Blog

  • The quick and easy guide to eSIM on Apple’s iPhone 14

    The quick and easy guide to eSIM on Apple’s iPhone 14

    [ad_1]

    Apple’s move to eliminate the SIM tray in US models of its new iPhone 14 could be a bigger move than its decision to abandon the old headphone port with iPhone 7. The obvious questions: what does eSIM offer and how do you provision devices?

    Apple’s journey to eSIM

    Apple first introduced electronic Subscriber Identity Module (eSIM) support in the iPhone XS, but it was optional — the handset also had a SIM tray for use with physical SIM cards. But Apple’s newly introduced iPhone 14 line-up has no SIM tray in the US, which means carriers must provision the device exclusively using an eSIM. (The new iPhones arrive on Friday.)

    It’s likely the company is trying to accelerate eSIM adoption with the move even though Apple smartphones sold outside the US will continue to host SIM trays.

    What is an eSIM?

    An eSIM is a built-in programmable identity module placed inside the iPhone itself. It’s like a hard-wired SIM, but must be provisioned by the networks, who must also upgrade their own systems to accommodate their use.

    Just like a physical SIM card, an eSIM carries a 17-digit code that shows your country of origin, carrier, and unique user ID.

    Apple’s decision to move to the eSIM is fine if your carrier supports the technology, but the decision to make it mandatory could prove  challenging for a small number of US customers whose carriers don’t. I received several messages apparently from readers in the US on smaller carriers complaining about Apple’s decision when it was announced. Hopefully, the carriers will play ball.

    The pros and cons of eSIM use

    Apple’s move to eSIM will probably have little impact on most people’s experience. But there are pros and cons to its use.

    One pro is that you no longer need to use a physical SIM, which means moving between handsets might become a little easier when your carrier supports eSIM. There is likely also a positive impact in terms of ensuring iPhones remain water resistant, as the removal of the tray also means the removal of an opening in the case.

    Another advantage: you can have multiple lines installed. Apple says you can store at least eight different eSIMs on the device and have any two active at any time. When you have multiple eSIMs installed, the two “active” numbers can make and receive voice and FaceTime calls and send and receive messages using iMessage, SMS, and MMS. Your iPhone will still only use one mobile data network at a time.

    One con is that use of eSIM makes it much harder for international travellers to simply pick up a Pay As You Go (PAYG) SIM to use with their device once they reach their destination. Given hefty roaming charges, this might be a big negative for frequent travellers, particularly those travelling to nations in which eSIMs are not available, though providers such as GigSky may be able to help some travellers plug this gap.

    Another potential negative would arise if carriers then decide to begin levying hefty fees against users attempting to provision an eSIM, or use the tech to make it even harder to migrate devices between networks.

    [Also read: 14+ reasons enterprises should upgrade to iOS 16]

    How to setup an iPhone eSIM

    There are several ways to setup an eSIM on an iPhone. These include eSIM Carrier Activation, eSIM Quick Transfer ,and other activation methods. Here’s a list of carriers and how they support eSIM.

    1. How to use eSIM Network Provider Activation

    This means your network provider assigns an eSIM to your iPhone on purchase.  If an eSIM was assigned to your iPhone when you bought it, turn on your iPhone and follow the instructions to activate your eSIM.

    If you are moving to a new device the line is frequently provided via a QR code which must be scanned by your device. It may also be provided within your network provider’s iPhone app. Alternatively, you might receive a notification that says Provider Mobile Data Plan Ready to Be Installed, which you should approve.

    1. How to use eSIM Quick Transfer to convert a physical SIM

    If your carrier supports eSIM Quick Transfer, you can convert your physical SIM to an eSIM when you set up your iPhone (you won’t need to contact your network provider). To do so, open Settings>Cellular and tap the Convert to eSIM button, if it is available. It that button is not available, you will need to contact your carrier. If the button does exist, tap Convert Cellular Plan, and then choose Convert to eSIM. Once the eSIM is activated, your SIM card will be deactivated, at which point you should remove the physical SIM and reboot your iPhone. You will see an option that enables you to transfer the eSIM to another device once the process is complete.

    1. How to use eSIM Quick Transfer to transfer your line

    First, ensure both the old and new iPhones are running iOS 16. Then open Settings>Mobile Data>Add Data Plan. You should see one or more mobile data plans to “transfer from another device,” or tap Transfer From Another Device. You’ll be provided with instructions on your older device that you must follow to transfer the line, and may be asked for a verification code. Then wait until the transfer takes place. You may receive a message asking you to Finish Setting Up Your Network Provider’s Data Plan. Follow this to be redirected to your network provider’s web page to transfer your eSIM to your new device.

    It is important to note that not every carrier supports all the different ways in which to transfer your line.

    1. You may need to enter details manually

    It is possible your carrier will choose to supply you with details you must enter into your device manually in order to activate an eSIM. You’ll enter these in Settings>Cellular or Mobile Data>Add Mobile Data Plan and then select Enter Details Manually.

    Preparing your device for sale

    You may need to erase your eSIM, particularly if you choose to assign it to another device or are preparing to trade or sell on your existing iPhone. This is easy to achieve, just open up Settings>Cellular or Mobile Data where you should select the plan you want to get rid of and then choose Delete SIM.

    How is it for you?

    I’m particularly interested in learning if the process is more or less complicated for large device deployments and the process (if any) of remote provisioning of eSIM for IT admins. Drop me a line if you have insight into this.

    Please follow me on Twitter, or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe.

    Copyright © 2022 IDG Communications, Inc.



    [ad_2]

  • How I troubleshoot swappiness and startup time on Linux

    How I troubleshoot swappiness and startup time on Linux

     

    I not too long ago skilled one other attention-grabbing drawback within the Linux startup sequence that has a circumvention–not an answer. It began fairly unexpectedly.

    I used to be writing a few articles whereas making some updates to my private copy of my collection of books, “Utilizing and Administering Linux: Zero to SysAdmin.” I had 4 situations of LibreOffice Write open to doing all that. I had three VMs working with VirtualBox to check a few of the issues I used to be writing about. I additionally had LibreOffice Impress open to work on an unrelated presentation. I prefer to hearken to music, so I had one among a number of tabs in Firefox open to Pandora, my music streaming service of alternative. I had a number of Bash shells open utilizing Konsole with quite a few tabs and the Alpine text-mode e mail shopper in a single. Then there have been the varied tabs within the Thunar file supervisor.

