Posts Tagged ‘Apple’
The Web as we know it have been born and matured on computers, but as it turns out now, computers no longer have dominance in it. According to a recent report by analyst Mary Meeker, mobile devices running iOS and Android now account for 45 percent of browsing, compared to just 35 percent for Windows machines. Moreover, Android and iOS have essentially achieved their share in just five years and their share is getting tremendously larger.
According to some forecasts their worldwide number of mobile devices users should overtake the worldwide number of PC users next year. If forecasts come true, this shift will not only continue, but accelerate. Based on data from Morgan Stanley, Meeker estimates roughly 2.9 billion people around the world will be using smartphones and tablets by 2015.
What does it mean now that more people are accessing the Web through tablets and smartphones rather than laptops and desktops? And is it really a big deal? Anyway, Internet is intended to be accessed from anywhere and thus from any device. Well, it is quite a change at least in terms most people consider the Web and how it gradually adapts to be used on mobile devices.
As mobile devices take over, the use of today’s desktop browsers like Internet Explorer, Chrome, Firefox, and Safari will decline. Mobile browsers are already very capable and will increasingly adopt HTML5 and leading-edge Web technologies. As mobile devices naturally have less screen area, the sites need to function more like mobile apps and less like collections of links. So the sites are likely to look like apps.
Apps may rule
Native apps for smartphones and tablets almost always surpass websites designed for mobile devices because they can tap into devices’ native capabilities for a more responsive and seamless experience. This is most likely to change in the nearest future – most experts agree HTML5 is eventually the way of the future. This is already the status quo in social gaming: for example Angry Birds and Words with Friends. Some services won’t be available at all to traditional PCs — they won’t be worth developers’ time.
Less information at once
Web sites and publishers will no longer be able to display everything new for users and hoping something will catch the user’s eye. Smaller screens and lower information density means sites will need to adjust to user preferences and profiles to customize the information they present. Increasingly, the Internet will become unusable unless sites believe they know who you are. Some services will handle these tasks themselves, but the most likely contenders for supplying digital identity credentials are Facebook, Google, Amazon, Apple, Twitter, and mobile carriers.
Sharing by default
In a mobile-focused Internet, anonymity becomes rare. Virtually every mobile device can be definitively associated with a single person (or small group of people). Defaults to share information and experiences with social circles and followers will be increasingly common, along with increasing reliance on disclosure of personal information (like location, status, and activities, and social connections) to drive key functionality. As the Internet re-orients around mobile, opting out of sharing will increasingly mean opting out of the Internet.
Emphasis on destination
Internet-based sites and services will increasingly function as a combination of content and functionality reluctant to link out to other sites or drive traffic (and potential advertising revenue) elsewhere. These have long been factors in many sites’ designs but mobile devices amplify these considerations by making traditional Web navigation awkward and difficult. Still URLs are not going to die – people will still send links to their friends and Web search will remain most users primary means of finding information online.
Going light weight
As people rely on mobile, cloud, and broadband services, the necessity to do things like commute, store large volumes of records or media, or patronize physical businesses will decline. Businesses won’t need to save years of invoices, statements, and paperwork in file boxes and storage facilities – cloud storage comes as their rescue. Banks will become purely virtual institutions consumers deal with online via their phones. Distance learning and collaborative tools will let students take their coursework with them anywhere — and eliminate the need to worry about reselling enormous textbooks.
Going mobile is an obvious trend today. Experts envisage that nearly every service, business, and person who wants to use the Internet will be thinking mobile first and PC second, if they think about PCs at all. Do you agree? And what other related changes can you imagine?
Many thanks for sharing your thoughts
Steve Jobs wasn’t a fan of Android. He thought it was a rip-off of the iPhone. He saw the iPhone as a ground-breaker and Android as an attempt by Google and a consortium of device manufacturers to bring a similar product to a wider market. He famously told his biographer Walter Isaacson that he would “spend my last dying breath if I need to” and “every penny of Apple’s $40bn in the bank” to right the perceived wrong done to Apple by Google. “I’m going to destroy Android,” he pronounced, “because it’s a stolen product…” Jobs’ quest led indirectly to the decision of a US court to award Apple $1bn in damages, and to place an injunction on Samsung distributing some of its product in the US.
