Académique Documents
Professionnel Documents
Culture Documents
05
CYBERTREND.COM
THE NEW
ENTERPRISE
MOBILITY
ENGINE
HOW JMA WIRELESS
EMPOWERS BUSINESS
WITH BETTER MOBILE
CONNECTIVITY
CORPORATE TRAVEL?
NEED A VACATION?
Let our #missionbird take you where you need to go.
Our diverse fleet of 22 aircraft offers a travel experience above the rest.
39
CONTACT US
P.O. Box 82545
Lincoln, NE 68501
or
120 W. Harvest Drive
Lincoln, NE 68521
31 COMMUNICATIONS
unified communications vendors increasingly
offer UC via the cloud
50 SECURITY
cyberthreat report, better ROI from risk
management
34 ENERGY
the latest news and research into energyconscious tech
54 WEB
privacy and credit card records
37 IT
more colocation providers for more data, how
PC Doctor's Service Center helps IT personnel
identify and solve problems quickly
41 NETWORKING
network optimization basics, choosing the
right VDI provider, avoiding headaches when
upgrading Wi-Fi hardware
56 ELECTRONICS
the latest in premium consumer electronics,
innovations in wearable technology
60 TIPS
smartphone, data usage, travel, and other tips
for mobile professionals
Copyright 2015 by Sandhills Publishing Company. CyberTrend TM is a trademark of Sandhills Publishing Company. All rights reserved.
Reproduction of material appearing in CyberTrend TM is strictly prohibited without written permission.
2016
2017
Health Care
9.7
15
23.4
Public Services
97.8
126.4
159.5
206.2
354.6
648.1
Smart Homes
294.2
586.1
1,067
Transport
237.2
298.9
371
Utilities
252
304.9
371.1
Others
10.2
18.4
33.9
Total
1,107.3
1,704.2
2,674
Managed security services enable companies to keep up with security threats and response mechanisms,
ideally to the highest degree possible,
without having to deal directly with the
complexities involved in ever-changing
security requirements. This, says ABI
Research, as well as increases in data
breaches (49% from 2013 to 2014) and
stolen digital records (78% from 2013 to
2014), accounts for a marked increase
in the adoption of managed security
services. ABI expects the managed security services market will be worth $15.4
billion by the end of this year, and $32.9
billion in 2020.
11%
14.50%
23.90%
Constant Connections
& Privacy Concerns
5.3%
10.2%
Twitter
32.1%
11.3%
19.4%
Instagram
21.7%
Other
STARTUPS
Kryptnostic Claims To Offer
A Safer Cloud Experience
As workloads increase and organizations store more and more data, older storage
systems, including some that are just a few years old, are struggling to keep up. Hedvig,
a startup based in Santa Clara, Calif., claims to have addressed this problem with
its patented distributed storage system, which uses a software-defined approach so
cloud and data center personnel can remotely scale
storage in a virtualized
pool. To keep up with this
rapid pace of growth and
change, storage platforms
must now be software defined, says Brian Long,
general partner at Atlantic
Bridge. They must also be
scalable, streamlined and
most importantly, flexible
enough to make instant
provisioning changes. These are some of the advantages Hedvig says its system provides, with practical benefits that include more efficient big data analysis and more
scalable virtual environments. Atlantic Bridge recently led a Series A funding round for
Hedvig, which took in $12.5 million. Hedvig, which had been operating in stealth mode,
announced the new funding and the company launch simultaneously.
Businesspeople can spend an inordinate amount of time trying to iron out all
of the contact information they collect.
To address this problem, Denver-based
startup FullContact offers multi-platform
software that automates certain contact
management tasks, so users spend less
time synchronizing, combining, and updating information. FullContact closed a
funding round recently, bringing in $10
million and raising its total raised so far
to $20 million. FullContact is currently
available for Gmail and iOS; with the
new funding, the company will continue
working to bring its software to Android
and Mac OS.
A great deal of time and money is routinely expended in the name of rigorous
research, the type businesses depend
on every day to secure client deals, provide consulting services, generate content, make sales, and meet other goals.
Among the companies striving to make
search less tedious and more informative
is Quid, a San Francisco-based startup
that uses artificial intelligence, access to
hundreds of thousands of sources, and
a natural-language search algorithm to
deliver more, better, and faster results.
Quid recently closed $39 million in Series
D funding, which the company says it will
use to continue its growth.
IT USED TO BE that cellular networks were only used for voice. But
as brick phones gave way to flip phones, and flip phones gave way to
smartphones, cellular network demand continued to grow. Now a
slew of other devices, including tablets, laptops, and countless wireless
devices and sensors, rely on wireless networks to function correctly.
Reliable, high-quality connectivity is important in almost any
setting, but with so many professionals using mobile devices as
their primary means of communication, its crucial that enterprises
ensure that they offer strong wireless signals and stable connections
company-wide. JMA Wireless (www.jmawireless.com) is dedicated
to helping organizations do just that. In addition to manufacturing
the antennas and other equipment necessary to improve range
and enhance cellular signals within a facility or across a campus,
JMA Wireless provides the expertise required to help organizations
develop an ideal design plan that ultimately serves the needs of employees and guests alike.
Industries Served
The products and services JMA Wireless offers are suitable for
any industry or environment, provided the coverage area, whether
Noteworthy Deployments
JMA Wireless has deployments at many stadiums around the
globe, including Angel Stadium in Anaheim, Calif., and Juventus
Stadium in Torino, Italy. JMA Wireless also has deployments at
airports and train stations in Nevada, Italy, Austria, Singapore,
Denmark, and elsewhere. Outside of sports and transportation, the
company has also installed its antenna systems in many high-profile
Higher Performance
For Campuses & Metro Areas
Metropolitan areas and campuses, particularly those surrounding sports complexes, are increasingly transforming to
include more shops, restaurants, hotels, and entertainment
venues. As these areas grow, so too does the demand among
mobile users for wireless connectivity. However, demand
fluctuates. Full coverage may only be necessary in stadiums
for a portion of the year, or in business centers on weekdays, says Landry. As a result, businesses and venues want
smarter systems that can reuse capacity over time.
JMA's C-DAS (Centralized Distributed Antenna
System) architecture offers sector capacity management,
providing excellent economies of scale, reducing the need
for head-end baseband and radio units by as much as 25%.
