Академический Документы
Профессиональный Документы
Культура Документы
07
CYBERTREND.COM
INFOSYS
28
CONTACT US
P.O. Box 82545
Lincoln, NE 68501
or
120 W. Harvest Drive
Lincoln, NE 68521
THE STATE OF
ANALYTICS TODAY
26 COMMUNICATIONS
hosted communications solutions offer
numerous extra benefits
28 DATA
data analytics trends, how to determine who
should be in charge of analytics, and why you
should keep an eye on Apache Spark
44 NETWORKING
there are many positives associated with
virtualization, but there can be problems as
well, and these issues can be mitigated
47 SECURITY
trends in advanced threat detection, security
in the cloud, and why companies hire hackers
38 ENERGY
the latest news and research into
energy-conscious tech
56 WEB
how to determine whether your organization
needs a new website
41 IT
how your organization stands to benefit
from DCIM (data center infrastructure
management) solutions
58 ELECTRONICS
the latest in premium consumer electronics
60 TIPS
advice for mobile professionals
Copyright 2015 by Sandhills Publishing Company. CyberTrend TM is a trademark of Sandhills Publishing Company. All rights reserved.
Reproduction of material appearing in CyberTrend TM is strictly prohibited without written permission.
Data Center Investments Will Help The IoT Reach Full Potential
According to research firm IDC, the IoT (Internet of Things) will be primarily driven
by new investments in data center development and expansion in the next four years.
Equal, or even greater, investments in the IoT platform services residing in the data
center will be instrumental in delivering the IoT promise of anytime, anywhere, anyhow
connectivity and context, says Richard Villars, vice president, data center and cloud, at
IDC. Given the number of devices connected and the amount of data generated, businesses must focus on their IoT service platform requirements at the level of the data
center itself, not just the individual servers or storage devices. Some specific findings
from IDC indicate the following:
Grow
Shrink
Company Website
36%
59%
5%
35%
62%
4%
Mobile Advertising
34%
60%
6%
33%
60%
7%
33%
58%
8%
32%
62%
6%
Manufacturing companies seeking to perform better in the Third Platform of computing (mobility, cloud, big data, and social
business) can look to 10 helpful scenarios
recently released by IDC. For example, companies intending to grow aggressively can
deploy a flexible IT infrastructure, whereas
companies focused on gathering customer
feedback more efficiently can use the Third
Platform via mobile devices to help process and take action on customer information. Organizations can also rely on Third
Platform technologies to meet regulatory requirements, innovate internal collaboration,
roll out as-a-service products, and accumulate product performance data.
0%
5%
10%
15%
20%
25%
30%
35%
40%
Small-Business Owners
Tackle Cybersecurity
Companies deploying network equipment around the world for the 4G cellular
communication standard known as LTEAdvanced are benefiting from the widespread adoption of mobile technologies.
According to ABI Research, at the end of
2014 there were 49 LTE-Advanced networks in place globally covering 100 million people. The research firm predicts that
LTE-Advanced coverage will extend to 1
billion people by 2018. Although network
operators in Western Europe dominate
in terms of commercialization, ABI says,
North American operators cover the largest
percentage of the population, with all four
of the big carriers running such networks.
STARTUPS
A Startup To Help
Startup Developers
Pure Storage, a startup that raised $225 million last year and reached a $3 billionplus valuation, has made a name for itself with its all-flash storage products. Now the
Mountain View, Calif.,-based company has entered the hardware storage arena in
a big way. That is, in addition to introducing
an all-flash storage array
called FlashArray//m (pictured here), Pure Storage
launched Pure1, a cloudbased management platform that provides greater
flexibility and support for
IT, as well as Evergreen
Storage, a procurement
and upgrade model designed to keep the storage
array in place for generations with what Pure Storage calls flat and fair pricing for
hardware upgrades and software updates. Now customers can invest in a storage platform that can add value to their businesses for a decade or more, and make individual
component, non-disruptive upgrades to capacity and/or performance when required by
the business, says Matt Kixmoeller, vice president, Products.
KEY POINTS
Infosys has had a global focus
from the beginning. Starting in
India, its first client was located in
New York City.
The company offers established
products and services to its customers, as well as custom engineering and consulting.
Finacle is an all-in-one, endto-end banking platform with
CRM, mobile banking, and other
features.
EdgeVerve works for a wide
range of industries and helps not
only with financial and customer
management, but also digital marketing and brand awareness.
Expertise Leads To
Exponential Growth
One of the major pillars on which Infosys
stands is the idea of harboring a culture of
learning. We have always looked for bright,
curious people who have that quality we call
learnability, and giving them the training,
tools, and opportunities to surprise themselves and their clients with what they can
accomplish, says Sandeep Dadlani, Head
of Americas for Infosys Ltd. We run the
worlds largest corporate university, partner
with many of the worlds leading universities,
and believe the training and education must
be constants in our fast-moving industry.
Its this yearning for education that has
helped Infosys establish an employee base full
of experts in their fields. Of the total workforce, which totals 180,000 employees and
comprises people of more than 98 nationalities, 94% are consultants and engineers. This
diversity and depth of knowledge helps us
to understand technology trends in every
corner of the globe, Dadlani says.
In addition to the employees themselves
being well-educated experts (97% hold university degrees), the company also makes
further education a company-wide initiative
and has multiple programs in place to foster
innovation and creativity. Along with its
93 development centers around the world,
Infosys also invests 2% of its revenues in
research-and-development-focused projects. The company has a culture of innovation focused on developing breakthrough
solutions that will redefine the future for
our clients and us, Dadlani says. Some of
those innovations are already showing up in
Finacle
What Infosys Does For Its Clients
The ultimate goal of Infosys is to help
its customers peer into the future at what
lies ahead in technology, Dadlani says.
As an intensely global-oriented company,
Infosys can witness worldwide technological trends as they happen and determine
which of those trends are a fit for their clients. Infosyss combination of engineering,
service offerings, and consulting makes it
essentially a one-stop shop for enterprises
looking to improve their operations and
grow in todays digital landscape.
Finacle is unique from other banking solutions because it covers nearly every facet of
banking, including core banking, e-banking,
mobile banking, CRM, payments, treasury,
origination, liquidity management, and
wealth management, among others. The ultimate goal of Finacle and its overall suite of
products is to make banks operate more efficiently as well as make them more customer
friendly. In fact, Reh says, Finacle users typically enjoy 50% higher returns on assets, 30%
higher returns on capital, and 8.1% points
less costs-to-income than other banks.
