Blog

  • Apple MDM industry outlook: M&A on the way

    Apple MDM industry outlook: M&A on the way

    [ad_1]

    Apple device management is the beating heart at the center of the mobile hybrid enterprise, and vendors that support Apple’s MDM (mobile device management) platform are investing as they seek to build for future growth. At this stage in the evolution of the Apple device management industry, it appears we are on the edge of an M&A frenzy as players in that space seek to build unique identities designed to foster future growth.

    Industry activity is intensifying

    Jamf, arguably one of the biggest firms in the Apple MDM business, has been investing deeply in companies and services to extend the tranche of security and device management tools it can provide to its customers. These extend to powerful content monitoring, zero trust, and endpoint management.

    Jamf CIO Linh Lam recently noted the acceleration of Apple’s enterprise market status, predicting: “The way the demand is growing and the expectations of younger generations joining the workforce, Apple devices will be the number one endpoint by 2030.” 

    More recently, we’ve begun to see entities from outside the Apple device management space begin to seek a way in. VMWare’s $1.17 billion acquisition of AirWatch in 2014 showed what was coming. Ivanti in 2021 purchased MobileIron. More recently, GoTo is in the process of acquiring cloud-based cross-platform device management provider Miradore. And arguably one of the larger illustrations of this kind was Apple’s 2020 acquisition of MDM vendor Fleetsmith, whose solutions have now been rolled inside Apple Business Essentials.

    Elsewhere, Hexnode has entered a partnership with Keeper Security; JumpCloud in February acquired MYKI to expand its cloud directory platform; Kandji continues to attract investment capital as it plays its own long game; Addigy is working with Acronis (the latter also works with Jamf); and Mosyle recently closed a $196m funding round and introduced new solutions for enterprise customers.

    The irresistible force

    This activity has purpose, of course. As enterprises become increasingly digitized, the value of the device management market is expected to reach $28.7 billion by 2027.

    To put that figure into context, that’s around four times the existing value, meaning there is huge scope for growth in the space, particularly around Apple devices.

    We’ve looked before at the acceleration there, as Mac and iOS together now comprise around 23% of global mobile/PC consumer market share and a higher slice of enterprise/knowledge worker markets. When it comes to the Mac, Gartner analyst Mikako Kitagawa recently predicted Apple will seize 10.7% of the PC market in 2026 as Windows share slips. And, of course, a 2021 Dimensional Research survey found that 85% of IT decision makers say Apple devices are more secure.

    With hundreds of millions of PC replacements now in sight as old Windows OS installations expire and companies seek to secure all endpoints against catastrophic business failure, the Apple side of this equation remains a highly attractive target for all these parties (and a few I probably forgot).

    Carving out space in these markets means Apple MDM vendors are under some pressure to extend the functionality of the solutions they provide while also defining their own unique market position.

    Many hope to achieve this by extending their core products with tools for security, remote support, and collaboration or by specializing in the needs of vertical markets such as education, healthcare, and manufacturing.

    Why a wave of acquisitions may be on the way

    Of course, with SAP, BlackBerry, Cisco, Citrix, IBM, Microsoft, Sophos, SOTI, and others also vying for some or all of the same business, smaller vendors must work hard to develop their own unique offerings. This suggests (at least to my jaded mind) that at some point relatively soon, we will see a wave of mergers and acquisitions as larger entities scoop up some of the smaller firms in a bid to offer more effective cross-platform MDM tools to enterprise customers and secure growth in a challenging market.

    What next?

    Quite a lot now depends on platform vendors, including Apple. MDM solutions providers live and die through the power of the APIs made available to them, which means that the addition of features and functionality is equally dependent on such system-level support.

    All the same, if there’s a seemingly unexplored space that relates to these technologies, it likely extends to remote collaboration and autonomous security solutions.

    Please follow me on Twitter, or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe.

    Copyright © 2022 IDG Communications, Inc.



    [ad_2]

  • Apple slaps hard against ‘mercenary’ surveillance-as-a-service industry

    Apple slaps hard against ‘mercenary’ surveillance-as-a-service industry

    [ad_1]

    Apple has struck a big blow against the mercenary “surveillance-as-a-service” industry, introducing a new, highly secure Lockdown Mode to protect individuals at the greatest risk of targeted attacks. The company is also offering millions of dollars to support research to expose such threats.

    Starting in iOS 16, iPadOS 16 and macOS Ventura, and available now in the latest developer-only betas, Lockdown Mode hardens security defenses and limits the functionalities sometimes abused by state-sponsored surveillance hackers. Apple describes this protection as “sharply reducing the attack surface that potentially could be exploited by highly targeted mercenary spyware.”

    In recent years, a series of targeted spyware attacks against journalists, activists, and others have been exposed. Names including Pegasus, DevilsTongue, Predator, Hermit, and NSO Group have undermined trust in digital devices and exposed the risk of semi-private entities and the threat they show against civil society. Apple has made no secret that it is opposed to such practices, filing suit against the NSO Group in November and promising to oppose such practices where it can.

    “Apple’s newly released Lockdown Mode will reduce the attack surface, increase costs for spyware firms, and thus make it much harder for repressive governments to hack high-risk users,” said John Scott-Railton, senior researcher at the Citizen Lab at the University of Toronto’s Munk School of Global Affairs and Public Policy.

    “We congratulate [Apple] for providing protection to human rights defenders, heads of state, lawyers, activists, journalists, and more,” tweeted the EFF, a privacy advocacy group.

    What does Lockdown Mode do?

    At present, Apple says Lockdown Mode provides the following protections:

    • Messages: Most message attachment types other than images are blocked. Some features, like link previews, are disabled.
    • Web browsing: Certain complex web technologies, like just-in-time (JIT) JavaScript compilation, are disabled unless the user excludes a trusted site from Lockdown Mode.
    • Apple services: Incoming invitations and service requests, including FaceTime calls, are blocked if the user has not previously sent the initiator a call or request.
    • Wired connections with a computer or accessory are blocked when an iPhone is locked.
    • Configuration profiles cannot be installed and the device cannot enroll into mobile device management (MDM) while Lockdown Mode is turned on.

    Ivan Krstić, Apple’s head of Security Engineering and Architecture, notes that Lockdown Mode can be applied to devices that are already enrolled in an MDM service. “Pre-existing MDM enrollment is preserved when you enable Lockdown Mode,” he tweeted.