But Android had been under development since 2003 and was purchased by Google in 2005, two years before the advent of the iPhone. Granted, its later development was undoubtedly influenced by the range of features incorporated in the iPhone, and the potential and scope of Nokia’s Maemo project.
Theft is an emotional concept and technology is a complex proving ground. The iPhone is an elegant synthesis of intricate ideas and technologies that had gone before, many of them originally developed, patented and supplied by companies such as Samsung and Motorola – now owned by Google. Smartphones and touchpads existed before the iPhone.
Samsung says it has spent billions on research into mobile technologies over the past 25 years and noted in its own submissions to the court that “the flash memory, main memory, and application processor for the iPhone” are supplied by Samsung. It said “also manufactures Apple’s A5X processor and is the sole supplier of the Retina display used in the new iPad”. It also initiated many of the wireless standards and technologies that make it possible for an iPhone to talk to other phones.
Apple’s distinctive contribution has been collation and design, derived from an understanding of why and how a Smartphone could and would be useful and attractive to an end user, and which features would enhance that effect. The iPod, iPhone and iPad are instantly recognizable for their cleanliness and simplicity – and the software is focused on simplifying the tasks of the end user.
Apple’s talent has been to transform utility into an art form, to reduce apparent complexity and anticipate the wants of the user. By collating the possibilities of the Smartphone, and pulling together the virtues of design and utility, Apple has lifted the concept of smart devices to browse the web from geek heaven into user space, which makes it all the more surprising how little attention other device and computer manufacturers have paid to the role of design in selling hardware.
But the bigger issue isn’t copying, or imitation, but the broken nature of the patent and so-called intellectual property industries. In an industry where last year’s must-have is already out of date, there is something obscene about a court case that involves, among other things, a dispute about patents and design registrations such as the one “for overall design of the product, including the rectangular shape, the rounded corners, the silver edges, the black face, and the display of 16 colorful icons”. Or the one “for the configuration of a rectangular handheld mobile digital electronic device with rounded corners”. These are not technological or design innovations.
The decision of the court to punish Samsung for its intrusion into the markets Apple considers its own, and in the words of Samsung’s press release “to give one company a monopoly over rectangles with rounded corners, or technology that is being improved every day by Samsung and other companies” is symptomatic of the ongoing crisis in the creative and technological industries.
The decision against Samsung is just the latest event in the war. It is bad news for everybody, not least the users and developers of Android and the iPhone, as each of these companies scrambles to buy up the ownership of patents. As Google’s chief legal officer, David Drummond, put it last year: “A Smartphone might involve as many as 250,000 largely questionable patent claims, and our competitors want to impose a tax for these dubious patents that makes Android devices more expensive for consumers. They want to make it harder for manufacturers to sell Android devices. Instead of competing by building new features or devices, they are fighting through litigation.”
And what do you think? Are you on Apple side or Samsung?
It seems most companies understand opportunities that cloud computing solutions and services open up for them, especially for SMBs. So now the question sounds like: how to choose a good provider and the right one for your company and to what extend cloud computing services should be used. The complexities are numerous – issues such as security management, attack response and recovery, system availability and performance, the vendor’s financial stability and its ability to comply with the law, all need to be considered. There may be a number of advice and tips formulated with this regards (some are taken from CIO article):
1) Choose trusted providers. Today it exists a number of cloud tech companies to choose from and new ones go live each month. Despite this for cloud services it’s better to stick with trusted and solid companies. To name a few: Microsoft, Google, Intuit, Dropbox, Apple, Amazon, Salesforce. These are companies with deep pockets and dealing with security, and your data is an important part of their business.
