Escolar Documentos
Profissional Documentos
Cultura Documentos
12
CYBERTREND.COM
REIMAGINING
EVERYTHING
VERIZONS TAKE
ON DATA SECURITY,
ENTERPRISE MOBILITY,
& THE FUTURE OF THE
INTERNET OF THINGS
10
48
30 ENERGY
Energy efficiency and the environment
10 COVER STORY
How Dell became a one-stop enterprise shop
32 IT
IT and data center concerns
16 CLOUD
Cloud computing and cloud-based services
42 NETWORKING
Wired and wireless networking
22 MOBILITY
Mobile tech for doing business anywhere
48 SECURITY
Solutions and best practices for security
26 DATA
Methods for leveraging data and analytics
56 ELECTRONICS
High-end consumer electronics
58 TIPS
Advice for mobile professionals
CONTACT US
P.O. Box 82545
Lincoln, NE 68501
or
120 W. Harvest Drive
Lincoln, NE 68521
Copyright 2015 by Sandhills Publishing Company. CyberTrend is a registered trademark of Sandhills Publishing Company. All rights reserved.
Reproduction of material appearing in CyberTrend is strictly prohibited without written permission.
64% of organizations
have enhanced
customer experience
as the primary goal of
their big data projects
Uncertainty about
effectiveness remains,
as 43% of those investing
in big data arent certain
ROI will be positive
Professional services, such as application development, systems integration, and consulting, are currently the
main drivers of IoT (Internet of Things)
revenues, according to ABI Research.
However, says ABI, revenues will likely
shift to vendors offering software platforms and analytics solutions designed
to simplify the process of deriving the
most useful information from all of
the raw data that machines, sensors,
and other connected devices provide.
Ultimately, the goal of IoT connections
is the data, says Day Shey, vice president and IoT practice director with ABI
Research, and the IoT data and analytics market is set to grow the fastest
of any of the major IoT revenue categories. Well-established vendors will do
well, but so will startups, Shey adds.
Pew Research Center recently released its latest big (26-page) report about digital device ownership in the U.S., and while some things arent so surprising (most of us own
smartphones), other changes are more interesting. Here are some of the essential stats:
Desktop/Laptop Computer
Smartphone
Tablet Computer
92%
(Including Smartphones)
Down from
88% in 2010
73%
68%
45%
Consistently around
40% since 2008
40%
Game Console
40%
Ebook Reader
MP3 Player
19%
14%
STARTUPS
Startup Seeks To Optimize The
Digital World, Raises $58M
Its an understatement that most websites could probably be better, both for the
visitors and the folks running the sites.
For businesses seeking to get the most out
of their websites and provide customers
Cloud-Based Predictive
Marketing Startup Raises $65M
Improved Scalability
For Real-Time Big Data
Advanced Detection
For Advanced Attackers
Reimagining Everything
VERIZON TAKES ON COMMUNICATIONS, SECURITY, THE INTERNET OF THINGS & MORE
KEY POINTS
Verizons 4G LTE network
covers most of the United
States, including both highly
populated and rural areas.
Verizon recently released
a pair of new DROID devices
and also unveiled an Advanced
Calling feature for HD voice and
video calls.
Verizons enterprise mobility
services cover not just the
network, but mobile device and
application management.
Verizon also offers cloud,
colocation, hosting, and security
services, among other enterprise offerings.
10
11
Verizon has taken great strides to make sure its 4G LTE network is available in as many regions as possible, from large metropolitan areas to remote,
rural areas. This map shows U.S. coverage as of 2015.
An Intriguing Future
Perhaps more interesting than how
Verizons 4G LTE network is being used
today is how it could be used in the near
future. Verizon recently launched a mobile-first video streaming solution called
Go90 in an effort to offer its customers
more entertainment options, but the
company isnt strictly focused on making
existing LTE uses better. In fact, Verizon
has an entire internal team dedicated
to furthering the companys overall IoT
(Internet of Things) strategy and exploring how people can use the existing
network in new and exciting ways.
For example, Verizons recently announced Hum service, which came out
of the companys telematics group, enables customers to plug a device into
12
Enterprise Mobility
Best-known for its consumer-oriented
mobile offerings, Verizon is a major
player in the enterprise space as well. The
companys enterprise mobility portfolio
includes MAM (mobile application management) solutions, which help organizations better manage and control how
applications are used and secured, and
Verizons Mobile Workforce Manager, a
cloud-based service that helps companies
PROTECTING
ENTERPRISE DATA
In researching data breaches for its
2015 Data Breach Investigations
Report, Verizon found, with the
help of 70 contributing organizations, that there were more than
79,790 security incidents that
resulted in 2,122 confirmed data
breaches in 2014 alone. These
breaches hit a wide range of industries across the globe, but some of
the most targeted were the public
sector at 303 data breaches, the
financial services industry at 277
breaches, and the manufacturing
industry at 235 breaches.
This illustrates just how important it is for organizations to make
security a part of everything they
do. With this in mind, Verizon offers security services designed to
help companies before, during,
and after a cyberattack, even if it
involves a full-scale data breach.
Specific solutions and services
include asset and exposure management, security enforcement
and protection, identity and access
management, and risk and compliance management.
13
IN-HOME SOLUTIONS
In addition to mobile solutions,
Verizon offers in-home services for
customers in certain regions. The
company offers phone, Internet,
and television services as part of
its Fios product family, all backed
by Verizons fiber network. These
are all offered as separate services
or they can all be bundled together
in what Verizon calls the Triple
Play. This allows consumers to
pay one bill for all of their in-home
services rather than having to pay
three separates ones, and its a
helpful option for existing Verizon
customers that still want to have a
dedicated phone at home.
14
KEY POINTS
Many organizations arent
prepared for the disruption that
cloud adoption can bring.
Some companies may find
they need to adapt their operating model and company culture to shift to a cloud model.
Shifting to a cloud model can
impact employees but most
notably will likely impact IT staff
the most.
Despite the internal changes
that may accompany cloud
adoption, experts generally
agree that adopting a cloud a
model is still ultimately worth
the effort.
16
etc., many organizations dont operate assuming their technology has these attributes, he says.
Thus, companies adopting cloud solutions must ask how they need to operate differently to fully capitalize on cloud,
Anderson says. Those that do can potentially bring about a new era of innovation,
agility, growth, and competitiveness. Those
that stick to old, established operating
models likely wont reach their true cloud
potential. No matter what, introducing
cloud services will challenge the status quo
and almost always create some tension and
disruption in the organization, he says.
The following explores such disruption
and how companies can anticipate and
react to them.
lead to significant obstacles. Many companies, for example, use standard budget
cycles in which someone estimates at the
start of the year how much more technology the company will need, and then
allocates for spend throughout the year.
A cloud model, however, entails only
consuming whats needed and paying for
whats used. In general, Anderson says,
when extending services that are running
on-premises to an external cloud service,
the assumptions companies have fall apart
and potentially cause numerous problems.
