tasks.
Some colocation providers also
make in-house, industry-specific expertise and knowledge available to
Shared Interests
A significant extra-value service
that various colocation providers offer,
says Clive Longbottom, analyst and
Quocirca founder, is providing multiple connectivity solutions to provide
extended availability and flexibility
of throughput. This should be a nobrainer to anyone in a colocation
space, he says. Other providers are
opening marketplaces of services that
tenants in the providers facility (or
in its other facilities) provide to other
tenants. Again, this can be highly
beneficial, as you can benefit from infacility core network speeds or preferential priority and QoS [quality of
service] speeds across facilities, as well
as a single platform for identifying and
dealing with any issues in service provision, he says.
Ian Brown, Ovum senior analyst,
says an example of these communities
of interest within a particular industry
is financial services hubs focused on
trading exchanges. Here, buy- and sellside traders, exchange trading engines,
and financial information services/
feeds co-locate to interconnect and
35
36
By providing common management tools, this allows [colocation vendors] to offer their tenants a degree of hybrid
cloud functionality, enabling tenants to choose the right
configuration for each workload.
LYNDA STADTMUELLER
Program Director, Cloud Computing : Frost & Sullivan
Speak Up
Before committing to managed colocation services, Longbottom recommends asking numerous questions
about whats available now but also
what solid plans the colo provider
has in place for the future. Look for
a visionary, yet pragmatic, set of responses that indicate the provider
knows its in a highly dynamic market
and is prepared to respond rapidly, he
says. Further, look for inclusivity. For
example, if the organization identifies a service it would like the provider
to offer, Longbottom says look for a
response from the provider similar to
Thanks, lets look into it together vs.
a straight-forward no or well look
into it and get back to you.
KEY POINTS
SDN (software-defined networking) lacks a consistent definition, but generally speaking SDN
decouples software from hardware.
The SDN marketplace is much
larger than it once was, but not all
vendors are offering a true SDN experience with their products.
SDN implementations require a
change in mind-set for your networking team. And with SDN, roles
within that team will likely change.
Even though analysts arent
100% sure when SDN will go mainstream, it should happen in the next
few years, which means companies
should think about starting pilot
projects and testing the technology.
38
39
theyre actually doing is SDN 0.2. For example, a vendors SDN solution might give
you some automation and better management tools, but it still relies on the old model
with embedded, tightly coupled hardware
and software, Skorupa says. And the only
reason a vendor would do this is so that they
can maintain control over where the value
is and not let third-party SDN vendors offer
added value that they arent able to match.
Skorupa compares this practice to the
smartphone industry where a given operating system may be somewhat open, but
there are clear benefits to using first-party
applications. For instance, a mobile device
may have a very high performance graphics
rendering engine that only a first-party Web
browser has access to. And while you may
have the option of downloading and using a
third-party browser, it simply wont have the
same level of performance as the first-party
alternative. In that same way, some vendors
are trying to maintain their control over the
networking market by offering automation
that isnt necessarily the full SDN experience.
Fortunately for businesses interested in
software-defined networking, Skorupa says,
most of the rest of the industry has really
embraced a separation of control plane and
data plane, the centralization of intelligence,
and the distribution of packet handling.
Because you are decoupling the control plane
from the network hardware, you actually
have more say as to which SDN controller
you choose. And thats where Skorupa recommends going with a controller where
there are lots of people writing value-add applications to bring value to the environment.
With these more open alternatives, you have
much more control over what capabilities
you get from an SDN implementation.
SDN Implementations
Can Be Challenging
As with any technology, SDN comes with
some growing pains if you want to implement it in the right way. One of the biggest
challenges, according to Kindness, is that
networks tend to be overly complex and customized to the point where its difficult to
make major changes. Weve gotten to the
point where were far enough in technology,
whether its networking or anything else,
that technology itself is not going to solve
40
KEY POINTS
The billions of devices, including
machines, sensors, and other devices involved with the IoT, will introduce a bevy of security concerns
enterprises will need to address.
IoT devices used in relation to
critical infrastructure environments,
such as the oil and gas industry,
are considered particularly enticing
targets for hackers.
As OT and IT networks/systems
increasingly combine and share
information, employing new, more
holistic security approaches may
be needed.
Although the IoT is still relatively
new, security vulnerabilities already
exist, thus enterprises should start
educating themselves now.
41
As IoT spreads into areas such as facilities management and physical security automation, the definition of
what constitutes digital security will change and become
much more holistic than it is today.
EARL PERKINS
Research Vice President, Systems, Security & Risk : Gartner
42
collaboration inside and outside of organizations firewalls continue, Krell says, the
threat of a malicious attack or industrial
espionage is around every corner.
