SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 
October 2014 
Issue 145 
Always the best source 
for IT ideas 
NewsBytes 
Windows 9/10, Office 365 eBook, HyperCat, misplaced 
cloud fears ... and more 
Always on the record 
Whose smartwatch is watching you? 
A strategy for blanket Wi-Fi 
Configuring multiple Access Points 
Tether your phone 
How to keep working when the broadband dies 
Here comes the new con ... 
... same as the old con 
The mobile printing scrum 
Accommodate users without compromising the network 
Q&A: How to suppress the "Open with" 
menu in Windows 7? 
Clicks of the Trade - Wean yourself off 
admin rights 
InfoBulletin 
Subscriptions 
IB archives 
What we read 
Privacy policy 
Audits & Reviews 
Backup 
Cloud Solutions 
Collaboration 
Disaster Recovery 
IT Infrastructure 
IT Strategy 
Remote Working 
Security 
Support Services 
Virtualisation 
coopsys.net 
About us 
Contact Us 
Recent Issues 
04/07/2014 - InfoBulletin July 2014 - Remote control software, Phones that listen, Life 
after XP, Create an IT security policy 
13/05/2014 - InfoBulletin May 2014 - Thought your mail was private? Cryptolocker 
ransomware, Wi-Fi pitfalls, Hire society 
02/04/2014 - InfoBulletin April 2014 - Mobile Device Management, Shapeshifting 
Office, Hybrid drives, A false sense of security, New roaming Wi-Fi 
*** NewsBytes *** 
1 of 17 23/10/2014 13:36
InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 
Liberating Windows 9 ... 
wait, that's Windows 10! 
As the details of Microsoft's next operating 
system gradually eked out to a waiting public, 
a free upgrade was conjectured as one of the 
carrots to lure existing users. During a press 
event ahead of the 30 September launch, the 
president of Microsoft France named the 
successor "Windows 9" by accident. Though 
the company line had been that the codename 
"Windows Threshold" was still the official one, 
Microsoft surprised everyone as Terry Myerson, 
head of operating systems, announced 
Windows 10. 
The much anticipated Start Menu returns as a 
mini hybrid, combining a traditional Windows 7 
application list on the left along with a set of 
Windows 8 Live Tiles on the right. This version 
runs Metro/Modern apps from the Windows 
Store will be able to run in multiple virtual 
desktop windows too. The 'write-once, deploy 
every where' approach of Windows Technical 
Preview will be for developers only. Using an 
adaptive new system dubbed Continuum, it will 
run across the "broadest range of devices ever 
from the Internet of Things to enterprise 
datacenters worldwide", encompassing Xbox, 
PCs, phones, tablets and tiny gadgets along 
the way. Though small-screened devices won't 
have the desktop, they will retain the Charm 
bar. A single view for all open apps and files 
now comes care of a new Task view button on 
the task bar, allowing quick switching and 
one-touch access to any desktop. Another 
appealing aspect posed by Andreas Diantoro, 
president of Microsoft Indonesia, is that 
existing users of Windows 8 would get a free 
upgrade the new OS. Interestingly this is one 
leak that nobody has confirmed or refuted as 
yet. 
Delve: Office 365 gets its 
own Google Now 
Coming to 
Enterprise Office 
365 users and 
then business 
plan subscribers 
from early 2015, 
Office Delve 
learns the 
relationships between a user's data pools and 
their activity. By tapping into Microsoft-powered 
data sources, this new Office 
assistant delves into business-subscribed 
email, OneDrive, SharePoint and Yammer, 
Microsoft's social network. The list of 
Office 365 virtually 
anywhere, free eBook 
This all-rounder 
from Microsoft 
Press aims to 
introduce 
beginners and 
team leaders to 
Office 365. The 
first tenth 
contains a fair 
bit of 
promotional 
puff - to be 
expected if they want hook readers as 
potential new subscribers - and a primer of 
cloud computing and collaboration. However 
those who understand or are responsible for 
basic admin - the ones likely to have the most 
purchasing clout - should skip straight to the 
admin section in chapter 3 to get acquainted 
with some edifying screen shots. For example, 
SharePoint serves up 6 handy roles (view, 
read, contribute + enhanced, design, full 
control) as well as permitting customised 
variations, invaluable for realising a hierarchy 
of site collaboration. The excellent Office Web 
Apps allow users to create, edit and share 
their work as usual but the guide is up front 
about the limitations too - no format painter or 
tracked changes being just two. We also find 
out that the single file size limit of 50MB can 
be increased with some "behind-the-scenes 
wrangling". The title "Microsoft Office 365: 
Connect and Collaborate Virtually Anywhere, 
Anytime" says it all really. The neat ambiguity 
displayed by "collaborate, virtually anywhere" 
or "collaborate virtually, anywhere" illustrates 
the power of implementing the kind of cloud 
computing any team can just pick up and run 
with. Download the epub (22MB) and mobi 
(8MB) formats from the Microsoft Press blog. 
88% fear risk of their 
data in the cloud 
... though only 
2 percent have 
actually 
experienced a 
breach. Nearly 
half of 
organisations 
changed the 
way they use 
cloud services 
following 
revelations 
surrounding PRISM, according to a poll of 250 
senior IT business decision makers conducted 
by the cloud industry forum (CIF), while a 
further 9% switched cloud service providers 
completely. Ranking highest amongst concerns 
were backup/disaster recovery, data storage 
and personnel/payroll. Chiefs and partners at 
CIF put the experience mismatch down to the 
fear, uncertainty and doubt promulgated by 
media stories, and cite their CIF code of 
practice as a route to helping cloud service 
providers (CSPs) build trust within their clients. 
Dying for a sit down 
2 of 17 23/10/2014 13:36
InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 
'delve-able' source applications will soon grow 
to include email attachments, OneNote and 
Lync. 
Inevitably Office Delve will be compared to 
Google Now, but underneath its engine is 
Office Graph, which employs "sophisticated 
machine learning techniques to map the 
relationships between people, content, and 
activity that occurs across Office 365" says 
Julia White, general manager of Office 365 
Technical Product Management. And of course 
Delve is mobile-friendly too, 
as you'd expect of any 
system that fetches 
information for you rather 
than having to go searching 
for it. As for the application 
itself, Office 365 admins 
don't have to do any searching or waiting; 
those on the First Release program can get 
Delve simply by signing into their Office 365 
online account. 
OneDrive now shareable 
and bigger 
In the race to 
offer ever more 
free cloud 
storage, 
Microsoft has 
taken a leap 
that puts it 
back in contention with Google and Dropbox. 
Up from 2GB, Microsoft's OneDrive cloud 
service is now syncing files up to 10GB size, in 
its free allocation of 15GB. The company has 
also rectified an omission that saw it losing out 
to Dropbox, namely a link whereby a right-click 
on a OneDrive-synced in the Explorer app on 
the desktop (both Windows and Mac) opens a 
sharing menu. The "Share a OneDrive link" 
menu item creates a link that can be mailed, 
IM-ed or shared via Facebook, Twitter, or 
LinkedIn. 
These features - among the top requested for 
OneDrive - are rolling out over the next few 
weeks says Microsoft. 
Dell Mobile Workspace 
tackles BYOD issues 
Streamlining phones, email and Office 365, 
Dell's solution aims to solve BYOD security, 
manageability and cost in one go. Rather than 
Today's desk jockeys have a dilemma on their 
hands: work is probably killing them, literally. 
Sitting comfortably? Here's a bit of news to 
make you squirm. With half the time of any 
modern day worker spent sitting down, one 
study has shown the associations of a 
sedentary life with diabetes and cardiovascular 
disease, while another at the British Journal of 
Sports Medicine emphasises the importance of 
exercise and standing up in preventing damage 
during cell division. The otherwise shortened 
chromosome-caps, called telomeres, display 
links to heart disease, cancers, diabetes, 
obesity and strokes. Thus, time spent stabbing 
the screen of 
our 
smartphones 
could be years 
of our lives 
saved, though 
only if we do it 
standing up, 
and avoiding 
texting 
faceplants. 
Shellshock: Macs and 
Linux get a bashing 
A flaw in the 
basic 
operating 
system of both 
Linux and 
Apple Mac's 
OSX was the 
recent big 
news discovery, if only because it lay hidden 
for perhaps 20 years. In the past, Macs and to 
some extent Linux have often been portrayed 
as 'immune to viruses' but the fallacy was well 
and truly shot down at the end of September 
with the revelation that the so-called 
Shellshock bug affects an essential piece of 
software called Bash - the shell or command 
line interface that allows a user to talk to a 
Unix based system, and is one of the most 
installed utilities on any Linux system. Security 
experts are deeply concerned, like FireEye 
Inc's Director of Threat Research Darien 
Kindlund who reckons Shellshock is "horrible. 
It's worse than Heartbleed, in that it affects 
servers that help manage huge volumes of 
Internet traffic. Conservatively, the impact is 
anywhere from 20 to 50% of global servers 
supporting web pages." The bug rated a 10 out 
of 10 on the severity scale of the US National 
Vulnerability Database. The team at Red Hat, 
who discovered the flaw have written an FAQ 
which cites the Red Hat release of patched 
versions of Bash. Patches for many other Linux 
distributions can be found via Lifehacker which 
also presents the one line command (env 
x='() { :;}; echo vulnerable' bash 
-c 'echo hello') to test whether a 
machine is vulnerable. Apple has promised a fix 
for Mac users is on its way. 
3 of 17 23/10/2014 13:36
InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 
employing today's piecemeal measures to reign 
in the bring-your-own-device wave, Dell offers 
a single application where employees access 
corporate email, calendar, contacts, the 
intranet and documents both on or offline. 
Mobile Workspace satisfies the requirements of 
managers, data controllers and IT admins, 
providing remote lock, wipe and passcode 
policy operations within the application, but 
without taking total control of the device, thus 
maintaining privacy concerns of the phone 
owners. Employees even get a separate 
business phone number on their existing 
smartphones or tablets with the Business 
Phone. The firm's cloud storage service facility, 
Box, allows staff to access its organisation's 
files and folders securely across a range of 
devices. Mobile Workspace supports Android 
4.0 upwards and iOS 7.0 upwards on Microsoft 
Exchange 2007 and up. 
*** end of NewsBytes *** 
^ Back to contents ^ 
1. Always on the record 
2015 is set to be the year of the smart watch but is this particular gadget also set to 
mould employees as in-house spies? 
Help 
at 
hand. 
Back 
issues 
just a 
click 
away 
The 'wearable tech' world of James 
Bond has arrived and it's watching you, 
even as you boggle at its capabilities. 
Timed to arrive at for a lucrative 
Christmas take-up and a blast into the 
New Year, a slew of renowned 
smartphone companies pitched their 
offerings into the smartwatch race in 
the second half of 2014: 
LG rolled out its initially 
somewhat dull rectangular G 
watch followed by a more 
exciting round G Watch R running 
the android Wear operating system 
Samsung produced a range of Gear watches, based on its home-grown Tizen operating 
system as a lever to disengage itself from the stranglehold of Google's Android 
Motorola's Moto 360, was a well received and water-resistant Android device with a circular 
and bright face, though as iFixit discovered, its battery capacity turns out to be a bit 
confusing 
Apple, puffing up to the finishing line, announced one rectangular watch in 2 sizes with a 
touch/pressure sensitive screen and a new take on the decade-old 'jog dial' 
With so little in the way of control and viewing surfaces, information harvesting in the style of 
Google Now, Cortana, and Siri will be a given. To respond to a user's wishes, wrist-borne data 
input will be automated as far as possible so that a picture of the user's environment is always on 
hand, and timely information can be served up with as little conscious interaction as practicable. 
Enterprises still coming to terms with the data-slurping side effects of BYOD may not realise that 
an even more insidious trend is about to bubble up, this time from technology on the arm instead 
of in the pocket. 
4 of 17 23/10/2014 13:36
InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 
Looks like a watch ... 
Feels like a watch ... 
Watch doppelgänger ... 
Er ... one to watch? 
Testing 1, 2, 3 
These devices are as packed with sensors 
as the smartphones with which they are 
intended to be paired. Stuff like Wi-Fi, 
Bluetooth, accelerometers, compasses, and 
gyrometers for GPS positioning, and heart 
rate sensors for fitness are taken as read, 
but these wrist buddies don't stop at just 
tracking their owners. 
The Samsung Galaxy Gear sports a 1.9MP 
camera while the Arrow smartwatch 
contains a 360° rotating camera for selfies 
or incognito filming. Microphones on 
smartphones are fairly capable of picking 
up sound from any direction (since most 
now bundle second mics to suppress 
background noise in conversations), while 
the Smartwatch 2 Camera app turns a 
remotely placed smartphone into a kind of 
video baby monitor. 
Thus the capabilities of bugging equipment 
toyed with only by professionals and 
thriller writers a decade ago is trickling 
down to consumer-level. So will bosses be 
logging every word and movement at 
meetings? Perhaps colleagues will join in 
as well, just to cover their backs. Monday 
morning round-ups could become a tense 
affair! 
Transparently rejected 
Google Glass is blatantly obvious by its 
mere presence, and also to its 'subjects' 
that recording is live/on air as it were. The 
sheer barefacedness of Glass already saw 
its use being banned - even before the 
concept had made it to production - in 
places such as bars, restaurants, banks (id 
protection), gyms, and cinemas (as an 
anti-piracy measure), while a mounting 
clutch of US states including West Virginia, 
Illinois and New Jersey have proposed 