One component of Finacle that helps illustrate just how flexible the platform can
be is the Finacle CRM solution. Not only is
it a modular and Web-based application, it
EdgeVerve
EdgeVerve consists of six main components that are all cloud-based and operate
on a pay-as-you-use model. As with other
Infosys products, EdgeVerve was created to
help companies serve their customers better
in a digital world, Reh says. The platform
covers a wide range of industries, including
financial services, insurance, retail, life sciences, manufacturing, and telecommunica-
Infosys highly values education and creativity as keys to success for its
employees. In its buildings and campuses, Infosys uses thoughtful designs to
encourage these ideals, as seen in the spherical multiplex theater, part of the
companys Global Education Centre located in Mysore, India, and the meditative
pool area on the Bangalore campus.
10
customized
approach to
your mobile
banking presence or you can choose a preconfigured bank-in-a-box model that will
get your mobile operations up and running
much more quickly and at a lower cost.
In addition to helping organizations improve their banking operations, Infosys is
also taking strides to make sure the youth of
the world has a way to learn important life
skills related to finances and banking. The
recently launched Finacle Youth Banking
solution goes a step further to encourage
Dr. Vishal Sikka, CEO and Managing Director of Infosys, interacts with employees at an Infosys innovation fair.
11
12
Finding Actionable
Information
We often cover big data in the pages
of CyberTrend, and big data analytics is
Say Goodbye To
Wasteful Spending
Margulies tells us that weve come a
long way from throwing money into a
marketing black hole and hoping that
were reaching the right people. He
notes, Today, the promise of data is
that you engineer marketing more precisely and get real-time feedback into
what works and what doesnt. As an
executive, you can use the feedback
to hold the marketing team and agencies accountable for the decisions. Isnt
technology a wonderful thing?
13
KEY POINTS
Companies are taking XaaSfocused approaches to meet infrastructure/service needs to gain agility
and flexibility and reduce infrastructure
responsibilities.
Some experts believe that to be
competitive in their markets, vendors
using traditional licensing models will
need to add as-a-service offerings.
Noteworthy as-a-service offerings, experts say, include business
process, database, desktop, security,
and unified communications.
Adopting an XaaS-centric
strategy can enable internal IT
organizations and businesses to
focus their efforts on whats core to
their business.
14
Exciting Times
A key component driving companies toward meeting their needs in an
XaaS-centric manner is the desire to
focus their efforts on whats core to
their businesses as opposed to infrastructures. Anything not core is often
just as easy to outsource, Keegan says.
Moreover, doing so can enable seeking
out new areas to enter relative, peripheral, or outside the companys own
market. Its kind of a de-cluttering process, he says. There are easier, more
consumable ways of obtaining services
as or arguably more reliably than they
can do themselves, Keegan says.
Interestingly, some XaaS offerings,
such as health care as a service, are extremely industry-specific. Although such
offerings will have a less broad consumption base, this doesnt make them necessarily less valuable. Thats really what it
comes down to, says Keegan. If theres
a service you can consume that will help
you save money and enable you to have
a laser focus on your business, there are
probably some legs to it.
15
16
A Change In Tradition
In addition to influencing companies
that are adopting as-a-service strategies,
the XaaS concept is impacting vendors
that have traditionally sold products vs.
individual services. Traditional software companies must rethink licensing
models, says Bartoletti. Pay-per-use
and self-service access are the hallmarks of as-a-service, and depending
on the age and penetration of an existing product, it can be quite difficult
for a vendor to make the switch to completely new licensing models.
Overall, many companies now simply
prefer purchasing a subscription and
love it when they can consume their
technologies as service, says Anderson.
This makes XaaS offerings an important part of the market opportunity, he
explains. In fact, he adds, as-a-service
is growing at rates much faster than the
traditional markets. If you extrapolate
the trends, its unlikely that technology
vendors will be able to compete over the
long term without an as-a-service option for their offerings, he says.
Cognizant Computing
BIG DATA, INTERNET OF THINGS & THE EVOLUTION OF THE PERSONAL CLOUD
17
18
KEY POINTS
The profound impact that the BYOD
(bring your own device) trend has had
on businesses has been accompanied
by various data and security worries.
Many experts believe BYOD will
eventually give way (or is already
giving way) to a model known as
CYOD (choose your own device),
which is said to balance control between employers and employees.
Cloud-based services can be a
boon to worker collaboration, file
syncing/sharing, and productivity, but
such services require careful company
oversight.
In coming years, expect wearables
and various Internet-connected devices to increase mobility demands.
20
Understand BYOD
Despite its relative youth, BYOD has had
a monumental impact on organizations.
Not too long ago, it was more common
for companies to deploy, say, a fleet of the
same BlackBerry model to its workers, and
many companies retain this model for various mobility management purposes. By
contrast, BYOD ushered in an era where
employees are hopping on the corporate
networks with whatever personal device
they feel most productive with.
Beyond boosting productivity and employee satisfaction, BYOD is praised for
introducing potential costs-savings for companies because BYOD saves companies the
trouble of buying devices and associated
accessories. Another positive is that todays
increasingly tech-savvy workers are more
likely to troubleshoot their own device
problems or find a co-worker who can.
for company security, data integrity, compliance issues, and regulatory requirements.
The lack of control enterprises generally have
over personal devices accessing corporate
networks and data has led many to implement MDM (mobile device management),
MAM (mobile application management),
EMM (enterprise mobility management),
and other solutions to regain control.
Increasingly, experts point to EMM as
the future of corporate mobility. Gartner
dubs EMM the future evolution and convergence of several mobile management, security, and support technologies, including
MDM, MAM, application wrapping, containerization, and file sync/sharing. Gartner
says it eventually expects EMM will address
an array of mobility needs spanning various
smartphone, tablet, and PC OSes.
Similarly, Christian Kane, Forrester
Research analyst, believes EMM will eventually be part of workspace management
solutions that address mobile and PC management aspects. You need application access and data access regardless of the device
youre using at that moment, he says. So
companies will look to manage things like
access, policy, and security across all of these
things in a much more consistent way.
Forrester has noted that EMM improves
upon legacy MDM solutions in three main
areas: security, support, and experience.
Where experience is concerned, Forrester
states the ability to make application recommendations to employees, provide automation and self-service abilities, and enable IT
to roll out and integrate services quickly will
make EMM more enticing to companies.
Chris Silva, Gartner research director,
notes that via just one console, EMM suites
enable managing multiple policies and enforcement methods, which is essential to
managing mobility on a large scale. As mobile OSes mature, he says, more control is
being placed natively into the device. This
21
22
tools, meaning employees computing arsenals will expand to include PCs, smartphones, tablets, wearables, and other
devices. A siloed management system that
only works for mobile devices and not PCs
will make it harder to take an employeecentric rather than a device-centric view,
Forrester stated.
Similarly, Jim Rapoza, senior research
analyst at Aberdeen Group, says while
managing mobile devices is already difficult, smart watches, wearable computing,
the IoT (Internet of Things), and other new
technologies will complicate matters. J.