Earl Perkins, a Gartner research vice
president specializing in security, says
much like how the Web revolution of the
late 1990s and early 2000s began in business units with IT later supporting it, the
IoT revolution has started in business
units seeking incubation projects that
use different devices to enhance business
processes or initiate processes to support
IoT devices their clients or partners carry.
CIOs and IT must heed IoT security worries now or risk being caught flat-footed,
similar to how many were with the Web
and mobile revolutions.
They must also be concerned because
IoT brings the aspect of the physical into
their enterprise security strategy, Perkins
says. Similar to how business strategies
evolved to support mobile and BYOD, he
says, more devices requiring physical and
digital security controls will demand strategies to further evolve. As IoT spreads
into areas such as facilities management
and physical security automation, the definition of what constitutes digital security
will change and become much more holistic than it is today, Perkins says. Just
ask those involved in industrial automation and control enterprises. They know
exactly what this entails.
Rahul Vijayaraghavan, Frost & Sullivan
research analyst, industrial automation
and process control, says while theres
considerable focus on IT security now,
not as much is targeted at OT (operational technology) and control systems or
other critical infrastructures. Within the
oil and gas industry, if a criminal hacked
into a system and changed a valve position, the magnitude of impact would be
huge, he says.
Another issue enterprises face is the
general blurring of lines between IT and
OT, Vijayaraghavan says. Concepts such as
digital oil fields, smart factories, and other
factories of the future will require streamlined integration among various enterprise
systems, assets, and workforces, he says.
Factor in the IoT and the scads more assets,
devices, etc. involved and theres going
The Connections
Examples of how corporate networks
are now connecting to networks that
involve machines and sensors are numerous. HVAC and lighting systems are
common ones. These systems, Krell says,
connect to the same networks that tap
into company data. Also, lets remember
that all networks are connected to the
Internet, which in turn is connected to
various machines and sensors, he says.
Printers and multifunction devices, for
example, are often overlooked in terms
of IoT and vulnerabilities, despite that
remote workers often connect to them
outside the corporate network.
Perkins says asset-intensive industries with automation production or engineering-oriented infrastructures and
services are the best examples of how corporate networks connect to machines and
sensors. Such infrastructures/services include electric utilities, oil and gas companies, manufacturing, and automotive
industries. Within commercial-oriented
industries in retail and facilities management, examples include the production use
of sensors, robots, and process control.
Perkins uses electric utilities, which for
decades had two personalities involving
technology, to illustrate IoTs influence
on security. Generally, corporate IT network and systems served business units
primarily involved with information processing, while OT systems served operations and production environments. Some
OT and IT technologies were and are similar, but other unique OT technologies, IT
may know little about. This is changing,
however, Perkins says, and IoT technologies and architecture are having an impact.
While many OT and IT systems were
once kept strictly separate in their daily
functions, theyre increasingly sharing information and opening up to other networks and the Internet, Perkins says. The
result will be a sea change in how digital
security is handled for these converged
environments. In general, as more proprietary, closed systems that OT used are
RAHUL VIJAYARAGHAVAN
Research Analyst, Industrial Automation &
Process Control : Frost & Sullivan
As we continue to be mobile, we open holes in the enterprise to data, hardware, and software. These holes are
natural entries for malicious attacks. As we connect more
devices to the enterprise, there are just naturally more
avenues we need to protect.
MIKE KRELL
Analyst In Residence : Moor Insights & Strategy
The Impact
The extent to which IoT may impact
the way large businesses view digital security could be significant depending on the
company and industry. Vijayaraghavan
says a big challenge for enterprises is
simply having a willingness to change
and not hold on to an If its working fine,
why change? mentality.
A dominant theme concerning IoTs impact on security is that enterprises will need
to view security in a much more holistic
manner and consider areas and scenarios
they havent previously. In short, areas that
need to be secured within enterprises are
much broader than before, and security
cant be a secondary thought, Krell says.
Imagine all the Wi-Fi- and Bluetoothenabled devices that are now on our person
and then entering the enterprise, he says.
CIOs have to remember that enterprise
lighting systems are now accessible from
outside [their organizations] and connected
to the internal network.
43
44
A Complicated Existence
Deciphering where NVs relationship
with NFV and SDN starts and stops can
be perplexing. NV is commonly described
as enabling an enterprise to slice a physical
network into several virtual ones that reside on the same infrastructure but remain
isolated. This is similar to how server virtualization permits creating multiple virtual
server instances on one physical server.
Matthew Ball, Canalys principal analyst,
describes NV as enabling the creation of
these dedicated, separate networks for different uses, applications, departments, and
more. For example, an enterprise could
create one virtual network for testing and
development purposes and others to meet
specific QoS (quality of service), performance, and security requirements for different business groups.
Tauschek considers NV the last man
standing in terms of data center infra-
Anything you buy now is going to be proprietary SDN/NVready, or its going to be OpenFlow-ready, or both. Whats
really driving interest now is vendors.