legislation banning drivers from "using a 
wearable computer with head mounted 
display", despite potential enforcement 
hurdles. 
If all this weren't enough to severely dent a 
Glass wearer's ego, a worse fate is to be 
labelled a 'Glasshole', and Google itself 
publishes an etiquette guide of Glass 
Explorers Do's and Don'ts to help users 
avoid humiliation at least. However, like 
cartoon Comic Book Guy, self-inflicted 
Glass nerds could already be flip-flopping 
between denial and depressed acceptance 
of a life as the new social outcast. 
Hidden in plain sight 
In the wake of face-worn tech, more stylish 
successors are inevitably becoming 
fashionably acceptable, but potentially 
more useful. Ron Amadeo found that after a 
month and half's ownership of Google Glass, his costly hi-tech specs ended up in the drawer and 
he found himself persuaded by the ergonomics of Android Wear. 
Wrist-worn computers are arguably a great innovation for users who want to sidestep the Google 
5 of 17 23/10/2014 13:36
InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 
Glasshole.sh is a script that can be used to kick 
Google Glass off your local wireless network. 
Written by Berlin artist Julian Oliver, it can be 
installed on a Raspberry Pi or Beaglebone. 
The Stop The Cyborgs store has published 
downloadable PDF banning signs. 
geek look and keep that giant smartphone slab tucked 
away, but the advantage of discretion that makes them 
socially respectable could also be their failing: they're 
inherently covert. 
The banning restrictions on Glass could apply to the 
pervasive capabilities of smartwatches but enforcements 
will be even more fraught. Workplaces could be concerned 
not only about the devices' lifeblogging capacities but the 
potential to leak organisational data should control of these 
wrist-worn devices end up in the wrong hands through 
viruses, remote attacks or disgruntled workers. 
Not on my watch 
Perhaps there's not as much to be feared here as might 
first appear; there are severe impediments to operating a 
smartwatch in slick fashion. However many buttons, jog 
dials and tap sensors are packed into the device, two hands 
are still required for response and control. Wrist-flicking 
and voice recognition algorithms don't pass any subtlety 
etiquette in meetings, while a smartphone, by comparison, 
can still be silenced inconspicuously with one-handed 
operation. 
Over several decades we've got used to what we must now 
presumably call 'feature watches' - those esteemed lumps of precision stainless steel driven by 
quartz movements - lasting a couple of years on a single non-rechargeable battery. However, 
sophistication comes at a price. By contrast to their predecessors, the smartest of the 'smart' 
adversaries - as witnessed by these comparisons - barely chug through a whole day, effectively 
around 700 times less efficient at telling the time and date. 
With that kind of stamina, you can bet that the average smartwatch will conk out just as the 
record button is pressed. Perhaps we're safe after all. 
Bookmark 
^ Back to contents ^ 
2. A strategy for blanket Wi-Fi 
Configuring multiple access points for shared Wi-Fi. 
Help 
at 
hand. 
Back 
issues 
just a 
click 
away 
When small organisation wants to expand into a 
neighbouring office, staff usually need to have 
access to Wi-Fi. The existing Wi-Fi router signal 
often doesn't reach where they want it so should 
they buy a repeater? 
This is a typical stumbling block of Wi-Fi 
expansion. Thick walls, water pipes and metal 
mesh all conspire to block off the Wi-Fi signal, 
and even metal filing cabinets being shifted 
around can play havoc, especially near the 30 
metre limit of Wi-Fi transmission. 
A decade ago, repeaters were seen as one 
solution but the technology effectively halves the 
bandwidth for connected computers as they 
process and rebroadcast the signal. While router 
bandwidth always tends to be much greater than 
that of an broadband Internet connection, it could make internal PC networking slow, and anyway 
6 of 17 23/10/2014 13:36
InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 
there are better solutions these days, either using existing Wi-Fi technology or the incoming 
generation of routers and antennae. 
Change the channel 
A common strategy is to buy additional access points (AP) and place adjacent APs on separated 
channels to prevent interference, but all broadcasting with the same SSID, so that staff don't have 
to worry about several SSID names and which one might be the 'right' one. Thus, a primary 
router's Wi-Fi and its two connected APs could all be called "acme-airside" but allocated to 
channels 1, 6, 11 (and in the UK 13) for 802.11b/g protocols. On 802.11n, it's possible to use a 
narrower separation, hence channels 1, 5 and 9. 
The router is likely to be the unit that handles DHCP while other Access Points will be allocated a 
static IP on the same subnet, something like this for 802.11b or 802.11g: 
Device Router Access Point 1 Access Point 2 
SSID acme-airside acme-airside acme-airside 
IP 192.168.1.1 192.168.1.2 192.168.1.3 
Channel 1 6 11 
With a minimum channel separation of 5 or possibly 4, some IT architects adopt a channel 
allocation strategy to blanket their workplace in seamless Wi-Fi. 
Imagine this example of channel separation in a linear continuous corridor: 
Channel sequence for each Access Point (5 channel separation): 1, 6, 11, 3, 8, 13, etc 
Channel sequence for each Access Point (4 channel separation): 1, 5, 9, 13, 4, 9, etc 
(For Europe/UK. US is generally 11 channels) 
In a shared building, neighbouring APs might be operating on adjacent channels on floors above, 
below or to the side so this strategy is not always as straightforward to operate as it might seem. 
Most routers are set up with 
channel 11 by default. It's 
neither impossible nor 
completely disruptive to others 
to operate with Wi-Fi 
broadcasting on nearby overlapping channels (look up CSM/CA), it's just less efficient. Software 
like NetStumbler can help to locate other broadcasts in the vicinity. 
Channel widths (and therefore separations) also vary depending how much each AP signal drops 
off as it gets attenuated and how much power is allowed by country. 
Better APs can assign 
channels automatically by 
polling each channel at 
random intervals and 
choosing the most separated 
one from other existing 
channels, while some 
manufacturers offer wireless 
management devices to 
control a whole group of 
APs - you get what you pay 
for. However not everyone 
recommends these because 
the algorithms doing the 
calculating can be quite 
basic. 
For more sophisticated seamless roaming Wi-Fi solutions, check out HomePlug products like 
Devolo for home use, or Cisco's Meraki for the workplace. 
Contacts 
The overlapping channel problem JANET library advisory services 
7 of 17 23/10/2014 13:36
InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 
Farproc Wi-Fi analyzer for Android smartphones 
Bookmark 
^ Back to contents ^ 
3. Tether your phone 
No Internet? Time to learn how to harness your phone as a temporary broadband 
replacement to keep your main computer up and running. 
Help 
at 
hand. 
Back 
issues 
just a 
click 
away 
When that red light appears on your router, it could be that your 
broadband line will be down for a while. One way or another, 
you're about to reach the end of your tether. 
What is tethering? 
This technique allows you to take your mobile phone as the point of contact for Internet data and 
share that connection out to other devices such as a desktop, a laptop, or even another mobile 
phone. This is achieved using the phone's mobile data, whether that's a pay-as-you-go allowance 
or a contract. 
So-called mobile tethering can be set up via a USB cable, or Bluetooth, or via Wi-Fi, also known 
as Personal Hotspot. 
First, get wise to a couple caveats and concepts: 
Treat the setup as temporary and use it sparingly. It's easy to hammer through a month's mobile 
data quota (say 1GB) when behaving as if the connected laptop or PC is still hooked up to tens of 
GB at landline capacity. Avoid video, audio and any sort of streaming until the main broadband is 
back up again. 
Cable will always be simplest and fastest (if your phone allows it) so look for USB to start with. 
For tethering one device, a USB cable is perfect as there's no need to worry about a password. 
Just grab a mini-USB or micro-USB cable (whichever suits your phone) and connect the other end 
into the standard USB socket on a laptop or desktop PC. 
Next best is any wireless type of connection, though these are less reliable and harder to set up. 
Bluetooth has an unobstructed range of up to 10 metres, while Wi-Fi will transmit across 30 
metres at best, again barring metal or thick masonry in its path. It's possible to tether more than 
one device this way. 
Print out the relevant page from links below, or practice how to set up tethering for your phone at 
least once in advance, but do it before you need to reach for it in anger! 
Android tethering 
8 of 17 23/10/2014 13:36
InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 
USB cable 
Settings | More | Tethering | USB tethering 
Bluetooth 
Settings | More | Tethering | Bluetooth tethering 
Wi-Fi hotspot 
Settings | More | Tethering | Mobile Wi-Fi hotspot 
More details for all three modes plus supported devices can be found on one page at: 
https://support.google.com/nexus/answer/2812516?hl=en 
BlackBerry tethering 
USB cable 
Learn to use your BlackBerry smartphone as a tethered 
modem (BlackBerry 7.1 OS and earlier): 
http://btsc.webapps.blackberry.com/btsc/viewdocument.do?noCount=true& 
externalId=KB05196 
Configure a BlackBerry smartphone as a tethered modem on a Mac: 
http://btsc.webapps.blackberry.com/btsc/viewdocument.do?externalId=KB19641 
BlackBerry Desktop Software will be needed for the above. 
Install BlackBerry Desktop Software for Windows: 
http://btsc.webapps.blackberry.com/btsc/viewdocument.do?externalId=KB16236 
Installing and uninstalling BlackBerry Desktop Software on a Mac computer: 
http://btsc.webapps.blackberry.com/btsc/viewdocument.do?externalId=KB18771 
Bluetooth 
Settings | Network connections | Internet tethering 
How to use your BlackBerry as a Bluetooth modem: 
http://www.pcadvisor.co.uk/how-to/pc-peripheral/3241331/how-to-use-your-blackberry- 
as-a-bluetooth-modem/ 
The EasyTether app for BlackBerry supports USB for Windows computers, Bluetooth 
SPP for Android tablets and Bluetooth PAN (not with BlackBerry 10) for OS X and 
Linux computers. 
Wi-Fi hotspot 
Settings | network connections | Mobile Hotspot 
Set up a hotspot on BlackBerry Z10: 
http://demos.blackberry.com/blackberry-z10/na/us/gen/how-to/your-blackberry-z10- 
smartphone/connections/mobile-hotspot/index.html 
iOS tethering 
(iPhone/iPad) 
USB cable 
Settings | General | Network | Internet tethering 
PC Advisor shows the setup in detail: 
http://www.pcadvisor.co.uk/how-to/mobile-phone/3279666/how-to-tether-an- 
iphone-for-free/ 
Bluetooth 
Wi-Fi hotspot 
Settings | Phone/cellular section | Personal Hotspot 
9 of 17 23/10/2014 13:36
InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 
If your plan does not support Personal Hotspots, you will see a link labelled "Set Up 
Personal Hotspot" which will tell you how to contact your carrier and update your 
plan. 
Windows Phone tethering 
USB cable 
To the disgruntlement of some Windows Phone users, 
Microsoft appears to have removed tethering via a USB cable 
(present up to Windows Phone 7.5) from Windows Phone 8 
Bluetooth 
Settings | Internet sharing | Share over | Bluetooth 
http://www.windowsphone.com/en-GB/how-to/wp8/connectivity/share-my- 
connection 
Wi-Fi hotspot 
Settings | Internet sharing | Share over | Wi-Fi 
http://www.windowsphone.com/en-GB/how-to/wp8/connectivity/share-my- 
connection 
Overcoming carrier blockages 
Although phone owners might complain about their phone or its operating system failing to carry 
out tethering, it's more likely the manufacturer of the phone hardware has taken out an agreement 
with the mobile carrier to limit tethering, or specifically exclude it. 
For those blocked by carriers and/or manufacturers (typically where deals are done to extract 
extra fees) there are two app to overcome restricted carriers, essentially a form of proxy. 
The two most popular Wi-Fi tethering apps are PdaNet and TetherMe. Both of these apps cost 
money, so ensure that they work on your phone and carrier. PdaNet has a trial version to check 
out your carrier. 
Tethering alternatives 
A dongle or datacard plug-in or pocket Wi-Fi is are other solutions. They involve extra expense 
(as opposed to borrowing someone else's) but purchasing a simple pay-as-you-go block of data is 
self-contained way to escape a broadband crisis, as long as 3G or 4G coverage is available in the 
building. Furthermore it can be a financially delineated alternative to using up the data allowance 
of a privately owned smartphone. 
Contacts 
How I share my iPhone's Internet connection (without paying Verizon extra) 
How to share your Windows Phone's internet - whether or not your carrier wants you to 
Bookmark 
^ Back to contents ^ 
4. Here comes the new con ... 
Recent strings of frauds are succeeding because of traps in old communications 
10 of 17 23/10/2014 13:36
InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 
technology. 
Help 
at 
hand. 
Back 
issues 
just a 
click 
away 
When communications technology moves at a fast pace, it's 
the older generations or the technically naïve that suffer. 
There has been a rise in the number of reported phone 
scams where the fraudster asks the 'mark' to put the phone 
down and then ring back, a common method to verify the 
caller is genuine. 
What the victim doesn't realise is the fraudster is still on 
their end of the line, and simulates the expected ring tone. 
They then 'answer' just as if it were a real banking call 
centre. 
Using this kind of deception, scammers have swindled 
thousands of pounds from individual victims, maybe their entire savings. That the scam works at 
all is largely because old analogue telephone lines may keep the line open for as much as 5 
minutes after the receiving handset is put down, allowing the fraudster to perpetrate this kind of 
electronic ambush. 
Decades ago, when the only sort of telephones available were analogue ones, making call was 