The Impact
Broadly, implementing a cloud model
can potentially disrupt everyone in an organization, although if done correctly, disruption can prove beneficial to purchasing,
skills enablement, architecting solutions,
IT management, and enabling IT to help
employees work differently. Longbottom
says processes can become far more dynamic, thus impacting how marketing
and sales approach their markets; workers
can more easily try to drop or continue
new functions and capabilities, thereby
impacting business development; and developers can move to a continuous delivery, DevOps model to meet the needs of
a highly dynamic business.
Typically, cloud disruption most acutely
impact IT; application migration and compatibility; data migration, management,
and integration; and security, Anderson
says. Beyond adapting to manage technological aspects of the cloud, IT will need
to manage relationships and details concerning external services and cloud providers delivering those services, which may
require developing new skills.
Bartoletti says organizations may need
to increase investments in training for
17
18
KEY POINTS
XaaS helps companies gain
agility and flexibility and reduce
infrastructure responsibilities.
Some experts believe that to
be competitive in their markets,
vendors using traditional licensing models will need to add
as-a-service offerings.
Noteworthy XaaS offerings
include business process, database, desktop, security, and
unified communications.
Adopting an XaaS-centric
strategy can enable internal IT
organizations and businesses
to focus their efforts on whats
core to their business.
Often whats top of mind among executives when it comes to accessing all
these service types, says Colm Keegan,
Enterprise Strategy Group senior analyst, is determining which of them have
demonstrative value in terms of helping
their companies do things faster and
with greater agility. CEOs are seeing the
market changing so quickly, and their
businesses are entering spaces theyve
never been before, he says. Their motivation in embracing XaaS is helping ensure their companies have the ability to
react as opportunities emerge and compete effectively, he says.
Undoubtedly, embracing an XaaS
mentality has its benefits, including
helping companies reduce capital investments in infrastructure and enabling
quicker times to market, greater flexibility and ease in provisioning, and easily
accessing resources remotely. Although
SaaS, PaaS, and IaaS are the most familiar
19
20
COLM KEEGAN
Senior Analyst
Enterprise Strategy Group
Exciting Times
A key component driving companies toward meeting their needs in an
XaaS-centric manner is the desire to
focus their efforts on whats core to their
businesses as opposed to infrastructures.
Anything not core is often just as easy to
outsource, Keegan says. Moreover, doing
so can enable seeking out new areas to
enter relative, peripheral, or outside the
companys own market. Its kind of a
de-cluttering process, he says. There
are easier, more consumable ways of
obtaining services as or arguably more
reliably than they can do themselves,
Keegan says.
Interestingly, some XaaS offerings,
such as health care as a service, are extremely industry-specific. Although such
offerings will have a less broad consumption base, this doesnt make them necessarily less valuable. Thats really what it
comes down to, says Keegan. If theres
a service you can consume that will help
you save money and enable you to have
a laser focus on your business, there are
probably some legs to it.
Something to note concerning XaaS,
however, is that just because a provider
dubs its service as cloud, that doesnt
make it so. Anderson says he believes
many vendors brand services cloud as a
threat management; and abilities addressing email and Web security, virus
scans, Web content and URL blocking,
spam, IAM (identity access management), and application security testing.
Like Bartoletti and Anderson,
Keegan views DaaS as something worth
considering. Essentially, DaaS is a form
of VDI (virtual desktop infrastructure)
a cloud provider hosts and offers via
subscription basis. Unlike a traditional
on-premises solution in which internal
IT would manage the VDI, DaaS typically entails a provider managing the
companys storage, backups, data security, upgrades, application support,
etc. Furthermore, DaaS enables users to
easily access data and applications from
anywhere and from any supported device. Overall, Keegan says, ESG still sees
desktops as something largely managed
on-premises. I think theres a market
for DaaS, but its probably going to be
applicable to newer companies that are
walking in without a sunken investment
in that infrastructure, he says.
Another as-a-service trend Keegan
believes has possible staying power is
DBaaS due to the practical uses and
flexibility it offers. For example, depending on the database vendor, he
says, youre not locked into either
way. You can consume it anyway you
want, including as a hybrid model. I
think thats what a lot of business are
shooting for. They want a combination
of things they can manage as well as
things they can push into the cloud.
Keegan points to one vendors DBaaS
offering as an example. A company
looking to perform, say, testing and development, could launch an instance of
the vendors database in its cloud space
in conjunction with what the company
has running on-premises. Unlike traditional IaaS, in which a company acquires
compute, storage, etc. but must still load
development tools and data before getting started, the vendor combines IaaS
with PaaS and a cloud database instance.
A Change In Tradition
In addition to influencing companies that are adopting as-a-service
strategies, the XaaS concept is impacting vendors that have traditionally sold products vs. individual
services. Traditional software companies must rethink licensing models,
says Bartoletti. Pay-per-use and selfservice access are the hallmarks of asa-service, and depending on the age
and penetration of an existing product,
it can be quite difficult for a vendor
to make the switch to completely new
licensing models.
Overall, many companies now
simply prefer purchasing a subscription and love it when they can consume their technologies as service,
says Anderson. This makes XaaS offerings an important part of the market
opportunity, he explains. In fact, he
adds, as-a-service is growing at rates
much faster than the traditional markets. If you extrapolate the trends, its
unlikely that technology vendors will
be able to compete over the long term
without an as-a-service option for
their offerings, he says.
21
KEY POINTS
BYOD (bring your own device)
growth hasnt been as dramatic
as expected, especially in larger
enterprises.
Many companies dont have
mobility or BYOD teams in
place, and therefore dont have
formal BYOD policies.
Security and compliance are
two major barriers to BYOD
adoption, but cloud integration is also contributing to the
slower growth of BYOD.
Businesses using BYOD are
seeing improved employee
productivity, better IT support
efficiency, and cost savings.
22
BYOD (BRING YOUR OWN device) policies are often discussed because they
have the potential to save money and
minimize the burden on IT teams. And
although many businesses have found
success with BYOD, the adoption of
such programs isnt growing as much as
some anticipated.
In its recent Building Digital
Organizations report, CTIA points
out that the number of companies with
no BYOD policy at all is trending upward. In fact, from 2013 to 2015, the
percentage of organizations that dont
allow BYOD rose from 34% to 53%.
And while there are a variety of reasons
why businesses are finding it difficult to
adopt BYOD, some of the most basic
challenges relate to the immaturity of
BYOD policies in general, and the fact
that some enterprises simply arent prepared to do everything it takes to support such a policy.
bring in their own devices for businessrelated needs, says McClure. Another
third have no policy in place, but they do
allow it. And then another third says they
dont have a policy place and employees
arent allowed to use their own devices.
Some of this split is due to companies
from different industries being unable to
implement it for compliance reasons or
due to the nature of the industry. If youre
in a highly regulated industry, like banking,
financial, or health care, then BYOD is
probably not going to be the solution that
your organization is looking for, says
Bryan Bassett, research analyst at IDC.