MARK TAUSCHEK
Associate Vice President : Info-Tech Research Group
The Market
Implementation- and technologywise, NV is still in its early stages. Doyle
writes, however, that because using NV
software as an overlay to existing network
infrastructure offers a fairly easy option to
alleviate virtual machine networking challenges, he expects NV adoption to strongly
increase throughout 2015 and 2016. Doyle
explains that adoption will depend on
pricing, standards, the open-source impact on the market, and other variables.
He projects global spending on the SDN
software market, of which he counts NV a
subset, to reach about $1.2 billion by 2018.
Tauschek says Info-Tech is seeing more
client interest in NV and SDN, though the
technologies are emerging within enterprises primarily in test beds, lab environments, or safe segments of networks. That
said, executives should be learning more
about NV now.
Anything you buy now is going to
be proprietary SDN/NV-ready, or its
going to be OpenFlow-ready [an open
networking standard for configuring
switches], or both, Tauschek says.
Whats really driving interest now is
vendors. Here, few independent NV solution startups remain as large network
vendors have all bought into the technology with acquisitions, he says. Now,
a lot of the vendors are saying to their
customers, Look at what we can do. Isnt
this cool? You should buy it.
45
KEY POINTS
Understand that risk and security
are actually business issues, so the
business should manage them and
have IT put solutions in place.
There are almost too many potential issues to name if you dont
take a risk-based approach, but the
most crucial are data loss and loss
of brand reputation.
Consider implementing GRC
platforms, to better handle risk and
compliance, and put strong quality
assurance processes in place.
Security and IT teams need to
use business terms when communicating risks so executives and
managers understand how important it is to fix security issues.
46
Understanding Risk
Once conversations among the business and IT groups begin, you can
move on to establishing the definition
of risk and working to spread that idea
throughout the entire organization. The
first step, according to Versace, is to
understand that risk and security are
actually business issues and not software
or technology issues. For that reason, he
recommends that companies consider
moving security out of IT and making it
a function of the business instead. Using
this approach, the business can pinpoint
enterprise risks, and then IT can help
put software and technology in place to
minimize those risks.
Ultimately, the end responsibility
with incentives and compensation
models around it for security and risk,
have to be established at the line of business level, says Versace. These folks
have to have the ultimate endgame responsibility, and its their responsibility
really to bring development, operations,
and security together on solving those
problems for their products, services,
and ultimately the line of business that
they operate.
Versace also recommends that companies put business training programs
in place so their security and operations
[Companies need to make] information security a business quality priority. . . . Its not something that simply
sits in technology. Its something that must sit in the line
of business, and we see that. We see a whole bunch of
trends indicating how much more business is influential
in making technology decisions that relate to risk and
security. Organizationally and policy- and process-wise,
making these things a business responsibility, priority and
accountability with incentives is really important.
MICHAEL VERSACE
Global Research Director : IDC
47
easy to email someones health information to the wrong person or to the right
person, but its not secured, Murphy
says. Thats why she recommends companies keep risk in mind, regardless of
project or process.
If youre not doing this to mitigate risk, why are you doing it then?
Murphy asks. The only reason you do
anything should be to mitigate risk. You
have a risk and you want to mitigate it,
so you create a control. Then, audit goes
in and tests that control to make sure
the mitigation works. If you ever have a
control that isnt tied back to a risk, you
are literally doing it for no reason, and
thats the danger of not taking a riskbased approach to security.
48
systems or any other solution throughout the organization are put in place,
they need to be checked for QA
throughout the development, testing,
and production processes, he says.
Versace stresses the importance of
including QA as a part of the business
continuity process as well, which can
also involve what happens when you
make changes to infrastructure. He says
you have to be able to evaluate how
changes to an operation or application or even to a significant business
process might impact the ability of the
firm to recover from a minor problem,
like a software or server failure or a
storage array running low on space, or
a major failure that could be related to
a major issue in the data center or loss
of power.
Communication Is Key
Although the strong risk-aware culture has to come from the top of the organization, there is also a huge amount
of responsibility on the security team
within an organization to properly communicate its concerns to executives.
Murphy says that too often executives in
companies are warned about security issues but because the warning isnt given
in business terms, it falls on deaf ears.
Its important that the security team
learns how to speak to the business and
that the business listen to what the security team has to say.
Even when you do bring them the
risks, if management doesnt have an
understanding, then that, to me, is
the biggest disconnect, says Murphy.
Once you understand the risk, you have
to understand how it actually feeds into
the corporate risk and figure out how
your security solutions and your security
risks impact that business. Then, he
adds, you can point it back to the business and have business conversations
with the rest of the world. You can have
your conversations about security and
technology internally, but the minute
you take that out of your own department, understand that you need to speak
in business risks, because technology
risks will never win the day.
