Wednesday 16 September 2009

The reality or the Independent mobility platform

In just 10 years, the wireless smartphone market has gone from virtually nonexistent to becoming a household term worldwide. At the start of the millennium, Research in Motion (RIM) was pretty much the only significant vendor selling what were then called "wireless PDAs." Today, there are no less than six major operating systems for smartphones. Currently, they account for 14 percent of overall mobile device sales, but it is expected that by 2012 they will make up about 37 percent of global handset sales.

Today, scores of smartphones are offered on the market, offering consumers and businesses a wide variety of options for both personal and enterprise needs. However, they have also presented a challenge for organizations looking to deploy enterprise-wide mobile solutions. Given all the device choices, as a business or IT executive, what are you to do?

If you have already embraced mobility for your workforce, great! However, there are a number of new smartphones coming to market at a breakneck pace that enterprises are trying to seamlessly integrate into their strategy. Conversely, many organizations have yet to implement a mobility strategy of any kind because of the daunting number and constantly evolving amount of choices on the market. How can you ensure that your investment is not obsolete by the time you deploy?

Platform is the answer

What's the answer to both scenarios just mentioned? In a word: platform. When planning a mobility strategy, the natural inclination may be to start with one device type and lock into it for simplicity and manageability. But today's hot device could be tomorrow's paperweight. A platform approach to mobility can minimize the dependency on the device by ensuring that new devices and technologies are easily integrated into the mobile solution.

Using a mobility platform, IT does not have to use multiple software tools to manage users and applications across multiple device types. They are freed up to design and deploy the best possible applications without being constrained by device limitations or management and control concerns—today and in the future. Also, because IT can easily manage multiple types of smartphones, business users can choose the appropriate device type for their work profile without overburdening IT resources.

With the ability to adopt anything from a rugged Windows Mobile device for technicians to a BlackBerry for salespeople or an iPhone for management, business units can use whatever devices best suit the job at hand and the unique wants and needs of the users. This freedom of choice will help to drive adoption and increase the usability and effectiveness of the applications on workers' devices.

When an enterprise adopts a mobility platform that supports multiple mobile devices, it provides its employees with unprecedented tools for productivity and efficiency. It also empowers IT to discover and create new applications to maximize mobility from end-to-end.

The reality or the Independent mobility platform

In just 10 years, the wireless smartphone market has gone from virtually nonexistent to becoming a household term worldwide. At the start of the millennium, Research in Motion (RIM) was pretty much the only significant vendor selling what were then called "wireless PDAs." Today, there are no less than six major operating systems for smartphones. Currently, they account for 14 percent of overall mobile device sales, but it is expected that by 2012 they will make up about 37 percent of global handset sales.

Today, scores of smartphones are offered on the market, offering consumers and businesses a wide variety of options for both personal and enterprise needs. However, they have also presented a challenge for organizations looking to deploy enterprise-wide mobile solutions. Given all the device choices, as a business or IT executive, what are you to do?

If you have already embraced mobility for your workforce, great! However, there are a number of new smartphones coming to market at a breakneck pace that enterprises are trying to seamlessly integrate into their strategy. Conversely, many organizations have yet to implement a mobility strategy of any kind because of the daunting number and constantly evolving amount of choices on the market. How can you ensure that your investment is not obsolete by the time you deploy?

Platform is the answer

What's the answer to both scenarios just mentioned? In a word: platform. When planning a mobility strategy, the natural inclination may be to start with one device type and lock into it for simplicity and manageability. But today's hot device could be tomorrow's paperweight. A platform approach to mobility can minimize the dependency on the device by ensuring that new devices and technologies are easily integrated into the mobile solution.

Using a mobility platform, IT does not have to use multiple software tools to manage users and applications across multiple device types. They are freed up to design and deploy the best possible applications without being constrained by device limitations or management and control concerns—today and in the future. Also, because IT can easily manage multiple types of smartphones, business users can choose the appropriate device type for their work profile without overburdening IT resources.

With the ability to adopt anything from a rugged Windows Mobile device for technicians to a BlackBerry for salespeople or an iPhone for management, business units can use whatever devices best suit the job at hand and the unique wants and needs of the users. This freedom of choice will help to drive adoption and increase the usability and effectiveness of the applications on workers' devices.

When an enterprise adopts a mobility platform that supports multiple mobile devices, it provides its employees with unprecedented tools for productivity and efficiency. It also empowers IT to discover and create new applications to maximize mobility from end-to-end.

