Wednesday, 22 June 2016

HELCY - The Only Laptop Case That Improves Your Posture


HELCY is the proof that healthy can also be stylish. Designed for the digital lifestyle, showcasing a sleek and modern look makes HELCY is the ultimate laptop case for the busy professional.
HELCY is now available for pre-order on Kickstarter. 
Productivity Booster
HELCY enables you to regain your natural posture while working on your laptop anywhere and effortless. While sitting up straight, the spine’s natural curvature is being restored and you sit with a comfortable and healthy posture while you work. HELCY has several steps to regulate the height of the screen, so you can adjust it as you like. It relieves you from neck and back pain and the increased and effortless breathing makes you more productive and healthy. HELCY won’t only improve your health, but will also increase your motivation and happiness.
Portable
The best part about HELCY is that your ergonomic workstation is not only bound to one desired desk, but you can take it anywhere. Integrated into the laptop case, HELCY provides a combined design of a case and a stand. The stand fits with any brand and is perfect for your laptop as well as phone and tablet.
HELCY can be used as a simple sleeve which fits into any bigger bag. The outer pocket lies flat on the sleeve, so it can be used to store essential items but does not take up any extra space. With the shoulder strap HELCY turns into a shoulder bag that can take up the laptop as well as your external keyboard, mouse and other essentials.
Healthy and stylish
HELCY is the proof that healthy can also be stylish. Designed for the digital lifestyle, showcasing a sleek and modern look makes HELCY is the ultimate laptop case for the busy professional. The upholstering inside keeps the laptop protected at all times. The outside is made from the finest vegetable tanned cow leather that gives you an elegant and professional look.  
Get it now and join the HELCY revolution!

This is why I can't replace my laptop with my tablet...but I want to...so bad.


iPad Pro, Pixel C, Samsung Tab Pro, or the Surface Pro 4; all tablet's that are gunning the future of mobile computing.  There's no question that the general population wants to kill their laptops and be productive and ultra portable, simultaneously.  The other desire is to have a device that can be useful on sales meeting Wednesdays and couch lounging Sundays.  So why hasn't this caught on?! 
Believe it or not, it's extremely difficult to meld portable computing, business software, productivity platforms and consumer electronics into a single experience.  Over the years companies have attempted.  HTC introduced "Sense" in 2009 that would allow your phone to change its configuration and widgets based on time-of-day.  Microsoft introduced Windows RT and 8.1 in 2012 which gave Windows the ability to be used with just touchscreen input.  Most recently, Windows 10 was released with a "tablet mode" which would simplify the interface for touchscreen usage vs. pointer and mouse.  Apple has even attempted with iPad Pro and Apple Pencil.  
Not all these products suffer from the same issue, but they all suffer from some of the major issues that seem to prevent mass adoption.  How can we fix this?

The Portable Experience

Apple, Google and all other hardware OEM's have forgotten what its like to work portable.  Microsoft is the only company who has released something entirely correct.  People need the flexibility of a slate...something completely devoid of keyboards, mice, and cabling.  But, they also need the rigidity and stability of a keyboard and hinge.  
Surfacebook is born.  
In my opinion, the Microsoft Surfacebook is the future of all computing.  It allows you to sit on a couch, bus or beach and feel absolutely comfortable consumingcontent...or...creating content.  The transition is seamless and completely fluid.  Ask anyone with a kickstand device how easy it is to type on a couch, without a table.  Then ask the same people how enjoyable it is to surf YouTube from their work laptops.  What you'll find is that a Macbook form factor is superlative in its ability to create a productivity workspace, while the iPad is synonymous with casual usage.  No amount of origami in a cover will compensate for hinge and counterweight.  

