Archive for January, 2017

Online Coaching Tool CoachThem Launched

Posted in Commentary with tags on January 31, 2017 by itnerd

Recently retired Montreal Canadien defenseman Mike Weaver and Florida Panthers Goaltending Coach, Robb Tallas have channeled their years of on and off-ice experience in professional hockey to develop CoachThem, an online resource web app geared towards coaches of all levels.

In addition to their NHL playing careers, both Weaver and Tallas have spent years running elite training camps for aspiring hockey players. This ongoing coaching experience has led them to embrace the benefits that technology brings to hockey coaches, associations and ultimately aspiring athletes, to aid in developing, maintaining and leading effective practices. It all began when Weaver played for the Florida Panthers, and he and Tallas had a discussion about the gap n the market – there was a need for something simple that worked on all platforms, across all operating systems.

CoachThem, provides coaches and associations with a digital platform to create, custom practices, drills, and share with the sports community. Gone are the days of binders and lost sheets of paper – this web-based tool allows anyone to compile practices on any device or operating system.

The tool provides coaches with the ability to:

  • CREATE – Draw digital drills with a mouse, finger or pencil. Never been easier.
  • ORGANIZE – Create practices before arrival to the rink. Stay informed.
  • DISCOVER – The marketplace feature offers new and unique drills. Grow as a Coach.
  • SHARE – Share with your Coaching staff, association or a friend. Makes the game better.
  • CUSTOMIZE – Create personal groups to share information. Spread the Love of the game.
  • EDUCATION – Learn more about the game through video tutorials. Teach accurately.

Operating as a web app, there is no need for downloads or updates – CoachThem is constantly evolving and subscribers will be privy to the most recent version each and every time they log on. There is no use of Adobe Flash Plugin which has been known to cause damage to computers due to it’s vulnerability to hackers.

The tool is available on an annual subscription basis, for $5 per month. That fee allows access to the Marketplace, where additional information, drills, customized practices created by the former NHL players and current NHL coaches can be accessed.

Here’s a video of CoachThem in action:

My Trip To India & Germany – Part 8

Posted in Commentary with tags on January 31, 2017 by itnerd

A reader just e-mailed me asking this question:

Hey IT Nerd. During your most recent trip, you used Rogers Roam Like Home roaming feature. I didn’t see you draw a conclusion about whether it is good, bad, or ugly. What are your thoughts on it? 

Thanks!

Thanks for the reminder. I completely forgot about tying up this loose end from my trip.

Roam Like Home was seamless. Every country (US for about 45 minutes, India for just over 2.5 days, Germany for just over a day) that I went to, I got a text message like this one when I took my phone out of airplane mode:

img_0088

It was seamless as everything worked right out of the gate and I didn’t really have to do anything special. That was great. I had access to my Toronto cell phone number in case it was needed and I had access to the data on my data plan which meant I got my e-mail, I could see Twitter, use Apple Maps or whatever. No complaints on that front.

Here’s where I feel that Roam Like Home doesn’t measure up – The cost. If I do the math on how much this might cost me (as I have not received my Rogers bill yet, thus I am estimating), I get this:

  • I was on the ground in the US for 45 minutes: $5
  • I was on the ground in India for just over 2.5 days: $30
  • I was on the ground in Germany for just over a day: $20

Total cost: $55

The FAQ for Roam Like Home indicates that I am charged per 24 hour period. Thus I assume that I have to round up the number of days to get the final cost. If that is the case (and even if it isn’t), that’s not cheap. To give you some perspective, the last time I was in India, I used a Vodafone India SIM for roughly $12 CDN for the entire week that I was there. That makes the $30 CDN that Rogers is likely going to charge me for roaming in that country for just over 2.5 days steep by comparison and reconfirms the fact that if you want to travel abroad with your mobile phone, the best option is to get an unlocked device and buy a local SIM card. The only scenario that I can see myself using Roam Like Home in the future is if I go to the USA as the $5 a day is reasonable. Thus my recommendation is that if you don’t want the hassle of getting a local SIM or you don’t have an unlocked phone, Roam Like Home from Rogers is seamless, convenient and it works. But you will pay a hefty premium for that. I’m not sure it’s entirely worth it unless you really need access to your Canadian phone number.

#Fail: LG’s UltraFine 5K Display Is Useless When It’s Within 2M Of Router

Posted in Commentary with tags , on January 31, 2017 by itnerd

You have to wonder if anyone QA’s their products these days. I say that because this story from 9to5Mac details how the LG UltraFine 5K Display which is Apple’s recommended monitor for their new MacBook Pro notebooks is pretty much useless when it is within 2M (about 6 feet) of a wireless router:

The problem is UltraFine 5K Display becomes unusable when positioned within 6.6-feet of a router. I discovered this issue after purchasing my own UltraFine 5K Display last week and thinking something was defective with my hardware.

