Categories
Uncategorized

The Windows Phone “I Want to Believe” Graphic

I made the image above back when I was working at Microsoft and in the role of Windows Phone Champ. A number of people have recently asked for this graphic, so I thought I’d give it its own post here on Global Nerdy, with a search engine-friendly title so that it’s easy to find. Download and enjoy!

mulder and i want to believe poster

For those of you who don’t get the reference, it’s to a poster that hung above Fox Mulder’s desk in The X-Files:

i want to believe

Click the image to see it at full size.

Categories
Uncategorized

iOS 7 Development: Installing the Xcode and iOS 7 Golden Masters

With the announcement of the iOS 7 release date — Wednesday, September 18th — come the Golden Master (GM) releases of Xcode 5, the iOS SDK and iOS for developers. As Golden Master releases, they’re going to be the same as the ones being released to the general public via iOS’ built-in update function. As a registered iOS developer, you can get them ahead of the public so you can start writing (or rewriting) your apps for iOS 7. In this article, I’ll show you how to get and install them.

Getting the Packages

Point your browser at the iOS Dev Center. If you’re properly registered in the iOS Developer Program, you should have the options of looking at resources for iOS 6.1 and iOS 7. Naturally, you should select iOS 7 GM seed, after which the page should look like the screen capture below:

click on downloads

You can either click on Downloads or scroll down to get to the packages, namely Xcode 5 GM, iOS GM, and the beta of iTunes 11.1:

download these goodies

If you want to dive right into iOS 7 development, you’ll probably want to install Xcode first. On the other hand, if you want to play with iOS 7 on your iDevices, you want to install iTunes first, and then use it to put iOS 7 on them.

Installing Xcode and the iOS 7 SDK

Xcode’s package is the biggest — about 2.5GB. Once you’ve downloaded it, double-click on it to mount the disk image, after which you’ll see this:

xcode window

Drag the Xcode icon to the Applications alias to install it.

Install iTunes and iOS 7

iTunes is the smallest of the packages, weighing in at about half a gig. The individual iOS 7 packages for the various devices — iPhones, iPads, and 5-gen iPod Touch — are about 1.5GB in size. Download iTunes and double-click on it to mount its disk image, after which you’ll see this:

itunes windows

Double-click on the Install iTunes icon to start the iTunes installer. Once iTunes is installed, launch it.

Download the appropriate packages for your iDevices. In my case, I downloaded the packages for the iPhone 4S and the iPad 2 wifi-only model, and then double-clicked on both to mount their respective disk images:

iOS 7 backups

With the package images mounted and iTunes running, hook up an iDevice and wait for iTunes to sync with it. Then click the button for your iDevice (near the upper right-hand corner of the iTunes window):

click the button for your idevice

This will take you to the Summary page for the plugged-in device. You’re going to install iOS 7 for the device by restoring your iDevice using the iOS 7 package you downloaded. You can specify a package to restore from by holding down the option or alt key while clicking the Restore button:

hold option or restore key

This will bring up a “select file” sheet. Choose the .ipsw file from the disk image containing the appropriate iOS 7 package. Once you’ve done that, the installation process should take about 10 minutes, including the setup of your device.

Categories
Uncategorized

How to Cover Your Ass When Your CxO Refuses to Use a Passcode on His/Her Mobile Device

marissa meyer unlocked phone

In an earlier article, I wrote that Yahoo CEO Marissa Meyer doesn’t lock her phone with a passcode. She’s breaking a cardinal rule of corporate smartphone IT, and she’s not alone. I’ve talked to a number of executives during consulting sessions, asked for shows of hands at speaking gigs, and simply asked people at meetings over drinks if they lock their phones with passcodes, and a lot of them simply don’t. Even those who use passcodes often go with terribly simple, easy-to-guess ones like this one from Spaceballs:

The story has stayed pretty much the same over the past couple of years, according to various surveys:

It’s the classic trade-off of security vs. convenience, or as Meyer puts it: “I just can’t do this passcode thing 15 times a day.” It’s annoying, and a lot of people see security measures as just another way that the IT department’s role is to obstruct anyone from getting anything done with technology, as shown in this Dilbert comic from 2007:

dilbert 2007-11-16

A number of people store their passwords in the “Notes” app on their mobile device, but the number source of information leakage is the smartphone’s killer app for execs: email. You can find out a lot about a company through an employee’s email, and the high-ranking the employee, the more valuable the email is. A number of companies — some you’d never expect — hinge all their planning on a handful of spreadsheets that get emailed around between a small group of high-ranking people; I’m aware of at least one Fortune 50 company with a division whose finances hang from a single emailed-about spreadsheet (which often goes “out of sync” because different people often edit it at roughly the same time). Email, accessed through a stolen phone, can prove to be the keys to the kingdom.

Someone from Yahoo’s IT department probably had the unenviable task of trying to suggest to Meyer that she lock her phone with a passcode. Perhaps s/he even cited the relevant line in Yahoo’s IT policy. I’m gld I’m not that person.