The mouse and pointer

In 1984 Apple released a product that was entirely based on the Point-and-Click UX.  It was completely deprived of command lines or programming interfaces.  While it was stolen from Xerox PARC, this idea revolutionized the technology industry.  For 32 years generations of people have learned to use technology with a mouse, keyboard and monitor.  Applications, OS's, and workflows have all been conceived under the pretenses of the mouse and keyboard.  Just like the steering wheel and automobile, the mouse and computer are linked for life.  
I'm not against the touchscreen interface.  I believe finger input and stylus input have an extremely valuable place in the market.  Think about how pen and paper is being replaced by stylus and touchscreen!  All things considered, there will never be a point in time that all workflows are solved by point-and-touch.  Productivity platforms like Office, Final Cut, database management and programming software require the fine tuning of keys and the cursor.  
I envision a time when Microsoft's "tablet mode" becomes mature enough to morph a UI from a touch experience to a pointer experience allowing users to switch between touchscreen and mouse with the same fluidity they go from slate to notebook.  Microsoft has done an absolutely amazing job at bringing Office applications to the iPad.  That said, they are only great for review and data input; they still require a PC for finishing and submission.
Bring the mouse to iPad, and it becomes a completely different device.

Filesystems and Folder Interfaces

Again, Xerox was ahead of its time when it invented the folder UI.  Couple this with Apple's Hierarchal File System and you've got what matured into exabytes of content and files.  The idea of drives, folder and files is as intuitive as buttons for rolling down windows.  Telling your car to "roll down the driver's window an inch" is cool and easy...but it isn't as easy as quietly and quickly pressing a button.  Some things just can't be improved on.
I fully believe our local storage will eventually become cloud storage and the idea of "information everywhere" is going to happen. Microsoft and Google have done an incredible job with Onedrive and Drive.  I myself use Onedrive for Business and have access to all my files on any device I'm on.  That said, it isn't as fluid as looking at it on my local computer.  This is amplified on iOS and Android.  The file managers on these devices are deplorable.  They make professional and personal workflow nearly impossible for any major task.  Outside of consuming news and information, they fall very short of the PC.
The UX of Flipboard on an iPad is unparalleled.  It is as natural as breathing.  For me to relinquish my Mac, I would need the same feeling about creating a slide deck on an iPad.  I need the ability to drag files, archive folders and store information in a way that is easy to retrieve.  The fundamentals are there, they just need execution. 

Accouterment & Bric-a-Brac

The PC is now a middle aged professional.  It's proven itself worthy and has acquired some experience over the years.  It knows its users want things like fonts.  It knows its users need multi-tenancy.  The PC is familiar with the ways of integrating with external devices.  This is another area where Microsoft blows away the competition.  Microsoft knows that Windows has all these things.  It also knows Windows has acquired some REALLY bad habits.  Internet Explorer...ehem...
This is why Microsoft Surface and Surfacebook run Windows.  Microsoft has stolen all the good things from younger technology and baked it right in.  Windows has picked up Cortana.  It has upgraded the Start Menu with tiles.  It has things like Tablet Mode and Fullscreen apps.  It even has an App Store.  Point is...it melded mobile with its mature OS.  You can tear Microsoft apart, but you can't argue away the fact that iOS isn't OSX.  Android is not Windows.  ChromeOS isn't Ubuntu.
For my tablet to replace my laptop it has to have an OS with 30+ years experience.  I need fonts in my productivity suite.  I need folders in my pictures app.  I needmultitasking to be more than 2 windows!  Telling the market that iOS or Android is the future of computing because it can deliver videos, email and news is like looking at a 10 year old and telling a company she can be the CEO because she has arms, legs and a brain.  There's a bit more to it than YouTube and Exchange.
The first company to meld their mature product with their mobile product and have it been seamless will win.  I hate to say it, but Google has a long road ahead of it.  Android and ChromeOS have no mature brethren. 