Right out of the box, UltraFine 5K Display was hardly usable as it would consistently disconnect and even freeze my MacBook Pro which made it unusable for work on Thursday and Friday. Connecting it to my MacBook Pro consistently resulted in needing to reboot my machine to continue working.

And:

I moved my router from the office to the living room and tested UltraFine 5K Display with my MacBook Pro on my desk and found that it stayed connected  in this spot for the first time.

Since moving the router to another room, UltraFine 5K Display has remained connected without issue.

I’d bet that other products besides routers will trigger this behavior. Nobody has stumbled upon them yet.

Given the amount of money and time poured into these products, you’d think they’d have done proper EMI susceptibility testing at some point. It’s moderately expensive, but easy enough for LG to afford. But clearly they didn’t do that, and now it’s an issue. If I owned one of these, I’d have to be pushing for them to take it back. Plus, Apple must have some egg on their faces as well seeing as they’ve recommended this monitor as they’re out of the monitor business. Perhaps they should choose their partners more carefully?

Yet Another Security Flaw Found In Netgear Routers

Posted in Commentary with tags on January 31, 2017 by itnerd

Seriously, what is up with Netgear these days?

After having some serious security flaws pop up last year, comes this latest one found by researcher Simon Kenin of Trustwave. According to this post, he found that by triggering an error message, the router can be tricked into handing over a numerical code that can then be used with the password recovery tool to retrieve the router’s administrator credentials. But what is worse is that Kenin also discovered that in many cases, the numerical code is not even necessary, and that random strings sent directly to the password recovery script would still cause the login information to be displayed. From there, it’s a trivial task to pwn the router. There are 31 different Netgear router models that are affected by this flaw and Netgear advises that you update your firmware right now.

Charming.

You really have to wonder if Netgear takes the security of its products seriously. I get that any vendor can have security issues with their products. But the scale that Netgear seems to have these sorts of issues seems really high to me.

Canadian Tech Community Pens Open Letter In Response To Trump’s #MuslimBan

Posted in Commentary with tags on January 31, 2017 by itnerd

Over the weekend, President Donald Trump signed an executive order banning travel to the United States from Iran, Iraq, Syria, Sudan, Libya, Yemen and Somalia for 90 days. He’s also suspended bringing in refugees from Syria for an indefinite amount of time. Because those countries are Muslim majority countries, he’s effectively banning people based on faith.

In response to this, The Canadian tech community has issued an open letter to the world that condemns the actions taken by President Trump. The letter also calls on Canadian Prime Minister Justin Trudeau to immediately give temporary residency to those displaced by the U.S. order. That’s something that may happen tonight as the Canadian Parliament is going to hold an emergency debate on the issue. As I type this, over 1000 people from 600 companies have signed this letter. Many of whom are C-Level execs, and includes many notable names in Canada’s tech community. These people have joined their counterparts in the US who have also denounced this move by Trump.

My take on this issue goes something like this. We all benefit from having diverse views and experiences at the table. We hurt ourselves when we exclude people for any reason from any discussion. This ban is nothing short of overt racism towards those of the Muslim faith. Thus this cannot be tolerated.

You can add your name to the letter here.

Review: Noyce 4m Lightning To USB Cable

Posted in Products with tags on January 30, 2017 by itnerd

I have a very unique cable in my possession to review. It’s the Noyce 4m Lightning To USB cable. Here’s a look at it:

IMG_0160.jpg

This cable has a bunch of things going for it. Let’s start with the fact that the cable is 4m long. That’s 13 feet in old money. That’s an insanely long cable which makes it perfect for desks, or your bedside, or any use case where length matters. Here’s another item that this cable has going for it:

IMG_0162.JPG

To keep things neat and tidy, not to mention looking classy, there’s this Brazilian leather strap.

IMG_0161.JPG

The ends are apparently tested to be able to bend 5000 times for durablity. Not only that, I found that this connector fit into the cases that I tried it with.

What’s missing from this cable? MFI certification. That’s clear when I check this Amazon page which says this:

screen-shot-2017-01-30-at-7-27-14-pm

Thus if you buy this cable, be prepared for it to not work with your iDevice. Though in my testing, it worked with every iPhone I tried it with. This cable costs $19.90 on Amazon. In short, I love the length, the leather strap, and the fact that it’s durable. But the lack of MFI certification gives me cause to pause as that is important. Thus you should keep that in mind if you choose to buy this cable.