The reality or the Independent mobility platform

In just 10 years, the wireless smartphone market has gone from virtually nonexistent to becoming a household term worldwide. At the start of the millennium, Research in Motion (RIM) was pretty much the only significant vendor selling what were then called "wireless PDAs." Today, there are no less than six major operating systems for smartphones. Currently, they account for 14 percent of overall mobile device sales, but it is expected that by 2012 they will make up about 37 percent of global handset sales.

Today, scores of smartphones are offered on the market, offering consumers and businesses a wide variety of options for both personal and enterprise needs. However, they have also presented a challenge for organizations looking to deploy enterprise-wide mobile solutions. Given all the device choices, as a business or IT executive, what are you to do?

If you have already embraced mobility for your workforce, great! However, there are a number of new smartphones coming to market at a breakneck pace that enterprises are trying to seamlessly integrate into their strategy. Conversely, many organizations have yet to implement a mobility strategy of any kind because of the daunting number and constantly evolving amount of choices on the market. How can you ensure that your investment is not obsolete by the time you deploy?

Platform is the answer

What's the answer to both scenarios just mentioned? In a word: platform. When planning a mobility strategy, the natural inclination may be to start with one device type and lock into it for simplicity and manageability. But today's hot device could be tomorrow's paperweight. A platform approach to mobility can minimize the dependency on the device by ensuring that new devices and technologies are easily integrated into the mobile solution.

Using a mobility platform, IT does not have to use multiple software tools to manage users and applications across multiple device types. They are freed up to design and deploy the best possible applications without being constrained by device limitations or management and control concerns—today and in the future. Also, because IT can easily manage multiple types of smartphones, business users can choose the appropriate device type for their work profile without overburdening IT resources.

With the ability to adopt anything from a rugged Windows Mobile device for technicians to a BlackBerry for salespeople or an iPhone for management, business units can use whatever devices best suit the job at hand and the unique wants and needs of the users. This freedom of choice will help to drive adoption and increase the usability and effectiveness of the applications on workers' devices.

When an enterprise adopts a mobility platform that supports multiple mobile devices, it provides its employees with unprecedented tools for productivity and efficiency. It also empowers IT to discover and create new applications to maximize mobility from end-to-end.

Tuesday 15 September 2009

Business War : Microsoft vs Linux

Microsoft is apparently teaching Best Buy employees that Windows 7 beats Linux in every category imaginable. At this point, everything looks fine. Microsoft is simply going to explain the pros of running Windows over Linux.

windows_linux_bb_3.png

First we see, according to Microsoft, that Linux has poor support for cameras, iPods and MP3s. Really? Have they tried to compare with Linux Audio player such as Audacious, Banshee, BMP (Beep Media Player), Amarok. Read more Linux audio information. Click here.

Microsoft also claims that Linux user can’t use video chat on desktop Linux. Is it really true ? Linux can run Ekiga and Skype for video chat on Linux all the time. How about Windows Live ? Does Linux user really need that application ? I don’t know… :) Linux doesn’t offer free downloads? Hello !!… The actual operating system is a free download!

windows_linux_bb_9.png

This is where Microsoft should have stopped. Linux does indeed offer a ton of updates, and they’re easy to download and install.

windows_linux_bb_10.png

This is probably the most controversial part of all the slides. Microsoft has somehow managed to imply, without actually saying it, that Windows 7 is more secure than Linux.


Look, nobody’s saying Linux is perfect for every consumer (or even most), but Microsoft’s “training material” for Best Buy employees casts the open source operating system in a bit of a bad light — and isn’t exactly accurate.

What is it with Microsoft? What wrong with giant Microsoft ? Why are they so frightened of desktop Linux that they have to resort to this kind of propaganda? Maybe Microsoft knows something that most of its Windows users don’t: given a fair shot, many users would switch to Linux. I dont know what Microsoft was attempting to accomplish with this, I bet they spent way more money on this campaign than they were losing from Linux sales.

Source : ERM Blog

Business War : Microsoft vs Linux

Microsoft is apparently teaching Best Buy employees that Windows 7 beats Linux in every category imaginable. At this point, everything looks fine. Microsoft is simply going to explain the pros of running Windows over Linux.

windows_linux_bb_3.png

First we see, according to Microsoft, that Linux has poor support for cameras, iPods and MP3s. Really? Have they tried to compare with Linux Audio player such as Audacious, Banshee, BMP (Beep Media Player), Amarok. Read more Linux audio information. Click here.