49
The Approaches
Encryption in general can be classified
into hardware- and software-based categories. Michela Menting, ABI Research
practice director, says both are valid for
endpoints. The former includes hardwarebased full-disk encryption, something
common to desktops and laptops, and can
involve usage of external hardware such as
USB dongles or flash drives that essentially
contain a random number generator that
creates an encryption key. Hardware-based
encryption can be more efficient and uses
less power, but it is more expensive than
software-based encryption, Menting says.
Software-based data encryption doesnt
rely on external hardware and is typically
easier to implement. Further, the approach
enables protection of data in transit and
at rest. Yet, this can increase processor
overhead and reduce data-transfer times,
Menting says. Overall, while no encryption
technology is inherently more secure than
any other, Menting says, AES (Advanced
Encryption Standard) is currently considered the most secure cryptographic scheme.
Importantly, the security of an encryption
system relies just as much on the secrecy of
the key as on the algorithm, she says.
Where laptops are specifically concerned,
widespread enterprise encryption deployments once carried a considerable pain
factor in terms of long and involved installations. Self-encrypting solid-state hard drives
have greatly turned this on its head, reducing
encryption times down to a minimal state,
McCloskey says. Elsewhere, some organizations take advantage of embedded encryption technologies on laptopsBitLocker on
Windows systems and FileVault on Mac OS
X systemsto obtain encryption benefits,
though lack of manageability can be an issue.
To combat this, many organizations seek
out endpoint encryption solutions that add
a management element but also enable using
embedded technologies.
50
The Market
Beyond health care companies and financial sectors, any organization dealing
with considerable personal identifiable
data is a good candidate for endpoint encryption. Insurance companies and some
educational entities where FERPA (Family
Educational Rights and Privacy Act) comes
into play are examples. McCloskey advises
organizations that deal with sensitive or
valuable IP (intellectual property) information to consider endpoint encryption
be capable of much more, in terms of destruction. For years, hackers have used
infected USB drives to spread malware that
could execute on machines with AutoRun
enabled, says Chris Rodriguez, Frost &
Sullivan senior industry analyst, network
security. More recently, researchers
Karsten Nohl and Jakob Lell published research on USB firmware vulnerabilities that
could mean the risk is even steeper.
Nohl and Lell, both researchers at SR
Labs in Berlin, discovered that USB devices
can have several identities, which are indicated by descriptors in the code. Malware
installed in a USB devices firmware can
make the device appear as a different type
of USB device, which allows it to infect
multiple endpoints and gain root privileges
and spoof other devices.
Typically, an infected USB device can
send code both directions, from the USB
device to the PC and from PC to the USB
device, says Tang.
The most notable examples of USB drive
attacks, according to Tang, are BadUSB
A Universal Attack
These types of hardware-based attacks arent dependent on a PC running
a particular OS (operating system) or
application. Since the infection is rooted
51
Risks Everywhere
If a USB device, including a mouse or
external hard drive, could hide malware,
how do you go about protecting your business and local network? You wont' find the
answer with your current security software.
Generally speaking, traditional security
approaches won't work because the malware resides in the firmware that controls
the sticks basic functions and the malicious code is invisible to conventional security tools, say Tang. Even if you had
tools that could identify the code, reformatting a BadUSB-infected stick wont fix
the problem, because, as Tang mentions,
the malware is in the devices firmware.
To protect your business and networks,
youll want to make certain that employees
never use any unsecured USB drives.
However, this might be harder than you
think. As Rodriguez explains, Penetration
testers tell stories of leaving USB drives in
common areas, on desks, or even laying
in a parking lot. Inevitably, someone will
come along and pick up the USB drive and
plug it into their work machines and personal computers.
52
A malicious hacker can program a USB drive with malicious commands and make the USB device act as other
devices such as a keyboard, network card, etc.
ALAN TANG
Director In Security Infrastructure : Info-Tech Research Group
Possible Solutions
Due to the challenges involved in detecting the firmware level code, youd need
advanced forensic methods for examining
devices. This type of deep scanning might
be difficult to achieve. In order to detect
hardware-level USB drive hacks, security
software vendors need the specific API
[application program interface] to access
to the firmware, which may be unique to
each manufacturer, says Tang. At this
point of time, it is almost impractical for
USB drive vendors to open their APIs to
other partners.
Multiple layers of security can help to
prevent any serious breaches. Businesses
should have plans to migrate to NGFW
(next-generation firewalls), which include
integrated threat detection capability, says
Rodriguez, who also notes that a UTM (unified threat management) solution "provides
a NGFW, plus a range of additional capabilities, such as content security, intrusion
prevention, gateway AV, and data leakage
prevention. NAC (network access control)
tools can also help to block network-based
USB device attacks.