An Update On Australian Hyundai Owners Attempts To Get Android Auto/Apple CarPlay

Posted in Commentary with tags on January 29, 2017 by itnerd

Seeing as some progres is being made for Canadian Hyundai owners to get Android Auto and Apple CarPlay in their cars, I’m going to focus on Australian Hyundai owerns to get the same in their cars.

The people behind this in Australia have set up a Facebook page which is only 4 months old and already has attracted 133 members. That’s a signifcant jump from when this page was set up last October. On top of that, 121 members have now signed a petition to asking Hyundai Australia to implement Apple CarPlay/Android Auto in the Hyundai Tucson. But the most striking thing is the comments on the Facebook page. Here’s some examples: 

screen-shot-2017-01-29-at-7-51-11-pmscreen-shot-2017-01-29-at-7-51-49-pmscreen-shot-2017-01-29-at-7-52-24-pm

image1.PNG

Clearly Hyundai Australia has a major perception problem. In my opinion, it would be smart if Hyundai Australia got out in front of this before it really spirals out of control because of negative press. The person behind this Facebook page is going to e-mail the CEO of Hyundai Australia to see that will generate some action. I’m also going to try and see if there’s any chance to get a word with Hyundai Australia to see if I can get their side of the story as well. Thus watch this space. 

Ooma Expands Into Smart Homes & Home Security

Posted in Commentary with tags on January 29, 2017 by itnerd

In a bold and significant new trajectory, Ooma who is better known for its VoIP phone offering—has just released the Ooma Home Monitoring System. Designed to work with the Ooma smart home phone service – the Ooma Telo – the system includes motion, water, door and window sensors in addition to the unique ability to remotely place a local 911 call from the home, thus providing all-encompassing protection and peace of mind for consumers.

Ooma Home Monitoring 2 (1).png

The system offers the following:

1. REMOTE 911 CAPABILITIES: Ooma users can remotely trigger a call to 911 from their home, using their cell phone to be conferenced into the 911 call.

2. MOTION SENSOR: Ooma’s motion sensor is estimated to have up to three times the area coverage and four times the battery life compared to leading competitors. The sensor can be mounted in any 90-degree corner in the house.

3. DOOR/WINDOW SENSOR: Worried about burglars? Ooma Home Monitoring can automatically notify you any time a door or window opens while you’re away.

4. WATER SENSOR: If a defective washing machine or water heater floods the room, Ooma users will immediately be alerted via text message or a phone call so necessary actions can take place and avoid further damage.

Consumers can manage the system and monitor the status of each sensor via the Ooma Home Monitoring Mobile App on their iOS or Android mobile device. Users can select from a variety of real-time notifications including a phone call, SMS, email alerts and app notifications. The Ooma Telo device can also deliver voice announcements when a sensor is triggered or when “home” or “away” mode is changed. Ooma Home Monitoring is the only solution to provide the option to remotely dial 911 from your home phone number, even when you’re away, and speak with your home’s local emergency dispatcher, who will automatically receive your home address information to facilitate the fastest response time possible.

Ooma Home Monitoring supports up to 100 connected sensors using the latest version of the Ooma Telo. Sensors work wirelessly using the same DECT (Digital Enhanced Cordless Telecommunications) technology used by hundreds of millions of cordless handsets worldwide and are easily installed. This eliminates the need for professional installers, and gives home owners and renters a simple and affordable home monitoring system.

All Ooma customers will receive the Ooma Home Monitoring service free for the first sensor (door/window, motion or water). For each additional sensor thereafter, Ooma Basic service customers can subscribe to Ooma Home Monitoring for $5.99 per month, while Premier service customers can use the service at no additional cost as a part of their Premier service plan. The water sensor retails for $29.99 MSRP, the motion sensor for $34.99 MSRP, and the door and window sensor for $24.99 MSRP. Ooma Home Monitoring will be available in Q1 and can be pre-ordered from Amazon.com starting today.

Guest Post: Is Your Network Protected? Cyber Crime in the Age of Information

Posted in Commentary with tags on January 28, 2017 by itnerd

By Mallory Weiler

Within the last four years, online security and data breaches have grown increasingly threatening, compromising big name companies such as Target, Home Depot and Sony Corporation. Yahoo became the most recently identified victim of a major hacking in mid- December of 2016, although the breach dates back as far as 2013. The attack compromised 1.5 billion user accounts, which is reportedly the largest of all time. Affected users have been advised to change all passwords associated with their Yahoo accounts, and surveillance technology is reportedly being designed to allow companies to more easily monitor customer accounts. Despite this, Yahoo is currently in negotiations to sell its core businesses to Verizon Communications and change its name to Altaba. However, because the merger discussions were started before the recent discovery of Yahoo’s breach, Verizon has not yet reached full conclusions on closing the deal. As such, they are expected to reevaluate the terms in the second quarter of this year.