You have regulatory statutes and HIPAA,
so having an employee bring their own
device in to work probably isnt going to
be the best solution. The same could be
said for industries like manufacturing or
shipping and logistics. These devices are
mission-critical to the company and they
need to be used in fairly unforgiving environments, so you might not want to bring
your phone thats worth hundreds of dollars into that type of environment.
the VPN (virtual private network) and inside the firewall, but with BYOD the device is outside of ITs control. She says
businesses struggle to convince employees
to put MDM (mobile device management)
solutions on their personal devices for security, because they dont want the company controlling, seeing, and managing all
of the data thats on there.
To combat this issue, companies are
starting to take advantage of application
management, app wrapping, and containerization technologies to essentially separate personal and corporate data on the
device. However, many of these technologies are relatively new, so many organizations are just beginning to investigate how
to use them to help embrace enterprise
mobility and BYOD.
Another barrier to BYOD adoption relates to general integration into the IT in-
23
24
GO DEEP
KEY POINTS
Ethical data usage concerns
range from privacy issues and
making poor business decisions
to potentially endangering lives.
Following the law is a good
start, but maintaining legality
wont necessarily prevent you
from being unethical.
Its important to not only
create a strong internal ethics
policy, but to also build a culture of honesty and loyalty.
Data scientists should consider following a professional
code of conduct to help them
avoid unethical practices and
properly guide the business.
26
it may be viewed as an invasion of privacy and could result in the loss of a customer. And even though the U.S. doesnt
have the strongest laws around privacy,
the European Union and other countries
have more stringent privacy laws, says
Michael Walker, co-founder and president of the Data Science Association. This
means, depending on where youre practicing analytics, that it can be easy to shift
from unethical to illegal.
Although privacy is a major concern
for some consumers, it isnt necessarily the
most significant risk associated with big
data analytics. In fact, according to Walker,
perhaps the biggest issue has to do with
improper use of data, and making faulty
assumptions that lead to business leaders
making ill-informed decisions. However,
this works both ways. On one hand, a data
scientist may make the mistake and give
the executive team bad information, which
will lead to a less than sound business
Illegal, Unethical
& Everything In Between
The problem with thinking in legal
terms with data analytics is that because
27
28
Greenovations
ENERGY-CONSCIOUS TECH
The technologies
that make our
lives easier also
produce some
unwanted side
effects on the
environment.
However, many
researchers,
manufacturers,
and businesses
are developing
solutions that are
designed to keep
us productive
while reducing
energy demands
to lessen our impact on the environment. Here's
a look at some of
the newest such
initiatives.
If current projections hold true, the worlds top energy consumers will also greatly increase their
renewable energy and nuclear energy production over the next 15 years.
30
Lawrence Livermore National Laboratory postdoc Jianchao Ye (foreground) and Morris Wang are
two members of the 13-scientist team who developed a method for improving the lifespan and
performance of lithium-ion batteries. (Image courtesy of Livermore.)
A prototype for a new wind turbine design cuts
wind energy costs to about 12 cents per kWh.
Lithium-ion batteries are found in nearly every kind of mobile device these
days, offering the best all-around option available in terms of energy capacity,
rechargability, small size, and cost. In the evolution of portable rechargeable batteries, li-ion versions are significantly better in many circumstances
than the nickel-cadmium and lead-acid batteries developed before them.
There remains, however, the pursuit of a better, longer-lasting charge. With
that goal in mind, scientists at the Lawrence Livermore National Laboratory
have discovered a way to make li-ion batteries operate faster and last longer:
use hydrogen.
One problem with the large-scale production of li-ion batteries, which relies
on the use of graphene materials, has been that the chemical process used in
manufacturing leaves leftover atomic hydrogen, according to the Livermore
scientists. We found a drastically improved rate capacity in graphene nanofoam electrodes after hydrogen treatment, said Brandon Wood, co-author of
the paper about this discovery
at Livermore. In other words,
adding hydrogen improves the
speed and life of li-ion batteries.
The performance improvement
weve seen in the electrodes is a
breakthrough that has real-world
applications, says lead author
Jianchao Ye. Overall, this discovery dashes earlier suggestions
that the capabilities of li-ion bat- Paper co-author Jianchao Ye holds up a hydrogenteries were rapidly approaching treated li-ion battery. (Image courtesy of Livermore.)
their limits.
In the Canary Islands, wind energy costs about 24 cents per kilowatt
hour to produce, according to the
Universitat Politcnica de Catalunyas
Department of Civil and Environmental
Engineering. But researchers there
have devised a new floating structure
for supporting offshore wind turbines
that cuts that cost in half. The prototype
for the structure, called WindCrete,
is cylindrical in shape and includes a
float and a ballast to remain both afloat
and stable. In addition to the innovative shape, the structure uses concrete
instead of the steel that floating wind
turbines typically use. The researchers
behind the project say that concrete
fares better than steel in a marine environment (lasting about 50 years), and
that the construction cost for the concrete prototype is roughly 60% of what
it would cost were it made of steel. The
researchers recently announced the design had been built and patented.
31
KEY POINTS
Outsourcing IT is on the rise,
especially as companies acquire
new technologies.
Cementing a solid customerprovider relationship with an
IT outsource provider is key to
successful outsourcing.
Although IT service providers
have technical expertise, some
lack specialized business
knowledge, which can impact
business-specific IT functions.
One complexity in outsourcing IT: integrating the
external providers services into
the organizations existing environment for managing services.
32
A Current Perspective
Organizations outsource IT operations for numerous reasons, including
to save costs and improve their technology foundation in an affordable
manner. Others seek to revamp their
infrastructure to launch a new business initiative or simply to place development, maintenance, support, and
33
The Complexities
IT-related headaches that outsourcing can alleviate can generally fall
into a few specific categories. One is
scalability. For many companies, its
easier to ramp up an IT services department thats outsourced vs. one
thats in-house. Another headache is
that IT operations consume in-house
resources that could otherwise be devoted to the organizations core competencies. You cant be an expert on all
things, Weaver says. Running an IT
department is something that demands
expertise, and if you dont have that expertise, why do it? You still rely on IT,
so why not outsource it?
Compared to decades ago when
starting a business essentially could
mean renting an office and buying
file cabinets and folders, a telephone,
and a typewriter, today computers,
servers, and mobile devices have replaced most, if not all, of these things.
Because of that change, you now need
providers that can help you set up and
manage not only the devices but the
data that sits or goes through those
devices, Weaver says. Thats why
I think youre seeing so many MSPs
We have external data to show that companies are spending on managed services and that it encompasses a variety
of vertical markets. Some are more aggressive in growth
than others, but its very prevalent, and it happens at all
levels of the spectrum: enterprise, mid-market and SMBs.
CHARLES WEAVER
CEO
MSPAlliance
34
technical experts, they may lack certain business knowledge. Benkel says
providers weakness in the area of
customers business or business understanding is why most sourcing strategies dictate that business-relevant and
business-strategic functions be done inhouse while technically relevant functions be outsourced. Conversely, many
organizations lack expertise in new
technologies to efficiently implement
infrastructures or automate service delivery. These are strong domains of
most external providers, Benkel says.