What might be more practical is something thats already in place in most
modern OSes. Code signing is a common
countermeasure from the operating system
side to stop the unauthorized modification of firmware, says Tang. Microsofts
WHQL program uses a type of signing
that will ensure that firmware has not been
Likelihood Of Attack
Despite the difficult-to-prevent nature
of USB device attacks, hardware exploits
are not the easiest path for a cybercriminal to take. For example, its not a simple
matter to reprogram firmware. Secondly,
hackers would need to find a way of getting
the USB devices into the intended targets
hands. The extra effort required makes
the hardware attacks an unlikely way to
target anyone but very large businesses or
high-value marks. Traditional methods of
attack are much easier for cybercriminals.
Still, it helps to be mindful of the risks.
USB ports on POS [point of sale] systems
are frequently targeted to great effect,
says Rodriguez. Hackers could also offer
low level and temporary employees thousands of dollars to connect a USB drive
with carefully crafted malware into a POS
system. That is all it takes.
GO DEEP
If quality time with the latest, fastest home computing technologies is your
idea of well-spent leisure time, CPU is the magazine for you. Each month CPU
serves up how-to articles, interviews with tech industry leaders, news about
cutting-edge research, and reviews of the newest hardware and software.
Storage Management
WHEN EVERYTHING IS COMPUTERIZED, STORAGE IS MORE CRUCIAL THAN YOU MIGHT THINK
KEY POINTS
Todays IT personnel must deal
with an ever-increasing influx of
data and storage-consuming apps
while continuing to manage the
data thats already stored in-house.
Poor storage management can
result in various negative impacts on
a business, including applications
running slower or stopping entirely.
Storage management involves
making decisions about what types
of data are (and arent) good candidates for cloud storage.
Organizations that decide to
migrate data from one storage
method to another should anticipate
potentially lengthy data migrations
and multiple potential impacts on
the business.
54
the business that poor storage management can lead to. This article explores
those concepts.
The Technicalities
Storage influences all aspects of an organization. Storage underpins all your
applications, housing the data required
to keep the lights on, bill customers,
pay employees, and keep store shelves
stocked, says Terri McClure, Enterprise
Strategy Group senior analyst. Weve
computerized everything, and it all depends on data being available to run.
Generally speaking, executing good
storage management ensures systems
are healthy and performing and that
theres enough space to store all data.
Failing at these tasks can result in
applications running slower or stopping, which in turn, depending on
the application, can cause an immediate negative impact on business. If
an application runs out of addressable
storage capacity, for example, it cant
IT Issues
Largely due to data growth, storage
management has become more difficult
for IT. Finance, budget, and other constraints dont help. Storage now takes up
a larger piece of overall IT, DuBois says.
Storage infrastructure is growing, but
the [number of] people to manage the
storage is not growing.
Although the cost of storage hardware is continually falling, another hard
truth is that the price of software for
managing storage isnt dropping as fast,
says Clive Longbottom, analyst and
Quocirca founder. Power, cooling, and
real estate costs are also rising. Such realities can make it necessary to use data
management techniques such as deduplication even at the file level in order to
reduce actual required storage volumes,
he says.
A business perception that storage
is cheap, however, can hinder the implementation of efficiency strategies,
Longbottom says. Asking businesses to
come up with solid policies on data
taxonomy and classification, along with
retention schedules, isnt easy, he says.
Its far easier for them to just say, Buy
more storage and store everything.
Storing everything, though, slows data
55
56
SPEED OF CHANGE
You use CyberTrend
to keep tabs on the latest
.COM
Get the latest issue right now
online at www.processor.com
or on your iPad via the iTunes Store.
58
The Ultimate
Audio Upgrade
WWW.CREATIVE.COM
If you prefer your digital audio to sound
bigger, bolder, and more refined than
what the typical computer, audio player, or
gaming system provides, the Sound Blaster
X7 ($399.99) from Creative offers an impressive upgrade. The latest in Creative's
Sound Blaster line of audiophile-grade
amplifiers, the X7 connects to a computer
or other device and delivers sound to
whatever you want to attach to it, whether
you plug in your favorite headphones or
speakers, or stream audio wirelessly via
the X7's Bluetooth 4.1 capability with aptX
Low Latency and AAC codec support. The
X7, which also acts as a Dolby Digital 5.1
decoder, is ideal for enhancing shelf-style
speakers in small spaces.
59
Images, clockwise from top left, courtesy of Apple (1), Samsung (2), Sony (3), Microsoft (4, 5), and BlackBerry (6)
Smartphone Tips
LOADS OF QUICK ADVICE FOR GETTING MORE OUT OF YOUR SMARTPHONE
BLACKBERRY
Get Driving Advice
On Your BlackBerry
If youre using the Map app to find
your destination on a BlackBerry 10
smartphone, with a few more taps on
the screen you can also get turn-byturn directions and other advice for
the drive. If you can see your destination on the map, you have undoubtedly
already established a GPS connection.