Gold Associates, meanwhile, predicts that
within two years, enterprise users will regularly use three to five personal devices and
eight to 10 business applications. Further,
theyll connect to at least five enterprise
systems. These numbers are expected to
multiply two to three times by 2018-19,
meaning new burdens for enterprises in
terms of access and interaction with corporate systems and infrastructure.
Beyond a changing device landscape,
expect enterprise workspaces to continue
changing in coming years, dramatically so
in some cases. Recently, there has been increasing acceptance of flexible and remote
working practices due largely to affordable
high-speed Internet connectivity and technologies that enable easier collaboration
and communication. Younger workers with
nontraditional workplace expectations and
knowledge workers reluctant to relocate but
who possess skills organizations desire are
also influencing this trend. For companies,
remote working situations can lead to savings in real estate and resources.
Another workplace trend making waves
is open workspace designs that do away
with cubicles and closed offices in favor
of more collaborative environments. Time
and a variety of implementations will tell
whether such efforts affect productivity and
creativity positively, negatively, or both.
Things To Get
The right frame of mind. A tablet is
almost universally smaller and lighter
than the average laptop, therefore there
are limits to what it can manage. Using
any application that requires a significant
amount of processing power, memory
bandwidth, or graphics chops, such as
CAD, 3D rendering, gaming (beyond
mobile games), scientific calculations,
media creation and editing, and the like,
will be painfully slow or impossible on
the average tablet. Also, tasks that involve
a lot of typing or the deft use of a mouse
translate poorly to tablets without add-on
23
24
Hosted Communications
THE APPEAL OF CLOUD-BASED VOIP & UNIFIED COMMUNICATIONS
26
Enterprise-Level Features
OConnell says most enterprise-level
hosted UC and VoIP solution deployments include a high uptake of VoIP,
mobility, UM, and audio conferencing.
The business case is often replacing the
premium-based PBX [private branch exchange; a private phone network used
within a company], as well as integrating
employee smartphones to enable enterprise mobility, he says.
Basically, Schoeller says, hosted UC/
VoIP solutions include the same set of
capabilities as on-premises UC solutions. These features are used for enterprise collaboration, and many look
to connect external users, but in other
cases, they use federation services to
do that. Federation essentially enables
UC-type communications with others
outside the organization.
In terms of telephony, some organizations require an exhaustive list of features,
including those in operator/attendant
consoles, Banting says. Additionally, with
remote working on the rise, mobility is
becoming key. Here, functionality can
range from simple call-forwarding from
a desk phone to a mobile device on up to
fully featured soft-client apps that enable
making voice and video calls over Wi-Fi,
holding conference calls, and IM.
Bantings own firms use of UCaaS
enables its analysts to operate globally.
U.S.-based clients, for example, use a
U.S. number to contact Banting with the
call routed via public Internet to an office-based IP phone near London. This
is where UCaaS makes a lot of sense
for companies geographically dispersed
with multiple locations and/or home
workers, he says.
Elsewhere, audio, video, and Web conferencing is becoming more common for
some organizations. Conferencing enables team members to meet online in a
scheduled or ad-hoc manner to talk, add
video, and share content. While some
solutions may include whiteboarding
Better Utilization
Currently, many cloud-based VoIP/
UC providers possess limited video
and Web conferencing capabilities,
OConnell says, although some are enhancing their abilities and making them
easier to use. We can expect these integrated solutions to start replacing the
Web conferencing and videoconferencing point solutions, he says.
Forrester, meanwhile, expects good
growth for desktop video, although,
Schoeller says, videoconferencing doesnt
seem a fit for some enterprises culture.
Some organizations will eventually grow
into video as more consumers using
it personally also want it for business,
he says.
Moving forward, Banting says its worth
noting that what was once a complex mix
of distinctly different business tools and
technologies is slowly coming together in
the cloud. UCaaS providers recognize that
multiple tools and multiple communication channels cause unnecessary repetition,
delay, and frustration for organizations,
he says. Likely, he adds, well see a rapid
convergence of real-time communications
(voice, video, conferencing, IM, presence,
and desktop sharing) and asynchronous
collaboration (email, intranet sites, voice
mail, enterprise file sync/share, and enterprise social networking).
Currently, the collaboration and communications market is fragmented into
numerous on-premises and cloud-based
offerings, Banting says. As such, an enterprise will likely compromise some features and functionality if choosing either
an all-cloud or all-on-premises solution.
Many vendors, Banting adds, do support
hybrid models that enable integrating
both deployment choices.
27
KEY POINTS
Because all companies possess
data, some experts view data analytics solutions as suitable for any
organization.
Increasingly, cloud computing
and the availability of open-source
resources are bringing data analytics programs more within reach
for smaller companies.
Successful data analytics programs largely rely on establishing
a company culture that recognizes
the benefits of making data-driven
decisions.
The Internet of Things and the
data it generates are expected to
become key focus areas for data
analytics in coming years.
28
A Growing Market
How big is the data analytics market?
Its massive, says Daniel Ko, Info-Tech
Research Group manager. Essentially,
Increasing Reliance
Right now, larger enterprises in particular are placing a strong emphasis
on data analytics. Some are literally
surviving on it, Ko says. Traditional
industries (financial, consumer goods,
energy, telecommunications, etc.) that
are experiencing slow or flat growth,
for example, are using data analytics
to find diamonds in an almost usedup diamond mine to create next-level
growth, he says. Some large enterprises
that ignored or delayed data analytics
usage are now trying to catch up but
with mixed results. Some will never
catch up and will eventually feel it in
their bottom lines, Ko says.
John Myers, Enterprise Management
Associates managing research director,
29
30
Get Creative
To meet enterprises changing demands for data analytics, particularly
ones concerning advanced analytical
models, data visualization, and realtime data capabilities, vendors are focusing on providing improved user
experiences. Myers says some are
taking a data flow-based approach to
advanced analytical models. For realtime data, youre seeing time series
analytical tools being developed
scrolling data-visualization elements
with time as the X-axis and connections for real-time streaming data
sources, he says. Although such tools
have been available for some time, now
visualizations are being tuned for this
type of analysis, he says.
Ko says data visualization is key to a
movement occurring in which BI, analytics, and predictive analytics tools are
empowering business users. End users
are empowered because they can data
visualize on their own, he says. Theres
also a demand from IT departments to
offload content creation to end users
instead of relying on overloaded IT departments to develop analytics content.
Compared to the rest of the BI market,
IDC predicts visual data discovery tools
will grow 2.5 times faster in 2015, and
by 2018 investments in this area will be a
requirement of all enterprises.
Phillips says the IAA definitely sees
a trend toward analytics being embedded in business processes or applications in which users dont even
notice analytics and data activity is
being undertaken. He foresees companies moving away from large, monolithic software to data visualization
tools in which vendors essentially decouple analytics from the visual layer.
Its kind of analytics light, he says.