C-DAS also frees up valuable space that would otherwise
be used for onsite equipment, Landry adds. In some instances, as much as 85% of space is recovered compared to
typical on-premises deployments.
KEY POINTS
Google Fiber hasnt been around
for long, but its already established
in three communities and has plans
to expand into five others.
Google Fiber is intended for both
residential and small business
deployments, with a comparatively
low price and flexible terms.
Google Wi-Fi is a rumored plan
to build on Fiber and offer Wi-Fi
connectivity for existing communities and the rest of the U.S.
Recent news indicates that
Google is planning to become a
wireless carrier in its own right,
but with a network based on Wi-Fi
and using cellular connectivity for
roaming purposes.
10
11
12
ALTHOUGH GOOGLE
FIBER CERTAINLY
MAKES SENSE
FOR RESIDENTIAL
USERS, THE HIGHSPEED INTERNET
SERVICE IS
PERHAPS EVEN
MORE OF A GAME
CHANGER FOR
SMALL BUSINESSES.
Fiber website, the company maintains
information about upcoming installations and a request form for those who
would like Google to consider their
community for Google Fiber service.
Larger Ambitions
With Google Wi-Fi
Google Fiber goes a long way toward the dream of offering high-speed
broadband Internet access to a large
number of people in the U.S., but due
to geographic barriers and the logistics
involved in laying down the equipment
and building out the infrastructure, it
isnt necessarily a viable approach in
every corner of the country. For that
reason, Google has been working for
more than a year on testing a Wi-Fi
network that could supplement its existing Fiber deployments, while also
making it easier to offer fast Internet
access in more regions.
Rumblings about Google Wi-Fi first
occurred in early 2014 when it was reported that the company was contacting
regulators in existing and potential
Google Fiber communities about the
planning required to bring Wi-Fi to
those areas. Because Google already has
a foothold in these communities, it follows that these sites would serve as ideal
real-life test beds for new Wi-Fi techniques involving the utilization of typically unused wireless spectrum.
Wi-Fi-enabled devices usually operate on the 2.4GHz or 5GHz frequency, but Google intends to test its
service on a variety of alternative wireless spectrum outside of the traditional
spectrum. This mainly involves the use
of higher frequencies, which should be
relatively free of interference and could
help Google offer wireless speeds that
are even faster than Google Fiber. In
fact, some analysts think Google Wi-Fi
could be as much as six times faster
than Fiber, depending on deployment
and other specifics.
The challenge with deploying Wi-Fi
technology to communities is that its
often a complex and expensive process
with quite a few variables. There are
transmitters and sensors that require
uninterrupted and unobstructed paths
between them to achieve speeds that
are higher than Fiber. Google, however, is highly experienced in working
with unique infrastructure challenges;
the company faced numerous such
challenges with Fiber, which is part
of the reason why Google is looking
for new and interesting ways to deploy
Wi-Fi nationwide.
Google published this graphic to illustrate how much quicker someone could download 100 photos when using Google Fiber as opposed to a standard Internet connection.
13
A RECENT REPORT FROM CISCO predicts that online video content is set for
a 13-fold increase, accounting for nearly
three-quarters of the worlds mobile data
traffic by 2019.
Video traffic already consists of 55% of
the total mobile data traffic, so its clear
that video is a priority for apps and websites being viewed on tablets and smartphones. Graphics and video capabilities
on PCs continue to steadily improve, as
well. It has never been more important
that your website and online marketing
efforts feature a strong visual presence.
A Visual Evolution
Stanford Persuasive Technology Lab
has found that people often evaluate
the credibility of a website based on its
visual design. The images you use, the
layout, and even the typography matter.
Using graphics and visuals are the path
of least resistance to get consumers to see
your content, says Jason Knight, head
of planning at 180LA. For example, do
14
video, on the other hand, can more rapidly provide information, often in a more
entertaining format. In short, visual content allows us to go from tell to show.
Traffic statistics tell a similar story. A
recent report from Shareaholic, for example, indicates that social networks
drove 31.24% of all traffic to websites.
Facebook itself accounted for 24.63%
traffic referrals, which was up from
15.44% in 2013. Overall, were relying less
on text-based searches, such as a search
engine query or directly visiting a website, and more on organic referrals from
our social networking tools. With that
in mind, you can leverage the power of
How Graphics
& Videos Communicate
Youve likely heard the phrase a picture
is worth 1,000 words, and the same concept is true with graphics and videos. The
ability to create an emotional appeal, and
to do so quickly, is one of the key elements
of visual marketing. When videos address
a real-time interest or need, they can create
an emotional appeal, says Brian Wong,
co-founder and CEO of Kiip. The images
you create and share with others can help
to both connect with customers and promote your businesss brand.
When it comes to creating videos that
will capture and engage your audience,
Wong gave us a few keys. First, the video
should be relevant to the content they
appear in. Secondly, the video should
appear to be serendipitous and without
incentive. For example, Kiip delivered
its own form of video advertising, called
Rewarded Video, inside the popular
mobile game Into the Dead, where the
ads showed a trailer for the popular TV
show The Walking Dead, says Wong.
The strong relation to the game content
helped the videos to receive a 77% viewthrough rate.
Visual content also holds appeal for
busy people who want to make the most
of their limited time. Theres a societal
pressure to keep up with news, and quick
visuals and graphics are an entertaining
condensation of information, says
Knight, who went on to note that A GIF,
meme, or six-second video can all deliver
your brands message, but with minimal
effort by a consumer. You can blow up
text and blend it with images, too, so you
can incorporate infographics, checklists,
tutorials, or slideshares to a website. Or
BRIAN WONG
CEO & Co-Founder : Kiip
maybe you just want to share an inspirational quote. The key is that you find a
quick way to share your message.
Whatever you choose to do, it should
be a seamless part of the online experience, whether it be an off-beat company
blog post connected to your website or
a critical video in the About Us section.
Of course, its also best if the customer
can stay on the website or product page
to view the visual marketing. Digital
platforms are increasingly incorporating
their own native video players and image
hosting, says Knight. Its important for
digital marketing to play naturally and
be contextual to each unique space.