    So I had rather a lot happening. Identical to I do now as I write this text.

    The signs

    As I used these open classes, I observed that issues slowed down significantly whereas ready for the system to put in writing a doc to the M.3 SSD–a course of that ought to have been actually quick. I additionally observed that the music was uneven and dropped out utterly each jiffy. Total efficiency was usually poor. I started to suppose that Fedora had a major problem.

    My major workstation, the one I used to be engaged on on the time, has 64GB of RAM and an Intel Core i9 Excessive with 16 cores and Hyperthreading (32 CPUs) that may run as quick as 4.1 GHz utilizing my configured overclocking. So I mustn’t have skilled any slowdowns–or so I believed on the time.

    Decide the issue

    It didn’t take lengthy to seek out the issue as a result of I’ve skilled related signs earlier than on techniques with far much less reminiscence. The difficulty seemed like delays as a consequence of web page swapping. However why?

    I began with one among my go-to instruments for drawback dedication, htop. It confirmed that the system was utilizing 13.6GB of reminiscence for packages, and many of the remainder of the RAM was in cache and buffers. It additionally confirmed that swapping was actively occurring and that about 253MB of information was saved within the swap partitions.

    Date & Time: 2022-08-12 10:53:08
    Uptime: 2 days, 23:47:15
    Duties: 200, 1559 thr, 371 kthr; 4 working
    Load common: 3.97 3.05 2.08

    Disk IO: 202.6% learn: 687M write: 188K
    Community: rx: 0KiB/s tx: 0KiB/s (0/0 packets)
    Systemd: working (0/662 failed) (0/7912 jobs)
    Mem[|||||||##*@@@@@@@@@@@@@@@@@@@@@@@@@@    13.6G/62.5G]
    Swp[||#                                      253M/18.0G]

    
    

    However that meant I nonetheless had plenty of reminiscence left the system may use immediately for packages and information and extra that it may get well from cache and buffers. So why was this technique even swapping in any respect?

    I remembered listening to in regards to the “swappiness” think about one among my Red Hat training classes. However that was a very long time in the past. I did some searches on “swappiness” to study in regards to the kernel setting vm.swappiness.

    The default worth for this kernel parameter is 60. That represents the % of free reminiscence not but in use. When the system reaches that 60% set off level, it begins to swap, regardless of how a lot free reminiscence is on the market. My system began swapping when about 0.6 * 62.5GB = 37.5GB of unused reminiscence remained.

    Based mostly on my on-line studying, I found that 10% is a greater setting for a lot of Linux techniques. With that setting, swapping begins when solely 10% of RAM is free.

    I checked the present swappiness setting on my system, and it was set to the default.

    # sysctl vm.swappiness
    vm.swappiness = 60

    
    

    Time to vary this kernel setting.

    Repair the difficulty

    I will not dive into the gory particulars, however the backside line is that both of the next instructions, run as root, will immediately do the job on a working Linux pc with out a reboot.

    # sysctl -w vm.swappiness=10

    You might additionally use this subsequent command to do the identical factor.

    # echo 10 > /proc/vm/swappiness

    Tecmint has a superb article about setting kernel parameters.

    Each instructions change the stay kernel setting within the /proc filesystem. After working both of these instructions, you need to run the sysctl vm.swappiness command to confirm that the kernel setting has modified.

    However these instructions solely change the swappiness worth for the at present working system. A reboot returns the worth to its default. I wanted to make sure that this transformation is made persistent throughout reboots.

    However first, the failure

    To completely change the kernel vm.swappiness variable, I used the process described in my earlier article, How I disabled IPv6 on Linux, so as to add the next line to the tip of the /etc/default/grub file:

    GRUB_CMDLINE_LINUX="vm.swappiness=1"

    I then ran the grub2-mkconfig command as root to rebuild the /boot/grub2/grub.cfg file. Nonetheless, testing with VMs and actual {hardware} confirmed that it didn’t work, and the swappiness worth didn’t change. So I attempted one other strategy.

    And the success

    Between this failure at startup time, the one I describe within the How I disabled IPv6 on Linux article, and different startup points I explored as a consequence of encountering these two, I made a decision that this was a Linux startup timing drawback. In different phrases, some required companies, one among which is likely to be the community itself, weren’t up and working, which prevented these kernel possibility adjustments from being dedicated to the /proc filesystem, or they had been dedicated after which overwritten when the service began.

    I may make all of those work as they need to by including them to a brand new file, /and many others/sysctl.d/local-sysctl.conf with the next content material, which incorporates all of my native kernel possibility adjustments:

    ###############################################
    #            local-sysctl.conf                #
    #                                             #
    # Native kernel possibility settings.               #
    # Set up this file within the /and many others/sysctl.d      #
    # listing.                                  #
    #                                             #
    # Use the command:                            #
    # sysctl -p /and many others/sysctl.d/local-sysctl.conf   #
    # to activate.                                #
    #                                             #
    ###############################################
    ###############################################
    # Native Community settings                      #
    # Particularly to disable IPV6                #
    ###############################################
    internet.ipv6.conf.all.disable_ipv6 = 1
    internet.ipv6.conf.default.disable_ipv6 = 1

    ###############################################
    # Digital Reminiscence                              #
    ###############################################
    # Set swappiness
    vm.swappiness = 1

    
    

    I then ran the next command, which activated solely the kernel choices within the specified file:

    # sysctl -p /and many others/sysctl.d/local-sysctl.conf
    internet.ipv6.conf.all.disable_ipv6 = 1
    internet.ipv6.conf.default.disable_ipv6 = 1
    vm.swappiness = 13

    
    

    It is a extra focused strategy to setting kernel choices than I utilized in my article about disabling IPv6.

    Reporting the bug

    On the time of this writing, there is no such thing as a true repair for the foundation reason behind this drawback–regardless of the trigger. There’s a technique to quickly circumvent the difficulty till a repair is supplied. I used the /and many others/sysctl.d/local-sysctl.conf file that I had created for testing and added a systemd service to run on the finish of the startup sequence, anticipate a number of seconds, and run sysctl on that new file. The main points of how to do this are within the How I disabled IPv6 on Linux article.

    I had already reported this as bug 2103517 utilizing Pink Hat’s Bugzilla when attempting to disable IPv6. I added this new info to that bug to make sure that my newest findings had been obtainable to the kernel builders.