Now, tap the pin marking your destination, tap the Location icon (triangle
pointing upward), and then tap the
location icon again to start turn-byturn directions. You can toggle spoken
directions on and off by tapping the
speaker icon. Tap the X icon at any
point to turn off turn-by-turn directions. While youre driving, you can
tap the List icon to see the directions in
list form.
60
Keep It Cool
The lithium-ion batteries used in mobile devices such as BlackBerry smartphones retain more capacity over time if they are kept cool. Precise capacity
loss varies depending on multiple factors, including how frequently the battery is charged and what level of charge is maintained, but it is generally the
case that devices stored with 100% charge at 32 degrees Fahrenheit (0 degrees
Celsius) will lose roughly 6% capacity per year, while those stored at 77 F (25
C) will lose around 20% capacity per year, and those stored at 104 F (40 C) will
lose about a third of their capacity per year. Storing batteries at a lower charge
(generally between 40% and 60%) reduces capacity loss, especially when using
the device in hotter temperatures.
ANDROID
Avoid Storage Woes
One quick way to reduce your Android smartphones cellular data usage and
battery consumption, which can be particularly useful when traveling, is to
stop apps from using cellular data in the background when a Wi-Fi connection
isnt available. Doing this can cause apps that rely on background data usage to
malfunction, but does not impact how apps behave when youre actively using
them. On the Home screen, tap Apps and then tap Settings and Data Usage.
Tap the Menu icon
and then tap Restrict
Background Data to
select it. A pop-up box
will caution that apps
performance might be
affected; tap OK to continue. You can more
carefully control how
apps use data connections by adjusting the
settings within each
app, but stopping background cellular data
usage is an easy way
to turn off such usage
across all apps, and its
Restricting the background use of cellular data affects all apps, but is a
quick and easy way to control data usage.
just as easy to turn this
setting off again.
Website Bookmarks
& Saved Pages
The Android operating systems
browser distinguishes between website
bookmarks, which are links to specific
Internet locations and operate the same
way they do on desktop browsers, and
saved pages, which are Web pages saved
to your smartphone for future reference. When you are using your mobile browser, tap the Bookmarks icon to
create a bookmark for the page youre
currently visiting, or tap the Menu icon
and Save Page to save the current Web
page for reading later on. Links at the
top of the browser screenBookmarks,
History, Saved Pagesoffer quick access to these items.
Unlike bookmarks, saved pages in Androids browser are Web pages saved to your smartphone.
61
I OS
The iPhones built-in Notes app may seem fairly, ah, one-note in terms of the
way text appears on-screen. You cant, for example, add true indentations or
bullet points (although you can make your own bullet points using dot symbols).
And recent iOS versions dont even allow you to change the font. However, the
Notes app includes features that let you do a little more with text. Tap any word
twice and the Cut/Copy/Paste menu appears. Tap the right arrow icon on the
right of this menu to access formatting options, and tap BIU to change
formatting for the selected word to
bold, italicized, or underlined. There
is also a Define option in case you
would like to look up the dictionary
definition for the word.
Dont Tap-Tap-Tap
Your Photo Button
Why tap away repeatedly at the
iPhone cameras photo-taking
button when you can simply use
Burst mode instead? To use this
mode, open the Camera app and
press and hold the button. The app
will then start snapping at a rate of
10 photos per second. A counter
above the button displays the
number of photos taken. Be forewarned, the app will continue to take
photos at this rate until you release
the button.
Did you know you can turn your iPhone into a level?
62
Recent versions of iOS have eliminated the persistent time stamp alongside
texts in the Messages app, but that doesnt mean time stamps have gone away
completely. With a string of texts open in the Messages app, swipe to the left and
dont let go to reveal the dates and times that messages were sent and received.
WINDOWS PHONE
Take A Screen Shot
If there are any apps on your Windows Phone smartphone that youve used recently but arent using currently, theres a good chance those apps are running in the
background and consuming some of your phones resources. To stop an app from
running, access Settings, tap Apps, swipe to view the All tab, find the app, tap it, and
then tap Disable. Repeat these actions for every app you wish to shut down.
Add Notifications
If you have any installed Windows
Phone apps that could provide you with
notifications but dont, check the notifications settings for those apps. Access
Settings, tap Notifications + Actions, select an app, and toggle Show In Action
Center to the On position to enable notifications for that app.
Swipe To Type
A feature new to Windows Phone 8 enables you to type by moving your finger
from one letter to the next on your phones on-screen keyboard. Microsoft calls this
shape writing because the words take shape as you move your finger about the
keyboard. Android users will find this feature familiar as it is standard on Android
phones; it is not, however, a built-in feature of BlackBerrys and iPhones.