    The company says it intends to extend the protection provided by Lockdown Mode over time and has invested millions in security research to help identify weaknesses and increase the integrity of this protection.

    How to enable Lockdown Mode

    apple lockdown mode update 2022 protections Apple

    Turning on Lockdown Mode. (Click image to enlarge it.)

    • Lockdown Mode is enabled in Settings on iPhones and iPads and in System Settings on macOS.
    • You’ll find it as an option in Privacy & Security, listed at the bottom of the page.
    • Tap Lockdown Mode and you’ll be told that this provides “Extreme, optional protection that should only be used if you believe you may be personally targeted by a highly sophisticated cyberattack. Most people are never targeted by attacks of this kind.”
    • The prompts also warn users that certain features will no longer work as you are used to. Shared albums will be removed from Photos, and invitations will also be blocked.

    What is the scale of this threat?

    These attacks don’t come cheap, which means most people are unlikely to be targeted in this way. Apple began sending threat notifications to potential victims of Pegasus soon after it was revealed and says the number of people targeted in such campaigns is relatively small.

    All the same, the scale is international, and the company has warned people in around 150 nations since November 2021. A BBC report confirms hundreds of targets and tens of thousands of phone numbers leaked as a result of NSO’s Pegasus alone. Victims have included journalists, politicians, civil society advocates, activists, and diplomats, so while the numbers are small, the chilling impact of such surveillance is vast.

    I believe that such technologies will become cheaper and more available over time, so it’s only a matter of time before they leak into wider use. Ultimately the very existence of such attacks — state-sponsored or not — makes the entire world less safe, not safer.

    “There is now undeniable evidence from the research of the Citizen Lab and other organizations that the mercenary surveillance industry is facilitating the spread of authoritarian practices and massive human rights abuses worldwide,” said Citizen Lab Director Ron Deibert in a statement. Deibert told CNET he thinks Lockdown Mode will deal a “major blow” to spyware companies and the governments that use their products.

    “While the vast majority of users will never be the victims of highly targeted cyberattacks, we will work tirelessly to protect the small number of users who are,” said Apple’s Krstić in a statement. “That includes continuing to design defenses specifically for these users, as well as supporting researchers and organizations around the world doing critically important work in exposing mercenary companies that create these digital attacks.”

    There’s little doubt Microsoft and Google will also move to provide similar protection to users. Google and Meta already offer tools to secure the accounts of those who are at an “elevated risk of targeted online attacks,” but these tools don’t go nearly as far as Lockdown Mode.

    Apples investments in security

    Apple already makes vast investments in security. For example, the company is working with others in the industry to support password-free authentication, has built tools to mask IP addresses and continues to focus on user privacy.

    The company will introduce a Rapid Security Response feature for its devices this fall, which will make it possible to deploy security fixes outside of full security updates and much more. Apple is even investing in improving the security of programming languages, further eroding potential attack surfaces.

    The company has now announced further investment in the security community:

    • Apple has also established a new category within the Apple Security Bounty program to reward researchers who find Lockdown Mode bypasses and help improve its protections. Bounties are doubled for qualifying findings in Lockdown Mode, up to a maximum of $2,000,000 — the highest maximum bounty payout in the industry.
    • Apple is also making a $10 million grant, plus any damages awarded from the lawsuit it is pursuing against NSO Group, to support organizations that investigate, expose, and prevent highly targeted cyberattacks, including those created by private companies developing state-sponsored mercenary spyware. It is giving this money to the Ford Foundation’s Dignity and Justice Fund.

    What will the Dignity and Justice Fund do?

    The fund will make its first grants later this year, focusing initially on initiatives to expose the use of mercenary spyware. In the press release announcing the initiative, Apple tells us these grants will focus on:

    • Building organizational capacity and increasing field coordination of new and existing civil society cybersecurity research and advocacy groups.
    • Supporting the development of standardized forensic methods to detect and confirm spyware infiltration that meet evidentiary standards.
    • Enabling civil society to more effectively partner with device manufacturers, software developers, commercial security firms, and other relevant companies to identify and address vulnerabilities.
    • Increasing awareness among investors, journalists, and policymakers about the global mercenary spyware industry.
    • Building the capacity of human rights defenders to identify and respond to spyware attacks, including security audits for organizations that face heightened threats to their network

    The fund’s grant-making strategy will be advised by a global Technical Advisory Committee. Initial members include Daniel Bedoya Arroyo, digital security service platform analyst at Access Now; Citizen Lab Director Ron Deibert; Paola Mosso, co-deputy director of The Engine Room; Rasha Abdul Rahim, director of Amnesty Tech at Amnesty International; and Apple’s Krstić.

    Ford Foundation Tech and Society Program director Lori McGlinchey said:

    “The global spyware trade targets human rights defenders, journalists, and dissidents; it facilitates violence, reinforces authoritarianism, and supports political repression. The Ford Foundation is proud to support this extraordinary initiative to bolster civil society research and advocacy to resist mercenary spyware. We must build on Apple’s commitment, and we invite companies and donors to join the Dignity and Justice Fund and bring additional resources to this collective fight.”

    What else can you do?

    Following revelations about NSO Group last year, Apple published a set of recommendations to help users mitigate against such risks. These guidelines do not even approach the kind of robust protection you can expect from Lockdown Mode, but it makes sense for anyone to follow such practices:

    • Update devices to the latest software, which includes the latest security fixes.
    • Protect devices with a passcode.
    • Use two-factor authentication and a strong password for Apple ID.
    • Install apps from the App Store.
    • Use strong and unique passwords online.
    • Don’t click on links or attachments from unknown senders.

    Furthermore, Amnesty Tech is gathering signatures to demand an end this kind of targeted surveillance of human rights defenders. I’d urge readers to add their signature to my own.

    Please follow me on Twitter, or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe.

    Copyright © 2022 IDG Communications, Inc.



    [ad_2]

  • 10 Tools to Generate and Have Fun With ASCII Art in Linux

    10 Tools to Generate and Have Fun With ASCII Art in Linux

    Linux terminal is not as scary as you think.

    Of course, it could be intimidating in the beginning but once you know the terminal better, you start loving it.

