Flappy Bird

Flappy Bird, for those of you who don’t know, was a smartphone game where users had to try and get a bird through as many obstacles as possible. I say had, as the app has been removed from the iTunes and Google Play – more on that later. I’m not sure I can really explain it much better than that, so take a look at this video to see it in action.

As you can see people take this game pretty seriously. The chap says how he has been playing it for about a week and that “it has totally consumed [his] life“. I tried the game on a friends phone and sensing that it was something that I was likely to get addicted to I decided not to install it myself. I am very glad I made that decision. In fact I have decided to take a total detox from all smartphone and tablet apps recently, and it really does feel great.

A screenshop of the Flappy Bird appUsually I install an app when I have some time to kill, but after a while, I seem to be wasting far too much time on pointless apps. I took a step back and saw that playing games such as Flappy Bird was just a waste of my time. This article is not asking you to stop using apps, but I do want to make people think.

I want to make people think, much in the same way that I suspect Dong Nguyen wants to make people think. Dong Nguyen was the creator of Flappy Bird and despite the fact that some sources report the game to have been earning around $50,000 per day in ad revenues, he took it down. The game was very addictive and didn’t really add any value to the lives of players. If anything, for many it just caused a lot of stress and aggravation.

Anyone who downloaded the game still has it, but if they uninstall it it is gone forever. Some people are selling their handsets with the game still installed on it, although many manufacturers advise against this on privacy grounds.

What I want to know – in the comments below – is what are your opinions? Was the developer right to remove the game? As a society are we getting more addicted to such games? If so, how are they affecting culture – or are they just a bit of harmless fun?

Oh and folks, please don’t go taking a hammer to your phone. 🙂

Is Windows 8 an attempt to create a united Windows?

It has been nearly two weeks now since Microsoft released its latest operating system: Windows 8. Windows 8 is probably the most extreme overhaul Microsoft have given its operating systems to date.

It would appear that Microsoft’s aim is to unify all devices with one standard operating system – which works on desktops, laptops, smartphones and tablets. Since the launch of Windows 7 just over three years ago, tablets have revolutionised the technology market – when Windows 7 was being developed, they didn’t exist. Windows Phone – the mobile operating system family – was also not around when Windows 7 was launched.

Until recently, the general perception of Microsoft was that it was falling behind in the rapidly evolving technology industry. Microsoft appear to have been aware of this, and that is reflected in the changes and developments they have made with Windows 8.

Tablets and smartphones are becoming widespread and more heavily depended upon than ever before, so Microsoft has moved to ensure that its new operating system works seamlessly with all our devices.

To do this the firm has simplified the range of operating systems that it offers. If you wanted to purchase Windows XP, then you could choose from XP Home, Professional, Media Center Edition and 64-bit Edition – among others. Vista made the choice even harder with Starter, Home Basic, Home Premium, Business, Enterprise, Ultimate and then other 64 bit variants to choose from. Windows 7 similarly offered many different versions of what is arguable the same operating system – give or take a few features.

Microsoft Windows 8If you want to buy Windows 8, your choice is much simpler: Windows RT, Windows 8 and Windows 8 Pro. Microsoft believes that those three variations of Windows 8 are all the consumer will ever need, no matter what their device or needs. Windows 8 and its three variations will (Microsoft believes) cater for all uses of the operating system (e.g. educational use, entertainment use, business use, etc.) and all devices that you might want to use it on – i.e. tablets, smartphones, desktops and laptops.

Windows 8 is a bold move by Microsoft, and it appears to be working for them – at least at the moment. I get the perception that the industry is a little taken aback by the release.

Major Features

There is no-doubt in the fact that Windows 8 is a major change from the operating systems we are used to from Microsoft, but what are the most notable changes?