How to Secure Your Computer or Laptop


No doubt,  computer has become an essential part of our daily lives. You get almost everything done online (or wish to do even when can’t) via your computer or laptop these days, and that’s perfectly fine – without computers it’d be silly to think living in this age.
Now, alongside a number of advantages we’re able to take from computers – there also are specific security issues related to the use of computers and laptops. Mostly, people store a decent amount of their personal data in computer or laptop. The information can’t be access unless a physical or network access is granted, right? But it’s fact that sometime you’re bound to leave your laptop or computer unattended, that’s just a single reason out of many critical ones why you need to secure them at first.
Moving along with another reason, Internet is active on most of the computers all the time – so there’s a real network intrusion danger. For these reasons and many others, it’s always a better idea to secure your computer or laptop at first to avoid any possible data theft or personal information leakage. Here in this article, I’m going to tell you about some easy ways with which you can achieve that! Read along.
It’s a renowned fact that the weakest link on any network or even a standalone computer, is the user!  So I’m focusing this article for all users. But, and there’s always a ‘but’, I’m not doing all the work for you.
I’ll touch on a range of issues, as the saying goes, ‘you can take a horse to water, but you can’t make it drink’.  This article won’t be full of hyper links, though I’ll be giving you things you can search on, as I want you to take ownership.
It’s not technical, and I’m not expecting you to be out of pocket either, so I’ve be quite prudent. By taking time and having patience, you too could quite easily research to locate the answers and ultimately secure your computer or laptop.
So without further ado, let’s commence …..
Secure operating system: Well I always thought Apple was the most secure, by searching on, ‘secure computer operating system’. Some Internet security news taught me something new. It appears in 2014, Apple Mac OS – 147, Apple iOS – 127 and Linux – 119 were the top 3 for vulnerabilities.
With Windows coming in at the bottom with 36 vulnerabilities. So it shows that doing research is most worthwhile, it pays dividends. The operating system is down to your choice, though common knowledge tells us about the cost of Apple. I can’t comment on Linux, never used the system, but the answer lies above.
Password protect your computer: Any computer must be password protected, it goes without saying. Even family members should have their own accounts. Now please don’t go using things like ‘Password’, ‘1234567’ or ‘abcdefg’. I’ve just done a search on ‘password cracking dictionary’ and CrackStation have a dictionary that includes over 1 Billion passwords. Now don’t you think the cyber criminal will be using this for brute force attacks as well?
When you read about using strong passwords or changing passwords regularly, it’s for your benefit and not to make your life hell. It’s your risk at the end of the day!  This is why your advised to use alpha numeric passwords, with the other characters on the computer keyboard.  But you do it in an order that you can recall your new passwords, it’s not rocket science and whatever you do, ‘Don’t share passwords’.
Use a trusted computer security system: Now this is where some expense could be involved, but it’s worth it and don’t cost that much if you calculate benefits and cost per day. Using a quality product like Norton 360 costs £24.99 for 1 year, now that’s less than a £1 a day and there’s other benefits, like having a secure vault.
If you then choose to use Norton Utilities, which runs automated routines each day to check your registry and protect personal information is £39.99  for a year, less than a pound a day. In total both items will cost you just over a pound a day.
You and your family are more than worth it and you’ll have peace of mind. Should you decide to check out Kaspersky or MacAfee, these are suggestions. But there is always AVG if your budget is really limited. Either way, you’ll need a quality anti-virus software.
Now something you may wish to consider and it’s ‘free’ is to do a Trend House Call, they will scan your computer to inform you of any risks that could be identified. Worth it for the peace of mind.
Something I use is IBM Trusteer Rapport and why, it will protect you from:
  • Multilayered protection
  • Protection of web browsing sessions
  • Defense against identity fraud
  • Prevention of Malware infections, and
  • Protection from Phishing.
And it’s ‘Free’, just takes you to start the ball rolling!
Firewall: The firewall is a most important feature, Windows does come with a firewall in the operating system.  Though be advised, when using Norton 360 (or any premium computer security suit), it will take over this feature. The firewall is designed to keep the bad boys out of your computer and protect you. Therefore it’s important not to interfere with this, it’s critical for your integrity.