Weaver similarly says MSPs have
largely been technical organizations
for the last 20 years, with most coming
from engineering or IT backgrounds
but lacking training and skills in business areas. Theyve had to learn the
business side to supplement what they
already know, he says. As an industry,
MSPs are making very good strides,
however, and are learning to translate
the sometimes very technical into a
non-technical manner and explain
why what they do is very valuable,
he says.
Another complexity of outsourcing
IT is managing the relationship with
a provider. A company thats poor
at managing third-party relationships may have difficulties with even
the best provider. Weaver stresses the
importance of making the companyprovider relationship the foundation
of IT outsourcing. What you see most
commonly are customers that arent
sure what the capabilities of the provider are, he says. For example, a provider may indicate what functions it
will perform for the company but it
doesnt end up being exactly what was
described. Thus, the company ends
up saying, We really didnt get what
we wanted, so were going to another
MSP, Weaver says. MSPAlliance is
seeing organizations now on their
third, fourth, and sometimes fifth MSP
for such reasons.
Specific To IT
Compared to outsourcing other
types of processes or roles, outsourcing
IT can be more complex, although
All vendors and client organizations know how to manage and set up servers or PCs and do this in the same
way. Application services are more client-individualized,
however, meaning more complexity for vendors in terms
of learning the application and other issues.
WOLFGANG BENKEL
Principal Analyst
Forrest Research
35
KEY POINTS
Make sure you have a plan in
place that details what needs to
be done and who is in charge of
each step along the way.
Cost of moving and lifecycles
are two ideas to consider when
deciding whether to keep existing hardware or buy new.
Use a combination of physical
tapes and over-the-network updates to migrate data and apps
from one location to another.
Consolidation offers many
benefits, but without proper
guidance and communication, it
may take longer than usual and
you may not meet your goals.
36
Reasons To Consolidate
Companies decide to consolidate data
centers for different reasons. Perhaps the
Its like anything else; anything thats well thought out and
planned beforehand, generally the better off youll be after
the fact as opposed to rushing headlong into something
because there are some compelling events. You may be at
the end of a five-year lease at a major data center, youre
behind the 8-ball, and youre rushing to get out because
you dont want to incur penalties for overstaying your
lease. Those are the realities. As much as youd like to
prepare . . . sometimes it just doesnt happen that way.
COLM KEEGAN
Senior Analyst
Enterprise Strategy Group
37
38
What Components
To Upgrade & Why
Compared to laptop computers,
desktops provide IT departments with
a greater number of upgrade options.
As with laptops, upgrades to a desktop
computers memory or storage offer the
simplest and often the most productive opportunities for improvements.
Unlike laptops, however, desktops allow
for significant upgrades, such as changes
to motherboards, graphics processors,
optical drives, and power supply units.
39
Cleaning, Repairing
& Refurbishing
A desktops tower is essentially a case
that houses the computers components.
One nice aspect of this type of setup is
that towers are easy to open for cleaning,
repairing, and refurbishing purposes.
40
42
Internet Connection
A strong, stable Internet connection is the foundation on which you
will set up your guest Wi-Fi hotspot.
Having a good connection that works
properly will stave off potential questions and complaints, particularly if
you go out of your way to advertise
your free wireless network to customers or visitors. Pin down the approximate number of simultaneous
connections you expect the hotspot
to support at any given time and use
that figure to determine (1) what type
of Internet connection you need and
(2) what router capabilities are necessary to handle the expected amount
of traffic.
Not all Internet services are created
equal. For example, the most basic
Internet services available from ISPs
(Internet service providers), either
broadband or DSL (digital subscriber
Wireless Router
If you plan to use one wireless router
to support two separate networks, look
for a business-class router that supports
a maximum data transfer speed of at
least 300Mbps; some models will support much faster rates. The most recent
Wi-Fi standard available as we went to
press is 802.11ac, which can offer realworld data transfer rates of 600Mbps
and better when communicating with
devices using 802.11ac adapters.
A dual band router is a good option
because it operates on both the 2.4GHz
frequency (which most current and
older devices support) and the 5GHz
frequency (which 802.11n/ac devices
support, and which offers the fastest
data transfer speeds). Most dual-band
routers offer the choice of broadcasting
in 2.4GHz, 5GHz, or both simultaneously to support the widest range of
devices and prevent signal interference.
Many consumer- and business-oriented routers let you easily create two
separate networks: one you can use for
your companys internal network, and
one you can use to provide wireless
Internet access for guests with Wi-Fienabled devices. Wireless routers and
access points can range in price from
$20 to as much as $300 or more depending on their speed and feature sets,
so make sure you only pay for functionality that you and your customers or
visitors are likely to use.
Software
All wireless routers come with a software or firmware-based user interface
that enables you to change the routers
Setup
Once you have all of the hardware
and software you need for a Wi-Fi
hotspot, its time to get it up and running. Most mainstream routers sold in
the U.S. have software that is intuitive
to use and makes it simple to add a
guest hotspot. With some routers, its
as easy as clicking Yes during setup to
enable and allow guest access, but with
other routers you may need to follow
more steps or launch a special setup
wizard. Because there are variations in
this process depending on the device
and manufacturer, check the manual
for instructions specific to your router.
In the process of using the routers
software to establish a guest Wi-Fi
hotspot, you will discover relevant settings that provide you with further
control over the hotspot. Some devices
allow you to set specific days of the
week and ranges of time during which
the guest network can be accessed. Use
these settings to make sure the hotspot
is available when youre open for business and not available when youre
Security
Perhaps the most important thing to
think about when setting up a public
Wi-Fi hotspot is to make sure that your
guest hotspot is separate from your
company network. Most routers support WEP (Wired Equivalency Privacy),
WPA (Wi-Fi Protected Access), and
WPA2 technologies, which provide for
encryption and password protection.
Use one of these settings as a minimum
safeguard from potential unauthorized
access or abuse; we recommend using
WPA2 as it provides the best security.
From a guests perspective, Wi-Fi
security means that they will have to
select the SSID (service set identifier,
or network name) if it's visible, or type
it in when connecting if the SSID is
hidden, as well as enter a password
in order to log on to the network. To
simplify matters, make sure your guests
know how to obtain a password, and
change the password on a regular basis.
Requiring guest users to accept a ToS
(Terms of Service) agreement can also
be beneficial. You can do this by employing a captive portal, a common feature of business-class routers, which is
essentially a splash page users will see
on their device screen when logging on
to the network.
Other Considerations
Using router settings, you can impose bandwidth controls to protect
your other networks from experiencing
a bottleneck. You can also set guest
connection time limits and designate
which websites or applications are
permitted to use the hotspot and even
charge fees for using the hotspot. Once
you have installed any necessary hardware (routers, range extenders, and access points), adjusted the settings, and
turned on your guest Wi-Fi network,
its ready to be discovered and used.