    You’ll be able to comply with the link to view the bug report. You do not want an account to view bug experiences.

    Closing ideas

    After experimenting to see how nicely I may reproduce the signs, together with many others, I’ve decided that the vm.swappiness setting of 60% is way too aggressive for a lot of large-memory Linux techniques. With out much more information factors than these of my very own computer systems, all I can tentatively conclude is that techniques with big quantities of RAM that get used solely occasionally are the first victims of this drawback.

    The fast resolution to the issue of native kernel possibility settings not working is to set them after startup. The automation I carried out is an efficient instance of easy methods to use systemd to exchange the outdated SystemV startup file rc.native.

    This bug had not been beforehand reported. It took a number of days of experimenting to confirm that the overall drawback by which locally-set kernel choices weren’t being set or retained at startup time was simply repeatable on a number of bodily and digital techniques. At that time, I felt it vital to report the bug to make sure it will get fastened. Reporting it’s one other method I may give again to the Linux neighborhood.

  • How I recovered my Linux system using a Live USB device

    How I recovered my Linux system using a Live USB device

    I’ve a dozen or so bodily computer systems in my dwelling lab and much more VMs. I exploit most of those programs for testing and experimentation. I regularly write about utilizing automation to make sysadmin duties simpler. I’ve additionally written in a number of locations that I study extra from my very own errors than I do in nearly every other manner.

    I’ve realized so much over the past couple of weeks.

    I created a serious drawback for myself. Having been a sysadmin for years and written a whole lot of articles and 5 books about Linux, I actually ought to have identified higher. Then once more, all of us make errors, which is a vital lesson: You are by no means too skilled to make a mistake.

    I am not going to debate the main points of my error. It is sufficient to inform you that it was a mistake and that I ought to have put much more thought into what I used to be doing earlier than I did it. Apart from, the main points aren’t actually the purpose. Expertise cannot prevent from each mistake you are going to make, however it could aid you in restoration. And that is actually what this text is about: Utilizing a Reside USB distribution in addition and enter a restoration mode.

    The issue

    First, I created the issue, which was basically a nasty configuration for the /and so forth/default/grub file. Subsequent, I used Ansible to distribute the misconfigured file to all my bodily computer systems and run grub2-mkconfig. All 12 of them. Actually, actually quick.

    All however two did not boot. They crashed through the very early phases of Linux startup with numerous errors indicating that the /root filesystem couldn’t be situated.

    I may use the foundation password to get into “upkeep” mode, however with out /root mounted, it was unimaginable to entry even the only instruments. Booting on to the restoration kernel didn’t work both. The programs had been really damaged.

    Restoration mode with Fedora

    The one method to resolve this drawback was to discover a method to get into restoration mode. When all else fails, Fedora offers a extremely cool instrument: The identical Reside USB thumb drive used to put in new cases of Fedora.

    After setting the BIOS in addition from the Reside USB system, I booted into the Fedora 36 Xfce reside consumer desktop. I opened two terminal classes subsequent to one another on the desktop and switched to root privilege in each.

    I ran lsblk in a single for reference. I used the outcomes to establish the / root partition and the boot and efi partitions. I used certainly one of my VMs, as seen beneath. There isn’t a efi partition on this case as a result of this VM doesn’t use UEFI.

    # lsblk
    NAME          MAJ:MIN RM  SIZE RO TYPE MOUNTPOINTS
    loop0           7:0    0  1.5G  1 loop
    loop1           7:1    0    6G  1 loop
    ├─live-rw     253:0    0    6G  0 dm   /
    └─live-base   253:1    0    6G  1 dm
    loop2           7:2    0   32G  0 loop
    └─live-rw     253:0    0    6G  0 dm   /
    sda             8:0    0  120G  0 disk
    ├─sda1          8:1    0    1G  0 part
    └─sda2          8:2    0  119G  0 part
    ├─vg01-swap 253:2    0    4G  0 lvm
    ├─vg01-tmp  253:3    0   10G  0 lvm
    ├─vg01-var  253:4    0   20G  0 lvm
    ├─vg01-home 253:5    0    5G  0 lvm
    ├─vg01-usr  253:6    0   20G  0 lvm
    └─vg01-root 253:7    0    5G  0 lvm
    sr0            11:0    1  1.6G  0 rom  /run/initramfs/live
    zram0         252:0    0    8G  0 disk [SWAP]

     

    The /dev/sda1 partition is definitely identifiable as /boot, and the foundation partition is fairly apparent as properly.

    Within the different terminal session, I carried out a sequence of steps to recuperate my programs. The precise quantity group names and system partitions akin to /dev/sda1 will differ to your programs. The instructions proven listed here are particular to my state of affairs.

    The target is in addition and get by way of startup utilizing the Reside USB, then mount solely the required filesystems in a picture listing and run the chroot command to run Linux within the chrooted picture listing. This strategy bypasses the broken GRUB (or different) configuration information. Nonetheless, it offers an entire operating system with all the unique filesystems mounted for restoration, each because the supply of the instruments required and the goal of the adjustments to be made.

    Listed here are the steps and associated instructions:

    1. Create the listing /mnt/sysimage to offer a location for the chroot listing.

    2. Mount the foundation partition on /mnt/sysimage:

    # mount /dev/mapper/vg01-root /mnt/sysimage

    3. Make /mnt/sysimage your working listing:

    # cd /mnt/sysimage

    4. Mount the /boot and /boot/efi filesystems.

    5. Mount the opposite principal filesystems. Filesystems like /dwelling and /tmp usually are not wanted for this process:

    # mount /dev/mapper/vg01-usr usr

    # mount /dev/mapper/vg01-var var

    
    

    6. Mount essential however already mounted filesystems that should be shared between the chrooted system and the unique Reside system, which remains to be on the market and operating:

    # mount –bind /sys sys

    # mount –bind /proc proc

    
    

    7. You should definitely do the /dev listing final, or the opposite filesystems will not mount:

    # mount --bind /dev dev

    8. Chroot the system picture:

    # chroot /mnt/sysimage

    The system is now prepared for no matter it is advisable to do to recuperate it to a working state. Nonetheless, one time I used to be capable of run my server for a number of days on this state till I may analysis and take a look at actual fixes. I do not actually advocate that, however it may be an choice in a dire emergency when issues simply have to stand up and operating–now!