  • No start button – for the first time since its introduction in 1995, Microsoft have decided to remove the iconic start button from the operating system. It is possible to get the button back if you want, but its not how the operating system is designed.
  • Touch-enabled – all three variations of Windows 8 are touch screen compatible. If your computer supports multitouch, then you will be able to control your PC via touch! All versions also support the conventional mouse and keyboard.
  • Cross device compatibility – Windows 8 can be run on tablets as well as laptops and desktops.
  • Tiles replace the desktop – no longer does the operating system revolve around the desktop, as it has done for so long, users now access software and applications via a start screen which is a series of ’tile’ style menus – similar to the way many smartphones operate. Windows Phone 8 and Xbox also run a similar tile welcome screen interface. The desktop is still there, just not the main focus.
Windows 8 tyle start screen

Windows 8 new tile style start screen

So, what do these changes mean to me and you? Well it would appear that there is a really big move towards more integrated, purpose built systems, or as they are starting to become known all in ones. This is mainly due to the touch screen capabilities that Windows 8 offers.

Devices which need fewer input devices (like mice and keyboards) and have inbuilt screens are really those best suited to Windows 8. If you want to see some examples, take a look at some of the all in ones from Ebuyer.

What are your thoughts on Windows 8? Do you like the idea of a more united Windows, or do you prefer your devices to work independently?

How to safely operate a bring your own device policy

Technology is growing by leaps and bounds and companies of every size are constantly looking for ways to leverage all of the benefits that these technological advances can bring them. It may not be cost effective for companies of any size to jump on every single new technological wonder, even when the price of technology is at an all-time low.

There is a way for companies to benefit from the latest and greatest technological gadgets without having to make any type of monetary investment. Portable devices are making their ways into the hands of people all over the world. Just about everyone has a smartphone, and tablet computers are quickly becoming the norm.

Many companies are choosing to adopt a ‘Bring Your Own Device’ policy in order to take advantage of these technological advances without incurring any type of costs, but there are security risks involved with a Bring Your Own Device Policy. Here are five things that companies can do to ensure their data does not end up in the wrong hands.

Know who is accessing data, and what devices they are using to do it

The very first step towards a successful ‘Bring Your Own Device’ policy is understanding what types of devices are being used to access data. It is also important to understand which employees are accessing which data.

A security audit is a great way for businesses to get a better understanding of exactly what types of devices are being used by employees to access sensitive corporate data. This will help a company determine exactly how to move on to the next step in securing their data in the mobile world.

Decide what data devices can access

The very first conclusion that many companies are jumping to is restricting access to corporate networks via personal devices. This is not the right choice. A security audit should have identified what types of devices are accessing the network.

The next step to properly protect data is to classify it and the networks that are being used to send and retrieve the data. By classifying data, businesses will be able to get a much better look at the areas that need protection, and the areas that do not. Once the data has been classified it will be much easier to see the bigger picture. Companies will be able to set forth a policy that allows certain groups of people access to certain areas of data.

Identify problem apps

Not every app will play nice. Some apps have been known to have huge security vulnerabilities. These apps, without notice to the user can copy and send address lists and personal photos through the corporate network.

The two most popular mobile device operating systems are both guilty of these two examples. iOS which powers Apple devices, and the Android operating system have both been known to have these same security problems. Once the problem apps are identified, they can be prevented from being installed through company networks. Another solution is to restrict app downloads to a company approved app market place.

Create company policies to help reduce mobile security problems

Once these other issues have been addressed, companies will need to create strict policies that will teach employees what can and cannot be done with their own devices on a company network. If an employee uses their own mobile device to conduct work in the work place, a strict policy should dictate what he or she can or can’t do with the device. These policies must also have strict repercussions for any employee that chooses to violate them.

Enforcing policy with software

A security key on a keyboardThere are several solutions on the market that can and will help corporations manage all of this information. These resolutions are called Mobile Device Management Solutions. These types of solutions will allow corporations to enforce the policies that have been set during all of the previous steps.

A mobile device management solution will protect data, manage apps, address mobile device security, protect content, and protect emails. A mobile device management system will also be compatible with every major mobile device operating system on the market.

Allowing employees to use their own portable devices should not present a security breach to any company regardless of its size. Proper planning will always be the best way to prevent any sort of problems.