Now the market is becoming more
fragmented on analytics solutions. So
you get a lot of analytical-driven applications where the analytics is sort
of hidden below the surface. Thats a
trend I think for sure is here to stay.
Although many vendors are focusing
on putting the power and knowledge
of data analytics into end users hands,
there are issues to consider, including
data governance and democratization,
Shimmin explains. For example, while
giving a director of sales a tool to ask
unanticipated, important questions in
real-time would be an absolute coup,
he says, a sales director likely doesnt
have the expertise for that power and
knowledge.
To bridge this gap, some organizations are moving to build tools into
their systems that work from the data
acquisition to data discovery point so
that at each step the end user is guided
toward the correct usage of data, the
correct way to ask questions, and the
correct way to interpret answers. You
can imagine from just that little statement thats a pretty big mountain to
climb, Shimmin says.
Vendors have come a long way in
enabling this, but really making the
kind of democratization of data needed
means companies must spend significant time curating and training data sets
ahead of time, Shimmin adds. There
has to be a lot of time invested in the
system itself to erase that knowledge
gap at the point of decision, he says.
31
KEY POINTS
Apache Spark improves on a
few aspects of Hadoop, especially
MapReduce because it can handle
business processing tasks much
faster both in memory and on disk.
Spark can be used with Hadoop,
but it can also be used with other
Apache and non-Apache data
frameworks as long as it has a resource manager and file system.
Spark can be used for streaming,
SQL, machine learning, and graphbased analytics, although the last
two arent as common as the first.
Spark may someday replace
Hadoop, but its a relatively new
technology thats still evolving and
currently has a complementary role.
32
33
34
For many companies, the initial decisionmaking comes from a joint effort between
business and IT. Whats key is that the
person or group understand how the organization will use the chosen analytics solution.
If the analytics solution is going to be
deployed on-premises, then it will be implemented and managed by IT, so [in this case]
usually IT will make the vendor selection and
own that process, says Jim Hare, research
director at Gartner. If the analytics solution is going to be an application thats cloud
or SaaS [software as a service]-based and
supporting a specific business function, like
sales or marketing, then business will drive
and own the vendor process. This scenario
doesnt leave IT out of the picture, however.
IT will be involved from the standpoint of
making sure whatever solution they choose
meets the organizations standard, such as
security, privacy, or integration, Hare adds.
In general, both the business and IT segments of an organization must work together
to get the most out of an analytics solution.
Brian McDonough, IDC research manager,
Implementation
Implementation has two parts: implement the data analytics platform and develop analytics content, says Daniel Ko,
manager at Info-Tech Research Group.
Many organizations plan for the first part
but underestimate the importance of the
second part. If you are a first-timer, you
should definitely consider using professional services. Professional services do not
only get the job done, they can also bring
best practices to your analytics program. It
is also like a mini-training, especially if your
own employees are working with the professional services.
35
Appoint A CDO
After an analytics solution and strategy
are in place, someone must run the program.
The emerging role of CDO (chief data officer) is one that many organizations are
adopting, says Hare. CDOs not only handle
analytics, but they also manage and govern
the data and anything else thats going to be
related to how that data gets used, he says.
In other words, the CDO needs to have visibility into every aspect of analytics, including
data governance.
The CDO typically reports to the business
side of an organization. The CDO is responsible for looking at trends and really bringing
together the disparate individuals and business groups that are in silos, and looking at
everything through his own specific lenses,
Hare says. CDOs are different from CIOs,
who are responsible for systems that contain
the data, but they dont own the data, Hare
says. The CDO needs to have a separate role
dedicated to analytics and understanding
how it impacts the entire business.
Whether a company needs a CDO depends entirely on the depth of its analytics
investment. If its dabbling and only uses
analytics for certain projects, then it may not
be viable for a company to have a full-time
CDO. However, if information is important
to the overall business model, then its more
likely to need a CDO. In fact, Hare says, 30%
of organizations will have appointed a CDO
by 2018, which illustrates just how important
analytics will be going forward.
36
can work on model development for various functions, including targeted marketing
campaigns or econometric models for determining lending practices. This group, led by
the CDSO, will typically support other key
business functions that need these advanced
analytical models to improve results.
Additional Support
For an analytics program to be truly successful, it has to have the support of the entire organization, so in addition to the CDO,
CDSO, CIO, and IT team, you need others
to help along the way. We are thinking
about a Moses in the long data analytics
journey, says Ko. Your CEO should be
that Moses figure. Better still, other key figures like the CMO and the CFO should be
on board to build a Holy Trinity leadership
triangle. With that triangle, the analytics
program has the strongest support. Dont
forget the strategists. Your internal and external strategists can help you to make sense
of data analytics program and execute the
program strategically to harvest low-hanging
fruit and to avoid the turbulence.
CORPORATE TRAVEL?
NEED A VACATION?
Let our #missionbird take you where you need to go.
Our diverse fleet of 22 aircraft offers a travel experience above the rest.
Greenovations
ENERGY-CONSCIOUS TECH
The technologies
that make our
lives easier also
produce some
unwanted side
effects on the
environment.
Fortunately, many
researchers,
manufacturers,
and businesses
are working to
create solutions
that will keep us
productive while
reducing energy
demands to lessen our impact on
the environment.
Here, we examine some of the
newest green
initiatives.
Five hundred New York City vendors are set to receive state-of-the-art solar-powered food vending carts. Move
Systems says its food cart pilot program will be paid for via sponsorships and private partnerships.
New York City Food Vendors Get Ready To Join The 21st Century
Thanks To Pilot Program Involving Free Solar-Powered Carts
Move Systems, a company that develops environmentally friendly mobile food
vending units, has launched a program to provide 500 free solar-powered vending
carts to street vendors in New York City. The carts are attractively designed and feature a hybrid natural gas and electric power system that incorporates batteries charged
by solar panels on the roof. The hybrid power system provides the power needed to
run the refrigeration and cooking units inside the carts. New York is home to thousands of street food vendors, many of whom rely on smelly or noisy gas-fed power
generators or use carts that lack proper refrigeration to safely store foods. Move says
the costs of the pilot program will be covered by private partners and paid sponsors,
and the company has already started gathering applications online from vendors who
wish to participate and receive a new cart.
38
Computer chips are proliferating in consumer goods, which isn't good news for
the environment. Some of the materials used to make computer chips are toxic, and
while the amount of hazardous materials in any one chip may not be that significant,
there is a cumulative effect resulting from billions and billions of chips being made and
disposed of annually. Researchers at the University of Wisconsin-Madison have discovered a way to make the substrate (the main part of the chip which acts as a support
to hold the other elements) out of a material derived from wood. Led by electrical and
computer engineering professor Zhengiang (Jack) Ma, the research team took wood
fiber and broke it down to the nanoparticle level, and then were able to create a material called cellulose nanofibril that is strong as well as transparent. Coating the material
with epoxy seals out atmospheric moisture and makes the surface smooth and suitable
as a support material for manufacturing computer chips.