    The answer

    The repair was straightforward as soon as I received every system into restoration mode. As a result of my programs now labored simply as if they’d booted efficiently, I merely made the required adjustments to /and so forth/default/grub and /and so forth/fstab and ran the grub2-mkconfig > boot/grub2/grub.cfg command. I used the exit command to exit from chroot after which rebooted the host.

    After all, I couldn’t automate the restoration from my mishap. I needed to carry out this complete course of manually on every host—a becoming little bit of karmic retribution for utilizing automation to rapidly and simply propagate my very own errors.

    Classes realized

    Regardless of their usefulness, I used to hate the “Classes Realized” classes we might have at a few of my sysadmin jobs, nevertheless it does seem that I have to remind myself of some issues. So listed here are my “Classes Realized” from this self-inflicted fiasco.

    First, the ten programs that did not boot used a unique quantity group naming scheme, and my new GRUB configuration failed to think about that. I simply ignored the truth that they could presumably be completely different.

    • Suppose it by way of utterly.
    • Not all programs are alike.
    • Check the whole lot.
    • Confirm the whole lot.
    • By no means make assumptions.

    Every thing now works tremendous. Hopefully, I’m just a little bit smarter, too.

  • It’s time to quit quitting on the quiet quitters

    It’s time to quit quitting on the quiet quitters

    [ad_1]

    The “quiet quitting” trend gained attention because one quiet quitter wasn’t so quiet about it. Quiet quitting gained notoriety on TikTok in a July video by engineer Zaid Khan (@zkchillin), followed by an August Wall Street Journal article about it.

    Though definitions vary, quiet quitting is the deliberate withholding by an employee of their full potential effort at work.

    In the wake of quiet quitting, the phrase “quiet firing” emerged — the deliberate withholding by employers of raises, promotions, development, and leadership opportunities.

    Of course, neither of these approaches to the employee-employer relationship is new.

    The Gallup organization calls “quiet quitters” “actively disengaged workers,” and their percentage has, in fact, risen in the past two years.

    But the “quiet quitter” label is new, enabling the concept to go viral on social media.

    Technically, the phrases are misleading. Quiet quitting is explicitly undertaken as an *alternative* to quitting. So quiet quitting is not quitting. And likewise, for quiet firing — it’s not firing.

    But quiet quitting and quiet firing represent a breakdown in communication. And that’s the biggest problem. The problem isn’t the “quitting” (that isn’t quitting) or the “firing” (that isn’t firing).

    The problem is the “quiet” part.

    Saying the ‘quiet’ part out loud

    The implicit contract for employees goes something like this: I will spend as much time and effort as I can in my job in return for a salary, benefits, job satisfaction, and career advancement.

    Traditionally, career-minded employees chose and were expected to go “above and beyond,” giving work 100% of their effort.

    As a result, they often work more than the assumed 40-hour workweek in a competitive employment marketplace.

    Quiet quitting happens when an employee feels used by a company and so, in self-defense, chooses to get back at the company. So instead of sharing the company’s purpose, the company serves only as a source of income and nothing more.

    Some reports say that some quiet quitters don’t do so deliberately but have simply stopped trying so hard.

    The reasons given in the flurry of reports about quiet quitting include lazy employees, workplace burnout, bad bosses, toxic workplaces, and other stresses.

    The quiet quitting movement takes place against a backdrop of other trends that reveal general work dissatisfaction, including the “Great Resignation” and the effort (especially in the technology industry) to unionize.

    While only some 10% of the American workforce is unionized, 71% of Americans told Gallup pollsters they approve of unions — the highest level of support since 1965.

    But the Great Resignation is actually a positive trend.

    Though painful for some companies in the short term, it represents employees taking action to find work and an employer where they can enjoy job satisfaction instead of remaining disgruntled.

    Even unionization entails communication. That’s what a negotiated contract is — collective bargaining between labor and management that results in a shared understanding of what’s expected by all parties.

    Whether you’re pro-union or anti-union, it’s objectively true that unions facilitate communication and result in a mutually documented understanding of expectations.

    Quiet quitting is the opposite; it’s about unilateral decision-making by an employee that is not communicated to managers and company leadership.

    Some commentators have argued that quiet quitting is a positive development because it represents resetting work-life boundaries and balance.

    But that’s wrong. Non-communication in and about the workplace is a negative trend.

    The other downside is that quiet quitting can go viral.

    When employees start doing less, those still giving their all feel like they’re doing more work without additional compensation and could be inspired to join the quiet quitters.

    Quiet quitting is also more prevalent among younger employees. 82% of Americans 65 and older believe employees should always go “above and beyond.” This drops to half among people who are between 18 and 29.

    It’s time to get loud about quiet quitting

    Despite rosy optimism about quiet quitting and firing in some quarters, its existence must be addressed. Here’s how:

    • Open up the floodgates of communication between managers and employees about employee satisfaction, and drive clarity about how employees feel about their jobs.
    • Document and specify job expectations, so everyone is on the same page about workloads, work hours, performance, and metrics for success and failure. This is also necessary for remote workers, who need to be effectively managed without reliance on “management by walking around.”
    • Double the efforts around career development, job training, and the cultivation of leaders within the organization. Work harder to promote from within so employees know that being actively engaged results in additional compensation and responsibilities.

    It’s time to address these trends through a new approach to management: One that involves a lot more communication, a lot more specificity about job requirements, and a lot more commitment to internal career development and advancement.

    It’s time to communicate. So don’t quit on the quiet quitters.

    Copyright © 2022 IDG Communications, Inc.

    [ad_2]

  • Which digital policies will top new UK PM Liz Truss’ agenda?

    Which digital policies will top new UK PM Liz Truss’ agenda?

    [ad_1]

    Newly appointed UK Prime Minister Liz Truss has not historically worked in government departments with a heavy technology focus, so the British electorate has thus far had very little insight into her digital ideology—and with soaring energy costs and record levels of inflation to tackle, it’s unlikely we’ll see any new, groundbreaking digital policies in the early days of her premiership.

    That’s not to say there aren’t a number of tech policy issues that have been left in her in-tray, including two controversial pieces of legislation. Furthermore, with technology continuing to reach far beyond the confines of the Department for Digital, Culture, Media and Sport (DCMS)—the government department responsible for all digital and tech related policy—having a coherent and comprehensive digital strategy will be vital for the new Conservative Prime Minister.

