Who is winning the smartphone war?

Apple’s iOS phones get a lot of press, but Google’s Android phones own the market while Microsoft’s Windows Phones are showing signs of life.

Android owned over 70% of the world-wide smartphone market in 2012 while Apple iOS held just 21%.  According to IDC, a market-research firm in Framingham, MA, Android-based phones accounted for over 80% of the smartphone market world-wide as of Q3-2013, while market share of iOS-based phones declined.  (Visit http://www.idc.com for IDC’s report on the smartphone market as of Q3-2013.)

Items fueling Android’s dominance over iOS include:

  • More hardware options (from small, sleek phones to mid-sized Phablets)
  • Carrier access (Verizon, AT&T, etc.)
  • Open-source operating system
  • Price

See why eWeek says that Google’s Android is a smarter choice than Apple’s iOS at http://www.eweek.com/mobile/slideshows/android-is-a-smarter-mobile-os-choice-than-ios-10-reasons-why/?kc=EWWHNEMNL03182013STR1.

Microsoft’s Windows Phone accounted for 3% of the worldwide smartphone market in 2012 and edged up to just under 5% as of Q3-2013.  Market share of Windows Phone is projected to grow to 7% by 2018 (according to IDC).  Jeffrey Schwartz of Redmond Magazine reports that most of this is corporate IT rather than consumer-based.  (See Jeffrey Schwartz’s article at http://redmondmag.com/blogs/the-schwartz-report/2014/02/enterprise-demand-for-windows-phone.aspx.)

How to tweak Windows 8 for business use

Anna D, Account Executive at Bryley Systems, reveals how she overcame some frustrations with Windows 8 and set it up for business use.

“My experience with Windows 8 started out a little bumpy, but with a few tweaks, I was able to customize the OS (operating system) to be more suitable for my business needs.

The first thing I noticed when I booted Windows 8 were the tiles, which can be compared to app icons for Android and Apple devices.  Personally, I only like navigating app icons on a touch-screen-capable device, and find it inefficient in my everyday business-computer needs.  For instance, when I am using an app on my phone, I am only using that one app.  At work, I am constantly multitasking, and moving back and forth from one application to another.  In order to solve this problem, I changed the settings so my computer will boot into desktop mode.  (For details on this procedure, please see Bryley Basics later in this post.)  I can still access the tiles with my Windows key, if I wish.

Once I changed the boot settings I came across another hurdle.  My Windows Start Button was missing and was replaced with a Windows key that brought me back to the tiles.  So, I went to Windows Store to restore the Windows Start Button.

The first option that was presented to me was Classic Start Button, but I decided to go with Classic Start 8, because it was the closest resemblance to the Windows 7 Start Button. (For details, see Bryley Basics later in this post.)  I have also tried Pokki, which is also nice, and which you can download directly on their website, or from the Windows Store.

I am now much happier with Windows 8.  I can understand the direction that Microsoft was going towards in creating a single operating system for all devices, but the OS still needs to be tweaked based on how you will use it.  The nice thing is I have the option and ability to customize Windows 8 for either business or fun.  At work I am more efficient using Windows 8 like a Windows 7 computer.  At home I much prefer the tiles, especially with a touch-screen-capable Ultrabook, which is how I imagine Microsoft envision we use it.

I have more tips on tweaking Windows 8.  Next month I’ll let you know how to change the default photo-viewing application, Photos, back to the old Photo Viewer.  Those of you running Windows 8 have probably experienced the new Photos app, which opens the image in the full-screen, hiding everything else on the screen.  It is really inconvenient for me, and I am guessing I am not the only one.”

Bryley Basics: Anna’s Windows 8 procedures

Setup your Windows 8 PC to boot to Desktop Mode:

    1. Click the “Windows” key on keyboard to access the “Start” screen.
    2. At the Start screen, select the tile named “Desktop”.
    3. Once at Desktop, go to the bottom taskbar (circled below), place your cursor on the taskbar, right-click, and then select properties.

  1. A pop-up screen named “Taskbar and Navigation Properties” will appear. Select the “Navigation” tab, check-on the desired items (and check-off the undesired items), and then click OK.