Microsoft also claims that Linux user can’t use video chat on desktop Linux. Is it really true ? Linux can run Ekiga and Skype for video chat on Linux all the time. How about Windows Live ? Does Linux user really need that application ? I don’t know… :) Linux doesn’t offer free downloads? Hello !!… The actual operating system is a free download!

windows_linux_bb_9.png

This is where Microsoft should have stopped. Linux does indeed offer a ton of updates, and they’re easy to download and install.

windows_linux_bb_10.png

This is probably the most controversial part of all the slides. Microsoft has somehow managed to imply, without actually saying it, that Windows 7 is more secure than Linux.


Look, nobody’s saying Linux is perfect for every consumer (or even most), but Microsoft’s “training material” for Best Buy employees casts the open source operating system in a bit of a bad light — and isn’t exactly accurate.

What is it with Microsoft? What wrong with giant Microsoft ? Why are they so frightened of desktop Linux that they have to resort to this kind of propaganda? Maybe Microsoft knows something that most of its Windows users don’t: given a fair shot, many users would switch to Linux. I dont know what Microsoft was attempting to accomplish with this, I bet they spent way more money on this campaign than they were losing from Linux sales.

Source : ERM Blog

Business War : Microsoft vs Linux

Microsoft is apparently teaching Best Buy employees that Windows 7 beats Linux in every category imaginable. At this point, everything looks fine. Microsoft is simply going to explain the pros of running Windows over Linux.

windows_linux_bb_3.png

First we see, according to Microsoft, that Linux has poor support for cameras, iPods and MP3s. Really? Have they tried to compare with Linux Audio player such as Audacious, Banshee, BMP (Beep Media Player), Amarok. Read more Linux audio information. Click here.

Microsoft also claims that Linux user can’t use video chat on desktop Linux. Is it really true ? Linux can run Ekiga and Skype for video chat on Linux all the time. How about Windows Live ? Does Linux user really need that application ? I don’t know… :) Linux doesn’t offer free downloads? Hello !!… The actual operating system is a free download!

windows_linux_bb_9.png

This is where Microsoft should have stopped. Linux does indeed offer a ton of updates, and they’re easy to download and install.

windows_linux_bb_10.png

This is probably the most controversial part of all the slides. Microsoft has somehow managed to imply, without actually saying it, that Windows 7 is more secure than Linux.


Look, nobody’s saying Linux is perfect for every consumer (or even most), but Microsoft’s “training material” for Best Buy employees casts the open source operating system in a bit of a bad light — and isn’t exactly accurate.

What is it with Microsoft? What wrong with giant Microsoft ? Why are they so frightened of desktop Linux that they have to resort to this kind of propaganda? Maybe Microsoft knows something that most of its Windows users don’t: given a fair shot, many users would switch to Linux. I dont know what Microsoft was attempting to accomplish with this, I bet they spent way more money on this campaign than they were losing from Linux sales.

Source : ERM Blog

Thursday 10 September 2009

Microsoft open threats to global network security?

Beginning with the release of Windows Vista, Microsoft has enable by default IPV6 protocol, and the policy will continue on the new baby-born windows 7. Among those reasons behind is that one of the Microsoft service requires IPV6, called Windows Meeting Space, which is peer-to-peer networks. What we are wondering now is that whether around 300 million users are aware on the IPV6 enable by default on their operating system? Is it really a threats if we just lets IPV6 running on our laptop? Lets see what network attackers can do ….

Considering the most serious issues of running a dual stack comprised of IPv6 and IPv4. Here’s what they said:

  • Rogue IPv6 traffic: Attackers realize that most network administrators aren’t monitoring IPv6 traffic or they can’t. Because existing firewalls, IDS, or network management tools aren’t IPv6-aware. Therefore, an attacker can send malicious traffic to any computer running IPv6 and it will get through.
  • IPv6 tunneling: Protocols such as Teredo and Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) encapsulate IPv6 packets inside IPv4 packets. The morphed packets can easily pass through IPv4 firewalls and network address translation (NAT) equipment, defeating perimeter defenses purposed to sense and drop IPv6 packets.
  • Rogue IPv6 equipment: Because IPv6 uses auto-configuration, an attacker can gain considerable control over computers running IPv6, simply by placing a rogue device capable of issuing IPv6 IP addresses on the network under attack. To make matters worse the device could have router attributes. Forcing all traffic to transit through it, allowing attackers to snoop, modify, or drop traffic at their whim.
  • Built-in ICMP and multicast: Unlike IPv4, IPv6 requires ICMP and multicast traffic. That fact will significantly change how administrators approach network security. Right now, blocking ICMP and multicast traffic on IPv4 networks is the accepted practice. That will no longer work and complicated filtering of ICMP and multicast packets will be required to maintain some semblance of security.