very expensive. Similarly the introduction of mobile networks brought relatively costly tariffs to 
consumers and lucrative revenue to mobile phone providers, all of which made for an equally 
punitive hostile environment for swindlers to enter. 
Now however, the cost of vocal communication is small, meaning that in this case at least, the 
con artist wastes only a few pence spent keeping a line open to hook their prey. 
Nevertheless phone scams haven't attained the dizzying levels of scatter-gun mass emailing 
because despite the plummeting call costs, it's not just a matter of hitting Send, sitting back and 
waiting for clicks from the gullible to roll in. The voice call costs may have dropped but executing 
each one is still a one-at-a-time labour intensive process. 
It's a burgeoning sector of the population that makes voice call scams a natural target: older, 
better off, and in today's climate of austerity, more fearful. These factors turn normally lethargic 
savers into panic stricken movers of wealth, paradoxically powered by the very fear about the sort 
of trouble they are getting into. 
At the same time as educating new audiences to the risks of 'baring all' on social media and 
incoming assaults via phishing, we're having to keep one eye at our backs for senior users who 
fall prey to time-worn scams in a new guise. Witness online dating frauds that promise happiness 
to vulnerable dating rookies in exchange for helping to release potential partners from some 
fabricated plight abroad. Or supposed telecom support people cold-calling to sort out a 
non-existent virus in the hope of gaining access to their quarry's PC. 
Whatever the ruse, victims are thus swindled out of vast sums through age-old social engineering 
tricks, though new technology makes the deceit look cleverer than it really is. For those who 
provide IT support, it's a wake-up call to hone their skills of communication: explaining the risk 
while adjusting the 'techno-babble' to suit the competence and understanding of the audience on 
the receiving end, whatever their age. 
Contacts 
Read the Scams Checklist from the Citizens Advice Bureau 
Report fraud at Action Fraud 
Bookmark 
^ Back to contents ^ 
5. The mobile printing scrum 
11 of 17 23/10/2014 13:36
InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 
Just when would you use mobile printing, and why is it a prescription for a 
punch-up? 
Help 
at 
hand. 
Back 
issues 
just a 
click 
away 
Like it or not, workplaces are increasingly buzzing with 
peripatetic employees and visitors who are stepping into 
the office scrum for just an hour or so, and the result is 
that their mobile devices have become a nearly universal 
work tool. 
Often they'll walk up to a meeting and - despite the 
ballyhoo that hypes everyone's ability to work directly on 
screen - they'll want to print an agenda, or a graph, or 
have a diary week shown on paper, or 
use the lowest-tech means of putting 
a copy in someone else's paws. 
Sure, we have Bluetooth and Wi-Fi 
and Dropbox, and any number of 
digital transfer mechanisms, but road 
warriors are frequently those that live 
by tried and trusted means. Because 
they exist mostly at the sharp, 
customer-focused end of business, the 
demands of these 'fly-halves' often 
carry clout. 
However, simple zero-setup printing 
doesn't exist at the level these people 
require and their tried and trusted paper stalwart then becomes vexatious and stressful, because 
giving up their mobile devices isn't an option either. 
Equally IT admins shudder at the idea of herds of users dropping in and out at will, hooking up 
strange new devices that might well be let loose rogue pirate copies of Angry Bird upon their 
protected network. 
Such a dichotomy is a recipe for a nasty ruck. How to keep both parties happy? 
On the basis that users are more likely to adopt security measures if 
they're quick and painless, a new standard looks like it could be the 
way forward. 
Enter the Mopria Alliance, a non-profit membership organization of 
leading global technology companies with the shared goal of 
providing intuitively simple wireless printing from smartphones, 
tablets and other mobile devices. Founded by member companies 
Canon, HP, Samsung and Xerox, most other major printer manufacturers are now members too. 
Looking at practical examples of this 
relatively new Mopria standard, HP 
launched its colour LaserJet Pro MFP 
M476 series offering important 
advancements that help mobile users 
with direct hassle-free printing. 
Wireless direct printing - allows 
Wi-Fi capable phone, tablets, 
etc to make a direct wireless 
connection to the printer 
without needing an in-house 
router. access point or network 
Touch-to-print - devices 
enabled with near field 
communication (NFC) chips can 
simply be touched to the 
printer's NFC antenna to print a 
document 
Secure connections - standard 
WPA2 security with 128-bit 
encryption for users, but IT administrators can also use HP's embedded web server (EWS) 
or Web Jetadmin remote management software to enable/disable HP wireless direct, touch-to- 
print functionality, or set passphrases 
Easy user authentication - to keep things simple for mobile users, printers feature a 
configurable passphrase for setting up authentication based Windows®/Kerberos, LDAP, 
12 of 17 23/10/2014 13:36
InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 
and a user PIN authentication and integrate with existing infrastructure 
Question 
Mark 
Of course, HP isn't the sole supplier in the 
market and Mopria-compatible printers from 
other manufacturers worth checking out are: 
Canon i-SENSYS laser MFPs, 
Xerox ColorQube and WorkCentre 
printers, 
Epson WorkForce Pro printers and 
Expression Home series 
It's rare to see a solution that satisfies IT 
greenhorns and IT admins simultaneously, 
but a Mopria-compatible printer as part of 
your next upgrade should allow both parties 
to get on with how they do things best - 
separately, but minus the foul play and 
without resorting to the sin bin. 
Contact us for a review of your IT infrastructure. 
Bookmark 
^ Back to contents ^ 
6. Q&A: How to suppress the "Open 
with" menu in Windows 7? 
Hi Mark, 
One of my users keeps opening image 
files in Paint instead of Windows Photo 
Viewer. Because they always hit OK 
instead of Cancel when closing 
everything (grrr!), our shared images 
files often get altered and I have to go 
back and restore the original from a 
backup. Is there any way to stop this 
happening? 
Help 
at 
hand. 
Back 
issues 
just a 
click 
away 
One obvious answer is training, but frequently nobody has time for training and of course some 
others are just bloody-minded. What's more, many of us have a habit of following the same 
error-strewn path of clicks as before simply because it looks so familiar from last time - with 
many a grrr along the way. 
The "Open with" context menu is the one 
that pops up from a right-click, and most 
people don't notice the pre-ticked box 
(Always use the selected program ...) at the 
13 of 17 23/10/2014 13:36
InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 
bottom of the panel, so next time the 
default program behaviour is changed. 
It's worth understanding the distinction 
between the functions that various 
programs can mete out to their associated 
files. Among the common files that can be 
both viewed and edited are images (.jpg, 
.png, etc), Adobe PDFs (.pdf), and web 
pages (.html, .php, etc). It's significant to 
note that a viewing role is the usually the default for this short list, whereas we've come to 
expect office files (documents, spreadsheets, presentations) to open ready for viewing and in 
editing mode. 
To preserve your images (or whichever files 
from the list above) from being continually 
'hacked about', there are several approaches 
you can try: 
Change the Default programs via Start 
| Default Programs (located in 
Control Panel) 
Of course most users can find this 
easily enough to change it back 
1. 
Configure the image files (presumably 
in a shared drive on your network) as 
read-only for everyone except those 
who should be editors of images, or 
rather configure the folders where the 
images reside 
2. 
Uninstall the image-editing 
application(s). 
This would be a bit drastic if other users who come to the same PC still want to do editing 
3. 
The last two are registry edits so one has to take the usual backup precautions first, but 
assuming that users aren't going to reverse-edit, they offer some permanency. 
Prevent an application appearing in the Open with dialogue box for file types it can't 
open: 
HKEY_CLASSES_ROOT 
Applications 
ApplicationName 
SupportedTypes 
.ext1 
.ext2 
.ext3 
If a SupportedTypes subkey is provided, only files with those extensions are eligible for 
pinning to the application's Jump List or for being tracked in an application's Recent or 
Frequent destinations list. 
4. 
Remove the "Open with" context menu completely 
The NoOpenWith entry is an empty REG_SZ value as shown in the following example. 
HKEY_CLASSES_ROOT 
Applications 
MyProgram.exe 
NoOpenWith 
The NoOpenWith entry overrides the SupportedTypes subkey and hides the application in 
the Open with dialogue box. 
5. 
This latter edit also prevents pinning a file to an application's Jump List. 
Discover answers in more Q&A topics 
Bookmark 
More news 
14 of 17 23/10/2014 13:36
InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 
You may also be interested in: 
LASA Computanews 
BBC News Technology 
^ Back to contents ^ 
Clicks of the Trade - Wean yourself 
off admin rights 
--- Quick tips for happier clicks! --- 
Help 
at 
hand. 
Back 
issues 
just a 
click 
away 
So many malware attacks these days succeed simply because somewhere a 
PC is the weakest link in the chain, and the reason for that is that its owner 
is running full admin rights. 
Take this description of the clever banking subterfuge labelled "Operation 
Emmental". The two-factor authentication form the bank is only foiled if the 
user's computer DNS settings can be changed, and that only happens if you 
are logged in as administrator. For everyone else, a User Account Control 
(UAC) prompt appears and the rest of the screen is dimmed in the 
background to indicate that significant changes are about to be made. 
A UAC 
prompt to 
approve an 
installation 
of Adobe 
Shockwave 
It's a kind of "Did you really start this action?" double-check, because if the 
user didn't, they should think twice about continuing. The prompt even 
reveals which application or process is making the request to elevate 
privileges to admin level. 
For most purposes, it's an annoying but infrequent interruption because we 
don't install new programs or mess about with our DNS and IP settings 
every day, and it's only a matter of typing the administrator login 
credentials once for that session. 
This UAC elevation has been around since Windows Vista but 
too many users still fire up their Windows Vista and Windows 7 
computers unprotected in administrator mode, and are 
15 of 17 23/10/2014 13:36
InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 
probably the sort of people who click away prompts without a second 
thought. 
To protect small organisations and their PCs - even if it's just a handful of 
machines - it's so easy to set up accounts for everyday use: 
Start | Control Panel | User Accounts 
Manage another account | Create a new account 
The elevated account doesn't have to be called "administrator" (and is 
probably best avoided anyway), but "installer" might be a friendlier name 
for users to understand what the new 'special' account is for. Obviously this 
admin or power user account should have a strong password. 
The user's account should be downgraded to a Standard User account. With 
this regime, malware attacks that arrive by email or from a web site stand 
less chance of gaining a foothold since the user has to type in the 
administrator password (assuming they've given been allowed that 
privilege), so it's a more conscious act that simply clicking a button that 
says "OK". 
This simple technique means the user or organisation isn't relying entirely 
on updated anti-virus as a means of defence, but still allows them an 
avenue for installing new programs. 
** try it now ** 
More Clicks of the Trade 
Bookmark 
^ Back to contents ^ 
Overview of InfoBulletin 
InfoBulletin is written and published by Co-Operative Systems 
and contains Information Technology tips that we come across 
during everyday research and support activities and which may 
be useful in improving your IT operations, either internally or on 
the Internet. 
Opinions expressed within InfoBulletin do not necessarily 
represent the views of Co-Operative Systems. 
E&OE 
Viewing IB 
This bulletin is presented as a Web page (in HTML) that can be 
read in any standard browser and most email clients. It is written 
in a compact format for fast viewing, short download time and 
ease of use for mobile computers. 
Printing IB 
If you prefer to read IB on paper (hopefully recycled!), think 
about pulling down the File | Print Preview menu in your 
browser and just printing the sheets you want. 
Implementation 
InfoBulletin topics can be implemented by Co-Operative Systems 
on a chargeable basis or via Facilities Management (FM) for 
Subscriptions 
At any time you can change your subscriber address or stop 
receiving InfoBulletin altogether by changing your subscriber 
preferences or by visiting www.coopsys.net/bulletin. Links in the 
original email message body allow you to forward this issue to a 
friend, colleague or associate without subscribing them. 
^ Back to contents ^ 
Contact details 
Sales & Enquiries: 020 7793 0395 
team@coopsys.net 
Support: 020 7793 7877 
support@coopsys.net 
Fax: 020 7735 6472 
Fax us via email 
Web: http://www.coopsys.net 
Privacy 
Under no circumstances does Co-Operative Systems supply lists 
of customers to other organisations. Read our Privacy Policy in 
full. 
16 of 17 23/10/2014 13:36
InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 
those with rolling work programmes. 
Archives and Index 
Read recent and past issues of InfoBulletins on the Web at www.coopsys.net/bulletin or search our 
archives and subject index. 
We hope you found InfoBulletin useful! If you would like to comment on any of the articles or request 
particular subjects to be covered, mail us here. 
CO-OPERATIVE SYSTEMS 
Interpreting Information Technology 
17 of 17 23/10/2014 13:36