Add a Start Button to you Windows 8 Desktop Mode:

    1. Click the “Windows” key on keyboard.
    2. Go to “Store”.
    3. Type “start button” in the search bar at the top-right.
    4. Select “Classic Start 8”.
    5. Select “Get app from publisher” on the upper, left-hand side.
    6. Select the “FREE Download Now!” icon.
    7. Follow the prompts.
    8. The new Windows Start Button is now added to you Desktop!

98% of mobile-device malware attacking Android (DROID) phones

Worldwide, a significant portion of the population owns and uses a smartphone;  mobile users search Google over 5.9 Billion times daily while over 6 Billion hours of YouTube are watched each month on mobile devices.  (Statistics taken from a presentation by Intel Corporation at the MOBILE World Congress 2014.)

Since most smartphones are based on Google’s Android operating system, these are the primary targets of malicious attacks.  Kaspersky Labs, a prominent anti-virus software manufacturer, reports that 98% of malware targeted at mobile devices attacks Google’s Android (DROID), which confirms “both the popularity of this mobile OS and the vulnerability of its architecture”.

Suggestions for DROID (and other smartphone) owners to suppress malware:

  • Keep your mobile phone updated with the latest patches
  • Deploy an anti-malware application

Visit http://blogs.computerworld.com/mobile-security/23577/98-mobile-malware-targets-android-platform for the entire article by Darlene Storm at ComputerWorld.

Fitness regime for your IT equipment: Keep it clean, cool, and empowered

IT (Information Technology) equipment is somewhat temperamental; it requires reasonable temperatures; stable, uninterrupted power; and some air flow to operate efficiently.  Cleanliness is important.  Here’s how to keep it toned.

IT equipment should be kept in a clean, neat, and (preferably) dust-adverse/static-resistant area; walls with painted surfaces, tiled or coated floors without carpeting, etc.  Fire-suppression equipment is a plus, but cannot be water-based.

Access should be restricted; a separate, locked room is ideal, but a closet with sufficient space and air flow can work for smaller sites.

Dust is the enemy of fans and electrical components; a reduced-dust environment and regular cleaning of equipment fans can lengthen the life of most items.  (Note: cleanings should be performed when equipment is powered-down, which is not always desirable or feasible.)

The area should have dedicated electrical circuits with sufficient amperage to match the power requirements of the equipment.  We also recommend an Uninterruptible Power Supply (UPS) for all critical items (and require them for equipment that we cover under our Comprehensive Support Program); the UPS provides emergency power when the input-power source is unavailable, but it also helps to regulate fluctuations in power, both spikes/surges (voltage overload) and brown-outs (reduction in voltage) that can damage sensitive equipment.

Cooling and humidity control are very important; most equipment runs optimally within a narrow range of temperature (64° to 81° Fahrenheit) and a maximum range of relative humidity of 60%.  HP, in an effort to be “greener”, lists current specifications on its DL360 server that provide a wider range of 50° to 90°F with 10% to 90% humidity (non-condensing).  However, cooler temperatures do make things last longer.  (The DL360 will actually throttle-back the CPU when the air-inlet sensors detect temperatures over 85°F.)

The area should have continuous air flow (to provide new, cool air while removing heated air that is exiting the equipment) and remain uncluttered to facilitate this air flow.  A dedicated A/C unit combined with a closed door is optimal; locating all equipment within a rack enclosure (with blanking panels over open areas) can enhance air flow.

TechAdvisory has 9 tips at http://techtimes.techadvisory.org/2011/11/9-steps-you-must-know-to-prevent-a-server-crash/.

Comparing Cloud-based services – Part 3: Backup and Recovery

Many Cloud-based services fall into one of these categories:

  • Productivity suites – Applications that help you be more productive
  • Storage – Storing, retrieving, and synchronizing files in the Cloud
  • Backup and Recovery – Backing-up data and being able to recover it
  • Prevention – Prevent malware, typically spam and related components
  • Search – Find items from either a holistic or from a specialty perspective

In this issue, we’ll explore popular options within Backup and Recovery, the highlighted item above, and compare them with one another.

Backup and Recovery automatically copies files and folders to an offsite location at periodic intervals.  It is similar to Storage, but is unique in that these files are held separately, unchanged, for the purpose of restoration (recovery) if the original files become unavailable.  Backups are typically encrypted and are somewhat resistant to malicious attacks; however, if the original files were infected before the backup process begins, the backup files will also be infected.