While cyber crime often targets companies for immediate financial gain, hacking in the United States is by no means limited to the theft of personal information or card numbers taken from major businesses. According to the US Intelligence Community, Russia sought to influence the 2016 US presidential election in the most daring and direct attack thus far. This release states: “In July 2015, Russian intelligence gained access to Democratic National Committee (DNC) networks and maintained that access until at least June 2016.” By acquiring this information, Russian hackers were able to provide WikiLeaks with key material that fueled negative public perception of presidential candidate Hillary Clinton. Considering the scope of these attacks, it is reasonable to expect that larger-scale threats will only become more commonplace.

A 2016 report by the Ponemon Institute, an independent data security research firm, found that companies that experience a data breach in the US pay an average of $158 per record for recovery, which includes any sensitive, protected or confidential data that has been lost or stolen. Additionally, as the percentage of services conducted online grows, the amount of sensitive information available to hackers also rises, increasing the risk of cyber attacks. In fact, IBISWorld estimates that the share of services conducted online will grow 4.7 percentage points from 2017 to 2020. Fortunately, there are steps businesses can take to help insulate themselves against security breaches, including leveraging network security equipment, security software and IT consulting services.

Breach-by-number-of-records.gif

Network Firewall Security Equipment is an electrical component that typically includes a firewall designed to block unauthorized digital access while simultaneously allowing outgoing communication. Such security equipment also allows users to customize their overall level of protection and network encryption. Specialization of the firewall is specific to individual companies based on how they interact with and use the internet; different functions require various capabilities. Due to the growing threat of online data breaches, demand for network firewall security equipment has been rising, although the availability of substitutes has prevented faster growth. As such, prices have been rising at an annualized rate of about 1.2% in the past three years. IBISWorld forecasts, however, that prices will stagnate from 2017 to 2020 due to declining input costs.

This kind of security equipment is typically ideal for small businesses- especially those that operate retail locations, which experience a high volume of traffic from smartphones and other devices that connect to their wireless network. However, large pieces of network firewall security hardware often require climate-controlled office spaces and significant maintenance work that some small firms may not have the means to provide. In cases such as these, the buyer will have to look to other, less costly security options.

Security Software is another option for small and midsize businesses, and typically provides virtual firewall protection and resistance to intrusion. The software also reports instances of malware detection to the supplier so the software can be updated on other machines, which allows it to better field disturbances on machines that have not yet been infected.

Many of these software products can also purge any intrusive software it discovers. Security software is simple to install and operate on most machines, setup is generally very easy and the software is continuously updated to battle the latest invasions automatically. As a result, small businesses without the resources for large-scale hardware purchases can easily buy and implement software as a cybersecurity solution. Companies like Norton, Avast and AVG also offer complimentary (i.e. open- source) cybersecurity software for businesses and individuals. The intense resultant competition at the production level has been contributing to a 0.9% annualized decrease in the market price of security software over the past three years. IBISWorld also forecasts that despite growing demand, an influx of new software suppliers will contribute to a continued 0.9% annualized decline in prices through 2020.

IT Consulting Services are typically employed to assist in the auditing, development and implementation of proprietary security systems or software. While security software is preferable to smaller companies, IT consultants are typically only used in large-scale projects, so their buyers tend to be large corporations with large budgets. This is because it takes years of providing quality service for these consultants to establish brand equity. Consultants rely on their brand names to win business, which curbs the speed at which new players can enter the market. As a result of these factors, IT consulting is a costlier option in relation to hardware and software solutions.

Michelle Hovanetz, a Lead Business Research Analyst at IBISWorld, states that, “rising technology usage has bolstered demand, leading to growth in prices.” As such, suppliers have raised the price of IT consulting at a rate of about 1.2% per year on average from 2014 to 2017. Hovanetz continues by adding, “Fortunately, an increasing number of suppliers in the market helps to offset the speed at which prices grow.” IBISWorld forecasts that demand for these services will lead to price growth at a slightly slower annualized rate of 1.1% in the three years to 2020.