43
OVER THE PAST 15 years, Wi-Fi technology has changed dramatically. Early
Wi-Fi specifications 802.11a (using the
5GHz frequency) and 802.11b (2.4GHz)
supported maximum speeds of 54Mbps
and 11Mbps, respectively, and had limited
range. Current and upcoming standards,
however, are pushing Wi-Fi well beyond
those limits. The now-popular 802.11ac,
for example, uses the 5GHz frequency
and offers speeds up to 1.3Gbps. Although
real-life data transfers are much slower
than these theoretical maximum speeds,
the leaps between 802.11b, 802.11n, and
802.11ac are quite noticeable, and nearfuture specifications stand to leave existing
Wi-Fi standards in the dust.
Alongside the changes in speed and
range, the Wi-Fi Alliance continues to add
features and functionality to Wi-Fi networks via its Wi-Fi CERTIFIED programs.
A Wi-Fi CERTIFIED logo indicates the
product has undergone rigorous testing
44
Wi-Fi Direct
Wi-Fi CERTIFIED Wi-Fi Direct is a
P2P (peer-to-peer) networking technology,
meaning that it doesnt require a router or
wireless hotspot to connect devices. With
Wi-Fi Direct, you are essentially creating
a dedicated Wi-Fi bridge between two devices thats protected by WPA2 security,
so you can safely send information back
and forth. To establish a Wi-Fi Direct connection, users can tap two NFC-capable
devices together, such as a pair of smartphones. You can also connect mobile computing devices, such as smartphones and
tablets, to compatible peripherals, such as
printers, and displays.
Business users in particular might appreciate the benefits of using Wi-Fi Direct,
Miracast
Building on Wi-Fi Direct (and in
fact using that exact P2P technology as
its foundation) is Miracast. The Wi-Fi
Alliance created Miracast as a certification program specifically for streaming
images and video between devices (such
as between two laptops, or from a tablet
to a large-screen display). Miracast is open
to any vendor, and there are scores of vendors and thousands of products that are
Miracast-certified. Smartphones, tablets,
ereaders, set-top boxes, laptops, projectors,
cameras, gaming devices, and displays are
among the types of products that manufacturers can design with Miracast certification in mind.
WMM Programs
Another way the Wi-Fi Alliance improves the quality and control over
streaming media is with its WMM (Wi-Fi
Multimedia) programs. WMM is essentially a quality of service function thats
built into Wi-Fi networks to help administrators monitor and prioritize certain
types of traffic. For instance, voice and
video require a steady connection with
low latency, whereas email or other less
demanding applications dont need quite
as much bandwidth.
Two other aspects of WMM are
WMM-Power Save and WMM-Admission Control. WMM-Power Save serves
two functions as it improves the battery
life of a mobile device and makes voice
calls over Wi-Fi more reliable. WMMAdmission Control focuses on improving
the quality of real-time data. It provides
bandwidth management tools, building on
the basic foundation of WMM and adds
advanced features and controls to categorize and prioritize network traffic in a
way that makes sense for the business
or consumer.
Passpoint
A Wi-Fi hotspot is a good way to get a
solid network connection when you are in
a public place, such as a restaurant, coffee
shop, hotel, airport, or even a retail store.
However, its sometimes difficult to find
the correct hotspot, let alone make a connection and know that it is secure. Wi-Fi
CERTIFIED Passpoint serves as a solution
to that problem by offering hotspot operators a way to provide a visitor with a secure
and seamless connection.
The idea behind Passpoint is that a mobile user signs up online for a given operators network and uses that account and its
built-in credentials to automatically connect to a WPA2-protected wireless hotspot
Wi-Fi Speeds
WiGig CERTIFIED
Wi-Fi speeds have continued to increase quite a bit over the past few years,
and there are no signs of that stopping any
time soon. In fact, the Wi-Fi Alliance anticipates there will be WiGig CERTIFIED
products capable of supporting multigigabit network speeds (potentially as high
as 7Gbps or more) in 2016. The Wi-Fi
Alliance and WiGig Alliance have been
working together on this project to make
sure the WiGig CERTIFIED products and
technologies are not only fast, but also
stand up to the same security and performance standards as traditional Wi-Fi
CERTIFIED solutions.
Frequency
802.11a
54Mbps
5GHz
802.11b
11Mbps
2.4GHz
802.11g
54Mbps
2.4GHz
802.11n
450Mbps
2.4GHz/5GHz
802.11ac
1.3Gbps
5GHz
60GHz
Voice Programs
The Wi-Fi Alliances Wi-Fi CERTIFIED
Voice Programs also take advantage of
the WMM programs but focus primarily
on voice quality, power consumption,
and security for both enterprise and personal voice applications. For the Wi-Fi
CERTIFIED Voice-Personal program,
voice applications are tested in the same
types of environments that you might
find in your home or in a small office. To
45
FOR THOSE WHO lack an extensive background in networking, NV (network virtualization) can be a difficult concept to grasp.
There is also considerable confusion about
its connection to SDN (software-defined
networking) and NFV (network functions
virtualization). Still, theres good reason why
executives should familiarize themselves
with NV. Although enterprises interest in
NV has stemmed primarily from a technical
perspective, thats changing as vendors are
positioning themselves to make business
cases for adopting their NV offerings.
Mark Tauschek, Info-Tech Research
Group associate vice president, infrastructure research practice, says in the near future, as enterprises ready themselves to
refresh their network infrastructures, any
vendor they work with will have NV on
the table. Anything youre going to purchase in your next refresh cycle is going
to support NV, and likely SDN, more
broadly, he says. You definitely need to
46
A Complicated Existence
Deciphering where NVs relationship
with NFV and SDN starts and stops can
be perplexing. NV is commonly described
as enabling an enterprise to slice a physical
network into several virtual ones that reside on the same infrastructure but remain
isolated. This is similar to how server virtualization permits creating multiple virtual
server instances on one physical server.
Matthew Ball, Canalys principal analyst,
describes NV as enabling the creation of
these dedicated, separate networks for different uses, applications, departments, and
more. For example, an enterprise could
create one virtual network for testing and
development purposes and others to meet
specific QoS (quality of service), performance, and security requirements for different business groups.
load balancers, WAN optimization controllers, and firewalls all in software form.
Basically, any network hardware has a
software counterpart, he says.
SDN, meanwhile, is considered to have
more to do with delivering automation
and programmability in complex network
environments by decoupling software (the
control plane) from hardware (the data
forwarding plane). Tauschek considers NV
a subset of SDN. NV isnt really about
running applications on your network infrastructure, he says. SDN is also about
essentially providing a signal point of control and policy control for the network
infrastructure. Obviously that makes use
of NV, but NV is really a subset of SDN."
The Market
Implementation- and technologywise, NV is still in its early stages. Doyle
writes, however, that because using NV
software as an overlay to existing network
infrastructure offers a fairly easy option to
alleviate virtual machine networking challenges, he expects NV adoption to strongly
increase throughout 2015 and 2016. Doyle
explains that adoption will depend on
pricing, standards, the open-source im-
NETWORK VIRTUALIZATION ALLOWS SERVICES TO EXIST RIGHT NEXT TO APPLICATIONS AND DATA IN THE VIRTUAL WORLD,
INSTEAD OF APPLIANCES DANGLING OFF
THE NETWORK.