    You are likely to use the terminal for serious work. But there are many fun stuff you can do in the terminal as well.

    One of them is experimenting with ASCII art. You can display predefined or random messages, play games, or run some animation in ASCII format in the Linux terminal using various command line tools.

    My teammate Sreenath likes to explore such unusual CLI tools and share his findings with me. I am sharing those findings with you.

    ascii art tools linux

    Most of these programs should be available in the repositories of your Linux distribution. You can use your system’s package manager to install them. To keep the article concise, I have only included the installation instructions for Ubuntu.

    1. lolcat: Add colors to your terminal

    Alright! lolcat doesn’t have anything to do with ASCII art. At least not directly.

    Still, I included it at the beginning of this article because you can combine other ASCII tools with lolcat.

    So, what does it do? It is similar to the cat command but it adds random gradient colors to its output.

    lolcat

    It may not look useful at the moment but you’ll see its impact when the outputs of other ASCII tools are piped through lolcat.

    Install lolcat with the apt command:

    sudo apt install lolcat

    2. Aewan: Display ASCII text beautifully

    Aewan is a multi-layered ASCII graphics/animation editor. It produces stand-alone cat-able ASCII art files and an easy-to-parse format for integration into terminal applications.

    It has two tools: aewan, an ASCII editor and aecat, for viewing the created file.

    I am not going to discuss the editor part here.

    aewan initial layout
    Aewan ASCII editor

    To display any text in pretty ASCII format, you need the aecat command. Notice the use of letters in the screenshot below.

    aewan output

    To install aewan use the following command:

    sudo apt install aewan

    And then use it like this:

    aecat hello

    3. Cowsay: Make an ASCII cow say whatever you want

    What does the cow say? Whatever you want it to say.

    The cowsay is already a popular tool among seasoned Linux users. It shows an ASCII cow that repeats the text you provide it.

    cowsay

    But you are not restricted to cows only. You can change it to several other characters as well. Like a dragon (burning King’s landing):

    cowsay

    Did you notice the colored output in the above screenshot? That’s the magic of the lolcat command I mentioned earlier.

    To install cowsay, use:

    sudo apt install cowsay

    Once installed, you can use it like this:

    cowsay hello

    You can refer to its man page for additional configuration and options.

    4. jp2a: Convert images into ASCII art

    jp2a is a command-line tool that converts images to ASCII art in the Linux terminal. It works with JPEG and PNG files. It also allows colored output and your selection of character set to appear as ASCII image.

    jp2a

    You can install it using the following command:

    sudo apt install jp2a

    You can get the colorful output and save the ASCII text like this:

    jp2a --output=ascii.txt --colors input.png

    It’s not the only program of this kind. There is ascii-image-converter and several other tools that could be used for the same purpose. I won’t discuss all of them in this list.

    5. linuxlogo: Display the ASCII logo your Linux distro

    The name says it all. It displays the Linux logo in ASCII format.

    No, not our beloved Linux logo, Tux but the logo of your Linux distribution. It also shows a few additional information like Linux kernel version, CPU, RAM, hostname, etc.

    linux logo

    You can install it using the apt command:

    sudo apt install linuxlogo

    Just enter linuxlogo to use the command.

    6. Neoftech: Display the Linux logo along with system info

    The above linuxlogo command is too simplistic. You can amp it up by using Neofetch.

    It displays the distribution in a more pretty way along with several system information like kernel, uptime, desktop environment, theme, icons, etc.

    neofetch

    You can also parse it through lolcat to get rainbow-colored output.

    Install Neoftech using this command:

    sudo apt install neofetch

    And then just enter neoftech to run the command.

    There is also screenfetch, a similar tool to Neofetch. You can use either of them.

    7. fortune: Get your fortune told

    Just kidding! There’s no such thing.

    However, fortune cookies are still fashionable and apparently, people like to read random predictions or teachings.

    You can get a similar feature in the Linux terminal with the fortune command:

    fortune cookie linux

    You can install it using the following command:

    sudo apt install fortune

    Once installed, just enter fortune in the terminal to get a random message.

    8. pv: Make things animated

    This is a classic example of the unintended use of a Linux command. The pv command is used to monitor the progress of data through pipe.

    But you can use it to animate the output of any command. Combine it with some of the above-mentioned commands and you can see the ASCII art appearing on your screen as if it is being typed.

    Don’t get it? Watch this video:

    Install it using the following command:

    sudo apt install pv

    And then use it in the following manner:

    neofetch | pv -qL 200 | lolcat

    The higher the number, the higher will be the speed.

    9. cmatrix: Matrix like animation in ASCII

    Remember the cult geek move Matrix? The green falling code is synonymous with Matrix and hacking.

    You can run an ASCII simulation of the falling code in the Linux terminal with cmatrix command.

    I am sharing a screenshot instead of animation here.

    cmatrix

    You can install it with apt command:

    sudo apt install cmatrix

    Once installed, you can run it with:

    cmatrix

    It starts the animation immediately and it keeps on generating random green text falling and disappearing from the screen. The command keeps on running. To stop the running application, use the Ctrl+C keys.

    10. cbonsai: Grow a bonsai in your terminal

    Got a green thumb? How about growing an ASCII bonsai tree in the terminal?

    cbonsai is a fun Linux command that lets you run bonsai tree growing animation in ASCII format.

    I shared a YouTube Shorts of cbonsai command a few days ago.

    You can install cbonsai using:

    sudo apt install cbonsai

    And then to run the animation, use this command:

    cbonsai -l

    Try some more

    There are many more such fun CLI tools. Heck, there are ASCII games as well. It’s fun to use them at times to amuse people around you.

    Can you put these commands to some good use? Not certain about the usability, but you can add some of them in your .bashrc file so that the command is run as soon as you open a terminal session.

    Many sys-admins do that on shared Linux systems. A program like cowsay or figlet can be used to display a message or system info in a pretty way.

    You may also use some of these programs in your bash scripts, especially if you have to highlight something.

    There could be other usages of ASCII art in Linux. I let you share them with the rest of us here.

     

    5 reasons to use sudo on Linux

  • Apple (almost) says, ‘If you want to collaborate, stay apart’

    Apple (almost) says, ‘If you want to collaborate, stay apart’

    [ad_1]

    Apple has made a decision that should show most enterprises that, when it comes to COVID-19, it’s not over till it’s over. The company has reportedly deferred plans to get staff back in the office three days a week because of increasing infection rates.