15
16
Raised On Technology
An ability to write code, use mobile devices effectively, and collaborate fluidly are
Matter Of Perspective
Although millennials possess numerous
traits companies covet, Gen Y workers are
also described, whether fairly or unfairly, as
being more concerned about their personal
growth than the companys prosperity. Even
though millennials are said to be entering
managerial positions in increasing numbers,
theyre sometimes dubbed as job hoppers
who lack the company loyalty of older generations. Rather than seek job advancement,
millennials are said to place more value on
broadening personal knowledge and skills,
and they wont hesitate to switch course to
do so.
Thanks to all of these impressions and
statistics, much has been written about companies needing to manage millennials differently. Millennials, for example, are said to
prefer transparent management that entails
frequent feedback, clearly defined tasks, and
frequent new assignments. They also expect
access to the latest technologies. Further,
many experts suggest millennials dont necessarily view success in financial terms.
17
KEY POINTS
ERP (enterprise resource planning) had success early on in the
manufacturing sector, but it has
grown to encompass many other
industries and serve many other
areas within organizations.
ERP solutions automate business
processes and provide a system
of record, so theyre often used for
improving efficiency, productivity,
and information integrity.
Although traditionally entrenched
as on-premises software, ERP is
increasingly available via the cloud.
As organizations investigate new
ERP solutions, its important to consider both cloud and on-premises
solutions or even a combination.
18
ERP In 2015
Scavo reasons that if the ERP systems
developed in the 1990s are still being
supported, theyd actually have good
functionality still, simply because theyve
had time to mature. Systems developed
in recent years may not have the breadth
of functionality of older systems, but
they are much more intuitive, he adds.
Most of the newer systems were built
for the cloud and are much better at supporting mobile devices, he says. So if
you put newer systems up against older
systems, most people would choose the
newer systems just based on the user experience. The functionality gaps, though,
arent as easy to perceive until you actually start using the system.
Similarly, Nick Castellina, research
director at Aberdeen Group, says solutions today are more usable and flexible
to business changes. They also feature
more industry-specific functionality.
Executives may be surprised that they
dont need to do as much customization
as they thought, he says. Schulz agrees
that modern ERP solutions have a much
broader selection of integrations, with
both solution providers and third parties
creating offerings that often integrate
seamlessly into existing systems. For example, there are reporting tools that can
extract data from an ERP system into,
say, a spreadsheet. From there, the end
user is often quite comfortable creating
reports, designing queries, or using new
tools . . . to create customized reports
that previously might have required a
programmer and many thousands of
dollars, Schulz says.
19
20
Modern Choices
Among the keys to effectively
choosing, implementing, and
using ERP solutions is sticking
with market leaders and considering the total cost of ownership,
Schulz says. A cloud solution
may involve lower up-front costs,
but there may be additional fees
for extra features, and discontinuing use of the cloud solution may
not be as easy as you think, he says.
Generally, Schulz recommends
that enterprises pilot test a given solution before buying. This should
involve configuring the test version
and running transactions through the
system, ensuring to involve members
NICK CASTELLINA
Research Director : Aberdeen Group
Reduce Down-Time.
Reduce Waste.
Go With The Best.
PC-Doctor offers the industrys #1 Diagnostic
Repair Toolkitsnow supporting Android
devices and Macs.
GO DEEP
866.289.7237 | PCDServiceCenter.com
Mobile Devices
Expect to see a greater number and
variety of mobile devices to enter enterprises in 2015. In addition to smartphones,
tablets, and hybrid laptop/tablets, look
for connected wearables (smart glasses,
smart watches, etc.), televisions, and cars.
Christian Kane, Forrester Research ana-
22
that businesses will continue experimenting with BYOD and other strategies for deploying, managing, and
securing mobile devices, and he expects
an increase in top-down, corporate-led
deployments, particularly for the next
generation of connected devices designed for specific business use cases.
Battista expects BYOD growth to
slow, with many businesses opting for
more freedom on company-issued devices. Although BYOD remains a fit
for many organizations, he says, good
options to enable personal use of company devices now exist without giving
up too much control. Kane, meanwhile,
says he anticipates BYOD will reach
mainstream status, meaning companies will have more formal ways to support BYOD for more employees. Not
every employee will use his own device,
however, thus Kane sees mobile policies maturing to the point they detail
when BYOD applies and when CYOD
(choose your own device) applies.
Applications
Among enterprise mobilitys various
components, Battista views apps as the
most unpredictable. For example, he
says, within a matter of weeks an app
can go from one that nobody knows
about to the talk of the tech world to
pundits declaring it dead. That said,
Battista believes a killer app for wearable
devices will likely emerge this year that
seems silly initially but quickly catches
on, is copied, and has the effect of slapping a computer on a sizeable chunk
of the mainstreams wrists by this time
next year.
Eventually, Gibbs believes, the enterprise-centric apps market will be
enormous, though it will struggle in
the short term due to security concerns
and a lack of interoperability between
Mobility Management
Expect EMM solutions to continue to
expand in capability this year. Kane says
EMM solutions will implement better
data security options and identify management or unified IAM (identity and
access management). Kane also expects
more talk concerning EMM solutions
managing wearables and a bigger push
to unify EMM with more traditional
PC management and virtualization
MOBILITY CHALLENGES
Todd Landry, corporate
vice president of product
and marketing strategy,
at JMA Wireless (www
.jmawireless.com), says
organizations have tried
for some time to apply
add-on mobile applications and connectivity
to in-house telephony
or UC (unified communications) systems,
only to discover theyre
complex, dont really
support full and easy
mobility, and are tied to
an old-school means of
communications. This is
true even if cloud-based,
systems are generally
still based on traditional
23
Workspaces
As mobile access to apps and data increases, Kane expects more employees
will work from non-desk-based locations
AN AGING WORKFORCE
Jeanine Sterling, Frost & Sullivan
principal analyst, says a continuing
aging mobile workforce within the
field service sector may mean mass
retirements and a wave of new,
very green replacements occurring in the future. More adventurous
companies will step into this breach
with mobile technology, she says.
For example, companies might
experiment with smart glasses as
a new training tool. An older, deskbased repair technician no longer
interested or able to work in the field
could provide assistance and advice
to a colleague equipped with smart
glass that lets her remotely transmit
video, images, and questions back.
The benefits? The newbie gets
trained, a group of experienced pros
are retained on staff as the Baby
Boomer transition plays out, and the
customer receives top-notch service
and fast time-to-first-fix, she says.
24
KEY POINTS
The GPS receiver in your PC,
smartphone, or tablet computer
can intercept signals from satellites
orbiting the Earth to pinpoint your
location.
