Kill the Password

This week I would like to draw readers’ attention to an article that appeared in Wired at the end of last year. Written by Mat Honan and entitled Kill the Password: Why a String of Characters Can’t Protect Us Anymore, it makes for really interesting and alarming reading.

The author starts by explaining that he lost all of his digital life last year as his accounts were hacked, an event that lead him into investigating online security and how it is breached.

What he discovered is not for the faint hearted. The linking together of different accounts using an email as username means that any seriously interested party with a little time on their hands and very little money can relatively easily get into a single account, and from there into the others.

His conclusion is that the culture of using passwords for security is outdated, a thing of the past and that anyone who tells you otherwise is either deluded or trying to convince you of something that is not true.

The worst password choices

Worst passwords of 2012

The availability of information is a problem because of the personal question access to resetting your password. Mother’s maiden name, place born etc. are easy things to find out about anybody through ancestry sites or other documents. Once you have somebody’s email address, you try to reset the password using the personal questions through the provider’s website. The answers might be on Facebook, or on their blog, or maybe intuitive, but they are out there.

Then to the customer services rep that you speak to by phone. They are people and can be misled. The article contains a transcription of a conversation between a hacker and one of these people. As the user needs to be able to reset the password they are offered a series of questions that get easier and easier to guess. Names of best friends is possible using Facebook or other social network publications, but if not try favourite food or others, but the example given is name of one of the files in the account. Try Google, Amazon, Personal, one will be right.

So the problem is that the system needs to be flexible and easy enough to use, so we must be able to easily change our passwords, but this makes security impossible.

How can this problem be addressed? Here the trade off is privacy. If the company knows you, through your search histories, places you have been, where you work and what you like to do they might better be able to tell if the password reset-er is you, but you lose any privacy you think you might have.

Voice recognition can be tricked using recordings, biometrics and fingerprints too. Once a system uses these things that cannot be changed or reset the problem is magnified. If I have a fingerprint lifted from a screen I can use it to get anywhere and new fingers are hard to come by these days, so what do you use next?

The article poses these problems from the point of view of somebody who has been hacked, but the author also looks at who these hackers are and even meets a couple. It is big business in certain circles, particularly in the Russian speaking world where organized crime has a large stake and makes a lot of money through stealing identities and all that follows. In other circles they are just “kids” having some fun wreaking havoc.

There are a few simple strategies outlined in this (not short) article that are worth following but none are foolproof, and that is a lesson we could all learn from. Just a word of warning, it contains some harsh language.

On a lighter note happy new year to everyone, and my mum’s maiden name was Windsor (no relation to either Barbara or Elizabeth).

Jump Start Your Revenue Generation In The Cloud

Independent software vendors (ISVs) need to constantly release new products, upgrade features to existing products and maintain market share in an era defined by shifting tastes and a quickly evolving consumer base. Cloud based solutions can facilitate this process and help to jump-start your revenue.

According to Jiten Patil, cloud expert and senior technology consultant at Persistent Systems, customer “stickiness” is never guaranteed and poses a challenge to the ISV revenue cycle. But take heart, there are a few simple solutions to address these challenges and none will require shifting resources away from your core business.

Computing from the cloudPatil breaks the large ISV landscape into two general categories. The first are ISVs that are introducing a brand-new product, whether they are a startup or an established firm releasing a renascent offering. The second are ISVs retooling existing solutions to take advantage of customers’ new interest in cloud-computing technology. Regardless, nearly all ISVs can boost revenue generation by following a few simple steps.

1. Refine Your Strategy and Accelerate Your Go-To-Market Process

ISVs must develop new methodologies to bring products to market quickly. This means that you must make sure that the product design facilitates fast product delivery. According to Patil, it should be a priority to accelerate the marketing, promotion and sales process so that the all-important order-to-cash process can begin.

It’s important to hire talent with skill sets that support your product deployment strategy. You will want to complement your engineering talent with employees with strong skills in sales, marketing and cloud based product delivery.

2. Identify Your Unique Cloud Roadmap, and Build In End-to-End Revenue Generation

Patil said companies must first identify a unique cloud roadmap. This roadmap may deviate from traditional cloud-based solutions, or it may imitate a go-to-market strategy that’s already proven successful. Whichever route your company chooses, make sure that you’re working toward creating an end-to-end revenue generation process throughout the duration of the promotion, marketing and sales cycles. ISVs should employ strategies like continuous delivery of promotional content, new product trial offers and value-added features, Patil said, to keep clients engaged.

Of course, the cloud can facilitate product updates on-demand to quickly address software problems. However, according to Patel, ISVs should also use the cloud to keep customers apprised of new products, solutions, updates, and other information in real time. Together, these processes can build brand awareness and expedite the go-to-market process.