Breachby-cost.gif

Keeping Your Business Safe

As businesses’ operations continue to be transformed by innovations in technology and automation, their sensitive data will become increasingly vulnerable to attacks. Without sufficient defensive measures in place, businesses will face a higher risk of incurring massive damages. With the threat that hackers, both domestic and foreign, will only intensify their cyber operations in the coming years, there is no better time to invest in cybersecurity measures. In fact, cybersecurity is the top spending priority for 2017, according to a survey conducted by The National Association of State CIOs. This also includes cybersecurity insurance, which has become increasingly important as more companies work to mitigate financial losses brought on by cyber threats. Although it is unknown what kind of payout Yahoo will incur, past breaches indicate that it is common for companies to be required to compensate affected customers for any inconveniences. Compared to the costs of a potential data breach, IT infrastructure protection and its accompanying insurance are relatively inexpensive. Whatever the size of the business, there are comprehensive, affordable cybersecurity solutions available. Businesses should protect themselves now—can you afford not to?

For a printable Is Your Network Protected? Cyber Crime in the Age of Information, click here.

Guest Post: How to Avoid Fake Apps and Stay Private Online

Posted in Commentary with tags on January 28, 2017 by itnerd

When one searches for an app on Apple or Google’s Play store, there will be a list of apps that resemble the original one, but are actually fake copies. Even if Apple – as well as Google – have a tough scrutiny of apps, new malicious apps appear every day.

This month, the biggest fake app scandal on Google Play store happened with the Indian BHIM app, launched to enable citizens to make digital payments. Numerous duplicates soon followed, some of them asking for permissions to review users’ personal information.

If an app is not free, or if it’s a shopping app that requires credit card info, or happens to be any other payment-related app, it is potentially very hazardous for the person who’s downloading a look-alike application.

It has been asserted that while some apps simply have the aim to share ads, there are also many that seek to steal the user’s identity and credit card information. These apps can use malware to steal personal information or can even tinker with the phone and lock it up until the user pays a ransom.

Simple tips about recognizing the fake apps:

1. Incorrect use of language. Since most fake apps are made in haste, often where English is not a native tongue, they might use broken English grammar. Users should pay attention to spelling and grammar in any app descriptions if they have any doubts about its originality.

2. Lack of reviews. Fake apps typically won’t have any user reviews – so that’s a definite sign an app could be  a fake.

3. It’s especially important to pay attention to retail apps. Many fake retail apps pop up before major holidays – such as Zappos, Nordstrom, Christian Dior and many others. Retail apps that ask users for their credit card info should be especially monitored.

4. Correct developer’s name. Users need to check for the name of the developer in the corresponding category, and avoid downloading apps that have a wrong or misspelled developers’ name.

5. Website domains in the title. Some apps will feature the website in their title – that might also be a red flag.

6. Variety of Apps. If an app is fake, the developer is likely making all sorts of apps that can cover anything from gardening to games to retail shopping.

7. Leading to the website. If it’s a paid app or if it conducts any transactions and if it does not lead to a company website, something is amiss.

8. Deals. If the app promotes a deal that is too good to be true, be suspicious. 

Overall, staying vigilant when downloading apps is just one example of avoiding threats to your personal data. Internet users can also be proactive in ensuring they are taking additional steps to stay private and secure online. 

The list of some of the most important privacy and security apps of 2017:

Signal is an encrypted messaging and voice calling app that provides end-to-end encryption to secure all communications. The app can also verify the identity of people one is messaging with and the integrity of the channel they are using. When texting with non-Signal users, one has an option to invite them to an encrypted conversation via Signal.

NordVPN (Virtual Private Network provider) is a must-have encryption app. A VPN encrypts the data shared across the Internet, and is the best security mechanism to ensure the Internet traffic remains confidential. NordVPN has a reputation of focusing on security and having a zero logs policy, is fast and easy to use. The developers at NordVPN have launched a powerful new VPN app for Android, iOS, Mac and Windows devices  that is also intuitive and focused on user experience. NordVPN app re-routes and encrypts all Internet traffic making the connection private and secured. For added security, NordVPN offers DoubleVPN servers.

my Secure email is an email app for managing various email accounts from various providers, which puts security first.  It offers encryption of sent emails, lock screen, password-protected digital signature and more. In addition, there are a few other good examples of secure email providers, including Tutanota, or the Gmail-like ProtonMail that offer an automatic end-to-end encryption, and no personal information is required to create a secure email account.

DuckDuckGo is for those who want more private browsing experience. It’s a search engine that provides information from hundreds of sources, and keeps the search private.

Besides security and privacy apps, everyone should be extra vigilant when sharing information on their devices, encrypt when using public Wi-Fi, update antivirus software, fire-up the the firewall and always use strong passwords.