Más contenido relacionado

La actualidad más candente

Replacing Lotus Notes? Here's How It Really Goes Down
Replacing Lotus Notes?  Here's How It Really Goes DownReplacing Lotus Notes?  Here's How It Really Goes Down
Replacing Lotus Notes? Here's How It Really Goes DownPeter Presnell
 
Text cloud computing
Text cloud computingText cloud computing
Text cloud computingJeroen
 
Adding Social Features To Cloud Computing
Adding Social Features To Cloud ComputingAdding Social Features To Cloud Computing
Adding Social Features To Cloud ComputingEric Rubin
 
Next Generation Collaboration - ICT Spring 2013 Luxembourg
Next Generation Collaboration - ICT Spring 2013 LuxembourgNext Generation Collaboration - ICT Spring 2013 Luxembourg
Next Generation Collaboration - ICT Spring 2013 LuxembourgLaura Yecies
 
Google Chat Summary
Google Chat Summary Google Chat Summary
Google Chat Summary GovLoop
 
IDC Web2.0 Best Practices Jun2009
IDC Web2.0 Best Practices Jun2009IDC Web2.0 Best Practices Jun2009
IDC Web2.0 Best Practices Jun2009Kim Jensen
 
Facebook Meets the Virtualized Enterprise
Facebook Meets the Virtualized EnterpriseFacebook Meets the Virtualized Enterprise
Facebook Meets the Virtualized Enterprisewhite paper
 
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataStorage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataHybrid Cloud
 
Internet Security
Internet SecurityInternet Security
Internet SecurityTom Cryer
 
Term Paper On Enterprise 2 0 The Next Leap For Indian It Services Industry
Term Paper On Enterprise 2 0 The Next Leap For Indian It Services IndustryTerm Paper On Enterprise 2 0 The Next Leap For Indian It Services Industry
Term Paper On Enterprise 2 0 The Next Leap For Indian It Services Industryvyas_harsh86
 
Introduction to Enterprise 2.0
Introduction to Enterprise 2.0Introduction to Enterprise 2.0
Introduction to Enterprise 2.0David Saitta
 
Next Generation Collaboration - Presentation at ICT Spring 2013
Next Generation Collaboration - Presentation at ICT Spring 2013Next Generation Collaboration - Presentation at ICT Spring 2013
Next Generation Collaboration - Presentation at ICT Spring 2013Laura Yecies
 
Social Networking and Unified Communications
Social Networking and Unified CommunicationsSocial Networking and Unified Communications
Social Networking and Unified CommunicationsJan-Willem Ruys
 
Web 2.0 goes to work for business: Enabling the power of participation
Web 2.0 goes to work for business: Enabling the power of participationWeb 2.0 goes to work for business: Enabling the power of participation
Web 2.0 goes to work for business: Enabling the power of participationRoss Dawson
 

La actualidad más candente (20)

Enterprise 20 Summary
Enterprise 20 SummaryEnterprise 20 Summary
Enterprise 20 Summary
 
Replacing Lotus Notes? Here's How It Really Goes Down
Replacing Lotus Notes?  Here's How It Really Goes DownReplacing Lotus Notes?  Here's How It Really Goes Down
Replacing Lotus Notes? Here's How It Really Goes Down
 
Enterprise 2.0 MSL Germany
Enterprise 2.0 MSL GermanyEnterprise 2.0 MSL Germany
Enterprise 2.0 MSL Germany
 
Mann assignment
Mann assignmentMann assignment
Mann assignment
 
Text cloud computing
Text cloud computingText cloud computing
Text cloud computing
 
Adding Social Features To Cloud Computing
Adding Social Features To Cloud ComputingAdding Social Features To Cloud Computing
Adding Social Features To Cloud Computing
 
IBM Notes 9.0 vs MICROSOFT Outlook 2013
IBM Notes 9.0 vs MICROSOFT Outlook 2013IBM Notes 9.0 vs MICROSOFT Outlook 2013
IBM Notes 9.0 vs MICROSOFT Outlook 2013
 
Next Generation Collaboration - ICT Spring 2013 Luxembourg
Next Generation Collaboration - ICT Spring 2013 LuxembourgNext Generation Collaboration - ICT Spring 2013 Luxembourg
Next Generation Collaboration - ICT Spring 2013 Luxembourg
 
Google Chat Summary
Google Chat Summary Google Chat Summary
Google Chat Summary
 
IDC Web2.0 Best Practices Jun2009
IDC Web2.0 Best Practices Jun2009IDC Web2.0 Best Practices Jun2009
IDC Web2.0 Best Practices Jun2009
 
Facebook Meets the Virtualized Enterprise
Facebook Meets the Virtualized EnterpriseFacebook Meets the Virtualized Enterprise
Facebook Meets the Virtualized Enterprise
 
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataStorage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented data
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Term Paper On Enterprise 2 0 The Next Leap For Indian It Services Industry
Term Paper On Enterprise 2 0 The Next Leap For Indian It Services IndustryTerm Paper On Enterprise 2 0 The Next Leap For Indian It Services Industry
Term Paper On Enterprise 2 0 The Next Leap For Indian It Services Industry
 
Introduction to Enterprise 2.0
Introduction to Enterprise 2.0Introduction to Enterprise 2.0
Introduction to Enterprise 2.0
 
Webos
WebosWebos
Webos
 
Next Generation Collaboration - Presentation at ICT Spring 2013
Next Generation Collaboration - Presentation at ICT Spring 2013Next Generation Collaboration - Presentation at ICT Spring 2013
Next Generation Collaboration - Presentation at ICT Spring 2013
 
Social Networking and Unified Communications
Social Networking and Unified CommunicationsSocial Networking and Unified Communications
Social Networking and Unified Communications
 
Web 2.0 goes to work for business: Enabling the power of participation
Web 2.0 goes to work for business: Enabling the power of participationWeb 2.0 goes to work for business: Enabling the power of participation
Web 2.0 goes to work for business: Enabling the power of participation
 
Domino85 vs Exchange 2010
Domino85 vs Exchange 2010Domino85 vs Exchange 2010
Domino85 vs Exchange 2010
 

Destacado

Where IT is headed - Philip Anthony, Co-Operative Systems
Where IT is headed - Philip Anthony, Co-Operative SystemsWhere IT is headed - Philip Anthony, Co-Operative Systems
Where IT is headed - Philip Anthony, Co-Operative SystemsCo-Operative Systems
 
Cooperative communication of brands
Cooperative communication of brandsCooperative communication of brands
Cooperative communication of brandsVanya Babanin, PhD
 
реализация компетентностного подхода на аудиторных занятиях и во
реализация компетентностного подхода на аудиторных занятиях и вореализация компетентностного подхода на аудиторных занятиях и во
реализация компетентностного подхода на аудиторных занятиях и воanryazanova
 
Apps - Stuart Lunn, informationworks
Apps - Stuart Lunn, informationworksApps - Stuart Lunn, informationworks
Apps - Stuart Lunn, informationworksCo-Operative Systems
 
Lightning Talks at IOGDC 2012
Lightning Talks at IOGDC 2012Lightning Talks at IOGDC 2012
Lightning Talks at IOGDC 2012Jeanne Holm
 
ICT služby ASBIS-u
ICT služby ASBIS-uICT služby ASBIS-u
ICT služby ASBIS-uASBIS SK
 
Cooperative Wireless Communications
Cooperative Wireless CommunicationsCooperative Wireless Communications
Cooperative Wireless Communicationsmravendi
 
Future Cooperative Networks
Future Cooperative NetworksFuture Cooperative Networks
Future Cooperative NetworksHira Shaukat
 
Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication ProtocolBibek Subedi
 

Destacado (14)

Where IT is headed - Philip Anthony, Co-Operative Systems
Where IT is headed - Philip Anthony, Co-Operative SystemsWhere IT is headed - Philip Anthony, Co-Operative Systems
Where IT is headed - Philip Anthony, Co-Operative Systems
 
Where IT's At 2012
Where IT's At 2012Where IT's At 2012
Where IT's At 2012
 
Cooperative communication of brands
Cooperative communication of brandsCooperative communication of brands
Cooperative communication of brands
 
Death, Taxes & Internet Outages
Death, Taxes & Internet OutagesDeath, Taxes & Internet Outages
Death, Taxes & Internet Outages
 
App crazy?
App crazy?App crazy?
App crazy?
 