39
GENERATORS
UPS
INQUIRIES
Kris Davenport: 602.622.5619
kris.davenport@empire-cat.com
DATA CENTERS ARE clearly vital to enterprise operations. Theyre also a source
of considerable power consumption,
hardware requirements, and related costs.
DCIM (data center infrastructure management) solutions offer the potential to deliver greater insight into and control over
data center equipment, components, space,
and resources. Gartnerwhich defines
the DCIM market as including tools that
monitor, measure, manage, and/or control energy usage of all data center and ITrelated equipment and facility infrastructure
componentsestimates more than 60%
of larger North American data centers will
deploy DCIM tools by 2017.
Essentially, DCIM solutions pull data
from various monitored equipment into a
unified system to provide valuable information to data center and facility teams. The
alternative typically involves IT staff manually tracking each piece of equipment and
monitoring performance separately, which
can be time-consuming, expensive, and limited in terms of how information is dissemi-
DCIM's Appeal
Initially, DCIM surfaced as something
more for facilities teams than for IT. Today,
says Steve Brasen, research director at
Enterprise Management Associates, DCIM
solutions at a minimum must provide abilities for asset, power, and space management; analytical reporting and alarming;
and modeling infrastructure performance.
More comprehensive solutions also support thermal management and hypothetical
modeling, or what-if scenarios, and may
include the ability to display a visual model
of a data center, which administrators can
drill into to view individual racks and more
granular details such as cable locations and
status lights.
41
which led to a 45% reduction in related energy costs, equating to more than $500,000 in
savings in annual energy expenses. A financial institution reduced the manual branch
circuit replacements in its infrastructure by
proactively monitoring energy performance,
thereby reducing annual costs by about
$110,000, including $90,000 in manual monitoring and maintenance labor and $20,000
in hardware costs for unnecessary circuit
replacements. Thats just two examples, but
there are many others, and they all reflect
different value achievements from DCIM,
Brasen says.
Get Proactive
Often DCIM addresses an area that a
current management solution can't. For example, DCIM can provide more detailed
data, which a company can analyze and
combine with other data sources to get a
better view into the cost and risks of delivering IT services. This may not sound
important, Illsley says, but considering how
much energy a data center consumes, in
the order of a couple of megawatts, saving
10% isnt insignificant. If you operate at
hyper-scale, then the savings on just 1% efficiency are immense.
Brasen notes that DCIMs holistic nature provides visibility across an entire IT
ecosystem. If a specific servers performance
declines at the same time each day, for example, DCIM can pinpoint the true cause
possibly a faulty fan in a neighboring
system causing temperatures to rise in the
rack when backups run. Correlating these
events would be close to impossible with
nonintegrated point solutions, he says.
Similarly, DCIM takes the guesswork out
of planning for equipment additions and reconfigurations by providing accurate intelligence on optimal deployment approaches.
Brasen categorizes potential benefits
from DCIM into 10 general areas, including
hardware upgrades. While upgrading to
more energy-efficient hard drives, chipsets,
PSUs (power supply units), and cooling systems alone can improve efficiency, the challenge is identifying the power hogs that
are good candidates for upgrade/replacement. Monitoring power consumption on
each device and comparing results against
system utilization via DCIM can help.
42
. . . DCIM takes the guesswork out of planning for equipment additions and reconfigurations by providing accurate
intelligence on optimal deployment approaches.
STEVE BRASEN
Research Director : Enterprise Management Associates
From One-To-One To
One-To-Many
Virtualization in and of itself can
be disruptive to existing infrastructure within an organization because
it essentially changes the way servers
operate. Colm Keegan, senior analyst
with the Enterprise Strategy Group,
says virtualization does a great job
of extracting the server compute layer
so that you can pack a bunch more
44
VM Sprawl Is A Possibility
A big benefit of virtualization is that
people can quickly spin up virtual machines as needed to work on projects
and then spin them back down after
the fact. But in some situations, those
VMs dont get turned off. Therefore,
they continue to consume resources
even though no one is actively using
them for a project. This phenomenon, which is commonly referred
to as VM sprawl, is a situation where
there are quite a few VMs running in
an environment that are all eating up
resources that can be better used elsewhere. This can often happen during
application development projects,
which are often short-term projects
that require a lot of VMs at once.
45
SPEED OF CHANGE
You use CyberTrend
to keep tabs on the latest
.COM
Get the latest issue right now
online at www.processor.com
or on your iPad via the iTunes Store.
KEY POINTS
Theres an argument that applying multiple security solutions in
layers can aid in combating threats,
although integration is key.
Determining that a security
solution isnt catching all of the
threats it should can be difficult, in
part because it involves unknown
unknowns.
Sometimes the processes and
resources surrounding a companys
security operations are more problematic than the solutions in place.
Sharing threat intelligence with
one another is one of the ways vendors are working to combat threats
and attackers.
47
Fight Back
One problem some organizations share
is they have fractured security systems
or multiple security solutions that dont
communicate well. Some security companies are working to address this, Tarzey
says. He notes theres a good argument
that using multiple vendors products
provides better protection in terms of
detecting a wider range of threats, but
theres also evidence that using too many
can cause coordination breakdown.
Similarly, Menting says a movement
toward integration is happening within
the security market, which is crowded
with many vendors offering different solutions. The result for security companies, she says, is that retaining clients is
just as important as gaining new ones.
Businesses, meanwhile, want to move
away from juggling numerous solutions
in favor of streamlined, efficient interfaces
that work well and interact seamlessly.
Integration has therefore become a key
strategy for security vendors, Menting
says. For businesses, integration enables
one solution to pick up where another
lacks capabilities and vice versa.
Some vendors are also enabling integration between endpoint security and
traditional perimeter security tools,
can never know for sure, in part because youre dealing with unknown unknowns. The best thing to shoot for is
minimizing vulnerability, maximizing
insight, and trying to stay ahead in the
online arms race.
McCloskey agrees that making such
assessments are difficult. I tend to
land on the side that you dont know
until your stuff shows up somewhere
you didnt expect it to be, and thats
really cold comfort, he says. He cites
physical protection, in which a company can use physical security controls
(cameras, badges, door locks, etc.) and
associated detective controls as an example. In this case, determining whether
a physical breach has or hasnt occurred
comes down to whether assets are intact
or missing. We dont have that luxury
in the digital world, he says, often because attackers access data but leave the
original stuff behind, so effectively they
leave the integrity and availability intact
but breach the confidentiality.