3. Use Cloud Solutions for Continuous Packaging and Distribution

ISVs should consider how cloud based technologies can be used for packaging and distribution of their applications. The cloud can also provide an extended development and testing platform for your products. This can streamline and speed up your product development and quality assurance process and enable you to begin generating revenue more quickly.

By following these guidelines, ISVs can use the cloud to accelerate the revenue generation cycle. ISVs ultimately need to plan for continual growth by embracing the new business strategies engendered by cloud computing. Doing so will ensure your business will remain competitive for years to come. Rackspace Hosting is the service leader in cloud computing, and a founder of OpenStack, an open source cloud operating system. The San Antonio-based company provides Fanatical Support to its customers and partners, across a portfolio of IT services, including Managed Hosting and Cloud Computing.

An analysis of the iPhone 5

Is is nearly 3 months since the 6th incarnation of Apple’s iconic iPhone, the iPhone 5, was released. Often I think it is more interesting to discuss a technology a few months after its release, rather than just straight away, as faults have been exposed, and there are opinions about long-term use.

In this article I am going to explore what the critics think of the iPhone 5, the good, the bad and the faulty!

So what makes the iPhone unique from any other phone? Samsung would argue very little, because as soon as Apple’s latest smartphone was released, Samsung announced that it was filing a lawsuit against Apple, because it had infringed many of its patents.

Size and Weight

The iPhone 5
The iPhone 5 is bigger than its predecessor (the iPhone 4S). It is taller, the same width, and slightly thinner. When smartphones first hit the market, there seemed to be a race to make them smaller. Now however, the trend seems to be towards developing a bigger screen. Tablets are getting smaller and smartphones are getting bigger – will the two ever merge? I think they might, so watch this space!

Despite being bigger, the latest model is 28g lighter than the previous model, weighing an amazing 112g. Considering the technology inside the device, that is an impressive weight!

Camera

The pace of development of inbuilt cameras in mobile phones is staggering. The iPhone 5 has an 8 megapixel camera, which is very competitive considering that just a few years ago, 8MP was pretty good for a digital camera – which isn’t also a phone.

Reception

One of the main criticisms of the iPhone 5 is that it has stopped being a phone. Logically the primary purpose of a smartphone should be to call and text people, browsing the internet, using apps, taking pictures and other features are optional extras, and shouldn’t be the main function of the device. That said, there have been many reports about people finding that the iPhone 5 has really bad signal problems. I know of two people who are on the same network, one with a Samsung Galaxy S III and one with an iPhone 5. The person who owns the Galaxy can almost always get signal, whilst the person who owns the iPhone can’t. When the phones are in the exact same place, the Samsung device can get signal, but the Apple device can’t.

Speed

Because of all the new features of the phone, it needs to have a good processor, and it does. There was hope that it might have a quad-core processor, which it didn’t, however it does have a pretty good A6 processor, which is very speedy, and is what makes the iPhone 5 feels quick and slick. Match that performance with the 4-inch Retina display, and you have a very fast and flashy phone!

Siri

Siri has seen a few updates, but nothing major. The initial introduction of Siri in the iPhone 3GS was revolutionary, and there is still relatively little viable competition out there for Siri, however one expects an iPhone to come with Siri these days.

Maps

The iPhone 5 was the first phone released by Apple with iOS 6 – which had Apple Maps installed. Apple Maps is Apple’s own version of Google Maps, which has replaced Google Maps on the operating system.

Some of the navigation features have been praised, as having better clarity and being more useful than the Google alternative; especially due to the inbuilt Siri compatibility.

That said, there are major issues with Apple Maps, in that it can be really inaccurate. Australian police have actually advised people against using the software, after they had to rescue motorists stranded in the wilderness of a national park who were trying to find a city, which Apple Maps thought was in the middle of the the wilderness, not where it should have been!

Many places are not where they are meant to be, some just a few miles out, others quite a lot further! One example is Berlin. You know, that city in Germany. The capital city of Germany. Well according to Apple Maps, Berlin is on the continent of Antarctica, which isn’t only the wrong continent, but also the wrong hemisphere! Have a search for Apple Maps fails, and you get some pretty funny results!

Berlin, Antarctica - Apple Maps

Apple Maps really does think that Berlin is in the Antarctic!

Awards

The iPhone 5 isn’t short of awards. The phone is top of Time Magazine’s top 10 gadgets list 2012, which is a big achievement!

Sales of the phone are something else for Apple to celebrate. In the first three days of the phone being on sale, there were 5 million sales! That is 1 million more than the iPhone 4S got in its first three days.

Your Thoughts

Do you own an iPhone 5? If so, what do you think of it? Do you like the phone and iOS 6, it it revolutionary, or was it a waste of money?