Although GPS technology is
generally the most accurate means
of determining a persons position
(within about 10 meters), it may not
be accessible in all areas.
Because you carry a mobile device
with you often, geolocation data
can be used to much greater effect
through mobile apps and geolocation
features in your smartphone or tablet.
You can turn off a Web browsers
location discovery capabilities if youre
concerned about privacy.
Geolocation Options
PCs, tablets, and smartphones can
pinpoint a persons location in a variety
of ways. Among the first methods that
comes to most peoples minds is GPS
(Global Positioning System), as nearly
25
26
Location-Aware Websites
Knowing there are numerous ways
for apps and programs to discover a persons location, you may be wondering
what the data is used for. Put simply,
it gives the user a more personalized,
relevant experience to their habits,
says Daniel Welch, Ipsos mobile leadAsia PAC. This is the age of context.
Geolocation is the easiest gateway into a
contextually rich, tailored experience for
consumers.
For example, lets say that you visit
a weather website and want the latest
Yelp is an example of a recommendation app that can help users find nearby businesses and attractions.
which of your social network connections rated it, being sent a coupon
to try a cup for 50% off because you
were in the area, and then being able
to share that experience with your networkshowing whats important to
you, he says. The end result is that
youll be more easily connected with
people, places, and things around you.
As Welch notes, When we feel something is really simple and tailored, it
feels like we are on the inside, part of
the collective in crowd.
27
Common Practice
Today, consumers have several options for making purchases and paying
bills using their mobile devices, including remote- and proximity-based
options that cover browser- and message-based purchases, retailers own
apps, and mobile wallet approaches
enabling contactless or tap-and-pay
28
Aite Group predicts U.S. mobile payments will reach $214 billion by 2015.
Elsewhere, Juniper projects 300 million consumers globally will make contactless payments via mobile devices
by 2017, up from 110 million in 2013.
Additionally, about 20% of mobile devices will possess mobile wallet functionality by 2018, up from less 10% in
2013, Juniper predicts.
Compared with making payments via
a desktop or notebook computer, doing
so via a mobile device is essentially becoming common practice, thanks in part
to smartphone accessibility, says Reinelt.
Aite Group research indicates consumers
prefer to transact using those devices
most accessible to them, Reinelt says.
Dr. Windsor Holden, Juniper Research
head of forecasting and consultancy, says
theres been a pronounced migration
from the desktop to couch commerce,
whereby consumers purchase goods
while watching the TV rather than sitting at their [desktops].
Reinelt says NFC terminal availability will grow due to EMV terminal
migration and the looming October
2015 deadline. Those EMV terminals automatically come with NFC
technology, which merchants merely
have to code and turn on, she says.
Retailers that have migrated POS terminals to EMV already will support
contactless, NFC approaches by default, she adds.
The Future
Where making remote mobile payments are concerned, Holden believes
were almost there. The sheer scale
of usage tells us that consumer awareness is high and acceptance is growing
rapidly. The key for retailers is recognizing how consumer behavior is
evolving and respond to it, he says. For
example, consumers today browse instore but complete purchases at home
on a tablet. Retailers are responding by
offering price-match guarantees and
equipping in-house staff with tablets
that act as a mobile POS to browse with
customers and let them skip checkout
lines. Holden says awareness and acceptance of contactless payments is far
lower. Here, consumer and retailer education is critical, which is why Apple
involvement is so critical.
In the next two years, Reinelt believes
well see notable consumer and merchant adoption of NFC. By that time,
merchants will have fully upgraded to
EMV/NFC terminals, and iPhone users
will be ready to upgrade to the iPhone
6 rather inexpensively. Further, because
most Android phones already have
NFC, a provider will eventually capture
the Android mobile payments market,
she says.
29
SPEED OF CHANGE
You use CyberTrend
to keep tabs on the latest
.COM
Get the latest issue right now
online at www.processor.com
or on your iPad via the iTunes Store.
consider altering their current communications solutions for UCaaS, and more.
Communication Breakdown
Years ago, while sizing up the UC markets reach, Landoline set about creating
a fundamental definition for UC. For a
solution to qualify as UC at the desktop,
he determined three basic criteria were
required, including a telephone dial tone
to make/receive voice calls, employee presence to know who was on the system at
any given time, and the ability to message
people. Since then, Landoline says, UC has
expanded to include such notable elements
as video, page sharing, collaboration, and
other components.
Historically, high acquisition, management, and maintenance costs relegated
on-premises UC solutions to large enterprises primarily, says Tim Banting, Current
Analysis principal analyst. Delivered
as a service, however, UC becomes accessible to more types and sizes of businesses. Essentially, UCaaS takes traditional
31
PHILLIP PEXTON
Analyst : Canalys
By going to UCaaS, [companies] can save in initial capital cost and obtain a broader set of integrated features
with less in-house integration efforts. UCaaS services
typically offer faster upgrades to deliver new features.
IRWIN LAZAR
Vice President & Service Director : Nemertes Research
The Advantages
Security concerns, reliability, and adhering to compliance/regulations requirements are among the deterrents companies
have experienced when adopting cloudbased communications services companies
have experienced. Conversely, flexibility,
complexity, and integration are key areas
where UCaaS can improve upon traditional UC. Traditional UC solutions can
be complex to deploy and manage, often
stretching IT departments beyond their
capabilities, says Pexton. UCaaS enables
IT to eliminate complexity by letting UC
specialists manage the solution. UCaaS
also enables flexibility in terms of easily
adding and removing users and its paywhat-you-use pricing model.
Lazar says the biggest advantage of
UCaaS is the native integration the solutions offer. For example, a company with
separate platforms for email, IM, voice,
video, Web conferencing, and contact
center can find that UCaaS offers a far
more integrated and easier-to-use user interface, he says. UCaaS offerings may
also offer presence and click-to-call federation with other companies or public services, such as Skype.
Elsewhere, the enhanced visibility
into spending and the ability to reduce
OPEX and limit CAPEX that UCaaS
provides can translate into financial efficiencies. Another advantage relates to
expanding points of service. Rolling out
a solution to three additional branch offices, for example, would basically only require an Internet connection and browser,
Landoline says. Further, customization
32
Future Adoption
Similarly, Landoline says a small percentage of companies are in a greenfield
environment that gives them a pure
choice to either implement UC on-premises or put it in the cloud. Instead, the marketplace is primarily a replacement market,
he says, meaning a company is facing
decisions concerning whether to replace
CyberTrend
Is The Essential
Monthly Guide To
Business Technology
For Executives &
Company Owners
Greenovations
ENERGY-CONSCIOUS TECH
The technologies
that make our
lives easier also
produce some
unwanted side
effects on the
environment.