    Living with COVID means taking it seriously

    A weekend Bloomberg report tells us the full implementation of Apple’s originally mandated three-days-a-week-in-person plan is probably “not imminent.” The report suggests the company is experiencing rising infection rates across its workforce. If Apple is experiencing this, then it is not alone.

    Way back at the beginning of the pandemic, Apple’s retail stores became seen as guides to local infection rates. The company’s planetary network of stores gave Apple’s HR teams global insight into disease outbreaks. Reporters followed Apple store closures as a guide to the disease clusters.

    Apple still has access to those insights today, which means its decision to suspend its return-to-the-office diktat should be seen for what it is: a signal that the sickness has not abated.

    Of course, we must identify some way to live with COVID, but doing so also means taking it seriously. Magical thinking will not make the disease go away, but smart working practices, staggered commuting patterns, and investment in air filtration systems might help blunt its impact.

    Apple’s decision to suspend progress on the return to the office shows the company is coming to terms with that reality. At least, I think it does.

    A warning you should heed

    Apple had chosen to adopt a hybrid work pattern in which employees attend the office three days a week and work remotely for two. It began requesting workers return to the office for one day a week on April 11, two days from May 4, and had intended attendance to rise to three days by May 23. Employees are currently expected to be present for two days a week, but the move to three has been delayed.

    In common with everyone else, not every Apple employee has been able to work remotely during the pandemic. Some of its teams have continued working in person across most of the last couple of years.

    But the decision to delay the company-wide return must surely be taken seriously by businesses hoping to get employees back to the office, as it suggests Apple’s data shows the risk of doing so remains high. As colleague Steven J. Vaughan-Nichols points out, that’s broadly in line with what health professionals are telling us, from epidemiologist Michael Osterholm’s warning to the Washington Post to this observation from Independent SAGE, a group of scientists in the UK: “Closing our eyes and pretending it’s not there, that’s the most dangerous strategy of all.”

    If you value collaboration, stay apart

    Given that the risks of COVID-19 can include months of mental and physical debilitation that leave sufferers unable to work effectively for months, a company that values collaboration and creative intelligence cannot logically insist its teams expose themselves to such risk.

    The last thing Apple, or anyone else, needs is for key personnel to be out of action for months — particularly when the consequences of a forced return are so evident and any company with commitment to corporate social responsibility also has a duty to protect staff’s psychological and physical health.

    Think about it. What is to be gained in mythical ‘water cooler conversations’ if there’s no one around to put those ideas into motion? Just ask the Society of Academic Emergency Medicine. It means that if your workplace values collaboration, it’s way past time to figure out how to collaborate effectively when apart.

    Please follow me on Twitter, or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe.

    Copyright © 2022 IDG Communications, Inc.



    [ad_2]

  • Cookie conundrum: The loss of third-party trackers could diminish your privacy

    Cookie conundrum: The loss of third-party trackers could diminish your privacy

    [ad_1]

    Third-party cookies may be going away in 18 months, but will that achieve Google’s stated intentions of creating a “more privacy-first web?”

    Chris Matty doesn’t think so.

    In fact, he believes the death of the invasive little trackers could paradoxically make our online identities less secure.

    And he believes the motivations of Apple and Google, which have advocated for an end to this form of passive surveillance, are motivated by goals that are less altruistic than they may seem.

    Matty is the founder and chief revenue officer of Versium, a business-to-business omnichannel marketing firm that profiles online visitors without using cookies. Instead, it harvests data from various third-party sources in a process that complies with the California Consumer Privacy Act and then uses deterministic algorithms to make what is essentially an educated guess about the identity of visitors.

    Matty believes the end of third-party cookies will be a windfall for technology giants whose reach spans multiple properties.

    The losers will be everyone else.

    On their own

    With third-party cookies out of the picture, marketers will be forced to double down on the data they collect on their own web properties through first-party cookies, which will still be with us.

    Those are the trackers you permit to install on your computer when you arrive at a website and are presented with one of those “this site uses cookies” messages.

    The thousands of small website owners that now rely on third-party cookies to identify visitors will have to start collecting more data for themselves.

    That means more registration pages, paywalls, and prompts to give up information about yourself.

    The result will be that “the loss of cookies will actually diminish privacy,” Matty says. “Publishers are going to have to start using gated logins, so they capture an email address.”

    This isn’t a problem for the few giants with a vast web footprint.

    Think about this: How often do you sign in to Google or Facebook? Almost never.

    Once you log in to Google, the company can follow you across its search engines, email service, office productivity applications, media sites, and other outposts in its empire.

    Theoretically, it can track you on other properties as well, as long as you’re signed in.

    However, independent ad networks won’t have access to this information soon, so Google and Facebook will become even more powerful online advertising brokers.

    Meanwhile, independent sites will be pressured to lock down their content more tightly to encourage registration.

    The result will be less free information, more walled gardens, and a greater need for people to keep track of usernames and passwords for all the places they visit.

    “It will cost marketers more because [the cost per thousand visitors] will grow,” Matty says. “The cost of marketing will go up because information will be controlled by fewer companies.”

    An unpopular alternative

    Google has proposed an alternative called Federated Learning of Cohorts that replaces third-party cookies with anonymized information about groups of people stored in the browser.

    Not everyone thinks that’s such a good idea.

    “That approach would put the browser at the center of the advertising equation, and Google, not coincidentally, makes Chrome, the world’s most popular browser,” wrote Adam Tanner, an author of two books about online privacy, in a recent article in Consumer Reports.

    Versium and many other identity technology firms are finding ways to reverse engineer identities without using cookies or compromising privacy.

    The firm gathers data from multiple sources about people who have given their permission to share it and then uses predictive algorithms to infer identities.

    Matty calls this technique “match logic. There are literally hundreds of match codes we can assign with high confidence,” he said. “We can increase match rates from 10% to 90%.”

    In a B2B context, that’s valuable in harmonizing personal and business email addresses. About 70% of LinkedIn profiles are tied to personal email addresses; matching them to a list of business addresses can be a shot in the dark.

    Matty says that adding third-party, opt-in data can resolve most of those mysteries.