Recovery is the reason for backups.  The most common recovery scenarios:

  • A user changes a document and then wishes to retrieve the previous version.
  • Changes are saved to a template document, rather than creating a new file.
  • An upgrade to an application fails and corrupts its data files.
  • Access is needed to a deleted file.

Popular, Cloud-based, Backup and Recovery services include (alphabetically):

  • Carbonite – Extremely popular; starts at $59.99/year per device
  • Mozy – Also well-known with prices starting at $5.99/month for up to 50Gb
  • SOS Online Backup – Starts at $9.99/month for 100Gb; unlimited devices
  • SugarSync – More synchronization than backup starting at $7.49/month

Carbonite

Carbonite is automated, encrypted, and easy to use.  It is available for home users, but includes business-oriented plans.  Home-user plans are per-device; each device is priced at $59.99/year with unlimited backup.  Business plans start at $299.99/year with an unlimited number of devices.

Visit www.Carbonite.com.

Mozy

Mozy is a subsidiary of EMC, a Fortune 500 company in Hopkinton, MA.  Like Carbonite, they offer both home and business packages.

There is a free version, but most MozyHome plans start at $5.99/month per device with up to 50Gb. The business option, MozyPro, starts at $19.99/month for unlimited devices up to 50Gb; $26.98/month with servers.

Visit www.Mozy.com.

SOS Online Backup

Plans from SOS Online Backup do not restrict the number of devices, but their base plan is restricted to a single user starting at $9.99/month.  Plans that include unlimited devices and unlimited users start at $99.99/month and include monitoring, password encryption, and phone support.

Visit www.SOSOnlineBackup.com.

SugarSync

SugarSync is more of a folder-synchronization service than a backup service; it synchronizes a folder across multiple devices.  SugarSync is user-based with plans starting at $7.49/month per user; multi-user plans start at $55/month.

My take:  Of these four options, we hear more about Carbonite and Mozy than SOS Online Backup or SugarSync.  Although SugarSync is popular, it is not as good a backup and restore solution as the other three.

Mozy has the deepest pockets with a large corporate partner, but Carbonite has, at this time, greater momentum.  The monitoring and telephone support included with SOS Online Backup makes it attractive.

Visit http://pcsupport.about.com/od/maintenance/tp/online_backup_services.htm for an extensive review of 40 backup services by Tim Fisher at About.com.  Another comparison at http://www.toptenreviews.com/services/internet/best-online-backup-services/ ranks 10 services from one through 10.

Bryley Systems offers our Backup/Disaster Recovery (BU/DR) service for servers; it is a monitored, secure, service hosted within our data-center in Hudson, MA with onsite appliance included.  Please visit www.Bryley.com for details.

Beware CryptoLocker

We have seen a rise in CryptoLocker virus attacks; these attacks can cripple the data files on your computer and on your computer network.

CryptoLocker is a destructive, ransomware virus; once downloaded, it locates and encrypts data files, which renders them inaccessible.  CryptoLocker does not announce its presence until all data files (Microsoft Office files, PDF files, etc.) are encrypted; it then asks for payment (ransom) to unencrypt these files.  (This type of ransomware is called “cryptoviral extortion”.)

The usual virus-delivery method is via email; the email looks legitimate and includes an attachment.  Once the attachment is clicked, the virus starts and then continues until all data files are encrypted or until the computer is powered-down.

You will not be able to unencrypt these files.  There is no cure.  There is no fix.

If the infected computer is connected to a computer network, data files on other computers and/or on the server(s) may also be encrypted and made inoperable.

Although payment is demanded to unencrypt the files, it should not be sent since any type of response to these criminals could open your computer network to future attacks.  The only recommended recovery method is to restore the encrypted data files from the latest backup.

Please visit http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information for more information on CryptoLocker.

Mike Morel, Engineer at Bryley Systems, suggests adopting these practices to reduce the risk of activating the CryptoLocker virus on your computer:

  • Do not open attachments within emails from sources that look legitimate, but are unexpected.
  • If you are expecting an attachment from someone, save the attachment first (without opening it) and then scan the attachment with your malware and anti-virus scanners before opening it.
  • Backup all data files regularly.