2) Distribute between free and paid accounts. For storing financial or alike information paid accounts are preferable. For less critical data and applications free accounts of big trusted cloud service providers may work well. For instance, Google can afford to offer decent free accounts because their business is well-established and their free services just act as bait aimed at attracting new users and then gently pushing them towards paid services and premium accounts.
3) Select the right apps and data for the public cloud. Some businesses, mainly start-up companies, begin using the public cloud for all applications, including mission-critical apps and their data. However, public clouds are neither for every organization nor for every application: what can be subject to the default security provided by most cloud service providers are websites, application development, testing, online product catalogs and product documentation.
4) Evaluate and add security if it makes sense. CSPs can provide significantly different levels of public cloud security. The ISO/IEC 27000 series of standards provides guidelines for evaluating this. If necessary security measures that are used in an organization’s internal private cloud may need to be extended to their public cloud instances, and some cloud products like CloudSpan allow doing this.
5) Get use of the third-party auditing services. When comes to security compliance, organizations need not simply take the CSP’s word for it. Third-party auditing services can be used to audit and then compare to the promised ones.
6) Add authentication layers. Most CSPs provide good authentication services for public cloud instances. Some products like Halo NetSec can help add an additional layer of authentication. Before doing this you need to weigh the benefits of better public cloud security against the costs of increased network latency, possible performance degradation and additional points of failure.
7) Weigh additional security effect on integration. Adding on top of default security by CSP may affect overall application performance and identity and access management. It’s especially important to consider if you work with mission-critical application that need to integrate with other business applications.
8) Make security guarantees from SLA clear for yourself. Public cloud security guarantees with CSPs should be clearly stipulated as service level agreements in the contract, so make sure that transparent monitoring and reporting functions are available to you as a customer as well as security processes, procedures and practices are transparent and verifiable so that you may rely on this information.
9) Streamline logging and monitoring. Comparing one CSP’s logging and monitoring practices with another before you sign a SLA may reveal subtle differences in the security that’s provided so it’s another key to ensuring public cloud security.
10) Add encryption. You may want to employ your own encryption instead of or in addition to the ones provided by the CSP. A number of installable products or SaaS vendors can do this type of encryption on the fly. (VPN-enabled cloud instances fall under this category of augmented public cloud security.) When this happens, only the customer and the third party know the key; the CSP does not.
11) Spread outages risk with multiple even redundant CSPs. Despite cloud provisioning tools these days come already integrated with leading CSPs, it’s possible to spin up additional instances of servers with multiple CSPs automatically on demand: they are turned on if average CPU utilization reaches a certain threshold and turned off once utilization drops. Also when spinning up additional instances, it may make sense to use different CSPs in a round-robin fashion.
Thus, as you may see, experience of using cloud services may be adjusted and improved through following some advice. What’s crucial is finding a balance between cloud security and performance. Naturally there’s always a tradeoff when adding layers of security may be at the expense of application running slower and potentially adding points of failure. Figuring out the right balance between security and performance, though being difficult, is a must-have to run a strong business today.
Helen Boyarchuk – Business Development Manager (LI page)
Helen.Boyarchuk@altabel.com | Skype ID: helen_boyarchuk
Altabel Group – Professional Software Development
At WWDC 2012, Apple took the wraps of iOS 6. Due to be released in the fall of this year, Apple has added several new features to the OS that will surely be a boon for business. Lets jump in and talk about a few of these features and how they may benefit your organization.
One of the most talked about Apps to receive an upgrade in iOS 6 is Maps. Apple chose to drop Google as its map provider and built a new solution from the ground up, using crowed sourced data for traffic and Tom technologies for navigation. The App now renders maps using vector art, making the App much more responsive while adding a great new feature called Flyover, which renders cities in stunning 3D. Siri is now fully integrated as well, so asking for directions will instantly produce turn-by-turn navigation results. You can even ask Siri, while navigating, how much longer until you reach your destination.