    With Truss becoming the fourth British Prime Minister in six years in the wake of Boris Johnson’s resignation, every government department has become a revolving door for personnel, with each new leader culling whole departments to suit their legislative agendas.

    As a result, the appointment of Michelle Donelan to DCMS marks the fifth secretary of state for that department in seven years, with the role of Minister for Digital—who will report to Donelan—still yet to be filled.

    Conservatives haven’t matched rhetoric with delivery

    When it comes to digital policy, the Conservatives can rarely be accused of lacking enthusiasm. Unfortunately, as is the case with most political promises, the rhetoric is rarely matched by the delivery.

    For example, last week the UK government at long last awarded the first major subsidy contract as part of Project Gigabit, a £5 billion plan to deliver fast, reliable broadband to homes and businesses across the country.

    Wessex Internet was selected to deliver a contract worth around £6 million, providing over 7,000 rural properties in South West England with high-speed internet. The first home will be connected by the end of the year, with an expected completion date of 2025.

    However, the pledge to roll out full fibre broadband across the country has long been a Conservative Party promise. In their 2015 manifesto, the party promised to provide superfast broadband coverage to 95% of the UK by the end of 2017. This was a revision of their previous May 2015 deadline. Their 2019 manifesto, on which the current government was elected, pledged full fibre broadband to every home and business by 2025.

    In July 2022, that deadline was revised once again to promise 85% coverage of gigabit broadband by 2025, increasing to at least 99% coverage by 2030.

    Caroline Carruthers, a global data consultant and former chief data officer at Network Rail, said that politicians need to be more transparent about what digital policy goals are actually achievable.

    She also believes that previous governments have not done a good job of selling the benefits of many digital policies, especially when it comes to data and how it can be used to drive improvements across society.

    “One of the things we’re really terrible at doing is promoting the positive use of data and technology within our public services,” Carruthers said. “We’re absolutely abysmal at it and as a result, there’s a really low-lying level of trust within the public, which is having the knock-on effect on public services as they’re frightened to use data in certain ways.”

    While Carruthers acknowledges that the disparate nature of many of the UK’s public sector institutions can make implementing a coherent data strategy rather challenging (there are 45 territorial police forces and 219 NHS trusts in the UK), there are some real differences that can be made to societal problems through the use of data.

    “[The public] needs a tangible understanding of how their data is being used, what it’s being used for and the potential benefits in order to create this high degree of trust,” she said. “What would be really good to see is a focus on trying to build up that trust again through engagement with the public. And I think part of the play is to really focus on improving data and tech skills all the way through things like data literacy, which is a fundamental life skill.”

    Which digital policies should DCMS be focusing on?

    When it comes to the immediate focus of DCMS’ digital arm, it’s likely that trying to address some of the controversies in the proposed Data Protection and Digital Information Bill and the Online Safety Bill will be high up the agenda.

    Described by the DCMS as “[freeing] businesses and researchers from GDPR’s one-size-fits-all approach”, critics of the new legislation have argued it diminishes the power of the Information Commissioner’s Office (ICO) by introducing more government oversight to the detriment of the data watchdog’s independence.

    In an article for PolitcsHome, Conservative peer, Lord Kirkhope, went as far as to say that moving away from European data laws poses serious economic and national security risks and the benefits of the new bill are “negligible at best”.

    Carruthers praised the bill’s attempt to make data privacy laws more targeted and proportional for smaller organisations, but said that she ultimately believes that trying to impose geographical restraints on something like data, which doesn’t sit in a physical geography, is futile.

    Following the appointment of Liz Truss, however, it was announced that the government will not move forward with the second reading or other motions relating to the Data Protection and Digital Information Bill. This puts the bill in limbo, at least for the moment.

    The other controversial piece of digital legislation that was borne out of the previous administration was the Online Safety Bill, which was denied a second reading during the dying months of former Prime Minister Boris Johnson’s tenure, essentially scrapping it.

    However, at Prime Minister’s Questions on Wednesday, Truss told MPs that the legislation would be returning to the Commons, noting that some “tweaks” may be required to ensure it does more to protect free speech.

    While many MPs supported the bill’s efforts to protect children online, others have labelled it as a disaster for free speech, while a survey of industry professionals by BCS, the Chartered Institute for IT, found only 14% of respondents believed the legislation is fit for purpose.

    Professor Jon Crowcroft, chair of the programme committee at The Alan Turing Institute and professor of communication systems at Cambridge University’s Computer Laboratory, said that the new administration needs to maintain the country’s current high standards, especially in data protection and privacy, to ensure that the UK remains competitive across all markets.

    “Designing to meet high standards, that exceed the standards of countries that compete with the UK in the development of technology, will give the UK a competitive advantage,” he said.

    Crowcroft also argued that in addition to the legislation that has been brought forward, one of the primary concerns for the tech industry is being able to fill the increasing number of roles in the sector. Crowcroft said that if Truss’ promises of a lower tax regime are to make sense, the tech industry needs to be able to hire and invest rapidly, which will require fast tracked visas to support immediate recruitment.

    Is it time to make digital its own department?

    DCMS only adopted its digital remit in 2017. But since then, technology has increasingly become part of the wider agenda everywhere from the Home Office to the Department of Health and Social Care.

    Currently, there are half a dozen senior civil service (SCS) technology roles being advertised, including director of digital at the Ministry of Justice, a chief data officer at the Cabinet Officer and four chief domain architects who will be based in HM Revenue and Customs.

    Crowcroft said that alongside the legislative priorities Truss should be focused on, its also vital she understands the importance in investing in and adopting emerging technologies to help improve efficiencies in government departments.

    “Many government departments trail behind other sectors in the use of new technology, and this needs addressing,” he said. “Leading by example would benefit everybody, including the taxpayer.”

    Carruthers, like many others operating in the technology sector, thinks it’s time that the digital part of DCMS was spun out into its own department, especially as data and digital are now more important to help grow the UK economy than ever before.

    “DCMS is an interesting amalgamation,” said Carruthers. “[By making digital a standalone department], it will allow the government to have a more laser sharp focus on all things digital, which in the long term would benefit both the government and the country.”

    Copyright © 2022 IDG Communications, Inc.

    [ad_2]

  • Decline in PC and tablet shipments will continue through 2023, says IDC

    Decline in PC and tablet shipments will continue through 2023, says IDC

    [ad_1]

    Global shipments of PCs and tablets are in steep decline, but will pick up again in 2024, according to a new study by IDC.