реализация компетентностного подхода на аудиторных занятиях и во
реализация компетентностного подхода на аудиторных занятиях и вореализация компетентностного подхода на аудиторных занятиях и во
реализация компетентностного подхода на аудиторных занятиях и во
 
Apps - Stuart Lunn, informationworks
Apps - Stuart Lunn, informationworksApps - Stuart Lunn, informationworks
Apps - Stuart Lunn, informationworks
 
Content jam 2012
Content jam 2012Content jam 2012
Content jam 2012
 
Lightning Talks at IOGDC 2012
Lightning Talks at IOGDC 2012Lightning Talks at IOGDC 2012
Lightning Talks at IOGDC 2012
 
ICT služby ASBIS-u
ICT služby ASBIS-uICT služby ASBIS-u
ICT služby ASBIS-u
 
Cooperative Wireless Communications
Cooperative Wireless CommunicationsCooperative Wireless Communications
Cooperative Wireless Communications
 
Future Cooperative Networks
Future Cooperative NetworksFuture Cooperative Networks
Future Cooperative Networks
 
Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication Protocol
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 

Similar a Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your phone, Mobile printing

Cloud computing: A Simple, Cost-Effective Solution for K-12?
Cloud computing:  A Simple, Cost-Effective Solution for K-12?Cloud computing:  A Simple, Cost-Effective Solution for K-12?
Cloud computing: A Simple, Cost-Effective Solution for K-12?Johan Koren
 
BBA 3551, Information Systems Management Course Learn.docx
BBA 3551, Information Systems Management Course Learn.docxBBA 3551, Information Systems Management Course Learn.docx
BBA 3551, Information Systems Management Course Learn.docxtarifarmarie
 
Evolution of #cloud computing
Evolution of #cloud computingEvolution of #cloud computing
Evolution of #cloud computingCirro
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_ukJ
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud ComputingJulie May
 
Harnessing 2012 - Cloud presentation
Harnessing 2012 - Cloud presentationHarnessing 2012 - Cloud presentation
Harnessing 2012 - Cloud presentationAngela Hart
 
Thin Client Vs. Fat Client Network Design
Thin Client Vs. Fat Client Network DesignThin Client Vs. Fat Client Network Design
Thin Client Vs. Fat Client Network DesignJenny Mancini
 
Understanding the Microsoft Cloud
Understanding the Microsoft CloudUnderstanding the Microsoft Cloud
Understanding the Microsoft CloudDavid J Rosenthal
 
Microsoft in new enterprise cloud initiatives
Microsoft in new enterprise cloud initiativesMicrosoft in new enterprise cloud initiatives
Microsoft in new enterprise cloud initiativesJohn Davis
 
Gehman Uyttendaele Lane Cloud Printing TAGA 2011
Gehman Uyttendaele Lane Cloud Printing TAGA 2011Gehman Uyttendaele Lane Cloud Printing TAGA 2011
Gehman Uyttendaele Lane Cloud Printing TAGA 2011charlesgehman
 
Cloud Web-Based Operating System (Cloud Web Os)
Cloud Web-Based Operating System (Cloud Web Os)Cloud Web-Based Operating System (Cloud Web Os)
Cloud Web-Based Operating System (Cloud Web Os)ijcsit
 
marketing strategy of Microsoft
 marketing strategy of Microsoft  marketing strategy of Microsoft
marketing strategy of Microsoft Rahat Gupta
 
VMblog - 2018 #VDI and Desktop Virtualization #Predictions from 11 Industry E...
VMblog - 2018 #VDI and Desktop Virtualization #Predictions from 11 Industry E...VMblog - 2018 #VDI and Desktop Virtualization #Predictions from 11 Industry E...
VMblog - 2018 #VDI and Desktop Virtualization #Predictions from 11 Industry E...vmblog
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentationLayani Malsha
 
How Windows 10 is enabling the digital workplace
How Windows 10 is enabling the digital workplaceHow Windows 10 is enabling the digital workplace
How Windows 10 is enabling the digital workplaceAvanade Nederland
 
Windows 8 product guide business english
Windows 8 product guide business englishWindows 8 product guide business english
Windows 8 product guide business englishHeo Gòm
 

Similar a Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your phone, Mobile printing (20)

Cloud computing: A Simple, Cost-Effective Solution for K-12?
Cloud computing:  A Simple, Cost-Effective Solution for K-12?Cloud computing:  A Simple, Cost-Effective Solution for K-12?
Cloud computing: A Simple, Cost-Effective Solution for K-12?
 
BBA 3551, Information Systems Management Course Learn.docx
BBA 3551, Information Systems Management Course Learn.docxBBA 3551, Information Systems Management Course Learn.docx
BBA 3551, Information Systems Management Course Learn.docx
 
Evolution of #cloud computing
Evolution of #cloud computingEvolution of #cloud computing
Evolution of #cloud computing
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud Computing
 
Technology update
Technology updateTechnology update
Technology update
 
Harnessing 2012 - Cloud presentation
Harnessing 2012 - Cloud presentationHarnessing 2012 - Cloud presentation
Harnessing 2012 - Cloud presentation
 
Thin Client Vs. Fat Client Network Design
Thin Client Vs. Fat Client Network DesignThin Client Vs. Fat Client Network Design
Thin Client Vs. Fat Client Network Design
 
Cloud Computing Essays
Cloud Computing EssaysCloud Computing Essays
Cloud Computing Essays
 
Understanding the Microsoft Cloud
Understanding the Microsoft CloudUnderstanding the Microsoft Cloud
Understanding the Microsoft Cloud
 
Microsoft in new enterprise cloud initiatives
Microsoft in new enterprise cloud initiativesMicrosoft in new enterprise cloud initiatives
Microsoft in new enterprise cloud initiatives
 
Gehman Uyttendaele Lane Cloud Printing TAGA 2011
Gehman Uyttendaele Lane Cloud Printing TAGA 2011Gehman Uyttendaele Lane Cloud Printing TAGA 2011
Gehman Uyttendaele Lane Cloud Printing TAGA 2011
 
Cloud Web-Based Operating System (Cloud Web Os)
Cloud Web-Based Operating System (Cloud Web Os)Cloud Web-Based Operating System (Cloud Web Os)
Cloud Web-Based Operating System (Cloud Web Os)
 
marketing strategy of Microsoft
 marketing strategy of Microsoft  marketing strategy of Microsoft
marketing strategy of Microsoft
 
VMblog - 2018 #VDI and Desktop Virtualization #Predictions from 11 Industry E...
VMblog - 2018 #VDI and Desktop Virtualization #Predictions from 11 Industry E...VMblog - 2018 #VDI and Desktop Virtualization #Predictions from 11 Industry E...
VMblog - 2018 #VDI and Desktop Virtualization #Predictions from 11 Industry E...
 
cloud-computing
cloud-computingcloud-computing
cloud-computing
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
How Windows 10 is enabling the digital workplace
How Windows 10 is enabling the digital workplaceHow Windows 10 is enabling the digital workplace
How Windows 10 is enabling the digital workplace
 
Windows 8 product guide business english
Windows 8 product guide business englishWindows 8 product guide business english
Windows 8 product guide business english
 

Más de Co-Operative Systems

Dell Windows 8 Tablet & Mobility Solutions
Dell Windows 8 Tablet & Mobility SolutionsDell Windows 8 Tablet & Mobility Solutions
Dell Windows 8 Tablet & Mobility SolutionsCo-Operative Systems
 
An Adaptive Approach to Software Procurement
An Adaptive Approach to Software ProcurementAn Adaptive Approach to Software Procurement
An Adaptive Approach to Software ProcurementCo-Operative Systems
 
What is crm and why do most implementations fail
What is crm and why do most implementations failWhat is crm and why do most implementations fail
What is crm and why do most implementations failCo-Operative Systems
 
Infoworks the cloud facing organisation pr1
Infoworks   the cloud facing organisation pr1Infoworks   the cloud facing organisation pr1
Infoworks the cloud facing organisation pr1Co-Operative Systems
 
Strategy - Ian Pritchard, Sayer-Vincent
Strategy  - Ian Pritchard, Sayer-VincentStrategy  - Ian Pritchard, Sayer-Vincent
Strategy - Ian Pritchard, Sayer-VincentCo-Operative Systems
 
Collaboration - Dr Peter Gee, Overseas Development Institute
Collaboration - Dr Peter Gee, Overseas Development InstituteCollaboration - Dr Peter Gee, Overseas Development Institute
Collaboration - Dr Peter Gee, Overseas Development InstituteCo-Operative Systems
 
How do we learn now? - Henry Stewart, Happy Computers
How do we learn now? - Henry Stewart, Happy ComputersHow do we learn now? - Henry Stewart, Happy Computers
How do we learn now? - Henry Stewart, Happy ComputersCo-Operative Systems
 
The Dell landscape - Richard Browne, Dell
The Dell landscape  - Richard Browne, DellThe Dell landscape  - Richard Browne, Dell
The Dell landscape - Richard Browne, DellCo-Operative Systems
 
Co-Operative Sytems WhereITsAt event introduction
Co-Operative Sytems WhereITsAt event introductionCo-Operative Sytems WhereITsAt event introduction
Co-Operative Sytems WhereITsAt event introductionCo-Operative Systems
 
infoworks: Apps r2 - Information Systems in the Third Sector
infoworks: Apps r2 - Information Systems in the Third Sectorinfoworks: Apps r2 - Information Systems in the Third Sector
infoworks: Apps r2 - Information Systems in the Third SectorCo-Operative Systems
 

Más de Co-Operative Systems (16)

Dell Windows 8 Tablet & Mobility Solutions
Dell Windows 8 Tablet & Mobility SolutionsDell Windows 8 Tablet & Mobility Solutions
Dell Windows 8 Tablet & Mobility Solutions
 
Cloud versus On Premise
Cloud versus On PremiseCloud versus On Premise
Cloud versus On Premise
 
Exploring the Cloud
Exploring the CloudExploring the Cloud
Exploring the Cloud
 
An Adaptive Approach to Software Procurement
An Adaptive Approach to Software ProcurementAn Adaptive Approach to Software Procurement
An Adaptive Approach to Software Procurement
 
What is crm and why do most implementations fail
What is crm and why do most implementations failWhat is crm and why do most implementations fail
What is crm and why do most implementations fail
 
Infoworks the cloud facing organisation pr1
Infoworks   the cloud facing organisation pr1Infoworks   the cloud facing organisation pr1
Infoworks the cloud facing organisation pr1
 
Working at home for the Olympics
Working at home for the OlympicsWorking at home for the Olympics
Working at home for the Olympics
 
Eve Joseph, Microsoft UK
Eve Joseph, Microsoft UKEve Joseph, Microsoft UK
Eve Joseph, Microsoft UK
 
Getting good value from IT
Getting good value from ITGetting good value from IT
Getting good value from IT
 
InfoBulletin February 2011
InfoBulletin February 2011InfoBulletin February 2011
InfoBulletin February 2011
 
Strategy - Ian Pritchard, Sayer-Vincent
Strategy  - Ian Pritchard, Sayer-VincentStrategy  - Ian Pritchard, Sayer-Vincent
Strategy - Ian Pritchard, Sayer-Vincent
 
Collaboration - Dr Peter Gee, Overseas Development Institute
Collaboration - Dr Peter Gee, Overseas Development InstituteCollaboration - Dr Peter Gee, Overseas Development Institute
Collaboration - Dr Peter Gee, Overseas Development Institute
 
How do we learn now? - Henry Stewart, Happy Computers
How do we learn now? - Henry Stewart, Happy ComputersHow do we learn now? - Henry Stewart, Happy Computers
How do we learn now? - Henry Stewart, Happy Computers
 