If you discover this virus, please immediately power-down the offending computer; if it is connected to a computer server, shutdown the computer network.  Then, call Bryley Systems at 978.562.6077 and select option one for technical support.

For additional information, see our lead article “Cybercrime targets smaller organizations” from the September 2012 edition of Bryley Tips and Information at

https://www.bryley.com/news/newsletter/bryley-tips-and-information-september-2012/.

Upcoming changes to major Microsoft products

Microsoft Windows 8.1 released on October 18th

The second iteration of Microsoft Windows 8, 8.1, occurred on October 18th.  Significant changes to this operating system include:

  • Boot to Desktop – Yes, you can restore the Start button and bypass the tiles, but don’t expect the traditional Start menu to appear since pressing Start takes you to the live tiles of the current Start screen.  (You can, at least, shut-down from the Start button once again.)
  • Help + Tips – Helpful clues are sequenced to usage, permitting an easier start-up and shortening learning times.
  • Smart Search – Windows 8 Search charm on steroids; all search results, local and otherwise, pooled together in a comprehensive summary.
  • Snap – Open up-to four applications and display them simultaneously on a single screen.

An excellent review of Windows 8.1 by Brad Chapos of PC World is available at http://www.pcworld.com/article/2048508/windows-8-1-review-the-great-compromise.html.  He also provides the top-five reasons to upgrade to Windows 8.1 at http://www.pcworld.com/article/2043268/the-top-5-reasons-to-upgrade-to-windows-8-1.html.

Microsoft Windows Server 2012 R2 release date was October 18th

Release 2 (R2) of Microsoft Windows Server 2012 is now available. 

Per Microsoft:  “Windows Server 2012 R2 offers exciting new features and enhancements across virtualization, storage, networking, virtual desktop infrastructure, access and information protection, and more.”

Along with this revision, Microsoft increased pricing on Windows Server Data Center to $6,155 and on Remote Desktop Services (RDS) Client Access Licenses (CALs) to $118.

For details, please visit http://www.microsoft.com/en-us/server-cloud/windows-server/windows-server-2012-r2.aspx.

The end is near for Windows XP, Office 2003, Server 2003, and Exchange 2003

Microsoft is ending support of Windows XP, its most-popular, desktop-computer operating system, on April 8th, 2014.  In addition, Office 2003, Windows Server 2003, and Exchange Server 2003 will reach end-of-life (EOL) on this date.

Basically, Microsoft will discontinue patching and updating these products, which exposes them to security and compliance risks; it will likely also end support for third-party applications that work with these products.

Microsoft’s message:  Upgrade these products now or risk problems later.

Comparing Cloud-based services – Part 1: Productivity suites

Many Cloud-based services fall into one of these categories:

  • Productivity suites – Applications that help you be more productive
  • Storage – Storing to and retrieving data and files from the Cloud
  • Backup and Recovery – Backing-up data and being able to recover it
  • Prevention – Prevent malware, typically spam and related components
  • Search – Find items from either a holistic or from a specialty perspective

In this and upcoming issues, we’ll explore popular options within these categories and compare them with one another.

Productivity suites

Probably the segment with the heaviest hitters, Microsoft and Google are battling for supremacy; Microsoft was late to the Cloud, but is ramping up nicely with its Cloud-services sales exceeding $1B/year. However, Google still owns this segment with an estimated 33% to 50% of Cloud-based, productivity-suite users, mostly on the strength of its free Google Apps and Google Apps for Education, but also with paid subscriptions to Google Apps for Business and Google Apps for Government.

Microsoft built Office 365 on its popular, desktop-based, Microsoft Office suite which includes Outlook, Word, Excel, PowerPoint, and other applications. (The current versions are Office 2003, Office 2007, Office 2010, and Office 2013.) Microsoft Office users will find Office 365 familiar since most versions include the Microsoft Office suite, which can be downloaded to your PC and to other compatible devices.

Office 365 consists of these primary components:

  • Exchange Online – Email, calendar, contacts, and tasks
  • SharePoint Online – Document collaboration and management
  • Lync Online – Online meetings with instant messaging and desktop sharing
  • Office Web Apps – Cloud versions of Word, Excel, PowerPoint, and OneNote

Most versions of Office 365 also include:

  • Office suite – Outlook, Word, Excel, PowerPoint, etc.
  • SkyDrive – Cloud storage of documents

Full-feature versions range from $96/user per year to $240/user per year. Microsoft now offers its E1 plan free to qualifying non-profit organizations.