    If a marketer has a personal email address, it can be matched to a business address by factoring in other data points like a home address and the nearby population of people with similar names.

    “We can look for a physical address and deduce how far they are from a business and so infer that the person works at that business,” Matty says. “There are literally hundreds of match codes we can assign with high confidence.”

    This means the end of cookies could trigger an explosion in big data analytics. And guess who owns the most popular suite of analytics tools in the cloud?

    Yup, it’s Google.

    Copyright © 2022 IDG Communications, Inc.

    [ad_2]

  • Reviewing the latest Apple rumors

    Reviewing the latest Apple rumors

    [ad_1]

    Audio

    On Today in Tech, join Michael Simon and Ken Mingis as they separate the facts from fiction about the new 13-inch MacBook Pro, the M2 chip, the M2 MacBook Air, and the latest rumors.

    Copyright © 2022 IDG Communications, Inc.

    7 inconvenient truths about the hybrid work trend

    [ad_2]
  • Q&A: Two coding-bootcamp graduates tell their stories

    Q&A: Two coding-bootcamp graduates tell their stories

    [ad_1]

    Technology bootcamps are relatively short-term full- or part-time intensive training programs offering skill sets that in many cases can quickly catapult a previously non-technical person into a high-paying tech career. 

    The schools teach students in-demand skills in areas such as coding, cybersecurity and fintech, and in recentyears, the one-and-a-half to six-month long bootcamps have become talent pools for organizations looking for skills-based job seekers. And with the Great Resignation in full swing, more workers are choosing to move into tech for flexible working conditions and high pay.

    Graduates from coding bootcamps report quickly finding full-time jobs, a fast ROI, higher salaries, and STEM career opportunities, according to recent survey of 3,800 US graduates of university coding bootcamps by US tech education platform company 2U and Gallup. Along with new careers, the programs can help existing tech workers gain new skills to grow in their current roles.

    Globally, there are more than 500 tech bootcamps, according to Source Report, a coding school tracker. While the average bootcamp costs about $14,000, a Source report survey found the average salary increase for coding bootcamp graduates was 56%, or $25,000. And, in 2021, the average starting salary of a bootcamp grad was $69,000.

    Some of the more popular tech bootcamps include CareerFoundry, Fullstack Academy, Flatiron School, Wild Code School, Coding Dojo, WBS Coding School, General Assembly online bootcamp, Springboard, and Udacity.

    2U offers a tech bootcamp platform that’s been adopted by more than 50 universities. The bootcamp offers instruction across eight disciplines, including coding, data analytics, cybersecurity, and fintech.

    Since 2U launched its platform in 2016, 48,000 students have graduated from its programs, and more than 6,000 companies have hired them, including Fortune 500 companies such as Amazon, Autodesk, Capital One, Cognizant, Deloitte, Google, Liberty Mutual, SkillStorm, and State Farm.

    Two graduates from U2’s six-month tech bootcamp are Stephen Powell and Danielle Bowman, neither of whom had any previous experience with technology or coding as part of their careers.

    Powell, 35, grew up in Washington DC and dropped out of high school before getting a  job in retail sales at Verizon at 20. A year later, he got his GED and advanced into a corporate role. To further boost his career, Powell decided he needed more technical training — but didn’t want to spend four years getting a degree. At age 32 – recently married, working full time and raising a 10-year child – he enrolled in George Washington University Data Analytics Boot Camp and landed a new role in data engineering at Koverse, an SAIC subsidiary.

    Based in Atlanta, Bowman spent more than 13 years as a Walgreens store manager before deciding to change careers. After graduating from a University of Central Florida coding bootcamp with a certificate in full stack web development, she now works as software engineering manager at CodeMettle.

    The following are excerpts from interviews with both bootcamp graduates:

    Stephen Powell

    Stephen Powell Stephen Powell

    Stephen Powell

    What were doing after getting your GED? “I started working for Verizon in the retail channel at 19. I did that for about four years and then went on to do government telesales. Then I was a federal account manager for a couple of years. Then I became a B2B trainer of B2B reps and managers and then a national client partner of enterprise accounts at Verizon. I was there for 11 years. I was able to move up…, mainly through sales and training. At the end of 2018, I decided to leave Verizon on my own volition and go work at a start-up as a sales engineer [at KryptoWire]. So, from a company of 66,000 to a company of 16, it was quite a culture shock. And, that’s kind of where I knew I needed to get a lot smarter around technology.

    “It was actually my job at KryptoWire that prompted me to think, ‘I’m going to peak here at some point.’ It was a mobile appliction security testing firm. That’s why I decided to go to boot camp in 2019.”

    What was it about your job at KryotoWire that gave you the idea to go to a coding bootcamp? “The first couple of meetings I had at KryptoWire — the internal meetings with the engineering team — they were saying things I had no clue about. To be candid, I felt kind of stupid. So, I went home and I started researching programs on tech, and coding specifically. I knew at 32-years-old, I didn’t have four years to give; not only that, I didn’t have debt to accrue. So, I literally Googled programs around Python and data analytics, and that’s how I found the bootcamp, and then I took the pretest and applied for it. It was literally researching programs on a Saturday.”

    What was it about the program that you liked, or didn’t like? “What I liked was the instruction.

    “Now, one thing I had over cohorts is that I spent such a long time in corporate America. I knew what it was like to generate and maintain relationships. That’s one thing I’m good at. I knew that developing relationships with instructors and teaching assistants was going to make me most successful in my career path. And, so that’s what I really enjoyed about it. I can’t say I had any dislikes only because I went into program knowing whatever happened would be based upon my effort. I was in sales, so I’m used to eating what I kill. So, I applied that same principle to the bootcamp.  

    “It was hard at first, from a work standpoint — but that’s because I hadn’t done Python before. …But after the first few weeks of me getting repetitious about it and doing some self-study, I was able to catch on.”

    What was it like seeing code for the first time? “I remember the first night we did Python, I went home and told my wife I’m probably going to drop out. The first night we did Python, they were very simple tasks, but I simply couldn’t catch on.

    “My wife has been a backbone for me. She told me to stick with it. It was scary. It was foreign. It looked like a foreign language. I know some Spanish and this looked a lot worse.”