Fortunately, many
researchers,
manufacturers,
and businesses
are working to
create solutions
that will keep us
productive while
reducing energy
demands to lessen our impact on
the environment.
Here, we examine some of the
newest green
initiatives.
Solar Impulse 2 is a single-seat, solar-powered aircraft. Its wings, longer than those of a 747, hold nearly 17,000
solar cells. The website www.solarimpulse.com is tracking the aircraft on its journey around the world.
34
Toyota's new i-Road vehicles are especially designed for city transportation. The three-wheeled i-Roads are
electric, so they emit no carbon dioxide, and they relieve congestion on streets and in parking structures.
35
STAY AHEAD
OF THE CURVE
www.cybertrend.com to get up
to speed on the latest technology news and information about
products for your company.
The Trend
37
38
Possible Drawbacks
Juggling multiple operators, however,
can also bring on added costs, complexity,
and hassle. The No. 1 drawback, according
to Morgan, is having to deal with multiple
contracts and points of contact, something
particularly challenging when rolling out
equipment or making changes that affect
numerous facilities. Different facilities may
also have different procedures and designs
that complicate matters for companies IT
personnel and compliance auditors.
Monitoring is another potential concern.
Some colocation providers with multiple facilities tie them together via one monitoring
system, enabling customers to view whats
happening in each facility from a single
portal. This makes tracking equipment,
PC-Doctors Service Center Premier Kit includes everything in the standard kit, as well as PCI and miniPCI POST cards
with a display (so technicians can test systems that wont boot) and a power supply tester.
quickly, says Zaretsky. PC-Doctor also provides a diagnostic DVD and test media.
39
KEY POINTS
VDI (virtual desktop infrastructure) makes it easier to deploy
and manage OS and application
instances for users without needing
high-performance PCs.
In-house VDI deployments can
be quite complex and costly, which
is why hosted alternatives are
growing in popularity.
Desktop-as-a-service solutions
enable virtual desktops without
having to build out or manage the
internal infrastructure.
Make sure your hosted VDI
solution offers mobile support and
strong management capabilities,
and that the vendor offers virtual
desktops and not server OSes.
41
In-House Challenges
& The Growth Of Hosted VDI
Lockwood stresses that delivering a
quality VDI experience to end users is extremely complex, which is why in-house
deployments require quite a bit of initial
spending and investment in VDI expert
talent. And while there are ways for companies to deploy VDI successfully through
42
Benefits Of DaaS
Compared To In-House VDI
Because DaaS is a hosted service offered
by third-party providers, it has some unique
benefits that companies wont get from an
in-house deployment. With DaaS, you dont
have to manage PC fleets and data and
you dont have to deal with mobile management related to offering virtual desktops on
mobile devices, Young says. You can also
offer users internal company data to work
on projects at home without that data actually being stored on the device. In essence,
you can jump into a growing marketplace
with significantly less risk than if you deployed everything in-house.
It goes back to the cost to procure that
on-premises infrastructure, says Young.
A lot of companies cant take on that
much of a CAPEX cost up front. They may
also not have the skillset to deploy it and/
or manage it and scale it. Many times, he
says, the benefit of client virtualization is
appreciated by remote employees. Mobile
is a huge growth segment in this market,
adds Young. Lets say you set it up yourself. Youre an internal IT organization
based in Boston. You set up the client virtualization, and your employees that work
in the greater Boston area probably arent
going to have any issue reaching back to
the data center, but when you start having
globalization and mobile employees traveling across the globe, how do you scale
that? DaaS lends itself to that.
As far as who will benefit most from
a DaaS-based VDI deployment, Young
says that its penetrating the midmarket more than it is the enterprise,
because those companies dont necessarily have a mature IT organization with
data centers in multiple regions. Its
also popular with companies that arent
as concerned about storing data in the
cloud. Young says that some vendors are
working to offer solution specifically for
highly regulated industries, but thats
a much smaller portion of the industry
right now.
Enterprises typically have a lot of
stringent compliance policies that they
need to run, so they want a lot of management around their client virtualization solutions that theyre delivering out
to their end users, says Young. Having
that level of management in a DaaS environment is still something thats being
built upon. VMware and Microsoft provide some management tools in their
DaaS offerings, but its still evolving. Its
not to where it would be if you were to
buy their solutions and implement them
on-premises.
43
KEY POINTS
With so many new types of devices connecting to networks, there
are multiple challenges IT teams
have to contend with when managing networks.
Monitoring tools are crucial for
pinpointing network issues, as
are any complaints you receive
from your workforce regarding the
network.
WAN (wide area network) optimization is a key solution for optimizing
a network, and you can outsource it
to a third party, if necessary.
Put more management solutions
in place and hold your IT team accountable with internal SLAs (service
level agreements).
44
networks, so they dont know the specifics as to how it was designed. For example, he says older wireless networks
may have only been designed to handle
laptop traffic and nothing else, but current networks have to be able to support
laptops plus smartphones, tablets, and
other devices, including wearables.
Conde adds that you have to
think about applications, as well.
Applications and other workloads typically ran onsite, whether they were
based in the central data center or in
a remote site, but now companies are
frequently turning to cloud-based solutions and SaaS (software as a service)
applications, which can put considerable stress on the network. There is
still a case that your equipment is
starting to fail or youre not updating
it with the right software, but a good
chance is that your applications and
platforms are changing with more
workloads or higher density of virtual
machines, Conde explains.
You need to have visibility. You need the right monitoring tools in there. First, you narrow [down the problem].
Is it consistent across all the sites or is it only at one
site? If its all the sites, then you have architectural issues. If its only at one site, maybe you dont have the
right amount of bandwidth or something else weird is
going on. It might not be an architectural issue.
ANDRE KINDNESS
Principal Analyst : Forrester Research
45
46
A Look Back
Between 1999s 802.11b protocol and
2009s 802.11n, Wi-Fi rose to prominence
47
Why Upgrade?
