Friday, December 27, 2013

Windows 8 May Become Useful

Remember the oldie "Heard It Through The Grapevine"?  When it comes to industry secrets and Windows, the Grapevine can often be the Gospel.  And today, that's cause for celebration!  Seems Microsoft has made some announcements.

First, back in October, they said Windows 7 would no longer be sold after October 2014.  A bit over a month later, they renounced that statement, labeling it a mistake.  Huh?  How does a press officer individually come up with kill dates?  And how does it take over 5 weeks to find it? Strike one.

Strike two, the Grapevine.  "Sources" say there are plans to branch the current Windows 8 behemoth into separate avenues:  one along current lines, one more like Windows 7, and another that will also support 32-bit applications without the need for a virtual XP machine. (Think Monty Python, light from above, choir. Ahhhh!)  Where was this kind of decision making back when Windows 8 was being developed?  Dumbing down, least common denominator, that's what happened instead.  Just who thought this approach would be a good idea for the public at large? This rumor mill versioning sounds far more appealing, and more importantly, workable.  Versioning should have been at the top of the list in Microsoft's pursuit of Apple.

Apple hit the bullseye with their approach to the stationary vs mobile situation.  There was no mass attack on the computing world, Apple just made sure their apps would co-exist and the OS versions were branched from the start.  OSX for stationary devices, iOS for the phones and pads.  Forward thinking, just what we have come to expect from them.  In the process, Apple reinvented the technology landscape.  Done deal.

Then there's Microsoft, thinking they will come from behind in the mobile arena to upset the Apple cart and Dancing Days Are Here Again.  Not so much.  Microsoft succeeded in creating record breaking upgrade sales, but they also created a record decline in PC sales.  The dog-and- pony-show folk will point to the fact that people bought Microsoft tablets instead.  Hel-lo!!!  If the average Joe looks at the marketing and thinks his PC will work just like a tablet and look just like a tablet, why not pocket the extra cash and just buy a tablet?  Cannibalizing PC sales for the sake of a unity that no one wants is questionable at best.   The tech world goes on, with or without Windows 8.  Microsoft has maybe figured that out.

If there's any validity to the rumor mill, Microsoft is in the process of reinventing this mistake and labeling it a marketing ploy.  Coke comes to mind, underestimating the public and trying to put a good face on the shambles.  Only takes one letter to turn a face to a farce, though.

Saturday, December 14, 2013

All Access Pass

In the course of business a couple of weeks ago, a client asked about his phone.  He wondered if it could have become infected somehow, as it was frequently restarting on its own. He had called his carrier who said, oh, there's something wrong so let's reset your phone. What??!!  I imagine the screech of a record needle being pulled right there, for those of you who even know what that sounds like, I suppose.  I digress.  Reset the phone, that's what they told him, and being the unsuspecting person that he was he did it.  Reset the whole thing.  The whole thing. All of it.

If you are in full realization of what that he did, you understand my disbelief, my appalled, dismayed, utter disbelief. Someone on the other end of the phone halfway across the world that doesn't have to deal with the aftermath of this recommended reset, says, "Press Settings, Backup and Reset, Factory Data Reset. That should solve your problem."  Of course, that same rep forgot to add, "Oh, by the way, the phone will disconnect and you'll never be able to track me down."

No, really, it's not QUITE that bad, but come on, everything on the phone is gone.    Everything was gone. All of it.  Nothing left.  And how happy do you think this innocent customer was when the phone rebooted and he realized this?  Suffice it to say he would have dearly loved to chat in person with the rep.  Fast forward a few days to when I see him, he's telling me this story and as I start to see where it's going I can't help but groan.  I am getting that sinking feeling like it's my data that's gone, like I feel when anyone loses data.  Data hoarder that I am, I hate to see it happen.  I know a few more of you, so I'm not alone in sharing this agony.  This utter, useless, agony.

Why useless? Because as I start to ask questions about why he called them in the first place, I found out about the shut downs and restarts and the sudden way it had become flaky and realized the problem wasn't the system.  The problem was the most recently installed app!! The rep didn't bother to ask about apps and the caller didn't think it could be the problem.  And now the phone was back to square one.

I recently intentionally reset a rooted device, and even using a full app/data backup for the restore I had issues.  Apps that thought they had Google's permission to use Google services could no longer connect, couldn't sync, were no longer useful.  The device had been properly set up in the first place and it had worked before the reset, but not any longer.  I finally narrowed down that it couldn't reconnect to the account that had been being used but could connect to others.  Soooo, it's a permission issue somewhere along the line.  Had to find Google's Revocation page and revoke all that access and force my apps to request new permission to connect.

Luckily this client's reset wasn't quite as hairy as all that, but it's always a possibility.  Keep in mind that non-Google apps using Google services to sync, transfer and otherwise keep us up to speed can balk at a reconnect. Google's end still identifies the device's info and finds no reason to reissue the connection token leaving the apps stuck in limbo.   This might help :  Google's Revocation Page.