The Dell landscape - Richard Browne, Dell
The Dell landscape  - Richard Browne, DellThe Dell landscape  - Richard Browne, Dell
The Dell landscape - Richard Browne, Dell
 
Co-Operative Sytems WhereITsAt event introduction
Co-Operative Sytems WhereITsAt event introductionCo-Operative Sytems WhereITsAt event introduction
Co-Operative Sytems WhereITsAt event introduction
 
infoworks: Apps r2 - Information Systems in the Third Sector
infoworks: Apps r2 - Information Systems in the Third Sectorinfoworks: Apps r2 - Information Systems in the Third Sector
infoworks: Apps r2 - Information Systems in the Third Sector
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your phone, Mobile printing

  • 1. InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm October 2014 Issue 145 Always the best source for IT ideas NewsBytes Windows 9/10, Office 365 eBook, HyperCat, misplaced cloud fears ... and more Always on the record Whose smartwatch is watching you? A strategy for blanket Wi-Fi Configuring multiple Access Points Tether your phone How to keep working when the broadband dies Here comes the new con ... ... same as the old con The mobile printing scrum Accommodate users without compromising the network Q&A: How to suppress the "Open with" menu in Windows 7? Clicks of the Trade - Wean yourself off admin rights InfoBulletin Subscriptions IB archives What we read Privacy policy Audits & Reviews Backup Cloud Solutions Collaboration Disaster Recovery IT Infrastructure IT Strategy Remote Working Security Support Services Virtualisation coopsys.net About us Contact Us Recent Issues 04/07/2014 - InfoBulletin July 2014 - Remote control software, Phones that listen, Life after XP, Create an IT security policy 13/05/2014 - InfoBulletin May 2014 - Thought your mail was private? Cryptolocker ransomware, Wi-Fi pitfalls, Hire society 02/04/2014 - InfoBulletin April 2014 - Mobile Device Management, Shapeshifting Office, Hybrid drives, A false sense of security, New roaming Wi-Fi *** NewsBytes *** 1 of 17 23/10/2014 13:36
  • 2. InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm Liberating Windows 9 ... wait, that's Windows 10! As the details of Microsoft's next operating system gradually eked out to a waiting public, a free upgrade was conjectured as one of the carrots to lure existing users. During a press event ahead of the 30 September launch, the president of Microsoft France named the successor "Windows 9" by accident. Though the company line had been that the codename "Windows Threshold" was still the official one, Microsoft surprised everyone as Terry Myerson, head of operating systems, announced Windows 10. The much anticipated Start Menu returns as a mini hybrid, combining a traditional Windows 7 application list on the left along with a set of Windows 8 Live Tiles on the right. This version runs Metro/Modern apps from the Windows Store will be able to run in multiple virtual desktop windows too. The 'write-once, deploy every where' approach of Windows Technical Preview will be for developers only. Using an adaptive new system dubbed Continuum, it will run across the "broadest range of devices ever from the Internet of Things to enterprise datacenters worldwide", encompassing Xbox, PCs, phones, tablets and tiny gadgets along the way. Though small-screened devices won't have the desktop, they will retain the Charm bar. A single view for all open apps and files now comes care of a new Task view button on the task bar, allowing quick switching and one-touch access to any desktop. Another appealing aspect posed by Andreas Diantoro, president of Microsoft Indonesia, is that existing users of Windows 8 would get a free upgrade the new OS. Interestingly this is one leak that nobody has confirmed or refuted as yet. Delve: Office 365 gets its own Google Now Coming to Enterprise Office 365 users and then business plan subscribers from early 2015, Office Delve learns the relationships between a user's data pools and their activity. By tapping into Microsoft-powered data sources, this new Office assistant delves into business-subscribed email, OneDrive, SharePoint and Yammer, Microsoft's social network. The list of Office 365 virtually anywhere, free eBook This all-rounder from Microsoft Press aims to introduce beginners and team leaders to Office 365. The first tenth contains a fair bit of promotional puff - to be expected if they want hook readers as potential new subscribers - and a primer of cloud computing and collaboration. However those who understand or are responsible for basic admin - the ones likely to have the most purchasing clout - should skip straight to the admin section in chapter 3 to get acquainted with some edifying screen shots. For example, SharePoint serves up 6 handy roles (view, read, contribute + enhanced, design, full control) as well as permitting customised variations, invaluable for realising a hierarchy of site collaboration. The excellent Office Web Apps allow users to create, edit and share their work as usual but the guide is up front about the limitations too - no format painter or tracked changes being just two. We also find out that the single file size limit of 50MB can be increased with some "behind-the-scenes wrangling". The title "Microsoft Office 365: Connect and Collaborate Virtually Anywhere, Anytime" says it all really. The neat ambiguity displayed by "collaborate, virtually anywhere" or "collaborate virtually, anywhere" illustrates the power of implementing the kind of cloud computing any team can just pick up and run with. Download the epub (22MB) and mobi (8MB) formats from the Microsoft Press blog. 88% fear risk of their data in the cloud ... though only 2 percent have actually experienced a breach. Nearly half of organisations changed the way they use cloud services following revelations surrounding PRISM, according to a poll of 250 senior IT business decision makers conducted by the cloud industry forum (CIF), while a further 9% switched cloud service providers completely. Ranking highest amongst concerns were backup/disaster recovery, data storage and personnel/payroll. Chiefs and partners at CIF put the experience mismatch down to the fear, uncertainty and doubt promulgated by media stories, and cite their CIF code of practice as a route to helping cloud service providers (CSPs) build trust within their clients. Dying for a sit down 2 of 17 23/10/2014 13:36
  • 3. InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm 'delve-able' source applications will soon grow to include email attachments, OneNote and Lync. Inevitably Office Delve will be compared to Google Now, but underneath its engine is Office Graph, which employs "sophisticated machine learning techniques to map the relationships between people, content, and activity that occurs across Office 365" says Julia White, general manager of Office 365 Technical Product Management. And of course Delve is mobile-friendly too, as you'd expect of any system that fetches information for you rather than having to go searching for it. As for the application itself, Office 365 admins don't have to do any searching or waiting; those on the First Release program can get Delve simply by signing into their Office 365 online account. OneDrive now shareable and bigger In the race to offer ever more free cloud storage, Microsoft has taken a leap that puts it back in contention with Google and Dropbox. Up from 2GB, Microsoft's OneDrive cloud service is now syncing files up to 10GB size, in its free allocation of 15GB. The company has also rectified an omission that saw it losing out to Dropbox, namely a link whereby a right-click on a OneDrive-synced in the Explorer app on the desktop (both Windows and Mac) opens a sharing menu. The "Share a OneDrive link" menu item creates a link that can be mailed, IM-ed or shared via Facebook, Twitter, or LinkedIn. These features - among the top requested for OneDrive - are rolling out over the next few weeks says Microsoft. Dell Mobile Workspace tackles BYOD issues Streamlining phones, email and Office 365, Dell's solution aims to solve BYOD security, manageability and cost in one go. Rather than Today's desk jockeys have a dilemma on their hands: work is probably killing them, literally. Sitting comfortably? Here's a bit of news to make you squirm. With half the time of any modern day worker spent sitting down, one study has shown the associations of a sedentary life with diabetes and cardiovascular disease, while another at the British Journal of Sports Medicine emphasises the importance of exercise and standing up in preventing damage during cell division. The otherwise shortened chromosome-caps, called telomeres, display links to heart disease, cancers, diabetes, obesity and strokes. Thus, time spent stabbing the screen of our smartphones could be years of our lives saved, though only if we do it standing up, and avoiding texting faceplants. Shellshock: Macs and Linux get a bashing A flaw in the basic operating system of both Linux and Apple Mac's OSX was the recent big news discovery, if only because it lay hidden for perhaps 20 years. In the past, Macs and to some extent Linux have often been portrayed as 'immune to viruses' but the fallacy was well and truly shot down at the end of September with the revelation that the so-called Shellshock bug affects an essential piece of software called Bash - the shell or command line interface that allows a user to talk to a Unix based system, and is one of the most installed utilities on any Linux system. Security experts are deeply concerned, like FireEye Inc's Director of Threat Research Darien Kindlund who reckons Shellshock is "horrible. It's worse than Heartbleed, in that it affects servers that help manage huge volumes of Internet traffic. Conservatively, the impact is anywhere from 20 to 50% of global servers supporting web pages." The bug rated a 10 out of 10 on the severity scale of the US National Vulnerability Database. The team at Red Hat, who discovered the flaw have written an FAQ which cites the Red Hat release of patched versions of Bash. Patches for many other Linux distributions can be found via Lifehacker which also presents the one line command (env x='() { :;}; echo vulnerable' bash -c 'echo hello') to test whether a machine is vulnerable. Apple has promised a fix for Mac users is on its way. 3 of 17 23/10/2014 13:36
  • 4. InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm employing today's piecemeal measures to reign in the bring-your-own-device wave, Dell offers a single application where employees access corporate email, calendar, contacts, the intranet and documents both on or offline. Mobile Workspace satisfies the requirements of managers, data controllers and IT admins, providing remote lock, wipe and passcode policy operations within the application, but without taking total control of the device, thus maintaining privacy concerns of the phone owners. Employees even get a separate business phone number on their existing smartphones or tablets with the Business Phone. The firm's cloud storage service facility, Box, allows staff to access its organisation's files and folders securely across a range of devices. Mobile Workspace supports Android 4.0 upwards and iOS 7.0 upwards on Microsoft Exchange 2007 and up. *** end of NewsBytes *** ^ Back to contents ^ 1. Always on the record 2015 is set to be the year of the smart watch but is this particular gadget also set to mould employees as in-house spies? Help at hand. Back issues just a click away The 'wearable tech' world of James Bond has arrived and it's watching you, even as you boggle at its capabilities. Timed to arrive at for a lucrative Christmas take-up and a blast into the New Year, a slew of renowned smartphone companies pitched their offerings into the smartwatch race in the second half of 2014: LG rolled out its initially somewhat dull rectangular G watch followed by a more exciting round G Watch R running the android Wear operating system Samsung produced a range of Gear watches, based on its home-grown Tizen operating system as a lever to disengage itself from the stranglehold of Google's Android Motorola's Moto 360, was a well received and water-resistant Android device with a circular and bright face, though as iFixit discovered, its battery capacity turns out to be a bit confusing Apple, puffing up to the finishing line, announced one rectangular watch in 2 sizes with a touch/pressure sensitive screen and a new take on the decade-old 'jog dial' With so little in the way of control and viewing surfaces, information harvesting in the style of Google Now, Cortana, and Siri will be a given. To respond to a user's wishes, wrist-borne data input will be automated as far as possible so that a picture of the user's environment is always on hand, and timely information can be served up with as little conscious interaction as practicable. Enterprises still coming to terms with the data-slurping side effects of BYOD may not realise that an even more insidious trend is about to bubble up, this time from technology on the arm instead of in the pocket. 4 of 17 23/10/2014 13:36