Whether to leave IPV6 enable or not, we got both different camp of opinions. Some says need and some says no. But the most secured is that and for me, if I got laptop with IPV6 enable, I just turn it off. If you dont know how to turn it off, just follow the below link:

Disable IPv6 in Linux

Disable IPv6 in Windows Vista

Disable IPv6 in Mac OS X

Microsoft open threats to global network security?

Beginning with the release of Windows Vista, Microsoft has enable by default IPV6 protocol, and the policy will continue on the new baby-born windows 7. Among those reasons behind is that one of the Microsoft service requires IPV6, called Windows Meeting Space, which is peer-to-peer networks. What we are wondering now is that whether around 300 million users are aware on the IPV6 enable by default on their operating system? Is it really a threats if we just lets IPV6 running on our laptop? Lets see what network attackers can do ….

Considering the most serious issues of running a dual stack comprised of IPv6 and IPv4. Here’s what they said:

  • Rogue IPv6 traffic: Attackers realize that most network administrators aren’t monitoring IPv6 traffic or they can’t. Because existing firewalls, IDS, or network management tools aren’t IPv6-aware. Therefore, an attacker can send malicious traffic to any computer running IPv6 and it will get through.
  • IPv6 tunneling: Protocols such as Teredo and Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) encapsulate IPv6 packets inside IPv4 packets. The morphed packets can easily pass through IPv4 firewalls and network address translation (NAT) equipment, defeating perimeter defenses purposed to sense and drop IPv6 packets.
  • Rogue IPv6 equipment: Because IPv6 uses auto-configuration, an attacker can gain considerable control over computers running IPv6, simply by placing a rogue device capable of issuing IPv6 IP addresses on the network under attack. To make matters worse the device could have router attributes. Forcing all traffic to transit through it, allowing attackers to snoop, modify, or drop traffic at their whim.
  • Built-in ICMP and multicast: Unlike IPv4, IPv6 requires ICMP and multicast traffic. That fact will significantly change how administrators approach network security. Right now, blocking ICMP and multicast traffic on IPv4 networks is the accepted practice. That will no longer work and complicated filtering of ICMP and multicast packets will be required to maintain some semblance of security.

Whether to leave IPV6 enable or not, we got both different camp of opinions. Some says need and some says no. But the most secured is that and for me, if I got laptop with IPV6 enable, I just turn it off. If you dont know how to turn it off, just follow the below link:

Disable IPv6 in Linux

Disable IPv6 in Windows Vista

Disable IPv6 in Mac OS X

Microsoft open threats to global network security?

Beginning with the release of Windows Vista, Microsoft has enable by default IPV6 protocol, and the policy will continue on the new baby-born windows 7. Among those reasons behind is that one of the Microsoft service requires IPV6, called Windows Meeting Space, which is peer-to-peer networks. What we are wondering now is that whether around 300 million users are aware on the IPV6 enable by default on their operating system? Is it really a threats if we just lets IPV6 running on our laptop? Lets see what network attackers can do ….

Considering the most serious issues of running a dual stack comprised of IPv6 and IPv4. Here’s what they said:

  • Rogue IPv6 traffic: Attackers realize that most network administrators aren’t monitoring IPv6 traffic or they can’t. Because existing firewalls, IDS, or network management tools aren’t IPv6-aware. Therefore, an attacker can send malicious traffic to any computer running IPv6 and it will get through.
  • IPv6 tunneling: Protocols such as Teredo and Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) encapsulate IPv6 packets inside IPv4 packets. The morphed packets can easily pass through IPv4 firewalls and network address translation (NAT) equipment, defeating perimeter defenses purposed to sense and drop IPv6 packets.
  • Rogue IPv6 equipment: Because IPv6 uses auto-configuration, an attacker can gain considerable control over computers running IPv6, simply by placing a rogue device capable of issuing IPv6 IP addresses on the network under attack. To make matters worse the device could have router attributes. Forcing all traffic to transit through it, allowing attackers to snoop, modify, or drop traffic at their whim.
  • Built-in ICMP and multicast: Unlike IPv4, IPv6 requires ICMP and multicast traffic. That fact will significantly change how administrators approach network security. Right now, blocking ICMP and multicast traffic on IPv4 networks is the accepted practice. That will no longer work and complicated filtering of ICMP and multicast packets will be required to maintain some semblance of security.

Whether to leave IPV6 enable or not, we got both different camp of opinions. Some says need and some says no. But the most secured is that and for me, if I got laptop with IPV6 enable, I just turn it off. If you dont know how to turn it off, just follow the below link:

Disable IPv6 in Linux

Disable IPv6 in Windows Vista

Disable IPv6 in Mac OS X