    Along with your wife’s support, what kept you from quitting? “I have an acute fear of failure. And also, I knew at KryptoWire, because I worked with such a smart group of people, my skillsets — even my ability to build relationships — wouldn’t carry me into tech. So, if I didn’t get any formal training, whether it be boot camp or a four-years degree, I was going to be left out of that pool of people smart enough to maintain a career in technology.

    “So, that fear of missing out — that FOMO – and the fear of failing really drove me. I actually developed a personal interest in learning more about code and data science.”

    Was it very expensive? “So, the whole program was $10K. Again, I think I was lucky in the sense that I had a good paying job, so it wasn’t a massive financial undertaking for me. I know some of my other cohorts emptied their savings, they got personal loans. But for me, it wasn’t a heavy lift financially. I always say, I’ve spent more on less.”

    What was the course like? “It was six months long. It was all in person. We did Tuesdays and Thursdays for three hours — 6:30 p.m. to 9:30 p.m. And from Saturday from 10 a.m. to 2 p.m.”

    Was the workload manageable, considering you were working a full-time job? “There were adjustments that had to be made, for sure. Because you have a full life, including your personal life, you do have to carve out time outside of regular coursework in order to maintain and upskill in the program. So, for the first couple of weeks there was a time I really had to adjust myself — not only my work schedule, but also my sleep schedule; some of these nights went a little longer than they would have if I weren’t in the program. It was a tough couple of weeks…just trying to get ramped up and really understand what being in a program like this takes….”

    What was the most difficult part of the course? “The speed of the course work. They really try to squeeze in about four years of materials into six months. So, keeping up initially was really tough for me. That’s why I had to put in the extra time, not just in the classroom, but also at home. So, there were some personal sacrifices, albeit mostly social, I had to make in order to be successful. But the speed was it; one week we’re talking about one thing and the next week we’re onto another topic, and the next topic might incorporate that thing you learned four weeks ago. So, it was a lot to keep up with….”

    What did you like best about it? “The teachers. I loved the instruction. It was careful and thoughtful. When you asked a question, you didn’t feel stupid. I really appreciated that. In fact, I still keep in touch with my instructors today. That’s how I know I valued them so much. They were always encouraging me, always.”

    What was your first job out of bootcamp? “I was a data analyst. The boot camp was a data science program. Normally, the path is to start off as a data analyst and then you end up a data scientist. So, I went in thinking that would be my path. But in the program you start to understand the skillset you’re investing in can fit a wide range of roles. So, once I was in the program, I stopped narrowing my view of what I could do.

    “Number one, I could keep the job I had and be better at it. I could be a data analyst or data scientist. That was a very buzz-worthy title three or four years ago. But after a while, I realized I could do anything with those skills. I actually got the data analyst job a month before completing the bootcamp program.

    “Because I had a lot of federal experience, dealing with federal integrators and customers, I got a job as a data analyst with the Department of Justice — and I got that right before COVID started. I wasn’t comfortable with my coding prowess at that point to be a full-fledged engineer. That’s why I went that route.

    “Now, I’m on my third job since the program. I was a data analyst for a year, and actually got the opportunity to become a data engineer at Koverse, an SCIC company.”

    How has your career change affected your life? “I had a pretty good job before. Job security is a term I stay away from, but now I have skill security. What the program did was give me a sense of always wanting to learn more. I’m a heavy reader. I read at least two books a month around what I do. And I wouldn’t have gotten that fervor to learn — that fire — had I not attended that bootcamp.

    “Engineering to me is a trade that if you’re able to learn and upscale it, you’ll be able to maintain [a career] for a very long time.”

    In terms of income, has this allowed you to earn more? “Yes. Specifically, when I was at Verizon, I earned well, but it was commission-based. So, now I’m earning that kind of money at a salary level. And, now I work at a company — I started a new job last week — that afforded me the ability to actually have equity in the company….

    “To be honest, you don’t know these companies like Facebook give you equity in the company until you get into that realm. It’s made a difference in how I view money, certainly in how I spend it and also how I invest it. It’s made a hell of a difference.”

    What advice would you give others considering careers in technology and attending a bootcamp? “Consistency over fear. If you’re consistent with it, no matter what you’re afraid of, you’ll get it eventually. I still have imposter syndrome to this day. But, if I’m consistent with my work ethic and my ability to program and build things, I can put that fear on the back burner. Because all I have to do is get in front of my computer and say. ‘I’m just going to do it regardless of what the outcome is.’ Consistency, will trump everything.

    “I now work for Gretel. It’s an AI and machine learning company. I’m super excited.”

    What do you like about your current job? “I like the fact that I’m part of a company that’s defining a new space in technology. We specialize around synthetic data. We are at the forefront of defining this space, to the point where we’re going to have to be educating folks in the next few years about what it is, which I absolutely love…. I can look back and say Gretel was the one who introduced me to this amazing new topic of AI and machine learning.”

    Danielle Bowman

    Danielle Bowman_ large Danielle Bowman
    Danielle Bowman

    What was your career prior to attending the coding bootcamp? “I got my business management degree and started at Walgreens literally the week after as assistant manager. I had my own store within three or four years. Then I managed a bunch of stores. I started in Cleveland, Ohio before Orlando. Then I was managing stores in Orlando.

    “It was fine. It was a good career. It was well paying. But, I knew it wasn’t my long-term career. I just happened to be good at it. But I also knew I didn’t want to work holidays, I was tired of working on weekends and dealing with stuff non-stop.”

    How did you learn about the coding bootcamp? “A friend of mine — we used to be assistant managers together in Ohio — asked me if I’d ever thought about coding, and I told him, no. He’d become a [software] engineer. No one had ever suggested it as a career path to me. I was naïve to all of it. He told me there’s a demand for it and your salary could transition and you wouldn’t have to take a huge [loss].

    [ad_2]

  • Cisco announces plan to exit Russia and Belarus

    Cisco announces plan to exit Russia and Belarus

    [ad_1]

    Cisco has announced plans to formally exit Russia, winding down its business operations in Russia and Belarus in response to the invasion of Ukraine earlier this year.

    The networking company first made a statement on March 3, declaring that it would be halting all business operations in Russia and Belarus “for the foreseeable future.” On Thursday the company released another statement, noting that it had continued to “closely monitor” the war in Ukraine and as a result, a decision had been made to “begin an orderly wind-down of our business in Russia and Belarus.”