    Shipments of traditional PCs are forecast to decline 12.8% to 305.3 million units in 2022, while IDC expects tablet shipments will fall 6.8% to 156.8 million. The combined market for PCs and tablets will decline by 2.6% in 2023 before returning to growth in 2024, according to IDC. 

    It attributes the reduced outlook to inflation, the weakening global economy, and the surge in buying over the past two years. Consumer demand has slowed, education demand has largely been fulfilled, and enterprise demand is getting pushed out due to worsening macroeconomic conditions, IDC said. 

    The new forecast was a part of IDC’s Worldwide Quarterly Personal Computing Device Tracker, which gathers historical and forecast trend analysis data from over 90 countries. It distinguishes between traditional PCs (including desktops, notebooks, and workstations) and tablets (including detachable tablets and slate tablets). Shipments are to distribution channels or end users.

    With economic headwinds gaining speed, consumer sentiments will worsen, resulting in contractions in the consumer market for the next six quarters, Linn Huang, research vice president for devices & displays at IDC said in a press note.  

    “Economic recovery in time for the next major refresh cycle could propel some growth in the outer years of our forecast. Though volumes won’t hit pandemic peaks, we expect the consumer market to drive towards more premium ends of the market,” Huang said.

    Growth to return post-2023

    IDC expects a growth in shipments post-2023, and that by 2026 total shipments will be around 477.7 million, including 269.3 million to consumers, 63.6 million to the enterprise sector, 75.9 million to the SMB sector, and 69 million to the public sector. 

    Though demand is slowing, the outlook for the shipments remains above pre-pandemic levels, Jitesh Ubrani, research manager for IDC mobility and consumer device trackers, said in a note.

    “Long-term demand will be driven by a slow economic recovery combined with an enterprise hardware refresh as support for Windows 10 nears its end. Educational deployments and hybrid work are also expected to become a mainstay driving additional volumes,” said Ubrani. 

    Demand continues to be weak since Q2, 2020

    The worldwide shipments declined 15.3% year over year to 71.3 million units in the second quarter of 2022, according to data released by IDC in July. It was the second consecutive quarter of lower shipments following two years of growth. IDC noted that the decline was worse than expected as supply and logistics further deteriorated due to the lockdowns in China and persistent macroeconomic headwinds.

    While Lenovo, HP Inc., and Dell Technologies retained their top 3 positions, Apple slipped into the fifth position, tying with ASUS. The researchers attributed the downfall to a dip in production during the quarter. As a result, Acer moved up to 4th place during the quarter. Barring any further supply issues, IDC expects Apple to ramp up its production in the second half of the year. 

    Quarterly PC volume at the beginning of the pandemic peaked at 74.3 million in the second quarter of 2020. Pre-pandemic volumes in the second quarter of 2018 and 2019 were 62.1 million and 65.1 million units respectively.

    Copyright © 2022 IDG Communications, Inc.

    [ad_2]

  • Apple wasn’t fooling when it said it wanted to make Macs more secure

    Apple wasn’t fooling when it said it wanted to make Macs more secure

    [ad_1]

    When Craig Federighi, Apple’s senior vice president of software engineering last year said, “We have a level of malware on the Mac that we don’t find acceptable,” he apparently really meant it. And Apple seems to be doing about something about it.

    Apple is giant taking steps to secure the Mac

    Federighi characterized Apple as being in an enduring battle against malware on the Mac. He also explained that between May 2020 and May 2021 the company identified 130 types of Mac malware that infected 300,000 systems.

    Given the Mac’s reputation for security, that may seem counter intuitive, but maintaining a secure platform requires constant watchfulness.

    We know Apple has intensified the degree to which it monitors its platform in recent years. Not only has the company been forced to do so as its growing market share makes its platforms attractive targets, but we’ve also experienced a scourge of “surveillance-as-a-service” businesses that have been attempting to crack Apple’s code for generally nefarious and repressive purposes.

    The new threat environment: Nasty and well-connected

    Apple last year sued controversial private surveillance company NSO Group.

    When it did, the company’s head of Apple Security Engineering and Architecture, Ivan Krstić, said:

    “Our threat intelligence and engineering teams work around the clock to analyse new threats, rapidly patch vulnerabilities, and develop industry-leading new protections in our software and silicon. Apple runs one of the most sophisticated security engineering operations in the world, and we will continue to work tirelessly to protect our users from abusive state-sponsored actors like NSO Group.”

    [Also read: It’s time to secure the Apple enterprise]

    A journey in multiple strides

    The company has made numerous security improvements to its platforms in response, including working far more closely with the independent security research communities than it has done before. This seems to have led to earlier identification and cures for some of the vulnerabilities that may have been used by these private armies of digital spies.

    The recent publication of an emergency security patch for iOS 12 is a case in point. Apple says the flaw may have been “actively exploited.” (The company fixed the same flaw on more recent iPhones and iPads a few weeks ago. The decision to release a fix for iOS 12 also reflects the scale of the threat.)

    It’s precisely this kind of flaw that’s being abused by these surveillance companies, which are prepared to pay millions to purchase hacks and attacks. It’s because Apple now knows these enemies it is introducing Lockdown Mode in iOS 16, which is an ultra-secure mode for its devices which does sacrifices some utility for high security.

    Macs gain smarter malware protection

    But Apple has also done one more thing that hasn’t really been noticed until now: It is making Macs even more security conscious than ever before, introducing automated self-diagnosis and malware checking that provides a layer of protection the platform hasn’t really had.

    “In the last six months, macOS malware protection has changed more than it did over the previous seven years,” explained Howard Oakley. “It has now gone fully pre-emptive, as active as many commercial anti-malware products, provided that your Mac is running Catalina or later.”

    The new protection apparently relies on a new tool/engine called XProtect Remediator in macOS 12.3. This enhances Apple’s existing XProtect malware protection by giving systems the ability to both scan for and remediate detected malware. Scans take place at frequent intervals during the day, Oakley says. They address a range of trojans, adware, browser hijackers and other threats.

    “Should malware make its way onto a Mac, XProtect also includes technology to remediate infections. For example, it includes an engine that remediates infections based on updates automatically delivered from Apple (as part of automatic updates of system data files and security updates). It also removes malware upon receiving updated information, and it continues to periodically check for infections,” an Apple tech note explains.