ANDRE KINDNESS
There are a number of people who believe some performance abilities and security controls with NV dont equal those of
hardware. Here, Kindness says organizations should have solid processes and controls in place before using NV. Because NV
is nebulous, he says, more due diligence
around procuring, deployment, and management is required.
As with server or storage virtualization,
monitoring can be an issue with NV in
terms of usage and running up against
capacity, which will impact performance.
If you go this direction, you have to
monitor your infrastructure more closely,
Tauschek says.
Where security and NV relate, arguments go both ways, says Tauschek, who
tends to believe NV is better for security,
as most problems we have with security
are human error. Often, for example,
security problems result from someone
misconfiguring something. Standardizing
policies across different groups of applications, servers, and infrastructure is easier
47
KEY POINTS
BCDR is just as much about
protecting your business from
small failures as it is about preparing for major disasters.
Performing a business impact
analysis and risk assessment
will help you prioritize systems
and applications to meet recovery time objectives.
There are different BC solutions to choose from, including
internal software and cloudbased alternatives.
SMBs may require more help
and expertise from providers
than large enterprises, but the
base needs are similar.
48
ITS SAFE TO SAY that BC (business continuity) is a major concern for every organization in existence. You work so hard
to build up your company and make it a
success, so of course youll do anything in
your power to keep it operating at a high
level. Unfortunately, no matter how wellprepared you are and what precautions
you have in place, there will undoubtedly
be instances where you need to recover
from an outage or a full-blown disaster as
quickly as possible. Its in those situations
where your BC plan and incident response
will be put to the test. How well you respond and rebound ultimately depends
on how you have prepared and what solutions or services you have in place, as well
as the resiliency of your infrastructure
and employees.
Why BC Is So Important
Buffington says that an overly simplistic answer to why BC is important
would be to say that its like choosing not
to have insurance. He says most responsible people understand that while they
would rather not pay for insurance, it is
better to have it and not need it than to
need it and not have it. But Buffington
also points out that BCDR (business continuity and disaster recovery) isnt always
about site-wide or regional calamities.
Its sometimes something as small as
a single server or a network access point
going down that can cause issues. You
dont build BCDR because youre worried about a flood or a hurricane, he says.
You build it because servers go down and
wires break. A responsible approach for
BCDR will let you accommodate crises of
all sizes.
That last part is particularly important
because being able to handle a crisis of
any size requires a larger scope in terms
of how you look at BC. For example, if
your company suffers from a natural disaster or major power outage, you may not
be the only facility suffering. Resources
Developing A BC Plan
Crafting a strong BC and DR plan is
clearly important, but what actually needs
to be included in a plan? For starters, it
should outline the specific actions youre
going to take when that disruption occurs,
Witty says. What some organizations may
not realize is that each may require its own
separate plan, such as a damage assessment
plan, crisis communication plan, IT service
recovery plan, business recovery plan, or
supplier recovery plan. You need to know
what kind of plan youre talking about,
then the next thing is, in the document
itself, you need to have some of the basics,
49
50
Youll also want BC management planning software. This is the tool youll use to
perform a business impact analysis and
risk assessment as well as to put your recovery plan in place. The business continuity management planning software
tools help you automate all of that, says
Witty. Having all of your recovery plans
in a single repository is actually the gold
mine of business operations. I find that
more progressive business continuity
management programs are actually integrated into strategic planning for the company and strategic IT planning. Theyre
leveraging this data that theyve amassed
about how the business works into much
more proactive and strategic activities for
the organization.
Crisis or incident management software
is another important tool to have. This is
the platform from which youll manage
the activities around recovering from a
business disruption. You get a view of
whats actually taking place, says Witty.
A plan is a good starting point, but every
event has its own uniqueness to it, so you
need to manage that situational awareness
against your plan. There may be actions
that youre not going to take or actions
you didnt know youd have to take but
now need to in the face of the event. Those
crisis management tools become critical
51
KEY POINTS
DRaaS (disaster recovery as a
service) can be a less expensive
alternative to traditional DR, but
it depends on how many workloads you back up.
Many traditional DR providers are moving customers to
DRaaS, but some newcomers
offer different levels of service.
Customers have the opportunity to save money by paying
monthly and not purchasing
their own DR-specific hardware.
DRaaS is currently best for
smaller businesses, but a nearfuture market shift could open it
up to large enterprises, as well.
52
This results in significant savings in software licenses and hardware, allowing the
organization to increase its budget in other
areas of operation. Traditional DR services
can prove to be expensive, thus scaring
off small and medium-sized businesses,
but DRaaS affords providers the opportunity to offer a less-expensive alternative for
cost-conscious markets.
Another benefit of the cloud aspect of
DRaaS is that it gives organizations the
ability to tier applications and workloads as
a way to prioritize them for recovery. This
means mission-critical apps will take precedence over less critical ones, so you can
get those workloads up and running first
to lessen the impact of a disaster on the
business. Plus, the cloud-based nature of
DRaaS means that backup and recovery
assets can be easily accessed and initiated
in the case of a disaster, Sen says. And for
that reason, disaster recovery as a service
is most beneficial to those organizations
who need a recovery time objective [RTO]
or a recovery point objective [RPO] thats
measured in minutes, rather than hours or
days, she says.
53
54
56
57
Smartphone Tips
GET THE MOST OUT OF THE LATEST ANDROID & IOS VERSIONS
ANDROID
58
Automatic backup to Google Drive is not new to Android, but with the introduction of Marshmallow (Android 6.0), your data and applications are automatically backed up. To view and control what exactly is getting backed up, open
Google Drive on your smartphone, tap the menu icon (three bars), tap Backup &
Reset, and tap Back Up My Data to ensure that the feature is active. Go back to
the previous screen and select Manage Backup to view all of the apps that are currently backed up to your Google Drive account in the cloud. Here you can change
the setting for each app. According to Google, only a set amount of data is backed
up per app, and the data isnt included in your Google Drive storage limit.
ANDROID
Make Your Android Even Sleepier
What do you do when you need to look something up on the go? If youre
like most people, you google it. Messaging someone about where there might be
a good place to eat nearby? Google it. Want to know whether a business is currently open? Google it. Well, with Marshmallow (Android 6.0) comes the introduction of Now On Tap, a feature designed to help you out quickly during these
google-able moments.
To call Now On Tap into action, tap and hold the home button on your
smartphone. Now On Tap recognizes what youre doing at any given time, so if,
for example, you are viewing an email discussing travel plans for an upcoming
event, the Now On Tap feature will offer a few suggestions related to that. For
example, it might serve up the address for the event site (with an option to open
the Maps app to get directions), a phone icon so you can call the site directly,
any apps you might have that are related to the event or location, and an option
to create a new Calendar item about the event.