     “Cisco remains committed to using all its resources to help our employees, the institutions and people of Ukraine, and our customers and partners during this challenging time,” the statement said.

    On an earnings call in April, Cisco’s CFO Scott Herren told analysts that historically, Russia, Belarus and Ukraine collectively have represented approximately 1% of the company’s total revenue.

    However, he noted that the decision to stop business operations in both Russia and Belarus did have a negative impact on revenue, costing the company “approximately $200 million or two percentage points of growth.”

    What are other companies doing?

    In the days after Russia’s initial invasion, a long list of Western technology companies suspending operations in Russia began to grow.

    SAP and Oracle were two of the first tech organizations to publicly pull out of the country after Ukrainian vice prime minister Mykhailo Fedorov publicly posted letters to appeal to both companies on Twitter.

    In early March, Microsoft also announced it would suspend new sales of Microsoft products in Russia, “in compliance with governmental sanctions decisions.”

    However, at the time, the statement was criticized by Ukrainian vice prime minister Mykhailo Fedorov, who said that simply suspending sales in Russia did not go far enough and that the company should block access to its products.

    This week, Russian news agency TASS reported that attempts to install Windows 10 and Windows 11 in Russia had been blocked. Microsoft has yet to make any comment as to whether this is a technical error or part of the company’s plan to further withdraw from Russia.

    Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

    Copyright © 2022 IDG Communications, Inc.



    [ad_2]

  • Zoom unveils its latest platform evolution with the launch of Zoom One

    Zoom unveils its latest platform evolution with the launch of Zoom One

    [ad_1]

    Zoom has unveiled Zoom One, a new offering that brings together chat, phone, meetings, and whiteboarding capabilities in a single, purpose-built environment.

    Users of Zoom One will be able to access Zoom’s collaboration and communication tools and perform actions such as starting phone or video calls from a chat message or collaborating on a whiteboard from a Zoom desktop or Zoom room.

    In a press release announcing the launch, company President Greg Tomb said that as Zoom evolved from a meeting app to a comprehensive communications platform, it was clear that introducing new packaging like Zoom One was the next step in the company’s evolution.

    “By bringing together chat, phone, meetings, whiteboard, and more in a single offering, we are able to offer our customers solutions that are simple to manage, so they can focus on business issues that matter most,” he said.

    Zoom One has six tiered plans available to customers, including Basic, Pro, Business and Enterprise versions.

    •      Zoom One Basic provides free 40-minute Zoom Meetings for up to 100 attendees, persistent Zoom Chat for team messaging, limited Zoom Whiteboard for synchronous and asynchronous work, and real-time transcription.
    •      Zoom One Pro provides everything Zoom One Basic offers without meeting time limits, plus cloud-based recording.
    •      Zoom One Business provides everything Zoom One Pro offers, plus Zoom meetings for up to 300 attendees and unlimited Zoom Whiteboards.
    •      Zoom One Business Plus provides everything Zoom One Business offers, plus Zoom Phone Pro with unlimited regional calling and Zoom’s all-new translation feature.
    •      Zoom One Enterprise and Zoom One Enterprise Plus provide everything Zoom One Business offers with larger meeting capacity and additional features, like Zoom Webinars, to help modern businesses scale. Zoom One Enterprise Plus also includes Zoom Phone Pro with unlimited regional calling.

    Zoom One Basic, Pro, Business and Business Plus plans are available for purchase today, priced at $149 per year/user; $199 per year/user; and $250 per year/user respectively.

    Translated and multilanguage captions

    Users of Zoom’s new Zoom One Business Plus and Zoom One Enterprise Plus packages will have access to bidirectional translated captions. The captions will be able to translate between Chinese (simplified), Dutch, English, French, German, Italian, Japanese, Korean, Russian, Spanish, and Ukrainian upon launch.

    Zoom has also extended its automated captioning—the ability to caption in real-time what a speaker is saying in the same language as the one spoken—to include 10 additional languages. Automated captions previously were supported in English, but now can be displayed in the same 10 languages available for live translation.  

    Multilanguage automated captions are available in Business Plus, Enterprise, and Enterprise Plus packages with additional support for other plans coming soon.

    Zoom Apps software development kit

    Zoom also announced this week that the company has opened its Zoom Apps developer programme to all developers via Zoom Apps SDK (software development kit).

    Zoom Apps JavaScript software development kit (SDK) is designed to provide developers with the resources and supports the necessary infrastructure to build Zoom Apps within the Zoom platform. By using Zoom Apps SDK, developers can reach Zoom customers via Zoom App marketplace, where users can simultaneously discover and add new apps, according to the company.

    Zoom says that to date, over 100 apps have been published by developer partners in its app marketplace.

    “With the launch of the Zoom Apps SDK, the Zoom Developer Platform continues to expand and offer developers new ways to incorporate video communications and collaboration into their creations, transforming business workflows forever,” said Zoom CTO Brendan Ittelson, in a statement.

    Copyright © 2022 IDG Communications, Inc.

    [ad_2]

  • How Apple is updating mobile device management

    How Apple is updating mobile device management

    [ad_1]

    As expected, Apple at WWDC announced a series of significant changes to how Macs, iPads, iPhones, and Apple TVs are managed in business and education environments. These changes largely break into two groups: those that affect overall device management and those that apply to declarative management (a new type of device management Apple introduced last year in iOS 15).

    It’s important to look at each group separately to best understand the changes.

    How did Apple change overall device management?

    Apple Configurator

    Apple Configurator for iPhone got a significant expansion. It’s long been a manual method of enrolling iPhones and iPads in management rather than using automated or self-enrollment tools. The tool originally shipped as a Mac app that could configure devices, but it had one major downside: devices had to be connected via USB to the Mac running the app. This had obvious implications in terms of the time and manpower in anything other than a small environment.

    Last year, Apple introduced a version of Configurator for iPhone that reversed the workflow of the original, meaning an iPhone version of the app could be used wirelessly to enroll Macs into management. It was primary used to enroll Macs that had been purchased outside of Apple’s enterprise/education channel into Apple Business Manager (Apple products purchased through the channel can be auto-enrolled with zero-touch configuration).