    Apple is building a bigger wall in the poison garden

    What this means is that Apple is introducing a degree of on-device intelligent malware protection to Macs. This intelligent protection can easily be updated with new malware definitions. In sum, it means the company has built an even bigger wall to protect against the poisons that lurk outside its PC garden.

    We can’t know how much impact these protections deliver. In a sense, that’s the problem with security in general — the value of the armor isn’t visible until protection breaks. However, I’m inclined to agree with Oakley who notes that this kind of intelligent, on-device protection represents a degree of security awareness you’d only gain through use of security services until now.

    That Apple is prepared to embrace this on a system level likely reflects recognition of of the need to protect distributed endpoints outside standard permiter security protections in a new world of work characterized by an environment of state-sponsored attack.

    We’re also seeing moves to make endpoints — the Macs, iPhones and iPads we use — more security aware elsewhere across the Apple ecosystem. Consider tools like Managed Device Attestation, improvements to Mac MDM, USB Restricted Mode and other tools making their way to the platforms. These improvements suggest the extent to which Apple’s security teams are ruthlessly and determinedly identifying and attempting to close the many attack vectors used by modern criminals.

    The one vulnerability that is hardest to change, of course, is human error, which remains the weakest link at any level of the chain.

    Please follow me on Twitter, or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe.

    Copyright © 2022 IDG Communications, Inc.



    [ad_2]

  • Addigy enables IT to automate Apple device configuration policies

    Addigy enables IT to automate Apple device configuration policies

    [ad_1]

    There’s yet more news from the ever-effervescent Apple-in-the-enterprise space, as Apple device management company Addigy has introduced a new tool called Flex Policies.

    Making policies remote, automated, and easier

    The tool is designed to make it much easier for enterprise IT to apply policies across their Apple device fleets. What tends to happen when attempting to apply policies at a device level is that IT must do so manually doing. This seems likely to get easier with iOS 16, iPadOS 16, and macOS Ventura, but it remains a time-consuming challenge for IT.

    Addigy explains that Flex will save IT admins time by eliminating the tedious task of manually assigning Apple device policies to new or existing devices. 

    What Addigy says

    “Addigy’s Flex Policies is a game-changer for not only IT admins managing Apple devices but also the industry,” Jason Dettbarn, Addigy CEO, said in a statement. “By making it easier for IT teams to onboard Apple devices, we’re destigmatizing Apple devices in the workplace. The reality is Apple usage in the workplace is expected to grow over the next several years, and whatever we, as a company, can do to assist IT admins and MSPs with managing these devices is a win for everyone.”

    The idea is that Addigy’s Flex enables IT admins to set up policy instructions that can be applied to devices. They can be used to configure device attributes in response to different criteria, and can then automatically be assigned — ensuring devices meet the appropriate policies for the situation.

    The beauty of this is that it is possible to assign a device to multiple policies at once, which basically enables companies to apply changes remotely as the situation around the device changes.

    Management is configurable

    IT admins can also exclude groups or individual machines. This makes it possible to install a critical system update intelligently. So, it is possible to push a critical system update to everyone on every team, but exclude those machines you know are being used in business-critical situations at that time. The CEO will not thank you for updating their iPhone when they are using it to trying to present data at an important investors meeting.

    Addigy explained that Flex also gives IT the power to automate device monitoring and remote remediation. Admins can, for example, build a Flex Policy that will identify a device that has FileVault disabled and then enable that feature to protect data. 

    It’s also possible to use the tool to assign user group-based policies; deploy advanced conditional software; assign items to all devices across policies; build custom reports; build small test groups of devices; and migrating settings. The tool also works with other solutions from the company.

    Addigy recently attracted investment from growth equity firm PSG. It’s an investment that reflects the continued opportunity opening up in this part of the Apple ecosystem, as Macs, iPhones and iPads experience accelerating deployment across the enterprise.

    Apple in the enterprise is an exciting space

    In the past two years, Mac laptop use in the workplace has surged 63%, with more than half of IT teams indicating a growing demand for Apple devices in their companies.

    It’s clear Apple understands the growing importance of enterprise markets. It recently saw a huge 30,000-strong iPhone deployment across Openreach, one of the UK’s biggest businesses, and continues to improve its own SMB-focused Apple Business Essentials product and to enhance the APIs it offers for the growing market of MDM vendors.

    The company also recently reached a deal with T-Mobile under which the carrier can offer Business Essentials to US SMBs.

    Things won’t get any slower. Not only will Apple introduce new iPhones and other products on Sept. 7, but rolling up we also have the world’s biggest event for Apple admins, the Jamf Nation User Conference (JNUC) on September 27, sure to provide some interesting announcements.

    There should be no doubt in anybody’s mind that Apple’s enterprise growth story continues, the market is expanding, and it seems probable the company will become the biggest vendor in the coming years.

    Please follow me on Twitter, or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe.

    Copyright © 2022 IDG Communications, Inc.



    [ad_2]

  • For most users, Windows 11 22H2 doesn’t move the needle

    For most users, Windows 11 22H2 doesn’t move the needle

    [ad_1]

    Last week, I wrote about a survey I’m using to ask PC users about their plans for Windows 11. With the 22H2 release just around the corner — and with Windows 11 now a year old — the operating assumption has been that many would be ready to move forward with deployment.

    As I’ve said before, this is an unscientific survey, merely an attempt at getting a feel for everyone’s plans. I didn’t limit who could answer questions, nor try to establish bias. (The survey is still open if you’d like to weigh in on what sort of Windows 10 or 11 topics you’re interested in.)

    Given that Windows 11 has higher hardware requirements, it’s no surprise most respondents (69.1%) are still using Windows 10 on their systems. Another 16.3% percent run Windows 11, just under 5% use Windows 7, and 1.8% still run Windows 8.1 (!). A smattering of respondents are on Macs (2.4%), Linux (3.5%), or something else (1.7%) — usually dual-boot Windows/Linux systems.

    I was surprised to find more than half the respondents (51.3%) already have hardware that would support Windows 11. Just under 40% either do not have a Trusted Platform Module, a good enough video card, or a processor that can support Windows 11. And 9% said they have no plans to move to Windows 11 at all.

    (At home, I have only one system out of four that’s Windows 11-ready; they are simply old machines, though they all now have SSD drives — a must in this era of Windows.)