  • 5. InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm Looks like a watch ... Feels like a watch ... Watch doppelgänger ... Er ... one to watch? Testing 1, 2, 3 These devices are as packed with sensors as the smartphones with which they are intended to be paired. Stuff like Wi-Fi, Bluetooth, accelerometers, compasses, and gyrometers for GPS positioning, and heart rate sensors for fitness are taken as read, but these wrist buddies don't stop at just tracking their owners. The Samsung Galaxy Gear sports a 1.9MP camera while the Arrow smartwatch contains a 360° rotating camera for selfies or incognito filming. Microphones on smartphones are fairly capable of picking up sound from any direction (since most now bundle second mics to suppress background noise in conversations), while the Smartwatch 2 Camera app turns a remotely placed smartphone into a kind of video baby monitor. Thus the capabilities of bugging equipment toyed with only by professionals and thriller writers a decade ago is trickling down to consumer-level. So will bosses be logging every word and movement at meetings? Perhaps colleagues will join in as well, just to cover their backs. Monday morning round-ups could become a tense affair! Transparently rejected Google Glass is blatantly obvious by its mere presence, and also to its 'subjects' that recording is live/on air as it were. The sheer barefacedness of Glass already saw its use being banned - even before the concept had made it to production - in places such as bars, restaurants, banks (id protection), gyms, and cinemas (as an anti-piracy measure), while a mounting clutch of US states including West Virginia, Illinois and New Jersey have proposed legislation banning drivers from "using a wearable computer with head mounted display", despite potential enforcement hurdles. If all this weren't enough to severely dent a Glass wearer's ego, a worse fate is to be labelled a 'Glasshole', and Google itself publishes an etiquette guide of Glass Explorers Do's and Don'ts to help users avoid humiliation at least. However, like cartoon Comic Book Guy, self-inflicted Glass nerds could already be flip-flopping between denial and depressed acceptance of a life as the new social outcast. Hidden in plain sight In the wake of face-worn tech, more stylish successors are inevitably becoming fashionably acceptable, but potentially more useful. Ron Amadeo found that after a month and half's ownership of Google Glass, his costly hi-tech specs ended up in the drawer and he found himself persuaded by the ergonomics of Android Wear. Wrist-worn computers are arguably a great innovation for users who want to sidestep the Google 5 of 17 23/10/2014 13:36
  • 6. InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm Glasshole.sh is a script that can be used to kick Google Glass off your local wireless network. Written by Berlin artist Julian Oliver, it can be installed on a Raspberry Pi or Beaglebone. The Stop The Cyborgs store has published downloadable PDF banning signs. geek look and keep that giant smartphone slab tucked away, but the advantage of discretion that makes them socially respectable could also be their failing: they're inherently covert. The banning restrictions on Glass could apply to the pervasive capabilities of smartwatches but enforcements will be even more fraught. Workplaces could be concerned not only about the devices' lifeblogging capacities but the potential to leak organisational data should control of these wrist-worn devices end up in the wrong hands through viruses, remote attacks or disgruntled workers. Not on my watch Perhaps there's not as much to be feared here as might first appear; there are severe impediments to operating a smartwatch in slick fashion. However many buttons, jog dials and tap sensors are packed into the device, two hands are still required for response and control. Wrist-flicking and voice recognition algorithms don't pass any subtlety etiquette in meetings, while a smartphone, by comparison, can still be silenced inconspicuously with one-handed operation. Over several decades we've got used to what we must now presumably call 'feature watches' - those esteemed lumps of precision stainless steel driven by quartz movements - lasting a couple of years on a single non-rechargeable battery. However, sophistication comes at a price. By contrast to their predecessors, the smartest of the 'smart' adversaries - as witnessed by these comparisons - barely chug through a whole day, effectively around 700 times less efficient at telling the time and date. With that kind of stamina, you can bet that the average smartwatch will conk out just as the record button is pressed. Perhaps we're safe after all. Bookmark ^ Back to contents ^ 2. A strategy for blanket Wi-Fi Configuring multiple access points for shared Wi-Fi. Help at hand. Back issues just a click away When small organisation wants to expand into a neighbouring office, staff usually need to have access to Wi-Fi. The existing Wi-Fi router signal often doesn't reach where they want it so should they buy a repeater? This is a typical stumbling block of Wi-Fi expansion. Thick walls, water pipes and metal mesh all conspire to block off the Wi-Fi signal, and even metal filing cabinets being shifted around can play havoc, especially near the 30 metre limit of Wi-Fi transmission. A decade ago, repeaters were seen as one solution but the technology effectively halves the bandwidth for connected computers as they process and rebroadcast the signal. While router bandwidth always tends to be much greater than that of an broadband Internet connection, it could make internal PC networking slow, and anyway 6 of 17 23/10/2014 13:36
  • 7. InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm there are better solutions these days, either using existing Wi-Fi technology or the incoming generation of routers and antennae. Change the channel A common strategy is to buy additional access points (AP) and place adjacent APs on separated channels to prevent interference, but all broadcasting with the same SSID, so that staff don't have to worry about several SSID names and which one might be the 'right' one. Thus, a primary router's Wi-Fi and its two connected APs could all be called "acme-airside" but allocated to channels 1, 6, 11 (and in the UK 13) for 802.11b/g protocols. On 802.11n, it's possible to use a narrower separation, hence channels 1, 5 and 9. The router is likely to be the unit that handles DHCP while other Access Points will be allocated a static IP on the same subnet, something like this for 802.11b or 802.11g: Device Router Access Point 1 Access Point 2 SSID acme-airside acme-airside acme-airside IP 192.168.1.1 192.168.1.2 192.168.1.3 Channel 1 6 11 With a minimum channel separation of 5 or possibly 4, some IT architects adopt a channel allocation strategy to blanket their workplace in seamless Wi-Fi. Imagine this example of channel separation in a linear continuous corridor: Channel sequence for each Access Point (5 channel separation): 1, 6, 11, 3, 8, 13, etc Channel sequence for each Access Point (4 channel separation): 1, 5, 9, 13, 4, 9, etc (For Europe/UK. US is generally 11 channels) In a shared building, neighbouring APs might be operating on adjacent channels on floors above, below or to the side so this strategy is not always as straightforward to operate as it might seem. Most routers are set up with channel 11 by default. It's neither impossible nor completely disruptive to others to operate with Wi-Fi broadcasting on nearby overlapping channels (look up CSM/CA), it's just less efficient. Software like NetStumbler can help to locate other broadcasts in the vicinity. Channel widths (and therefore separations) also vary depending how much each AP signal drops off as it gets attenuated and how much power is allowed by country. Better APs can assign channels automatically by polling each channel at random intervals and choosing the most separated one from other existing channels, while some manufacturers offer wireless management devices to control a whole group of APs - you get what you pay for. However not everyone recommends these because the algorithms doing the calculating can be quite basic. For more sophisticated seamless roaming Wi-Fi solutions, check out HomePlug products like Devolo for home use, or Cisco's Meraki for the workplace. Contacts The overlapping channel problem JANET library advisory services 7 of 17 23/10/2014 13:36
  • 8. InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm Farproc Wi-Fi analyzer for Android smartphones Bookmark ^ Back to contents ^ 3. Tether your phone No Internet? Time to learn how to harness your phone as a temporary broadband replacement to keep your main computer up and running. Help at hand. Back issues just a click away When that red light appears on your router, it could be that your broadband line will be down for a while. One way or another, you're about to reach the end of your tether. What is tethering? This technique allows you to take your mobile phone as the point of contact for Internet data and share that connection out to other devices such as a desktop, a laptop, or even another mobile phone. This is achieved using the phone's mobile data, whether that's a pay-as-you-go allowance or a contract. So-called mobile tethering can be set up via a USB cable, or Bluetooth, or via Wi-Fi, also known as Personal Hotspot. First, get wise to a couple caveats and concepts: Treat the setup as temporary and use it sparingly. It's easy to hammer through a month's mobile data quota (say 1GB) when behaving as if the connected laptop or PC is still hooked up to tens of GB at landline capacity. Avoid video, audio and any sort of streaming until the main broadband is back up again. Cable will always be simplest and fastest (if your phone allows it) so look for USB to start with. For tethering one device, a USB cable is perfect as there's no need to worry about a password. Just grab a mini-USB or micro-USB cable (whichever suits your phone) and connect the other end into the standard USB socket on a laptop or desktop PC. Next best is any wireless type of connection, though these are less reliable and harder to set up. Bluetooth has an unobstructed range of up to 10 metres, while Wi-Fi will transmit across 30 metres at best, again barring metal or thick masonry in its path. It's possible to tether more than one device this way. Print out the relevant page from links below, or practice how to set up tethering for your phone at least once in advance, but do it before you need to reach for it in anger! Android tethering 8 of 17 23/10/2014 13:36
  • 9. InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm USB cable Settings | More | Tethering | USB tethering Bluetooth Settings | More | Tethering | Bluetooth tethering Wi-Fi hotspot Settings | More | Tethering | Mobile Wi-Fi hotspot More details for all three modes plus supported devices can be found on one page at: https://support.google.com/nexus/answer/2812516?hl=en BlackBerry tethering USB cable Learn to use your BlackBerry smartphone as a tethered modem (BlackBerry 7.1 OS and earlier): http://btsc.webapps.blackberry.com/btsc/viewdocument.do?noCount=true& externalId=KB05196 Configure a BlackBerry smartphone as a tethered modem on a Mac: http://btsc.webapps.blackberry.com/btsc/viewdocument.do?externalId=KB19641 BlackBerry Desktop Software will be needed for the above. Install BlackBerry Desktop Software for Windows: http://btsc.webapps.blackberry.com/btsc/viewdocument.do?externalId=KB16236 Installing and uninstalling BlackBerry Desktop Software on a Mac computer: http://btsc.webapps.blackberry.com/btsc/viewdocument.do?externalId=KB18771 Bluetooth Settings | Network connections | Internet tethering How to use your BlackBerry as a Bluetooth modem: http://www.pcadvisor.co.uk/how-to/pc-peripheral/3241331/how-to-use-your-blackberry- as-a-bluetooth-modem/ The EasyTether app for BlackBerry supports USB for Windows computers, Bluetooth SPP for Android tablets and Bluetooth PAN (not with BlackBerry 10) for OS X and Linux computers. Wi-Fi hotspot Settings | network connections | Mobile Hotspot Set up a hotspot on BlackBerry Z10: http://demos.blackberry.com/blackberry-z10/na/us/gen/how-to/your-blackberry-z10- smartphone/connections/mobile-hotspot/index.html iOS tethering (iPhone/iPad) USB cable Settings | General | Network | Internet tethering PC Advisor shows the setup in detail: http://www.pcadvisor.co.uk/how-to/mobile-phone/3279666/how-to-tether-an- iphone-for-free/ Bluetooth Wi-Fi hotspot Settings | Phone/cellular section | Personal Hotspot 9 of 17 23/10/2014 13:36
  • 10. InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm If your plan does not support Personal Hotspots, you will see a link labelled "Set Up Personal Hotspot" which will tell you how to contact your carrier and update your plan. Windows Phone tethering USB cable To the disgruntlement of some Windows Phone users, Microsoft appears to have removed tethering via a USB cable (present up to Windows Phone 7.5) from Windows Phone 8 Bluetooth Settings | Internet sharing | Share over | Bluetooth http://www.windowsphone.com/en-GB/how-to/wp8/connectivity/share-my- connection Wi-Fi hotspot Settings | Internet sharing | Share over | Wi-Fi http://www.windowsphone.com/en-GB/how-to/wp8/connectivity/share-my- connection Overcoming carrier blockages Although phone owners might complain about their phone or its operating system failing to carry out tethering, it's more likely the manufacturer of the phone hardware has taken out an agreement with the mobile carrier to limit tethering, or specifically exclude it. For those blocked by carriers and/or manufacturers (typically where deals are done to extract extra fees) there are two app to overcome restricted carriers, essentially a form of proxy. The two most popular Wi-Fi tethering apps are PdaNet and TetherMe. Both of these apps cost money, so ensure that they work on your phone and carrier. PdaNet has a trial version to check out your carrier. Tethering alternatives A dongle or datacard plug-in or pocket Wi-Fi is are other solutions. They involve extra expense (as opposed to borrowing someone else's) but purchasing a simple pay-as-you-go block of data is self-contained way to escape a broadband crisis, as long as 3G or 4G coverage is available in the building. Furthermore it can be a financially delineated alternative to using up the data allowance of a privately owned smartphone. Contacts How I share my iPhone's Internet connection (without paying Verizon extra) How to share your Windows Phone's internet - whether or not your carrier wants you to Bookmark ^ Back to contents ^ 4. Here comes the new con ... Recent strings of frauds are succeeding because of traps in old communications 10 of 17 23/10/2014 13:36