It sounds as though Yahoo’s IT department will breathe a little easier once she gets an iPhone 5S, which sports a fingerprint reader in its Home button. Like any other authentication system, it isn’t perfect. The “gummi bear hack” of 2002, in which fingerprint sensors were fooled by fingerprints embedded in gelatin in a reasonably well-known trick that’s been effective at countering previous generations of fingerprint readers. There are conflicting reports on whether or not it would fool Apple’s sensor, which was designed by AuthenTec, one of Apple’s 2012 acquisitions. At this point, flawed or not, I’m sure that Yahoo IT are counting the days until Meyer gets her new phone.

because im the boss

One of the realities of office life is that the “C-suite” and any other employees with a certain rank or “pull” at the company will be exempt from the rules that apply to the rest of us mere mortals. When these exceptions concern IT security, the best you can hope for is to limit the consequences of a security breach and make sure your ass is covered. Here are my suggestions, culled from actual practice at real companies where I’ve either pitched or done some mobile device consulting, if you’re dealing with an exec who refuses to use a passcode to lock their smartphone or tablet:

  1. Try to sell the executive on doing the right thing and using a passcode. This is a little easier if there’s at least another person at the same level who does, a little more difficult if everyone’s ignoring the rules. You can attempt to cite things such as the recent ZDNet/Cisco/BT survey, in which they report that one-third of the organizations who responded have already experienced a security breach as the result of the loss or compromise of an unmanaged, unprotected, unsanctioned device.
  2. If they refuse to use a passcode, be sure to enable mobile device management (MDM) on their device and get remote wipe capability. You want these whether or not the executive uses a passcode, but when they’re going around with unprotected devices, the “nuclear option” of remote wipe is your only line of defense should the phone get lost or stolen. Since many people’s mobile phones are also their primary cameras, and since many people also use them as photo albums for pictures that they somehow fail to back up, you may want to look into “containerization” or “selective wipe capability”. The last thing you want to be is the object of an executive’s wrath because you wiped out the only photos of his first child’s first steps. An effective way to “sell” remote wipe capability is to just say it’s part of MDM, which will allow you to configure their email/calendar/contacts access, sparing them from having to do that.
  3. Try to get them to sign a waiver saying that they were advised of the risks and take full responsibility for the consequences. I’ve seen companies do this not just for execs who refuse to use passcodes to lock their mobile devices, but also for execs who use devices that IT is not ready to support or secure, such as the iPad in its earliest days.
Categories
Uncategorized

Mobile News Roundup: Phonebloks, Marissa Meyer’s Insecure Phone, iPhone 5C and 5S

Phonebloks: A Concept for a Modular Smartphone

What if phones could be assembled out of detachable blocks held together by a base, like Lego? That’s the idea behind Phonebloks, Dave Hakkens’ concept and social media campaign for a modular phone that would allow users to customize their phone using the components they want. In order to turn this dream into a reality, Hakkens is rallying people to lend their social media reach by the end of October in order to convince hardware and software vendors to get behind the Phonebloks concept. As of this writing, he’s reached over 147,000 of the 150,000 supporters he’s seeking, and he’s still got over a month left!

i don’t know which hardware vendors will buy into the idea, but I think it’s an opportunity for Ubuntu Touch to shine.

Marissa Meyer has the Tech Industry’s “Must-Steal” Phone

marissa meyer smartphone
Yahoo CEO Marissa Meyer doesn’t lock her phone with a passcode, and to make matters worse, everybody knows it now. At the TechCrunch Disrupt conference, she said “I can’t do this passcode thing 15 times a day.” I’ve heard similar from other “C-suite” people, whose rank often gets them exempted from IT rules that the rest of us mere mortals must follow. Unfortunately, these are the people who get the most sensitive email, from simple messages to spreadsheets with sensitive financial information and presentations outlining confidential plans and initiatives, and an unlocked phone is the gateway to all those goodies. As Tom Cochran, CTO of Atlantic Media (which owns the site Quartz) puts it, the leak of information through a smartphone is like a car accident: it may be low probability, but the cost is high enough to merit protection, whether it’s a seatbelt or a passcode.

The iPhone 5S’s thumbprint scanner is Meyer’s favourite new feature, and Yahoo’s IT department will probably breathe a sigh of relief when she gets hers.

iPhone 5C and 5S

Speaking of the iPhone 5S, here’s yesterday’s keynote featuring both it and its cheaper sibling, the iPhone 5C:

If you haven’t got time to watch the whole keynote, here’s The Verge’s “Under 4 Minutes” summary of the keynote:

And with these announcements, came the jokes:

star wars iphone 5S

iphone 5c crocs

nokia - imitation in the best form of flattery

Categories
Uncategorized

Misfile Under “Computer Science”

misfile under computer science

This article also appears in The Adventures of Accordion Guy in the 21st Century.

Categories
Uncategorized

A Man for All Seasons

stay at home playing video games

This article also appears in The Adventures of Accordion Guy in the 21st Century.

Categories
Uncategorized

Hire Justin Kozuch!

hire justin kozuch

Justin Kozuch is one of the better-known people in Toronto’s startup/indie tech scene, and he comes by his notoriety honestly. As a digital marketer par excellence, he’s worked on a number of notable projects, including:

  • Hailo, the smartphone app that connects taxis with people who need them, quickly and conveniently. Justin was their social media marketer and community manager, growing the brand from a virtual unknown to one of the go-to apps for Torontonians on the go.
  • Pixel to Product, a Canada-wide research project of his own creation that covered the country’s digital media industry. He won the Mesh Prize to fund the project, and its output was the comprehensive 2011 Canadian Digital Media Economy Report.
  • Community management for Radar DDB and OSL Marketing.
  • Social Media Week Toronto, where he was the lead events coordinator.
  • The TTC’s Customer Liaison Panel, where he gives Toronto’s transit system some much-needed advice on improving their customer service from the angle of technology and social media.

In a just world, Justin wouldn’t be looking for work. But it’s not a perfect world, and looking for work is exactly what he’s doing right now. If you need someone who truly gets digital marketing, social media, and PR, and who comes with my highest recommendations, go talk to Justin! Give him the opportunity, and he’ll take your company to great heights with his social media/marketing/community management savvy.

If you don’t need his services, please help spread the word! Send people to and use the Twitter hashtag #hirejustin:

hirejustin

This article also appears in The Adventures of Accordion Guy in the 21st Century.