Sunday, December 8, 2013

Multitasking

It's the time of year when all those nifty little electronics that have been beckoning are on sale, and more and more folks begin to think they need one.  I know, I love 'em too, but by the same token I like to try to keep it simple.  The right tool for the job, the proper app for the purpose, all multitasking as much as possible.  Reminds me of a time years ago when a couple kids were going door to door selling "the greatest cleaner that was ever made".  They tried hard to sell it, went down a laundry list of what their nifty cleaner would do, but I already had a product for each and every purpose they could think of. They asked what would impress me. Honestly, something that will take care of an as yet unmet need. I didn't have any, no sale.

I look at technology in the same way.  I don't need the wand scanner I keep seeing advertised. If I need something scanned, I have a scanner or a phone that will turn a photo into a PDF, and mobile apps and open source computer applications that will transform it into an editable document.  For Mobile: Smart OCR:Text Miner  For PC: Tesseract OCR

Another mobile device that proves very useful is the camera.  People snap and post pictures with phones all the time, quick and easy. Digital cameras are also a good thing, like on a trip, but the hassle of dealing with the camera photos means that when we get home, I rarely take the photos off the camera.  They sit there till next time we need the camera unless there's still lots of room on the card.  Enter a totally awesome idea, wifi cameras  that allow instant offloading (my next one will be wifi) and wifi SD cards to give older cameras the same functionality.  Solves the problem in a couple ways, and I can keep the cameras I like while they get easier to use.   Toshiba FlashAir 8GB Wireless Memory Card

The problem with the other camera is that though it shoots super fast so I get what I was shooting, it uses a proprietary memory card.   That means I can't use the nifty wi-fi card with it, but I can now use an adapter that will allow a micro-SD card to work, and I have those around in abundance since they work in everything else.  Done.  Micro Sd to Memory Stick Adapter

But, what if the price you see is still too steep?  Price shopping is mandantory this time of year, and there's a web service to help.  It has a memorable name, so go there and use price history, set alerts, and browse the deepest discounts.  One less thing to keep track of since this service will do it automatically.  CamelCamelCamel

Enter Amazon.  Another multitasker for me.  One of the places to price watch, plus the smart apps on the TVs will stream their free Prime movies.  Daily free Kindle books and free apps, and Prime members get free two-day shipping for a year.  Members can also use their Prime shipping to send their purchase to anyone they like for no additional charge.  Amazon's free shipping on other purchases just went up to $35, maybe as a way to boost Prime memberships before the drone fleet takes wing.  Try one free.

Now what to do with these alerts?  Ahh, glad you asked.  IFTT will handle almost any alert you have.  If This Then That is your app collection stepping up and interacting.  What IFTT does is allow users to set automated actions when triggered.  It connects to Evernote, SMS, Dropbox, Box, Drive, Feedly, WordPress, and many others.  When an event occurs in one app, another responds. Say you subscribe to news feeds in Feedly and one item is worthy of saving.  Save it in Feedly, a clip shows up in Evernote.  Your package was delivered and the Boxoh event triggers an SMS. Save yourself time by using truly simple web based automation.  IFTT

Saturday, November 30, 2013

The Threat Landscape

We've all done it, clicking happily along like usual, engrossed, absently clicking the pop-up without paying much, if any, attention to what is wanted.  Usually it's no biggie, just another opportunity for distraction.  But not always.

There's an increasingly common result from those absent clicks, one that in extreme instances will lock up all your data, and in all will demand payment.  This is a new variety of infection referred to as "ransomware".  

Technically, it isn't a virus, think more like a bacteria.  Malware, computer programs written for a less than honorable purpose, is on the rise, especially the kind that directly invites you (read extorts) to send the writers money.  In the process, of course, also revealing enough information for them to take you to the cleaners.  

Chances are if you see something like this it has a name relating to computer security, suddenly popping up and announcing a host of infections that it will kindly address.  Then there are the types that will do this while locking you out of certain computer functions.  Others lock you out of nearly all computer functions, and then there are the ones that encrypt your data and hold it hostage.  Yes, your data is now locked with an encryption key that has not been shared with either you or the NSA.

Generally speaking these infections can be gotten rid of with a fairly straightforward approach without any collateral damage.  But in the last instance, collateral damage is the name of the game. They are out to get you by whatever sensitive part presents itself and hang on till you pay.  And in some form or fashion you will.  Maybe not them, maybe not anyone, but in loss of productivity and time, still a loss.  

So what to do?  First off, read the popups.  If you just went to a website and there was a permission request, deny it.  Go back to what you were doing and see if it works.  Maybe it was a fluke, maybe it wasn't.  Infections can come from any website out there if they aren't being watched for hacks so be aware of what a site is requesting.  If you came there to read but that isn't done without granting permission, go somewhere else.  If you are looking for a download, get it from a reliable source and reduce your risk.  If you have Java, check it and make sure it's up-to-date.

Second, make sure your data is being backed up regularly, and to an external or offsite location. Make multiple copies, and anything that is mission critical needs special consideration.  Maybe save it to a cloud service such as Box, Dropbox, or Google Drive as well as to your computer.  If you would be willing to pay the scammers a minimum of $300 to get it back, it needs a backup plan and needs it now.

Third, keep your security up to date.  NOTHING will protect against anything, and if you click the wrong permission it becomes rather pointless anyway as the first thing the attack will focus on will be any and all defences already in place, but between a decent set of security software and some good old fashioned Spidey sense, you can avoid the biggest pitfalls.  If those fail, you have your backups. If you didn't make those, well, you won't have much.