Being able to transmit data between
an access point and an adapter at several
hundreds of megabits per second sounds
ideal, but what will it actually let you
do? The 802.11ac equipment is capable
of streaming multiple HD videos simultaneously, fast syncing large data files,
rapid backups, supporting wireless display technology, simultaneous multiuser
applications, and manufacturing floor
automation. The 802.11ac access points
that feature USB 3.0 ports will enable
users to plug in external storage devices for hosting videos and media for
streaming, FTP (File Transfer Protocol)
servers, and personal cloud services.
Additionally, anything you did with
802.11 equipment is still possible with
48
Wi-Fis Future
Zimmerman acknowledges there are
new extensions to the 802.11 protocol
under development, but they wont diminish the value up upgrading to
802.11ac equipment today. The catalyst
for change to a different standard or technology will not be performance, but other
factors such as battery life savings for mobile clients, the ability to provide better
indoor positioning information, or the
integration of a cellular/Wi-Fi module
that dramatically reduces the cost of a
joint solution.
The Wireless Gigabit Alliances efforts
are focused on 802.11ad, now simply referred to as WiGig, which will utilize the
2.4GHz, 5GHz, and unlicensed 60GHz
frequency bands to achieve 7Gbps peak
data rates. Thats about as fast as an eightantenna 802.11ac access point, but 60GHz
transmissions degrade quickly when
passing through walls and other obstructions. Wi-Fi Alliance has announced the
new technology will be used in Wireless
USB. Another protocol that Zimmerman
highlights, 802.11ah, isnt expected to be
finalized until 2016. [It] uses 900MHz
instead of 2.4GHz or 5GHz. This change
allows greater range/coverage area at a
lower data rate . . . but may be an ideal solution for sensors in vertical markets such
as smart metering.
With the mobile industry expanding at
a faster pace than ever before, we expect
to see Wi-Fi grow and evolve right alongside our wireless needs.
WHOLE CHICKEN
Tecumseh Farms Smart Chicken is truly the most natural chicken in the United States. All Tecumseh Farms
products are raised without the use of animal by-products, antibiotics, or hormones, are 100% all-natural, and are
processed using puried cold air instead of adding non-potable waterthats the air-chilled difference.
WWW.SMARTCHICKEN.COM
Cyberthreat Report
DDOS ATTACKS ARE ON THE RISEHOW VULNERABLE IS YOUR BUSINESS?
50
51
52
DRM Exposed
Sean Pike, program director with IDC,
says the emergence of the term digital
risk management is really a recognition
of business transformation that has taken
place over the last 20-plus years, during
which time corporations have shifted to
large-scale digital architectures with complex IT systems requiring specific and
unique risk management processes.
Still, Pike is wary of the term. While
readily acknowledging corporations have
transformed on expanding technology platforms, he says, the idea that digital risk
management is a new discipline discounts
inability to get business processes running again after a disaster. Mobile devices,
using or not using the cloud, hacking,
insider threats, etc. introduce numerous
other risks, although these nearly always
link back to data or performance/systems
DRM aspects, Tarzey says.
Michela Menting, ABI Research practice director, says intrinsic to DRM is the
concept of information security and an
understanding of what information needs
to be protected and managing the risks of
not properly protecting information and
systems. The key is to be able to protect
information at rest and while in transit
anywhere, as it flows through the corporate network and through third-party
service and application providers, she
says. Information security is therefore a
non-negligible aspect of digital risk management, as it involves the formulation
of policies as much as the configuration
of hardware and software, such as patch
management, network scans, logging and
monitoring activity, etc.
Menting says within the DRM context,
enterprises must consider such things
as data loss prevention, encryption and
key management, and identity and access
management because each enables assessing and managing risks appropriately.
Information governance is the sort of
overarching field of application for risk
management, she says. Its as much
about management as it is about assessing
risks and determining the proper level of
security that will not too adversely impact
business productivity.
The Payback
Pike says theres plenty to gain from
possessing a strong, effective DRM
strategy. Arguably the biggest benefit is
transformation of the organizations culture. Organizations with a risk-assessing
culture tend to be thoughtful about how
new lines of business or technologies
will affect the rest of the organization, he
says. That level of thoughtfulness and
cooperation can reduce spending, reduce
duplication of effort, and create collegial
environments that encourage innovation, he says.
Similarly, Menting says the advantage
of having a well-planned IT structure is
that its conducive to enhancing business models and modes of operation.
The current progression and expansion
of cybercrime means that most organizations with a digital presence will eventually have to deal with an incident, she
says. Legitimate organizations have the
most to lose. Theyll need to deal not
only with cyber threats, but also with
the consequences of deficient security.
Liability can be eschewed, however, with
a well-implemented information governance framework.
53
54
55
56
57
Wearable Tech
WHATS UP WITH THE LATEST GADGETS?
KEY POINTS
Fitness data from wearables
helps you to manage and enhance
the value of physical activities
and can be extremely helpful for
workout enthusiasts.
Smart watches can generally
perform the basic functions of a
smartphone, but the extra functionality varies from one device to
another.
Smart glasses have received a
lot of press, but they still require
some tweaking by designers before
being introduced to the masses.
Wearable cameras are ideal for
use with biking and skiing, and
others are being developed to help
with your golf and tennis swings.
58
to control their smart TVs, capture pictures, video chat, and run scaled-down
versions of common smartphone apps,
in addition to using the device as an
activity tracker.
Connected digital trackers is another category in which wearable tech
is expected to see growth. This category
includes fitness tracking and wearable
GPS devices. Parks Associates anticipates that connected digital trackers will
account for 81% of all sales by 2018.
However, just because people are buying
these new devices doesnt mean that everyone loves the functions currently offered. A small number of consumers
are taking the plunge into wearables, and
survey results indicate that up to a third
of those who have no longer use their
device six months after purchase, says
Ben Lemieux, telecoms market analyst
at Visiongain.
Some wearable offerings dont provide much value, notes Nick Spencer, senior practice director with ABI Research.
A Personal Monitor
Wearable devices are capable of
gathering an incredible amount of data
about a person due to sensors embedded
in the device. There are wearable devices designed to monitor sleep patterns,
heart rate, weight, running cadence, and
posture, just to name a few. If its something a digital sensor can detect, a wearable device can monitor it for you.
As we stated, health and activity
trackers are among the more popular
forms of wearable technology to date,
and theres a good reason for this: the
health monitors provide a clear value.