For those of you out there that manage your organization’s social media, the introduction of Facebook integration will almost certainly be assisting in your day-to-day task. Simply add your Facebook username and password within the iOS setting, just as you do with Twitter now, and Facebook will automatically authenticate Apps that use Facebook authentication. Share your information using hooks that can be built into any App using Apple’s Facebook API and from most every App that comes native in iOS.
Passbook is a very interesting tool that Apple will be making available in iOS 6. Think of Passbook as your digital wallet, allowing you to store boarding passes, movie tickets, retail coupons, loyalty cards, and more. Granted Passbook will make travel far more convenient with powerful features such as real time updates such as gate changes and location based notifications.
There isn’t really much new with FaceTime. Essentially it’s the same App as before, only now FaceTime works over 3G. But combined with the power of AirPlay, and the ability to project your conference to a display, it’ll be a renaissance in telecommuting, networking, and conferencing. As more iOS devices come to market and business adopts them, video conferencing will become far more accessible. FaceTime is remarkably easy to use and convenient, as it can be accessed while traveling.
The phone App received some simple but great new features, and features that seem to be targeted right at professional users. In the new phone App, declining a call produces a new set of actions, such as Reply with Message or Remind Me Later, allowing you to message the caller or remind yourself after a meeting while sending your call to voice mail. Additionally, for those times that your undivided attention is needed, Apple has provided a new Do-not-Disturb preference within the OS Settings.
Mail has received a few minor but useful tweaks such as a new VIP inbox that allows you to easily select contacts from your address book that will place any email communications into a specially marked inbox. Also mail now has the ability to add photos and videos inline.
Have you heard about some others updates to iOS 6? You could list them bellow.
Microsoft may gain a powerful set of partners to help Windows 8 become a success – AT&T and Verizon Wireless, who need leverage against Apple’s onerous demands for subsidies for every iPhone the carriers sell.
AT&T and Verizon are both eying Windows Phone as the Smartphone platform they can promote to push back against Apple demands for high subsidies and royalties. Mobile operators are sick of taking orders from Apple…iPhones are occupying an increasingly dangerous share of mobile operators’ Smartphone sales. In 2011, iPhones represented half of AT&T’s Smartphone sales, and now that Verizon has recently voiced a similar shift in sales, the companies’ fears of an Apple takeover are growing stronger.
There clearly is a danger now that iPhone is going to get a stranglehold of the U.S. Smartphone market, and I don’t think operators are crazy about that. The larger the share of the market that Apple owns, the higher the subsidies it can demand from carriers. Those subsidies eat into carrier profits and fatten Apple’s bottom line.
Apple’s demands for subsidies in order for a carrier to sell an iPhone are legendary. U.S. carriers heavily subsidize all Smartphone hardware, primarily to entice new customers to buy a two-year service contract that costs more than $1,700 over that period. The iPhone 4S with 16GB sells unlocked from Apple for $649 (useful on many GSM carriers with a separate contract), but Verizon, AT&T and Sprint sell it for $199.99 with a two-year contract.
Beyond that, Apple also gets a portion of the monthly revenue that carriers get from each customer who buys an iPhone, and it’s a hefty cut, as much as $600. And that number is on top of the subsidies for the phone itself.
Given all that, it’s no surprise that AT&T and Verizon would see Windows Phone as a possible savior. Microsoft badly needs Windows Phone to succeed, and it also doesn’t have the same leverage to demand high subsidies and monthly royalties. Verizon is particularly interested in pushing Windows 8 phones when they hit. Verizon CFO Fran Shammo hopes to use Windows 8 phones as leverage against Apple:
“We’re really looking at the Windows Phone 8.0 platform because that’s a differentiator. We’re working with Microsoft on it.”
If Verizon and AT&T do make a concerted effort to push Windows Phone, it may finally breathe life into the struggling operating system. As the release of the Lumia 900 shows, Windows Phone devices are just as good as iPhones and Android phones – but by itself, that’s not enough.