It can help a great deal to stay aware
of the security market and the latest vulnerabilities, and to know when patches
are available. Its also helpful to use stress
or penetration testing and perform security audits. Pen testing involves placing
security professionals in front of the organizations defensesfirewall, IPS (intrusion prevention system), antivirus
protection, etc.so they can try to find
their way. This helps them determine
how effective existing security controls
are when confronted with real-world
testing. Still, while such tests can provide
48
Determine Whether
Its Time For A Change
Realistically, few companies abandon
an entire layer of security because legacy
protection continues to play a role,
Tarzey says. Host-based antivirus, for
example, still detects random malware,
while an IPS still blocks intruders to private networks. However, he adds, its
not enough to rely on this. So, a nextgeneration firewall sits in line with older
firewalls to provide application-level
protection, advanced threat detection
supplements antivirus, and so on.
Menting says some organizations do
consider changing solutions when they
become aware that major vulnerabilities
exist and could severely affect or compromise their systems. A good example is
Heartbleed, she says. Zero-day [attacks]
can be particularly damaging, but as soon
as information about one is revealed, security experts should consider how best
to remedy themfind a patch ASAP or if
none yet exists, switch solutions.
For companies considering a change,
McCloskey says, they should understand
that technology alone isnt the answer.
A company may decide product X is
not optimal and switch to product Y,
for example, but the root problem may
reside within its own processes and the
resources associated with its security
Be Prepared
If you decide to change security solutions, expect some challenges, including
learning a new solution. Its encouraging that vendors are working to make
solutions more user-friendly via intuitive user interfaces that dont require
special training, Menting says. For more
complex solutions, using a managed
service to adapt to the new solution may
pay off. Certainly, some solutions will
be more difficult to learn and [will] require a specialist to operate, but the
market is increasingly offering solutions
that can streamline learning and usage,
she says.
Notably, McCloskey says switching
solutions isnt a matter of saying well
get rid of this one and replace it with
that. Its about adding additional technologies in layers so the new solution
overlaps whats already in place but also
addresses new problems that past solutions couldnt. Id encourage for the
time being not consolidating and reducing but looking at adding to your
security protection portfolio in a way
you can still manage, he says.
49
KEY POINTS
Among SecaaS offerings, organizations have most widely adopted
email and Web protection services,
but offerings run the gamut.
Reducing internal security infrastructure and administration burdens while acquiring cutting-edge
security are top reasons organizations adopt SecaaS.
SecaaS can translate into cost
savings for organizations, but that
isnt guaranteed and shouldnt be
the driving factor for adoption.
A potential drawback to using
SecaaS offerings for some organizations can be a providers inability
to meet various customization
requirements for security that an
organization may have.
50
Whats Available
To date, email and Web security services that help weed out bad URLs and
Web content, provide secure (typically
encrypted) email, reduce spam, perform
virus scans, and combat phishing attacks,
among other capabilities, have seen
the greatest adoption among organizations, says Lawrence Pingree, Gartner
research director.
SecaaS offerings, however, pretty
much cover the entire security spectrum. Service types available include
IAM (identity and access management),
website protection (anti-fraud, anti-DoS
[denial of service], anti-DDoS [distributed DoS]), application security testing,
vulnerability scanning and assessment,
penetration testing, security intelligence
The Benefits
Among the more notable enticements
for organizations to adopt SecaaS is
the ability to bolster current security
measures, achieve better positioning
in terms of compliance (government
and industry regulations, industry standards and best practices, audits, etc.),
acquiring better reliability, and the
potential for cost-savings. Some companies also look to SecaaS to help avoid
the negative publicity and business
disruptions that can stem from security incidents.
As with other cloud computing services, adopting SecaaS offerings enables organizations to reduce their
on-premises technology infrastructures,
streamline processes, and achieve economies of scale previously not possible.
Specifically, Fielder cites speed of implementation, scale and elasticity of a
service, the depth of expertise available
from a security provider vs. whats typically available internally to most companies, the flexible and global nature of
a service, and reliability and resilience
as primary SecaaS benefits.
For Pingree, the greatest benefit of
adopting SecaaS is its ability to reduce
administrative burdens. Most larger enterprises want their IT security teams
focused on reducing threats and risks, as
well as the incident-response process,
he says. The biggest weakness most organizations have is that they dont properly resource their incident-response
processes. So redirecting resources is
essentiala factor that SecaaS offerings
help deliver.
In short, some organizations couldnt
or wouldnt deploy security architectures
and functionality without the benefit
of SecaaS, Fielder says. Any company,
however, can deploy leading-edge security solutions via the cloud and take
advantage of providers expertise with
SecaaS, he says. Additionally, SecaaS offerings provide the ability to easily integrate multiple sites into the service
regardless of location, as well as the
flexibility to rapidly scale up and down
a service to pay only for those services
the organization actually consumes.
DDoS protection is a good example of
the latter, Tarzey says. Why pay if you
arent under attack? he says.
Yet other SecaaS benefits include obtaining security thats more up-to-date
and part of a large-scale security operation. The latter means organizations
benefit from protection the provider
has developed based on issues other
customers have experienced. Broadly,
Tarzey says, SecaaS gives organizations
the freedom to focus on delivering value
to their business and leave the security
to experts.
From a budgetary standpoint,
SecaaS offerings are available in a wide
array of service contract options, including monthly, annual, and biennial contracts that make budgeting
easier, Pingree says. While theres a
notion among some that using cloudbased services automatically translates
into costs savings, this isnt necessarily true. Pingree says over the long
haul, using SecaaS offerings may cost
more than covering security internally. The tradeoff, however, is that
SecaaS offerings are much easier to
51
The Drawbacks
Although the list of benefits associated
with using SecaaS is long and attractive,
there are potential risks and drawbacks
to consider before adopting such services, including those related to a providers reliability, policies and control,
quality and quantity of customer support, and ability to protect data moving
between the provider and the organization. Additionally, while many providers
offer geographic hosting, organizations
with requirements about where data is
hosted should ensure this.
For some organizations, the level of
customization required vs. the level of customization the provider can deliver can be
a drawback. Some providers, for example,
focus on serving the needs of many by delivering common capabilities as opposed
to providing highly customized services.
Some services may be more commoditized in order to create economies of
scale and provide a very standardized service, which is likely to be very good but
may not be capable of much tailoring to
meet specific needs or working practices,
Fielder says. Thus, organizations may need
Viable Candidates
In terms of using SecaaS and all
cloud-based services in general, Tarzey
says no organization in the 21st century should not be looking at on-demand
service as an alternative to on-premises
deployment. Increasingly, he says, oldstyle IT and vendors that fail to adapt are
52
A New Day
Any discussion about hacking must
begin by establishing ground rules
about what hacker and hacking
mean, largely because the words' meanings have been twisted and reshaped
53
researchers that work unilaterally, disclosing what they find as they see fit.