59
iOS
Get Started With iCloud Drive
New to iOS 9, the Wi-Fi Assist feature comes automatically turned on in new
devices running iOS 9 or later, or when you upgrade to iOS 9. The feature is
designed to detect whenever you are using a poor quality or slow Wi-Fi connection, and automatically switch the device
to cellular usage. This
can, of course, come
in handy. If, for example, youre in the
middle of sending or
receiving an email attachment, or trying
to find a location
on the map, and the
app youre using is
struggling to use the
established Wi-Fi
connection, Wi-Fi
Assist will keep your
device on task. But
if you want to avoid
inadvertently using
cellular data services, you can turn
Wi-Fi Assist off. To
find the feature, open
Settings, tap Cellular,
and scroll all the way
down to the bottom
(past the potentially
long list of all of
Apples Wi-Fi Assist feature, new to iOS 9, helps you avoid slow or
your installed apps
poor quality Wi-Fi Internet connections by diverting your connecthat may use cellular tion to cellular when necessary. Slow-loading Web page due to
data), and look for the Wi-Fi? It will speed up when Wi-Fi Assist automatically activates.
Wi-Fi Assist toggle.
60
Apple provides four search engine options for its Safari browser: Google,
Yahoo, Bing, and DuckDuck Go. If you arent familiar with it, DuckDuckGo,
despite its unusual name, is a swift search engine whose claim to fame is that it
doesnt track your every move while youre browsing, and packages search results a little differently (some say better) than Google. Access Settings, tap Safari,
and tap Search Engine to try a different search engine.
iOS
More Email Attachment Options
Apple Pay is gaining steam with businesses and users alike. According to Apple,
there are hundreds of banks and credit unions that work with Apple Pay in addition to a rapidly growing number of retailers. If youre using Apple Pay, theres a
quick way to find out whether an establishment works with Apple Pay. Open the
iOS Maps app, search for
the location youre interested in, and when you
spot the little call-out on
the map for the appropriate location, tap it to
reveal details. The results
will include basic location information and
hours, but look in the
Category section for the
Apple Pay icon. Only the
presence or absence of
the Apple Pay icon indicates whether the business takes Apple Pay, so
if you dont see the icon
youre out of luck.
61
Isolate Malware
HOW TO COMBAT ATTACKS
62
files. These are really useful for protecting sensitive documents, she says.
On browsers, there are a number of security features that can also be activated
or increased.
Immediate Response
When you suspect malware has
infected your notebook, Menting
advises turning off its Internet connection. Most malware will use the
Internet connection to send information back or infect other computers
on a network, she says. Isolate the
laptop and then run an antivirus scan.
Additionally, ensure that antivirus software on the notebook is up-to-date
with the latest malware signatures.
If not, then copy a free AV program
onto a USB thumb drive and use it to
install [the software] on the disconnected infected PC, she says. More
sophisticated malware, Menting says,
may be able to obfuscate its presence,
and others, such as zero-days, have
simply not yet been uncovered by security firms and, therefore, an antivirus
[program] will not help. In such cases,
Menting says the best option may be to
wipe the hard drive clean and reinstall
the operating system.
Means Of Prevention
As a means of prevention, Menting
says, at the least, you should ensure that
a firewall is running and working properly. Generally, she says, most operating
systems have built-in security features
that users should activate. Additionally,
numerous programs (including PDF
and document-creation programs)
provide options to password-protect
63
Facebook
When setting up your Facebook profile,
the service will ask for a lot of personal
informationincluding education history,
64
Twitter
By default, Twitters account settings
make your tweets available for all to see.
The alternative is a protected mode, where
your tweets are only visible to your approved Twitter followers. Protected tweets
are not retweetable, so even approved users
cant share your tweets. You also cannot
share permanent links to your tweets with
anyone but approved followers. If you
want to use Twitter to drive Web traffic,
the restrictions in the protected mode
might undermine why you joined Twitter
in the first place.
If you want to adjust your tweet privacy level, or the other privacy controls
on Twitter, sign into Twitter and open
your account settings. Next, click Security
And Privacy and scroll down to Privacy.
If you only want approved followers to see
your tweets, click the Protect My Tweets
checkbox. You can also control who can
tag you in photos, whether your tweets
include a location, and how others can find
Google+
For Google+, privacy has been a key
consideration from the very beginning. For
example, youve always been able to assign
a privacy level for each post you share. And
based on the Circles (friend groups) youve
set up, its easy to share content with only
a specific crowd. Google+ also offers detailed privacy settings where you can control most every aspect of your profile. Visit
your Google+ page, click your name, select
the drop-down menu under the Google+
logo, and choose Settings.
In the Settings window, you can customize who can send you notifications,
comment on your public posts, and
manage subscriptions. If you want to
configure the audience settings for your
posts, photos, and profile updates, scroll
down to the Your Circles section and click
Customize. By default, Google+ pushes
updates to the people in your Friends,
Family, and Acquaintances groups. To
block a particular group, remove the check
from the checkbox. If you want to reach a
larger group of people, you might want to
add a check to the Following checkbox, so
followers of your Google+ profile will be
added to Your Circles list.
Next, scroll down to the Profile section where you can configure how people
are able to find your profile and control
what content displays in your profile. A
setting of interest for businesses is Allow
People To Send You A Message From
Your Profile, as this setting offers a way for
consumers to reach out to you. If the setting is limited to Your Circles or Extended
Circles, customers might not be able to
contact you.
If you use Google+ on your mobile
device, youll also want to examine the
Location Settings section. These settings
let you enable or disable location reporting
via your smartphone and tablet. If enabled,
you can control who can see your current city and/or exact location. The precise
LinkedIn
The business-focused nature of LinkedIn ensures that privacy is a priority. To
examine your settings, log in to LinkedIn,
hover your pointer over your profile
photo in the right-hand corner, and select
Manage next to the Privacy & Settings option. In Privacy Controls, youll find a host
of options to control what others can see
on your profile and activity feed.
If you use LinkedIn to search for new
clients and key connections within an organization, you can opt to remain anonymous, so people wont know that you
looked at their profile. To do so, click
Select What Others See When Youve
Viewed Their Profile. There are two anonymous options, one where others will see
an industry and title, or you can opt to
be completely anonymous. You can also
manage who can follow your updates, edit
blocked connections, and shut down users'
ability to view your connections.
65
Rootkit Attacks
WHAT TO DO TO FIGHT BACK
What Is A Rootkit?
A rootkit is software that infects and
gains privileged access to a computer.
This means it can perform administrator-level type tasks, says Michela
Menting, digital security research director with ABI Research. The primary
feature is that it can hide itself in the
system and remain undetected.
66
The Damage
Essentially, rootkits give an attacker
free reign to perform any task desired, including installing software; deleting files;
modifying programs; transmitting data;
and using spyware to steal credit card
numbers, passwords, keystrokes, etc. A
rootkits ability to modify existing programs and processes, says Menting, enables it to avoid detection by security
software that would normally catch such
software.