    The iPhone incarnation is incredibly simple. During the setup process, you point an iPhone camera at an animation on the Mac’s screen (much like pairing an Apple Watch) and that triggers the enrollment process.

    The big change this year is that Apple expanded the use of Apple Configurator for iPhone to support iPad and iPhone enrollment using the same process — removing the requirement that devices be attached to a Mac. This greatly reduces the time and effort needed to enroll these devices. There’s one caveat: devices that require cellular activation or have been activation locked will need that activation to be completed manually before Configurator can be used.

    Identity management

    Apple has made useful changes for identity management in enterprise environments. The most significant: it now offers support for additional identity providers including Google Workspace and Oauth 2, which allows an expansive set of providers. (Azure AD was already supported.) These identity providers can be used in conjunction with Apple Business Manager to generate Managed Apple IDs for employees.

    The company also announced that support for single sign-on enrollment across its platforms will be implemented after macOS Ventura and iOS/iPadOS16 arrive this fall. The goal here is to make user enrollment easier and more streamlined by requiring users to authenticate only once. Apple also announced Platform Single Sign-on, an effort to expand and streamline access to enterprise apps and websites each time they login to their device(s).

    Managed per-app networking

    Apple has long had per-app VPN capabilities, which allow only specific enterprise or work-related apps to use an active VPN connection. This applies VPN security, but limits VPN load by only sending specific app traffic over a VPN connection. With macOS Ventura and iOS/iPadOS 16, Apple is adding per-app DNS proxy and per-app web content filtering. This helps secure traffic for specific apps and functions the same as per-app VPN. And this requires no changes to the apps themselves. DNS proxy supports system-wide or per-app options while content filtering supports system-wide or up to seven per-app instances.

    E-SIM provisioning

    For iPhones that support eSIMs, Apple is making it possible for mobile device management software (MDM) to configure and provision an eSIM. This can include provisioning a new device, migrating carriers, use of multiple carriers, or configuration for travel and roaming.

    Managing Accessibility settings

    Apple is well known for its expansive set of Accessibility features for people with special needs. In fact, many people without special needs also use several of these features. In iOS/iPadOS 16, Apple is allowing MDM to enable and configure a handful of the most common features automatically, including: text size, Voice Over, Zoom, Touch Accommodations, Bold Text, Reduce Motion, Increase Contrast, and Reduce Transparency. This will be a welcome tool in such areas as special education or hospital and healthcare situations where devices may be shared among users with special needs.

    What’s new in Apple’s Declarative Management process?

    Apple unveiled Declarative Management last year as an improvement over its original MDM protocol. Its big advantage is that it moves much of the business logic, compliance, and management from the MDM service to each device. As a result, devices can proactively monitor their state. That eliminates the need for the MDM service to constantly poll for their device state and then issue commands in response. Instead, devices make those changes based on their current state and on the declarations sent to them and report them back to the service.

    Declarative management relies on declarations that contain things like activations and configurations. One advantage is that a declaration can include multiple configurations as well as the activations that indicate when or if the configuration should be activated. This means a single declaration can include all the configurations for all users, paired with activations that indicate to which users they should apply. This reduces the need for large sets of different configurations as the device itself can determine which ones should be enabled for the device because of its user. 

    This year, Apple has expanded where Declarative Management can be used. Initially, it was available only on iOS/iPadOS 15 devices that leveraged user enrollment. Going forward, all Apple devices running macOS Ventura or iOS/iPadOS/tvOS 16 will be supported, regardless of their enrollment type. That means device enrollment (including Supervised devices) is supported across the board, as is shared iPad (an enrollment type that allows multiple users to share the same iPad, each with his or her own configuration and files.)

    The company has made it crystal clear that Declarative Management is the future of Apple device management and that any new management features will be rolled out only to the declarative model. Although traditional MDM will be available for some unspecified time, it has been deprecated and will eventually be retired.

    This has major implications for devices already in use. Devices that can’t run macOS Ventura or iOS/iPadOS 16 will eventually be dropped and any that remain in service will need to be replaced. Given the swath of devices losing support, this could make for a costly transition for some organizations. Although it isn’t immediate, you should begin to determine the size and cost of the transition and how you will manage it (particularly since it will likely require a transition to Apple Silicon, which doesn’t support the ability to run Windows or Windows apps, in the process).

    Beyond expanding what products can use declarative management, Apple also extended its functionality, including support for passcode configuration, enterprise accounts, and MDM-governed app installation.

    The passcode option is more complex than simply requiring a passcode of a certain type. Passcode compliance is traditionally required for certain security-related configurations, such as sending the corporate Wi-Fi configuration to a device. In the declarative model, those configurations can be sent to the device before a passcode is set. They are sent along with the passcode requirement and include an activation that will only enable it once the user creates a passcode that complies with that policy. Once the user sets a passcode, the device will detect the change and enable the Wi-Fi configuration with multiple connections to the MDM service, enabling Wi-Fi immediately and notifying the service it’s been activated.

    Accounts — which can include things such as mail, notes, calendar, and subscribed calendars — function similarly. A declaration can specify all the types of accounts supported within the organization as well as all the subscribed calendars. The device will then determine — based on the user’s account and role(s) within the organization — to activate and enable.

    MDM app installation is the most significant addition to declarative management, since app installation is one of the tasks that puts the most load on an MDM and the biggest bottleneck during mass device activations (such as a large onboarding of new employees, new device rollouts, or the first day of school). A declaration can specify all the potential apps to be installed and sent to a device at activation, even before it has been handed to its user. Again, the device will determine which app installation configurations to activate and make available, based on the user. This avoids each device having to repeatedly query the service and download apps and their configurations. It also simplifies and speeds up the process of enabling (or disabling) apps if a user’s role changes.

    These are significant improvements and it’s easy to see why they are the first additions to Declarative Management after its initial rollout. There are still MDM capabilities that have not made the leap to declarative use, but it is obvious that eventually – perhaps as soon as next year – they will.

    This is one of the most significant WWDC announcements for enterprise and it’s good to see that Apple has been thoughtful in deciding which features to add or update since most of them tackle areas that were difficult, time consuming, resource intensive, or tedious. Apple is not just addressing enterprise customer needs, but demonstrating that it understands those needs.

    Copyright © 2022 IDG Communications, Inc.

    [ad_2]