54
MICHELA MENTING
Practice Director : ABI Research
Site Essentials
When it comes to the information
your website should convey, Magnus
56
Mobile In Mind
Visitors will view your company's website
on a variety of devices with different aspect
ratios and resolutions, so it should be designed to remain cogent and easy to read regardless of the screen size. If simply resizing
the browser window turns your layout into
a chaotic mess, you'll want to return to the
drawing board to reconfigure your design.
Furthermore, considering much of the traffic
to your site will come from mobile devices,
you have more incentive to ensure the home
page loads quickly, which means preventing
video and audio feeds from auto-playing.
E-COMMERCE ESSENTIALS
Websites that have an
e-commerce component
can take an active role
in boosting a companys
revenues. That is, unless
the website is missing
one or more of these
features:
Site-wide security and
SSL certificates are prerequisites for any website that hopes to earn
the customers trust.
57
58
Portable
Lightning For
Your iPhone
WWW.PNY.COM
Although it's true that the Apple
iPhone 5 and 6 pack more of
a charge than their predecessors, there's no guarantee
your battery won't run low just
when you need it most. PNY
Technologies' PowerPack L300
($49.99 retail, but often available for significantly less online
from PNY) features a retractable
Apple Lightning connector and
holds enough juice to deliver up
to two full charges, depending
on the iPhone model receiving
the charge. Because the device
uses the Lightning interface,
you'll enjoy speedy charges. The
L3000's own lithium polymer
battery is charged using a
Micro-USB cable (included)
and the device sports an LED
battery level indicator so you
always know where you stand
with your charge. The device
uses the same 5-volt, 1-amp
flow for both input and output,
and charges one iPhone at a
time. The PowerPack L3000 is
lightweight and pocket-sized for
easy carrying and comes with
a three-year warranty. What's
more, as long as Apple continues
using the Lightning connector,
the L3000 will work with future
iPhone models.
59
Images, clockwise from top left, courtesy of Apple (1), Samsung (2), Sony (3), Microsoft (4, 5), and BlackBerry (6)
Smartphone Tips
A GRAB BAG OF HANDY ADVICE
BLACKBERRY
60
ANDROID
Your Contacts, Google-Fied
61
iOS
Understand Widgets
& How To Use Them
With iOS 8, Apple introduced the
ability to add widgets to your iPhone
screen. Although widgets arent new,
your ability to add them is. So whats a
widget? Well, lets provide some background first. Swipe down from the very
top of any app screen on your iPhone
and you should see calendar items
listed under Today and alerts and
notices listed under Notifications.
(If you swipe down and see a Spotlight
Search bar and a bunch of app icons,
this means you didnt swipe down from
the very top of the screen, but from
somewhere near the top of the screen,
which is an easy mistake to make, so
tap Cancel.)
So far, what youre seeing is nothing
new. Tap the Edit button, however,
and you should see a new set of
choices underneath the items that reside in this area by default. (Default
choices include Today Summary,
Calendar, Reminders, and Tomorrow
Summary.) Heres the catch, however: the only other choices you will
see will be for installed apps that have
been updated for iOS 8 and that support widgets, so unless you have apps
that fall into those two categories, you
will only see Apples Stocks app here.
If you see any apps in this area you
think you might be interested in
adding to the Today screen, tap the
green plus sign icon. You can then
press and move the editing bars on the
right to reposition the order of widgets. Tap Done to view your customized Today screen.
If you dont like the manner in
which a particular widget displays information, tap the Edit button, tap the
red minus sign icon next to the widget,
and tap Remove to remove it from the
list. Many apps, such as The Weather
Channel app, currently support widgets, but over time many more are
likely to add widget support.
62
WINDOWS PHONE
Check Your Roaming Options For
International Travel
Depending on your smartphone model
and wireless carrier, your phone may automatically switch on a global roaming
mode and connect to various 3G and 4G
cellular networks when you travel to a
different country. If you want to take direct control over your cellular connection when traveling, the Windows Phone
operating system provides numerous
relevant options, all of which are accessible by accessing Settings, swiping
to access System, and tapping Cellular.
Activate Network controls which network your smartphone connects to, and
Mode Selection lets you choose a specific network mode. Data Connection allows you to switch data service on or off;
switching it off lets you turn the smartphone into a voice-and-text-only device.
Data Roaming Options enables you to
choose whether your smartphone will use
data when roaming, and Voice Roaming
Options enables you to do the same thing
for voice calls. In this area you can also
tap For Limited Wi-Fi Connectivity and
then tap Dont Use Cellular Data so that
your smartphone wont dip into your cellular data pool when it cant hold a good
Wi-Fi connection.
63
YOURE READY TO give your presentation, but until that first slide appears on
the big screen, you can never be sure
that your equipment has got your back.
We cant tell you not to worry, but these
handy tips should help bail you out if
your presentation goes south.
64
Sound. Some HDMI and DisplayPort digital video connections can carry
audio through the same port, but both
notebook and projector must support
audio over the digital video connection.
Traditionally, audio is connected using
the notebooks audio out jacks and the
projectors audio in ports; both of these
are often RCA or 3.5mm. If youre not
using the projectors built-in speakers,
make sure you connect your notebooks
audio out to the sound system you intend to use and turn the volume down
on the projectors speakers.
Network Connection
Many venues supply network projectors, which are made available as a
shared resource. Making a connection to
a network projector is as easy as plugging
your notebook into the corporate network via wired or wireless Ethernet.
Check with the companys IT staff for
specifics. Once connected, use the network connection wizard in Windows 7 to
find the projector you wish to use:
Click Start (the Windows button
in the bottom-left corner of the
screen).
Click All Programs.
Click Accessories.
Click Connect To A Network
Projector.
The network connection wizard
may inform you that your notebooks firewall is blocking the
ability to connect with the projector. Click to establish the network connection.
Either have the wizard search for
available network projectors or
enter the projectors address manually if it is available.
Once the device is connected, a
Network Presentation window will minimize to your Taskbar. When youre ready
to make your presentation, open the
Network Presentation window and select
Resume. Your notebook will treat the network projector like an external monitor.
NOTEBOOK-PROJECTOR
TROUBLESHOOTING TIPS
Turn off all equipment before
connecting the notebook to the
projector.
If possible, use a digital
connection to ensure a highquality presentation.
If youre not using the projectors built-in speakers, turn
them down and connect the
notebooks audio out to the
sound system.
No Video
In many cases, your notebook will
detect that you have a projector plugged
into one of its video outputs and will
automatically turn on the port. Not all
notebooks do this, however; and even
those that can still have missing video
if the notebook isnt set to duplicate the
Desktop or extend it to the secondary
monitor (the projector). Many notebooks use a function key combination
to toggle the projector port on or off
and set how you can use the display. We
recommend using the control panels
in Win7:
Right-click a blank area on the
Desktop.
Select Screen Resolution.
Select the second display from the
drop-down menu.