    As far as when users anticipate upgrading to Windows 11, the answers are muddled; 43.5% simply aren’t sure. I assumed the arrival this fall of Windows 11 22H2 would be a key release for people who plan to upgrade, yet just 3.6% expect to do so. Another 2.8% said they would upgrade in six months, and 10.5% plan to do so within a year.

    The vast majority, 66.17%, plan to stay on the OS they’re running now, with 12.1% saying they are only testing Windows 11 and 3.8% evaluating other platforms. Just under 18% are using Windows 11 all the time.)

    As for what excites Windows users about Windows 11, the word salad that emerged had “better security” as a standout. But not much else seemed to catch user attention.

    Windows 11 word cloud Susan Bradley

    What excites users most about Windows 11?

    As one respondent said: “The short answer: Nothing. The truth is, like most people, I’ve long since stopped being ‘excited’ about anything my computers do. They’re tools, to help me write, organize and communicate, and ANY time spent having to figure out the new ‘features’ that Microsoft (or Apple, or Google) crams down my throat is time away from doing anything productive or enjoying life. ‘Excitement’ over new operating systems is for geeks and is an increasingly odious burden on the rest of us.”

    I also included an open-ended question about what users would like to see changed in Windows 11. Of those who answered, many lamented the revamped Start menu, and an inconsistent UI across various menu systems. As one person wrote: “The Windows 11 file explorer made unnecessary changes that worked fine in Windows 10. I use copy, paste, cut, delete, rename, and refresh more frequently than the average user. I find the icon replacements, and the extra step required to refresh changes in Windows 11 to be a waste of additional time on my part. And personally, I find the Settings app differences in Windows 11 require that I essentially go through the entire app to make changes to suit me. I did not have to do that in the Windows 10 Settings app.”

    Microsoft is aiming to make the UI more streamlined. But I’ve heard from many long-term Windows users that having to relearn menus and clicks slows them down when trying to cut and paste. (There are a variety of documented ways and tools to bring many of these features back to Windows 11.) And the fact that users who like to move things around and customize their desktop can longer do so without hacks and third-party tools is probably the biggest roadblock to Windows 11 adoption. It will be interesting to see whether Microsoft listens to its core users and brings back some ability to customize the platform.

    If you want to read what others have said about Windows 11, the full survey results are available here.

    Copyright © 2022 IDG Communications, Inc.

    [ad_2]

  • It’s time to quit quitting on the quiet quitters

    How Generation Z workers are different from everyone else

    [ad_1]

    Members of Generation Z, or people born between 1997 and 2012, will comprise 27% of the workforce by 2025. That means they will soon be working in your company if they aren’t already.

    What makes this generation different from the ones that came before it? Statistically, a few facts are worth noting.

    Gen Z is on track to be the most diverse and best-educated generation yet. More than 20% of its members identify as LGBT. Yet, they have little or no memory of 9/11.  Nearly every one of them owns a smartphone, at least in the developed world.

    Perhaps most important is that a significant percentage of them began their professional lives during the COVID-19 pandemic. That may have an impact that reverberates for years.

    I asked the experts on Qwoted to get some real-world perspective on people’s experiences with Gen Zers in the workplace. I got plenty of responses, and a few threads were evident.

    Show the way

    “They crave mentorship: someone to take them under their wing, show the Jedi way, have heart-to-heart talks, and provide a real, tangible, lasting relationship with a person who is interested in their betterment,” says Austin Fox, president of PeopleCaddie, a temp hiring agency.

    Although this group has grown up with a screen always within arm’s reach, they crave human contact more than those who came before them, Fox says. “Millennials were all about text and emails; Gen Z is about video, face-to-face, and live interaction,” he says.

    That isn’t surprising, perhaps, given that human contact was so rare during the early years of their careers.

    TalentReef, a maker of a platform for high-volume hiring, posted advice on its blog earlier this year about attracting Gen Z talent.

    Among its recommendations are to promote your company culture with fun, musical videos, make the application process fast and easy, hire promising candidates quickly and promote the causes your company supports.

    Respect gender preferences

    Gender identity is important to this group, experts say.

    For example, Veris Insights found that “three-quarters of LGBTQ+ students said they’d find an employer more appealing if employers asked about their pronouns during an interview while 86% of LGBTQ+ students find it important to feel comfortable being out at work,” according to Chelsea Schein, director of university recruiting research at the recruiting intelligence and analytics firm.

    Experts say that you might expect a generation that came of age during quarantines to shun office work, but the opposite is true.

    A study by human resource software maker BambooHR found that 48% of Gen Zers feel more productive in the office compared to 30% of Baby Boomers, 32% of Generation X, and 45% of Millennials.

    In fact, the study found that members of this generation are more interested in seeing colleagues in person than the four cohorts that came before them, the study found.

    Not that they want to be chained to a desk.

    “Gen Zers are the drivers of the Great Resignation,” says Ximena Hartsock, founder of BuildWithin, a firm that helps businesses manage apprenticeship programs. “They have seen the lack of work-life balance of their parents, and they want a better life for themselves. They had their first jobs during the pandemic and expect that work will be remote and flexible.”

    A recent survey by IWG, a global provider of hybrid workspaces, found that Gen Z hybrid workers are the least likely to say their personal career growth has advanced due to hybrid work. Members of this group also have the lowest expectations for how much of a pay bump they would receive for returning to the office full-time.

    Compassion matters

    Although a good salary is table stakes for hiring in a market like this, Gen Z members are more inclined than their predecessors to expect additional services that support their health and mental well-being.

    “Caring for employees needs to be the highest priority,” says Birk Cooper, chief marketing officer at  Fetch Rewards, which manages loyalty programs.

    Among the services his company offers all employees are no-cost confidential counseling, legal support, mental health resources, paid parental leave, and child-care assistance.

    “Aligning values is most important to this generation,” Cooper says. “Every company promotes Black History, LGBTQ+ and Women’s History agenda, but what are they doing on a 24/7 basis?”

    Many Gen Zers may have started their careers during lockdowns, but that doesn’t make them any more or less resilient than others, says PeopleCaddie’s Fox.

    “COVID has brought them through adversity; coming through adversity breeds confidence,” he says. “They’re resourceful. Because they’ve been so adept at finding things on their own, they can figure things out, but they still want a road map that shows what success looks like.”

    That’ll be your job.

    Copyright © 2022 IDG Communications, Inc.

    [ad_2]