The key unique selling proposition for
wearables is using sensors on the body
to measure someones health, fitness,
and activity, Spencer explains.
59
Images, clockwise from top left, courtesy of Apple (1), Samsung (2), Sony (3), Microsoft (4, 5), and BlackBerry (6)
Smartphone Tips
OUR BEST BATTERY-SAVING ADVICE
WINDOWS PHONE
Preserve Your Charge, Shut
Down Open Web Pages
You might be among the many
Windows Phone users who dont know
that opening Web pages and not closing
them means that those pages are maintaining an Internet connection (and
sapping your devices battery charge as
part of the bargain) in the background.
In Internet Explorer, tap More (three
dots), tap Tabs, and then tap X however
many times is necessary to close every
open tab. If you wish to clear all open
Internet connections in one fell swoop
(that is, connections that exist in the
background for various mobile apps),
you can do that as well by accessing
the Start screen, swiping left, tapping
Settings (gear icon), tapping Wi-Fi, and
sliding the Wi-Fi Networking switch to
the Off position.
60
ANDROID
Find Energy Wasters
One quick way to reduce your Android smartphones cellular data usage and battery consumption, which can be particularly useful when traveling, is to stop apps
from using cellular data in the background when a Wi-Fi connection isnt available. Doing this can cause apps that rely on background data usage to malfunction,
but does not impact how apps behave
when youre actively using them. On
the Home screen, tap Apps and then
tap Settings and Data Usage. Tap
the Menu icon and then tap Restrict
Background Data to select it. A popup box will caution that apps performance might be affected; tap OK to
continue. You can more carefully control how apps use data connections by
adjusting the settings within each app,
but stopping background cellular data
usage is an easy way to turn off such Restricting the background use of cellular data affects all
usage across all apps, and its just as apps, but is a quick and easy way to control data usage.
easy to turn this setting off again.
61
BLACKBERRY
Keep It Cool
The lithium-ion batteries used in mobile devices such as BlackBerry smartphones retain more capacity over time if
they are kept cool. Precise capacity loss
varies depending on multiple factors,
including how frequently the battery is
charged and what level of charge is maintained, but it is generally the case that
devices stored with 100% charge at 32
degrees Fahrenheit (0 degrees Celsius)
will lose roughly 6% capacity per year,
while those stored at 77 F (25 C) will lose
around 20% capacity per year, and those
stored at 104 F (40 C) will lose about a
third of their capacity per year. Storing
batteries at a lower charge (generally between 40% and 60%) reduces capacity
loss, especially when using the device in
hotter temperatures.
62
iOS
Auto-Lock To Save Power
You may not be aware that using the iPod Equalizer settings while listening to
music and other audio content can drain the battery. Disable the EQ by tapping
Settings, Music, EQ, and Off. Keep in mind that in order to get the same batteryconserving effect if you changed your EQ settings in iTunes, youll have to set EQ
on iPhone to Flat by tapping Settings, iPod, EQ, and Flat.
Adjust Brightness To
Curb Battery Drain
To cut down on excessive battery drain in your iPhone, decrease
the screen brightness. Tap Settings,
tap Display & Brightness, and then
drag the slider to the left to dim the
screen brightness. Turning on AutoBrightness with the switch on this
screen can also help. Doing this
causes the iPhone to automatically
adjust brightness based on the current ambient light conditions.
Background Apps
Affect Performance
Your iPhone can sometimes seem
as if its dragging its feet. There are
many possible causes for this, but one Turning off the equalizer is a good way to prolong your
of the most common is that too many iPhones battery life.
background apps are running. Apps
that you use but dont quit sometimes
wind up running in the background,
waiting to be called up again. When theyre in the background, most apps dont
use much in the way of resources, but if there are too many of them, they can
contribute to a general slow-down. To keep your iPhone feeling lively, try quitting
some of those background apps. Double-tap the Home button to bring up a list of
background apps. Tap and hold an app you wish to quit. Wait for a red circle with
a minus sign to appear on the app. Tap the circle and the selected app will quit.
Repeat for any other apps you wish to quit.
63
Understand Roaming
Roaming occurs whenever a wireless carrier other than your own provides your device with a cellular signal.
International roaming rules and rates
are typically different from those that
apply in the U.S., so heres the No. 1
64
Barring that, bring your carriers tollfree customer service phone number
with you; if you have any doubt as to
how your plans roaming rates work
when traveling, use a local phone to call
that number and find out.
65
Facebook
When setting up your Facebook profile,
the service will ask for a lot of personal
66
Twitter
By default, Twitters account settings
make your tweets available for all to
see. The alternative is a protected mode,
where your tweets are only visible to your
approved Twitter followers. Protected
tweets are also not retweetable, so even
approved users cant share your tweets.
You also cannot share permanent links
to your tweets with anyone but approved
followers. If you want to use Twitter to
drive Web traffic, the restrictions in the
protected mode might undermine why
you joined Twitter in the first place.
If you want to adjust your tweet privacy level, or the other privacy controls
on Twitter, start by signing into Twitter
and bringing up your account settings.
Next, click Security And Privacy and
scroll down to Privacy. If you only want
approved followers to see your tweets,
click the Protect My Tweets checkbox.
You can also control who can tag you in
photos, whether your tweets include a location, and how others can find you, such
Google+
For Google+, privacy has been a key
consideration from the very beginning. For
example, youve always been able to assign
a privacy level for each post you share. And
based on the Circles (friend groups) youve
set up, its easy to share content with only
a specific crowd. Google+ also offers detailed privacy settings where you can control most every aspect of your profile. Visit
your Google+ page, click your name, select
the drop-down menu under the Google+
logo, and choose Settings.
In the Settings window, you can customize who can send you notifications,
comment on your public posts, and
manage subscriptions. If you want to
configure the audience settings for your
posts, photos, and profile updates, scroll
down to the Your Circles section and click
Customize. By default, Google+ pushes
updates to the people in your Friends,
Family, and Acquaintances groups. To
block a particular group, remove the check
from the checkbox. If you want to reach a
larger group of people, you might want to
add a check to the Following checkbox, so
followers of your Google+ profile will be
added to Your Circles list.
Next, scroll down to the Profile section. Here, you can configure how people
are able to find your profile and control
what content is displayed in your profile. A setting of interest for businesses
is Allow People To Send You A Message
From Your Profile, as this setting offers a
way for consumers to reach out to you. If
the setting is limited to Your Circles or
Extended Circles, customers might not
be able to contact you.