Manage Notifications
To gain control over the ways in which
notifications appear on your Windows
Phone smartphone, access Settings, tap
Notifications + Actions, and select an
app from the list to change its notifications settings. You can, for example, tap
Notification Sound to change the sound
associated with that apps notifications.
Do Not Disturb
Sometimes its nice to be left alone. As with other mobile operating systems,
Windows Phone 8 includes a feature that lets you silence calls and notifications.
Microsoft calls its version Quiet Hours. To turn on Quiet Hours, press Search
(which brings you to Cortana if enabled), tap Cortanas Notebook, tap Quiet Hours,
and slide the Right Now toggle to the On position. On this same screen, you can
switch on Automatic Rules to schedule specific times for Quiet Hours to take effect.
63
64
Then select My Notes to start typing private notes or click Share Notes and choose
a section for note-taking.
in this way requires that the corresponding Microsoft Web App (Word, Excel,
PowerPoint, or OneNote) is installed.
Share A Presentation
choosing Share This Calendar. Next, insert the individual or group who will receive the shared calendar.
There are plenty of helpful features built into Office 365 to keep you organized. For example, you can customize your
Outlook calendar Web app as you plan meetings and work toward deadlines.
65
Isolate Malware
HOW TO COMBAT ATTACKS
66
when you visit an infected website, install software or an app with malware
hiding inside, click links or open attachments in email, or insert an infected USB thumb drive.
Though warning signs that malware
may be present can differ depending
on the malware type, there are some
primary indicators to look for. Michela
Menting, ABI Research practice director, says the most common include
applications and programs running noticeably more slowly, slower Internet
performance, and data or files that
are unexpectedly deleted or altered.
A notebook running more slowly, for
example, could indicate malware is
stealing computing resources to fuel
whatever activity the malware was designed to execute, such as hijacking
the system to help generate and spread
spam to other systems.
Some specific examples of changes
in notebook performance to watch out
for include programs, files, and folders
Immediate Response
When you suspect malware has
infected your notebook, Menting
advises turning off its Internet connection. Most malware will use the
Internet connection to send information back or infect other computers
on a network, she says. Isolate the
laptop and then run an antivirus scan.
Additionally, ensure that antivirus
software on the notebook is up-to-date
with the latest malware signatures.
If not, then copy a free AV program
onto a USB thumb drive and use it to
install [the software] on the disconnected infected PC, she says. More
Means Of Prevention
As a means of prevention, Menting
says, at the least, you should ensure
that a firewall is running and working
properly. Generally, she says, most operating systems have built-in security
67
Bluetooth Finder
$20+
Ever set down the keys to your rental
car or your own vehicle on a restaurant
table only to get up, walk away, and leave
them behind? Many of us have done
this. One way to prevent the aggravation
that typically follows is to attach a small
Bluetooth dongle-like device to the key
ring. These devices communicate with
a smartphone, warning you when the
phone moves out of range of the dongle.
Typically, such devices cost about $20 or
more and have a smartphone app that
sounds an alarm, emits a beep, or even
provides a visual indicator that lets you
see when you get closer or move farther
away from the key ring or other object to
which you attached the device.
68
Bluetooth Keyboard
$60-$100+
Device Charger
$40-$100+
Luggage Tracker
$50-$100
Some people would pay a small fortune to know where their luggage is
at all times. Anyone who has experienced lost luggage understands why.
The good news is you dont have to pay
a fortune to pinpoint the exact location of your baggage. For somewhere
in the neighborhood of $50 to $100,
you can acquire a device (perhaps even
an FCC-certified and FAA-compliant
one) that uses GPS (Global Positioning
System), GSM (Global System For
Mobile Communications), and other
technologies to provide tracking abilities for luggage. These devices are
small enough to easily fit in a bag and
can do such things as email or text
you a verification that your luggage arrived at its destination. If your luggage
is completely lost, the devices let you
pinpoint the bags locations on a Webbased map.
Multi-Tool Knife
$25-$100+
While you still cant carry a pocketknife onto a plane, you can take one
with you when traveling by land, and
having a multi-tooled knife on hand
can get you out of a fair number of
jams, including in a storage sense.
Thats because beyond packing an actual blade (as well as possibly a screwdriver, scissors, wine opener, pliers,
etc.), some multi-tool knives integrate
a USB memory stick for storing and
transferring several gigabytes worth
of document, image, video, audio, and
other files. Thus, even if you lose your
notebook or tablet, youll still have important files handy. Depending on the
storage amount and model, prices of
multi-tool knives can span from about
$25 to $100 or more.