There really arent any limits to
how much damage it can do to a PC,
Olds says. It can delete data files and
then rewrite gibberish on the hard
drive to ensure that the data cant be
recovered, or it can quietly work in the
background and log user keystrokes,
eventually capturing workplace, ecommerce, or banking user-names and
passwords. Ultimately, a rootkit can
route that data to a hacker to plunder
Unfortunately, the likelihood of being hacked or unwittingly downloading malware on a computer is extremely
high. Especially in the network-connected environment
of a company, even if you take all precautions necessary
someone else may not have and you get a virus from
them internally.
MICHELA MENTING
Digital Security Research Director
ABI Research
What To Do
For typical users, arguably the worst
news concerning rootkits is that getting
rid of one can be beyond their scope.
Olds says, in fact, most users should
probably seek an experts help if they
suspect a rootkit infection. Though
some security programs can detect and
remove specific rootkits, Menting says,
there are so many variants that it can
be impossible to detect and remove
them all. Often, she says, getting rid of
a rootkit requires a radical solution.
If a user suspects a rootkit, he should
first disconnect the system from the
Internet to cut off possible remote access
and prevent data from leaking, Menting
says. Next, remove data from the infected
computer and scan it for malware on another device. (Menting notes that if the
data contains unknown [or zero-day]
malware, this step may not guarantee the
malware is eradicated.) Finally, the computer should be purgedwipe the hard
drive and reinstall everything, she says.
67
YOURE READY TO give your presentation, but until that first slide appears on the big screen, you can never
be sure that your equipment has got
your back. We cant tell you not to
worry, but these handy tips should
help bail you out if your presentation
goes south.
68
Network Connection
Many venues supply network projectors, which are made available as
a shared resource. Making a connection to a network projector is as easy as
plugging your notebook into the corporate network via wired or wireless
Ethernet. Check with the companys
IT staff for specifics. Once connected,
use the network connection wizard in
Windows 7 to find the projector you
wish to use:
Click Start (the Windows button in the bottom-left corner
of the screen).
Click All Programs.
Click Accessories.
Click Connect To A Network
Projector.
No Video
In many cases, your notebook will
detect that you have a projector plugged
into one of its video outputs and will
automatically turn on the port. Not all
notebooks do this, however; and even
those that can still have missing video
if the notebook isnt set to duplicate the
Desktop or extend it to the secondary
monitor (the projector). Many notebooks use a function key combination
to toggle the projector port on or off
and set how you can use the display.
We recommend using the control
panels in Win7:
Right-click a blank area on the
Desktop.
Select Screen Resolution.
Select the second display from
the drop-down menu.
Select Extend These Displays
from the Multiple Displays
drop-down menu. Your Desktop
background should now appear
on the projector.
Win7 also has a pop-up display for
selecting the content that is sent to the
projector. Press the Windows-P keys
to bring up the four possible selections:
NOTEBOOK-PROJECTOR
TROUBLESHOOTING
TIPS
Turn off all equipment before
connecting the notebook to the
projector.
If possible, use a digital connection to ensure a high-quality
presentation.
If youre not using the projectors built-in speakers, turn
them down and connect the
notebooks audio out to the
sound system.
If youre using a wireless
mouse or controller, make sure
you can establish the wireless
connection.
Use the network connection
feature in Windows 7 to connect to a network projector.
No video? Check the ports and
Windows Screen Resolution
settings.
Adjust the screen resolution to
resolve out-of-range messages.
When a projected image isnt
proportionally correct, reposition
the projector and/or change the
projectors keystone setting.
If a display turns off during a
presentation, check the notebooks power management
settings.
If video isnt displaying correctly, change the Display settings to make the projector the
primary display.
69
GENERATORS
UPS
PRE-OWNED GEN SETS
20-3000KW
LOW HOUR WITH WARRANTY
INQUIRIES
Kris Davenport: 602.622.5619
kris.davenport@empire-cat.com
PROCESSOR
SPEED OF CHANGE
PROCESSOR
I T & FAC I L I T I E S M A N AG E M E N T
Small Footprint
The unique footprint and features
of Room Alert 3 Wi-Fi make it perfectly designed to assist with monitoring temperature and other environmental conditions where a small
footprint is needed, where a wired
connection may not exist, when the
investment cost needs to be minimal, or where deployment volume
may be high.
With one digital temperature sensor built-in, users can expand monitoring by adding another digital
sensor (i.e., temperature, humidity,
$175 price makes it affordable to deploy or use in areas requiring a large number of
devices. Over 30 sensor options.
(888) 220-6700
Sales@AVTECH.com
Go to AVTECH.com and click Store
73
PROCESSOR
S E RV I C E T O WAT C H
76
Overall Benefits
GIGABYTE provides a threeyear warranty for all of the
motherboards in the GSM program. All products have passed
WHQL testing and are certified for Windows. GIGABYTE
assigns each customer a dedicated sales representative to ensure
the best service possible. The
company also offers dedicated
technical support and service, a
phone hotline for immediate service (Monday through Friday, 9
a.m. to 6 p.m. Pacific Time), and
BIOS customization support.
(626) 854-9338
businesscenter.gigabyte.us
PROCESSOR
V I D E O WA L L & D I G I TA L S I G N AG E M A N AG E M E N T
with DVI signals. The VM5808D supports up to eight DVI video sources and
eight DVI displays and the VM5404D
supports four DVI video sources and
four DVI displays. These new models are particularly beneficial for traffic
control centers and other larger control rooms where DVI displays are still
widely used. You can also create 8 or
16 connection profiles, depending on
which model you choose, so you can
customize layouts and quickly access
them as needed. P
On The Horizon
Looking forward to early 2016,
ATEN plans to launch its VM5808D
and VM5404D Seamless Matrix
Switches, which are designed to work
888-999-ATEN (2836)
www.aten-usa.com
77
F E AT U R E D P R O D U C T
easily configure a solution that fits perfectly into your data center environment.
Every product that AIC offers serves
as a building block for a highly customized system. The company offers
platform solutions featuring MAX
I/O technology for improved performance, high availability storage servers
with dual controllers for better reliability, and network solutions that are
FIPS- and/or NEBS-ready. Add to that
AICs infrastructure appliance solutions, which are designed to improve
the management and efficiency of data
centers and cloud environments, and
you can build custom solutions that
will continue to serve your company
for years to come. P
(866) 800-0056
www.aicipc.com
CLOUD-BASED SEARCH
(888) 865-4639
www.lindy-usa.com
dtSearch
The Smart Choice for Text Retrieval since
1991, dtSearch has provided enterprise
and developer text retrieval along with
document filters for more than 24 years.
(800) IT-FINDS or (301) 263-0731
www.dtsearch.com
Intel NUC
Everything Inside
The latest NUC is powered by
Intels Pentium N3700 processor, a
quad-core CPU with a base frequency
of 1.6GHz and a burst frequency of
2.4GHz. The N3700 is built on a
14nm manufacturing process, has 2MB
84
85
ONE AIO
TO RULE THEM
ALL!
PREDATOR
CORPORATE TRAVEL?
NEED A VACATION?
Let our #missionbird take you where you need to go.
Our diverse fleet of 22 aircraft offers a travel experience above the rest.