If you use Google+ on your mobile
device, youll also want to examine the
Location Settings section. These settings let you enable or disable location reporting via your smartphone
and tablet. If enabled, you can control
who can see your current city and/or
exact location. The precise location
is ideal for those who wish to share their
location with friends and family. If thats
LinkedIn
The business-focused nature of
LinkedIn ensures that privacy is a priority. To examine your settings, log in to
LinkedIn, hover your pointer over your
profile photo in the right-hand corner,
and select Manage next to the Privacy &
Settings option. Scroll down to Privacy
Controls and youll find a host of options
to control what others can see on your
profile and activity feed. For example,
you can turn off activity updates that
let other connections know when you
make a change to your profile or follow
another company.
If you use LinkedIn to search for
new clients and key connections within
an organization, you can opt to remain
anonymous, so people wont know that
you looked at their profile. To do so, click
Select What Others See When Youve
Viewed Their Profile. There are two anonymous options, one where others will see
an industry and title, or you can opt to
be completely anonymous. You can also
manage who can follow your updates, edit
blocked connections, and shut down users'
ability to view your connections.
67
Bluetooth Finder
$20+
Ever set down the keys to your rental
car or your own vehicle on a restaurant
table only to get up, walk away, and leave
them behind? Many of us have done
this. One way to prevent the aggravation
that typically follows is to attach a small
Bluetooth dongle-like device to the key
ring. These devices communicate with
a smartphone, warning you when the
phone moves out of range of the dongle.
Typically, such devices cost about $20 or
more and have a smartphone app that
sounds an alarm, emits a beep, or even
provides a visual indicator that lets you
see when you get closer or move farther
away from the key ring or other object to
which you attached the device.
68
Bluetooth Keyboard
$60-$100+
Device Charger
$40-$100+
Luggage Tracker
$50-$100
Some people would pay a small fortune to know where their luggage is
at all times. Anyone who has experienced lost luggage understands why.
The good news is you dont have to pay
a fortune to pinpoint the exact location of your baggage. For somewhere
in the neighborhood of $50 to $100,
you can acquire a device (perhaps even
an FCC-certified and FAA-compliant
one) that uses GPS (Global Positioning
System), GSM (Global System For
Mobile Communications), and other
technologies to provide tracking abilities for luggage. These devices are
small enough to easily fit in a bag and
can do such things as email or text
you a verification that your luggage arrived at its destination. If your luggage
is completely lost, the devices let you
pinpoint the bags locations on a Webbased map.
Multi-Tool Knife
$25-$100+
While you still cant carry a pocketknife onto a plane, you can take one
with you when traveling by land, and
having a multi-tooled knife on hand
can get you out of a fair number of
jams, including in a storage sense.
Thats because beyond packing an actual blade (as well as possibly a screwdriver, scissors, wine opener, pliers,
etc.), some multi-tool knives integrate
a USB memory stick for storing and
transferring several gigabytes worth
of document, image, video, audio, and
other files. Thus, even if you lose your
notebook or tablet, youll still have important files handy. Depending on the
storage amount and model, prices of
multi-tool knives can span from about
$25 to $100 or more.
Noise-Canceling Headphones
$50-$100s
Whether in a plane, shuttle bus, taxi,
or room in a not-so-quiet hotel, noise
seemingly always surrounds a traveler. Noise-canceling headphones provide an escape from the din by using
Portable Hotspot
$50+
Staying Internet-connected while
traveling is an absolute necessity for
business travelers, but doing so via
Wi-Fi isnt always easy. Although
public Wi-Fi hotspots are available,
theyre not always free and security
can be an issue. An alternative is to
use a portable hotspot device (costing
about $50 or more) that uses a mobile
broadband connection (a 4G LTE network, for example) to form a wireless
hotspot for multiple devices. Another
option is to use a portable router. Plug
an Ethernet cable into, say, a hotel
rooms wired Internet port, plug the
cables other end into the router, and
youve created a wireless network with
multiple-device support. Elsewhere,
various companies provide private
Wi-Fi services for a monthly/annual
charge that provide a welcomed layer
of security when connecting to a public
Wi-Fi hotspot.
Portable Monitor
$75-$200+
In some office environments today,
you may see two (or more) monitors
on an employees desk. This setup allows users to easily switch among open
programs, keep tabs on continually updating information in a Web browser,
and perform other multitasking chores.
Travelers can get this same secondscreen ability away from the office by
bringing along a USB-based portable
monitor. Such screens (generally $75
to $200 and more) connect and draw
power from a notebook via USB cable.
Storage Device
$10+
One thing you cant have too much
of is storage, including for reasons
tied to accessing and backing up data.
Packing an extra memory card, USB
thumb drive, or external drive on
which you can grab or offload photos,
videos, and other files is smart. (Just
make sure not to lose the storage device on which that data resides.) If
youre expecting rugged conditions
where youre going, some external
drives and USB memory sticks offer
water- and shock-resistant features
to provide protection against the elements and drops. Overall, storage
continues to be an excellent value.
Memory sticks, for example, can start
at around $10 depending on the storage capacity.
Video Streamer
$35-$100+
Its possible you already have a settop box-like device attached to your
HDTV at home to stream on-demand
TV programs, movies from subscription services, and audio from Internet
radio stations. A nifty aspect of these
devices is that travel-friendly sizes
(some are essentially a glorified USB
stick) means they can easily stow away
in a suitcase. Unpack it once in your
hotel room; connect it to the TVs
HDMI, USB, or AV port; configure
the Wi-Fi settings; and all the content
you have at home is now available for
watching in your hotel room. Should
you forget to pack the remote control
the device bundled, many streamers
have compatible apps that enable a
smartphone or tablet to function as a
remote control. With prices ranging
from about $35 to $100 or more, these
devices are an entertainment steal.
69
70
Then select My Notes to start typing private notes or click Share Notes and choose
a section for note-taking.
in this way requires that the corresponding Microsoft Web App (Word, Excel,
PowerPoint, or OneNote) is installed.
Share A Presentation
choosing Share This Calendar. Next, insert the individual or group who will receive the shared calendar.
There are plenty of helpful features built into Office 365 to keep you organized. For example, you can customize your
Outlook calendar Web app as you plan meetings and work toward deadlines.
71