Noise-Canceling Headphones
$50-$100s
Whether in a plane, shuttle bus, taxi,
or room in a not-so-quiet hotel, noise
seemingly always surrounds a traveler. Noise-canceling headphones provide an escape from the din by using
Portable Hotspot
$50+
Staying Internet-connected while
traveling is an absolute necessity for
business travelers, but doing so via
Wi-Fi isnt always easy. Although
public Wi-Fi hotspots are available,
theyre not always free and security
can be an issue. An alternative is to
use a portable hotspot device (costing
about $50 or more) that uses a mobile
broadband connection (a 4G LTE network, for example) to form a wireless
hotspot for multiple devices. Another
option is to use a portable router. Plug
an Ethernet cable into, say, a hotel
rooms wired Internet port, plug the
cables other end into the router, and
youve created a wireless network with
multiple-device support. Elsewhere,
various companies provide private
Wi-Fi services for a monthly/annual
charge that provide a welcomed layer
of security when connecting to a public
Wi-Fi hotspot.
Portable Monitor
$75-$200+
In some office environments today,
you may see two (or more) monitors
on an employees desk. This setup allows users to easily switch among open
programs, keep tabs on continually updating information in a Web browser,
and perform other multitasking chores.
Travelers can get this same secondscreen ability away from the office by
bringing along a USB-based portable
monitor. Such screens (generally $75
to $200 and more) connect and draw
power from a notebook via USB cable.
Storage Device
$10+
One thing you cant have too much
of is storage, including for reasons
tied to accessing and backing up data.
Packing an extra memory card, USB
thumb drive, or external drive on
which you can grab or offload photos,
videos, and other files is smart. (Just
make sure not to lose the storage device on which that data resides.) If
youre expecting rugged conditions
where youre going, some external
drives and USB memory sticks offer
water- and shock-resistant features
to provide protection against the elements and drops. Overall, storage
continues to be an excellent value.
Memory sticks, for example, can
start at around $10 depending on the
storage capacity.
Video Streamer
$35-$100+
Its possible you already have a settop box-like device attached to your
HDTV at home to stream on-demand
TV programs, movies from subscription services, and audio from Internet
radio stations. A nifty aspect of these
devices is that travel-friendly sizes
(some are essentially a glorified USB
stick) means they can easily stow away
in a suitcase. Unpack it once in your
hotel room; connect it to the TVs
HDMI, USB, or AV port; configure
the Wi-Fi settings; and all the content
you have at home is now available for
watching in your hotel room. Should
you forget to pack the remote control
the device bundled, many streamers
have compatible apps that enable a
smartphone or tablet to function as a
remote control. With prices ranging
from about $35 to $100 or more, these
devices are an entertainment steal.
69
Excel Formulas
MAKE THEM WORK FOR YOU
70
Calculate Percentages
You can calculate percentages in a variety of ways using Excel, depending on
MATCH Function
Excels MATCH function makes
it easier to find the location of a specific
figure relative to its order in a column.
For instance, if you are searching
for the number 780 in a column of
30 cells, you can type the formula
=MATCH(780,B1:B30,0) to find your
exact match. If the information is located
in the 15th cell, for instance, youll receive
the result of 15 from the formula. You can
also use a 1 or -1 modifier in place of the 0
to find the number that is greater than or
less than your desired figure.
Round Up Or Down
If you work with figures that have multiple decimal numbers and need to round
up or down to a specific decimal place,
then Excel has two easy functions you
can use to get the job done: ROUNDUP
and ROUNDDOWN. For example, take
a number you want to round up, such
as 12,345.678 and decide what decimal
place you want to round to. Then, use the
function =ROUNDUP(12,345.678, 2) and
Excel will automatically round it up to
12,345.68.
WORKDAY Function
WORKDAY lets you take a start date
and a number of days to determine what
your end date will be with weekends and
holidays taken into account. For example,
you need to enter the DATE formula,
The MATCH function is helpful if you want to find a specific figure in a long column of numbers. It shows you where your
query is located in relation to the array you provide in the formula.
REPT Function
Typing the same thing over and over
can quickly get repetitive, especially if
you need 32,767 instances of the same information. If you think that number is
oddly specific, youre right. Its the maximum number of times you can use the
REPT function, according to Microsoft.
To use the REPT function,
simply take a word, number,
or other entry (Repeat,
in this instance) and tell
Excel how many times you
want it repeated by typing
=REPT(Repeat ,5) into a
cell. You can also use this
function to better visualize
data. For instance, you can
use symbols to represent
sales figures or your amount
of customers and watch your
growth over time.
71
Certied Piedmontese beef tastes great: lean and tender, juicy and delicious.
But theres more to it than just avor. Certied Piedmontese is also low in fat
and calories. At the same time, its protein-rich with robust avor and premium
tenderness. Incredibly lean, unbelievably tender: Its the best of both worlds.
piedmontese.com