  • 11. InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm technology. Help at hand. Back issues just a click away When communications technology moves at a fast pace, it's the older generations or the technically naïve that suffer. There has been a rise in the number of reported phone scams where the fraudster asks the 'mark' to put the phone down and then ring back, a common method to verify the caller is genuine. What the victim doesn't realise is the fraudster is still on their end of the line, and simulates the expected ring tone. They then 'answer' just as if it were a real banking call centre. Using this kind of deception, scammers have swindled thousands of pounds from individual victims, maybe their entire savings. That the scam works at all is largely because old analogue telephone lines may keep the line open for as much as 5 minutes after the receiving handset is put down, allowing the fraudster to perpetrate this kind of electronic ambush. Decades ago, when the only sort of telephones available were analogue ones, making call was very expensive. Similarly the introduction of mobile networks brought relatively costly tariffs to consumers and lucrative revenue to mobile phone providers, all of which made for an equally punitive hostile environment for swindlers to enter. Now however, the cost of vocal communication is small, meaning that in this case at least, the con artist wastes only a few pence spent keeping a line open to hook their prey. Nevertheless phone scams haven't attained the dizzying levels of scatter-gun mass emailing because despite the plummeting call costs, it's not just a matter of hitting Send, sitting back and waiting for clicks from the gullible to roll in. The voice call costs may have dropped but executing each one is still a one-at-a-time labour intensive process. It's a burgeoning sector of the population that makes voice call scams a natural target: older, better off, and in today's climate of austerity, more fearful. These factors turn normally lethargic savers into panic stricken movers of wealth, paradoxically powered by the very fear about the sort of trouble they are getting into. At the same time as educating new audiences to the risks of 'baring all' on social media and incoming assaults via phishing, we're having to keep one eye at our backs for senior users who fall prey to time-worn scams in a new guise. Witness online dating frauds that promise happiness to vulnerable dating rookies in exchange for helping to release potential partners from some fabricated plight abroad. Or supposed telecom support people cold-calling to sort out a non-existent virus in the hope of gaining access to their quarry's PC. Whatever the ruse, victims are thus swindled out of vast sums through age-old social engineering tricks, though new technology makes the deceit look cleverer than it really is. For those who provide IT support, it's a wake-up call to hone their skills of communication: explaining the risk while adjusting the 'techno-babble' to suit the competence and understanding of the audience on the receiving end, whatever their age. Contacts Read the Scams Checklist from the Citizens Advice Bureau Report fraud at Action Fraud Bookmark ^ Back to contents ^ 5. The mobile printing scrum 11 of 17 23/10/2014 13:36
  • 12. InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm Just when would you use mobile printing, and why is it a prescription for a punch-up? Help at hand. Back issues just a click away Like it or not, workplaces are increasingly buzzing with peripatetic employees and visitors who are stepping into the office scrum for just an hour or so, and the result is that their mobile devices have become a nearly universal work tool. Often they'll walk up to a meeting and - despite the ballyhoo that hypes everyone's ability to work directly on screen - they'll want to print an agenda, or a graph, or have a diary week shown on paper, or use the lowest-tech means of putting a copy in someone else's paws. Sure, we have Bluetooth and Wi-Fi and Dropbox, and any number of digital transfer mechanisms, but road warriors are frequently those that live by tried and trusted means. Because they exist mostly at the sharp, customer-focused end of business, the demands of these 'fly-halves' often carry clout. However, simple zero-setup printing doesn't exist at the level these people require and their tried and trusted paper stalwart then becomes vexatious and stressful, because giving up their mobile devices isn't an option either. Equally IT admins shudder at the idea of herds of users dropping in and out at will, hooking up strange new devices that might well be let loose rogue pirate copies of Angry Bird upon their protected network. Such a dichotomy is a recipe for a nasty ruck. How to keep both parties happy? On the basis that users are more likely to adopt security measures if they're quick and painless, a new standard looks like it could be the way forward. Enter the Mopria Alliance, a non-profit membership organization of leading global technology companies with the shared goal of providing intuitively simple wireless printing from smartphones, tablets and other mobile devices. Founded by member companies Canon, HP, Samsung and Xerox, most other major printer manufacturers are now members too. Looking at practical examples of this relatively new Mopria standard, HP launched its colour LaserJet Pro MFP M476 series offering important advancements that help mobile users with direct hassle-free printing. Wireless direct printing - allows Wi-Fi capable phone, tablets, etc to make a direct wireless connection to the printer without needing an in-house router. access point or network Touch-to-print - devices enabled with near field communication (NFC) chips can simply be touched to the printer's NFC antenna to print a document Secure connections - standard WPA2 security with 128-bit encryption for users, but IT administrators can also use HP's embedded web server (EWS) or Web Jetadmin remote management software to enable/disable HP wireless direct, touch-to- print functionality, or set passphrases Easy user authentication - to keep things simple for mobile users, printers feature a configurable passphrase for setting up authentication based Windows®/Kerberos, LDAP, 12 of 17 23/10/2014 13:36
  • 13. InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm and a user PIN authentication and integrate with existing infrastructure Question Mark Of course, HP isn't the sole supplier in the market and Mopria-compatible printers from other manufacturers worth checking out are: Canon i-SENSYS laser MFPs, Xerox ColorQube and WorkCentre printers, Epson WorkForce Pro printers and Expression Home series It's rare to see a solution that satisfies IT greenhorns and IT admins simultaneously, but a Mopria-compatible printer as part of your next upgrade should allow both parties to get on with how they do things best - separately, but minus the foul play and without resorting to the sin bin. Contact us for a review of your IT infrastructure. Bookmark ^ Back to contents ^ 6. Q&A: How to suppress the "Open with" menu in Windows 7? Hi Mark, One of my users keeps opening image files in Paint instead of Windows Photo Viewer. Because they always hit OK instead of Cancel when closing everything (grrr!), our shared images files often get altered and I have to go back and restore the original from a backup. Is there any way to stop this happening? Help at hand. Back issues just a click away One obvious answer is training, but frequently nobody has time for training and of course some others are just bloody-minded. What's more, many of us have a habit of following the same error-strewn path of clicks as before simply because it looks so familiar from last time - with many a grrr along the way. The "Open with" context menu is the one that pops up from a right-click, and most people don't notice the pre-ticked box (Always use the selected program ...) at the 13 of 17 23/10/2014 13:36
  • 14. InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm bottom of the panel, so next time the default program behaviour is changed. It's worth understanding the distinction between the functions that various programs can mete out to their associated files. Among the common files that can be both viewed and edited are images (.jpg, .png, etc), Adobe PDFs (.pdf), and web pages (.html, .php, etc). It's significant to note that a viewing role is the usually the default for this short list, whereas we've come to expect office files (documents, spreadsheets, presentations) to open ready for viewing and in editing mode. To preserve your images (or whichever files from the list above) from being continually 'hacked about', there are several approaches you can try: Change the Default programs via Start | Default Programs (located in Control Panel) Of course most users can find this easily enough to change it back 1. Configure the image files (presumably in a shared drive on your network) as read-only for everyone except those who should be editors of images, or rather configure the folders where the images reside 2. Uninstall the image-editing application(s). This would be a bit drastic if other users who come to the same PC still want to do editing 3. The last two are registry edits so one has to take the usual backup precautions first, but assuming that users aren't going to reverse-edit, they offer some permanency. Prevent an application appearing in the Open with dialogue box for file types it can't open: HKEY_CLASSES_ROOT Applications ApplicationName SupportedTypes .ext1 .ext2 .ext3 If a SupportedTypes subkey is provided, only files with those extensions are eligible for pinning to the application's Jump List or for being tracked in an application's Recent or Frequent destinations list. 4. Remove the "Open with" context menu completely The NoOpenWith entry is an empty REG_SZ value as shown in the following example. HKEY_CLASSES_ROOT Applications MyProgram.exe NoOpenWith The NoOpenWith entry overrides the SupportedTypes subkey and hides the application in the Open with dialogue box. 5. This latter edit also prevents pinning a file to an application's Jump List. Discover answers in more Q&A topics Bookmark More news 14 of 17 23/10/2014 13:36
  • 15. InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm You may also be interested in: LASA Computanews BBC News Technology ^ Back to contents ^ Clicks of the Trade - Wean yourself off admin rights --- Quick tips for happier clicks! --- Help at hand. Back issues just a click away So many malware attacks these days succeed simply because somewhere a PC is the weakest link in the chain, and the reason for that is that its owner is running full admin rights. Take this description of the clever banking subterfuge labelled "Operation Emmental". The two-factor authentication form the bank is only foiled if the user's computer DNS settings can be changed, and that only happens if you are logged in as administrator. For everyone else, a User Account Control (UAC) prompt appears and the rest of the screen is dimmed in the background to indicate that significant changes are about to be made. A UAC prompt to approve an installation of Adobe Shockwave It's a kind of "Did you really start this action?" double-check, because if the user didn't, they should think twice about continuing. The prompt even reveals which application or process is making the request to elevate privileges to admin level. For most purposes, it's an annoying but infrequent interruption because we don't install new programs or mess about with our DNS and IP settings every day, and it's only a matter of typing the administrator login credentials once for that session. This UAC elevation has been around since Windows Vista but too many users still fire up their Windows Vista and Windows 7 computers unprotected in administrator mode, and are 15 of 17 23/10/2014 13:36
  • 16. InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm probably the sort of people who click away prompts without a second thought. To protect small organisations and their PCs - even if it's just a handful of machines - it's so easy to set up accounts for everyday use: Start | Control Panel | User Accounts Manage another account | Create a new account The elevated account doesn't have to be called "administrator" (and is probably best avoided anyway), but "installer" might be a friendlier name for users to understand what the new 'special' account is for. Obviously this admin or power user account should have a strong password. The user's account should be downgraded to a Standard User account. With this regime, malware attacks that arrive by email or from a web site stand less chance of gaining a foothold since the user has to type in the administrator password (assuming they've given been allowed that privilege), so it's a more conscious act that simply clicking a button that says "OK". This simple technique means the user or organisation isn't relying entirely on updated anti-virus as a means of defence, but still allows them an avenue for installing new programs. ** try it now ** More Clicks of the Trade Bookmark ^ Back to contents ^ Overview of InfoBulletin InfoBulletin is written and published by Co-Operative Systems and contains Information Technology tips that we come across during everyday research and support activities and which may be useful in improving your IT operations, either internally or on the Internet. Opinions expressed within InfoBulletin do not necessarily represent the views of Co-Operative Systems. E&OE Viewing IB This bulletin is presented as a Web page (in HTML) that can be read in any standard browser and most email clients. It is written in a compact format for fast viewing, short download time and ease of use for mobile computers. Printing IB If you prefer to read IB on paper (hopefully recycled!), think about pulling down the File | Print Preview menu in your browser and just printing the sheets you want. Implementation InfoBulletin topics can be implemented by Co-Operative Systems on a chargeable basis or via Facilities Management (FM) for Subscriptions At any time you can change your subscriber address or stop receiving InfoBulletin altogether by changing your subscriber preferences or by visiting www.coopsys.net/bulletin. Links in the original email message body allow you to forward this issue to a friend, colleague or associate without subscribing them. ^ Back to contents ^ Contact details Sales & Enquiries: 020 7793 0395 team@coopsys.net Support: 020 7793 7877 support@coopsys.net Fax: 020 7735 6472 Fax us via email Web: http://www.coopsys.net Privacy Under no circumstances does Co-Operative Systems supply lists of customers to other organisations. Read our Privacy Policy in full. 16 of 17 23/10/2014 13:36
  • 17. InfoBulletin October 2014 - Smartwatches watching you?, Blanket Wi-F... http://www.coopsys.net/downloads/infobulletin_oct14.htm those with rolling work programmes. Archives and Index Read recent and past issues of InfoBulletins on the Web at www.coopsys.net/bulletin or search our archives and subject index. We hope you found InfoBulletin useful! If you would like to comment on any of the articles or request particular subjects to be covered, mail us here. CO-OPERATIVE SYSTEMS Interpreting Information Technology 17 of 17 23/10/2014 13:36