Google Apps are, and always were, Cloud-based; they did not start as applications installed onto your computer. As such, they are easy to use and maintain and they work on a wide variety of devices, from PCs to tablets to smartphones. On the downside, due to this setup, they have some functionality and usage limitations when compared to Microsoft Office applications.

Google Apps for Business has a “one size fits all” approach; you get all the features at $50/user per year. Google Apps for Business includes:

  • Gmail – Email with Google-powered search
  • Calendar – Schedule meetings, share calendars, get reminders
  • Drive – Store files in the Cloud and send files to colleagues
  • Docs – Create, share, and work-on documents
  • Sheets – Manage spreadsheet data
  • Slides – Create presentations

Comparing Productivity Suites

Both Office 365 and Google Apps for Business provide desired applications that are somewhat easy to use; while Microsoft relies on its huge base of Office users to consider switching to Office 365, Google lures its users in with its free versions of Google Apps and Google Apps for Education and then provides a simple upgrade to the paid version of Google Apps for Business (or Google Apps for Government).

Basic reasons to choose Microsoft Office 365:

  • Users are familiar and comfortable with Microsoft Office interface
  • Multiple plan options exist to fit your needs and budget
  • Greater functionality within applications

Basic reasons to choose Google Apps for Business:

  • Relatively inexpensive with only one plan to select
  • Low maintenance with no updating necessary
  • Works over a wide range of devices

Get more Microsoft Office 365 versus Google Apps from our August newsletter atBryley.com — Bryley Tips & Information – August 2013

Bryley Basics (in 100 words): Mass. enacts sales tax on Computer Services

Massachusetts is now one of the few states collecting sales tax on services; the 6.25% tax targets specific computer system design services as of July 31st.

The legislation was approved July 24th, 2013 with the intent to tax customization services; the relevant, broadly worded phrases:

  • “’Computer system design services’, the planning, consulting or designing of computer systems that integrate hardware, software or communications technologies…”
  • “…modification, integration, enhancement, installation, or configuration of standardized software.”

See Section 48 and Section 49 of Chapter 46 of Massachusetts Session Laws at https://malegislature.gov/Laws/SessionLaws/Acts/2013/Chapter46 for details.

Fortunately, this legislation was followed on July 25th with guidance from the Massachusetts Department of Revenue (DOR) in Technical Information Release (TIR) 13-10, which helped to narrow the discussion with these clarifications:

  • “…generally intending to tax software services that modify, enable, or adapt prewritten software to meet the business or technical requirements of a particular purchaser and to operate on the purchaser’s computer systems…”
  • “…may also be described as customization services with respect to prewritten software.”

TI 13-10 also provides guidance on sourcing; when the tax would be applied if the provider or consumer occupies multiple tax jurisdictions.  TIR 13-10 is available at http://www.mass.gov/dor/businesses/help-and-resources/legal-library/tirs/tirs-by-years/2013-releases/tir-13-10.html.

Why are QR codes failing?

Why are QR codes failing?

QR (Quick Response) codes were developed over 20 years ago to track goods and inventory, but are now a marketing technique targeted at on-the-go cellphone users to easily receive information and promotions.  However, only 19% of US cellphones have ever tracked a QR code; plus, most QR codes are scanned at home, usually from a magazine or newspaper.

Problems with QR codes:

  • They are typically displayed improperly and lack consumer enticement
  • They just aren’t that easy to use; they take time and effort to scan

It’s not too late for QR codes, but here are some things that need to change:

  • Advertisers should place QR codes in easy-to-retrieve locations
  • QR-code messaging must include immediate, useful benefits
  • QR-code scanners need to become easy-to-use

Invoke media posted http://www.invokemedia.com/qr-codes-why-they-are-failing-and-what-the-future-holds/ (article no longer appears to be available) to review QR code use on their site, The Blog; they also point out that Mobile Visual Search (MVS), a newer technology that responds with relevant options based on a picture, could work with or even replace QR codes.