Something promising that i read up on recently was the concept of Near Field Communication. Essentially near field communication or NFC for short, consists of a close-range radio chip that is in your phone or other personal electronic devices and it will allow you to access different devices or rooms based on the settings. The current interesting use is for turning your cell phone into a key for a hotel, or a key-card lock. Personally I would love to just walk up to my house or hotel room and put my phone in front of the door which would allow me to access my room. Consolidating everything into one would be a great accomplishment.
This could also be potentially used for a variety of things. It wouldn’t necessarily have to be put into a cell phone but it could be in other devices as well. Maybe a car key or something of that nature. The nice thing is that they can be reprogrammed for anything.
If you lose your device, your access can easily be revoked through the management system. It is currently being pioneered in Sweden by a lock maker company Assa Abloy.
I think this is pretty neat and would love to see it in action.
Are you running out of space on your iPhone or Droid where you store your music? Google has come up with awesome idea by incorporating the cloud where you can store your music an acces it via an app on your phone. The key to this is that you have to have internet access to listen to your music.
To learn more about Google Music go to http://music.google.com/about/
From the Music Manager, you can:
Add music from your iTunes library, Windows Media Player library, My Music folder, or folders of your choosing to Google Music:
–Choose to add songs automatically or completely manually
–Adjust the bandwidth available for adding songs
–View the progress of songs you’re adding
–Download any of the songs that you previously uploaded to your Music library, as well as any song you purchased
from the Google Music store
You can install Music Manager by going to http://music.google.com/music/listen?#manager_pl
For the iPhone app you’ll have to get gMusic and if you have a Droid phone you’ll have to get Google Music app.
Have you ever thought about mobile security for your business? Well you should? Mobile security is going to be a huge concern for companies in the next few years because of the masses of new smartphones and tablets coming to the market.
According to a Q4 2010 report done by McAfee, cybercriminals have a “window of opportunity” to attack multiple mobile platforms. The biggest of the threats is Nokia’s Symbian OS. The report also included the fact that there is a direct correlation between device popularity and criminal activity.
The new mobile devices are hitting the market months before security software even exists for them. The sheer amount of mobile devices without security could lead hackers to target these devices for botnet infections. According to McAfee there has been a 46 percent increase in the amount of threats than in 2009.
What can you do? Well at BVA, we believe that your network is first priority whether it be your server, workstations, or mobile devices. We suggest that you thoroughly evaluate the devices that you are allowing on your network. Don’t be afraid to do a little research and look into possible security holes that may be found, or if anyone has found issues with the devices. It is not a bad thing to standardize the devices that are allowed on your network, especially when there are so many that it is hard to keep up with them all. It is always a good idea to ask your IT vendor if devices are safe.
Also, establishing a company wide mobile security policy is another great feature. When using ActiveSync, you have the option of setting certain security features on your mobile devices, such as allowing or denying the use of removable storage, cameras, Wi-Fi, internet sharing and more. You can also allow or deny the use of unprovisional devices and enforce password policies. In today’s small to medium sized businesses, these policies are often overlooked and can potentially put your network and data at risk.
By this time, many people have had the opportunity to get their hands on the new Droid X by Motorola, and explore the vast amount of features on this incredibly powerful device. From social networking to games, applications, and mobile content this device is a definate must have.
I recently had the task assigned to me to figure out how exactly to configure the Droid X to be used with the Microsoft online hosted exchange, and to my surprise, it was just as easy as configuring it to work with an in-house exchange server but with a very slight variation.