Select Extend These Displays from
the Multiple Displays drop-down
65
Facebook
When setting up your Facebook profile,
the service will ask for a lot of personal
66
Twitter
By default, Twitters account settings
make your tweets available for all to
see. The alternative is a protected mode,
where your tweets are only visible to your
approved Twitter followers. Protected
tweets are also not retweetable, so even
approved users cant share your tweets.
You also cannot share permanent links
to your tweets with anyone but approved
followers. If you want to use Twitter to
drive Web traffic, the restrictions in the
protected mode might undermine why
you joined Twitter in the first place.
If you want to adjust your tweet privacy level, or the other privacy controls
on Twitter, start by signing into Twitter
and bringing up your account settings.
Next, click Security And Privacy and
scroll down to Privacy. If you only want
approved followers to see your tweets,
click the Protect My Tweets checkbox.
You can also control who can tag you in
photos, whether your tweets include a location, and how others can find you, such
Google+
For Google+, privacy has been a key
consideration from the very beginning. For
example, youve always been able to assign
a privacy level for each post you share. And
based on the Circles (friend groups) youve
set up, its easy to share content with only
a specific crowd. Google+ also offers detailed privacy settings where you can control most every aspect of your profile. Visit
your Google+ page, click your name, select
the drop-down menu under the Google+
logo, and choose Settings.
In the Settings window, you can customize who can send you notifications,
comment on your public posts, and
manage subscriptions. If you want to
configure the audience settings for your
posts, photos, and profile updates, scroll
down to the Your Circles section and click
Customize. By default, Google+ pushes
updates to the people in your Friends,
Family, and Acquaintances groups. To
block a particular group, remove the check
from the checkbox. If you want to reach a
larger group of people, you might want to
add a check to the Following checkbox, so
followers of your Google+ profile will be
added to Your Circles list.
Next, scroll down to the Profile section. Here, you can configure how people
are able to find your profile and control
what content is displayed in your profile. A setting of interest for businesses
is Allow People To Send You A Message
From Your Profile, as this setting offers a
way for consumers to reach out to you. If
the setting is limited to Your Circles or
Extended Circles, customers might not
be able to contact you.
If you use Google+ on your mobile
device, youll also want to examine the
Location Settings section. These settings let you enable or disable location reporting via your smartphone
and tablet. If enabled, you can control
who can see your current city and/or
exact location. The precise location
is ideal for those who wish to share their
location with friends and family. If thats
LinkedIn
The business-focused nature of
LinkedIn ensures that privacy is a priority. To examine your settings, log in to
LinkedIn, hover your pointer over your
profile photo in the right-hand corner,
and select Manage next to the Privacy &
Settings option. Scroll down to Privacy
Controls and youll find a host of options
to control what others can see on your
profile and activity feed. For example,
you can turn off activity updates that
let other connections know when you
make a change to your profile or follow
another company.
If you use LinkedIn to search for
new clients and key connections within
an organization, you can opt to remain
anonymous, so people wont know that
you looked at their profile. To do so, click
Select What Others See When Youve
Viewed Their Profile. There are two anonymous options, one where others will see
an industry and title, or you can opt to
be completely anonymous. You can also
manage who can follow your updates, edit
blocked connections, and shut down users'
ability to view your connections.
67
Isolate Malware
HOW TO COMBAT ATTACKS
68
when you visit an infected website, install software or an app with malware
hiding inside, click links or open attachments in email, or insert an infected USB thumb drive.
Though warning signs that malware
may be present can differ depending
on the malware type, there are some
primary indicators to look for. Michela
Menting, ABI Research practice director, says the most common include
applications and programs running noticeably more slowly, slower Internet
performance, and data or files that
are unexpectedly deleted or altered.
A notebook running more slowly, for
example, could indicate malware is
stealing computing resources to fuel
whatever activity the malware was designed to execute, such as hijacking
the system to help generate and spread
spam to other systems.
Some specific examples of changes
in notebook performance to watch out
for include programs, files, and folders
Immediate Response
When you suspect malware has
infected your notebook, Menting
advises turning off its Internet connection. Most malware will use the
Internet connection to send information back or infect other computers
on a network, she says. Isolate the
laptop and then run an antivirus scan.
Additionally, ensure that antivirus
software on the notebook is up-to-date
with the latest malware signatures.
If not, then copy a free AV program
onto a USB thumb drive and use it to
install [the software] on the disconnected infected PC, she says. More
Means Of Prevention
As a means of prevention, Menting
says, at the least, you should ensure
that a firewall is running and working
properly. Generally, she says, most operating systems have built-in security
69
Hotspot Troubleshooting
Ordinarily, when you carry your
laptop into an airline lounge, it will automatically connect to the available Wi-Fi
hotspot. But what if that doesnt happen?
First, check that your notebooks Wi-Fi
adapter is turned on. Often, youll see a
backlit Wi-Fi icon near the keyboard. If
the icon isnt illuminated, look for a
physical switch that you can flip to enable the adapter. Sometimes, the state of
your network connection is easily determined by an icon in the notification area
of the Taskbar. For instance, a red X on
the network icon indicates the adapter
70
Outlook folders list, if it appears, will contain all the data that is recovered. You can
then drag the data to your new PST file and
delete the Recovered Personal Folders item
from Outlook.
A Touchy Touchpad
If you use your laptop on a dock (and
use an external mouse and keyboard),
you can go weeks or months with a deactivated touchpad and never realize it
until you hit the road. If you find yourself in this situation, you can activate
the touchpad by pressing the Fn (function) key simultaneously with the F
number key associated with the laptops
touchpad (often labeled with an image
of a touchpad). Using this key combination will either automatically activate
An Unresponsive Keyboard
Or Mouse
If your programs and applications
dont respond to keyboard commands,
use your mouse to shut down the computer by clicking Start, then Shut Down
(in Win7) or tap the Power Button and
tap Shut Down (in Win8). Unplug the
keyboard from your PC and then reconnect it. Restart your PC to determine whether this process corrected the
problem. (If both input devices are unresponsive, you can press and hold the
Power Button on the tower to manually
shut down your system.)
If your mouse isnt responding, but
your keyboard is, press the Windows key
in Win7 to open the Start menu, use the
Right-Arrow key to select Shut Down,
and then press ENTER. In Win8, press
CTRL-ALT-DELETE, press the Tab key
until the power icon is highlighted, and
then press ENTER. Unplug your mouse
and then reconnect it. (If necessary, you
can press and hold the Power button to
shut down the PC.) Then restart your
computer to see if these instructions fix
your problem.
If youre using a wireless keyboard and
mouse, ensure that the peripherals are
synced and in range of the wireless receiver. You may also need to install new
batteries. If these steps dont enable peripheral communication with the PC, try
reinstalling device drivers. You can often
download these from the mouse and keyboard manufacturer websites.
71