Keep software updated: This is critical, the last thing you need is your software going out of date. Your operating system should run an automated routine for updating itself. However, any applications you have running won’t necessarily have automated routines running.
Your anti-virus, and if using Norton utilities will automatically update. Furthermore, you’ll also be advised automatically if you’ve not done back up’s  and it’s out of date, a word of warning!
Only download from trusted sources: This goes without saying, please do only download from trusted sources.  However, it’s your risk and you decide.  Though some downloads look to be quite safe, but the cyber criminal can’t be trusted.  They embed malware, ransomware or phishing software, which unknown to you, will run in the background without you knowing, infect your computer and steal your data, photos or whatever they wish.  Be cautious and tread carefully.
Good web browser: Your computer will come with a default web browser, but there is a myriad of browsers available on the internet.  Some may even change your browser when you download articles or go onto sites. May I advise you to be wary and be on the lookout for such types of automated occurrences. You must take steps at your own tosecure your browser, no matter how much security your browser creator (no matter if it’s Mozilla, Google or Microsoft) claims. It is worthy to checkout your Programs and Features and remove any unwanted software in your Control Panel.  The administrative task is a continuum process which you need to take ownership of.
Never open compressed or unknown attachments in email: Now then a question for you, What do we all have on our keyboards? It’s the Delete Key, so never be seduced to open compressed files or unknown attachments if you want to have secure email account.  They will ultimately be contained within an email. So if you don’t know the sender or not expecting them, just hit that Delete key. If it’s genuine the sender can always resend, and you can bet, the cyber criminal won’t be checking this out. It’s called self protection and your ensuring your integrity and that of your computer remains so.
Secure wi-fi router: Should you be using an iPad or using a wi-fi router, please ensure its in the secure mode. If you don’t anyone could use you internet connection, which is unknown to you and they could be up to any form ofmisdemeanors. The police will take a different  view on this and you could end up in a lot of trouble. So please protect yourself and your family too, by securing your router.
Never leave computer equipment unattended: Now believe this or not, this is common sense. Would you leave your luggage unattended at an airport or railway station, I don’t think so or you shouldn’t do. Equally, never leave your computer unattended at home, internet cafe or in the office. At least all you need to do is lock the device, and don’t trust members of your family either. I don’t wish to make you paranoid, kids don’t see dangers and it’s your account!
Deep web or dark net: Ever heard of these, well they are risky areas, don’t get me wrong they’re not all bad people using these, but the cyber criminal will prowl, like a praying mantis.  The Internet we all use is also called the ‘Surface web’, it’s structured and contains over 19 Billion pages, a bit of light reading one could say. Who needs more than that! But the Deep web and dark net do exist, it’s risky and I don’t suggest you go there, no matter what your colleagues say. This more of an advisory tip and not meant to scare you, I’m trying to protect you.
Using offline storage and USBs: If you can afford it, use encrypted offline storage devices and USBs. You would be protecting yourself and others too.  You need toprotect your USB drives as much as you can, too. The only things on my computer is the operating system, applications and emails. Aside of these, I have no personal data residing on my computer. Bank information, letters, documents, credit card information, photos as all are on an external hard drive. Ok the email is a risk, one which isn’t recoverable, so all I would lose in the event of a theft is a computer and applications, and the latter I have original discs. Food for thought.
Education, Open University cyber course: I’m a firm believer in education, it’s good for the soul and keeps your memory working and you feel good when you’ve achieved something. I highly recommend doing the Open University cyber course, it’s enjoyable, you learn something and even better it’s Free. The computer and internet are excellent gateways for your education, you know what you wish to study, go on give it a go.
Encrypt your connection to the Internet: Indeed, it bodes well why encryption is of such grave significance for a broad range of employments on the web. Not just will this system permit you to send over arranged records in an encoded and thusly private environment, yet it will secure all that you do on the web. It merits taking the risk and adapting more about what encryption actually is and which kind of encryption is the perfect for you.
One of the best encryption tools is none other than VPN. A VPN encrypts your Internet connection and keeps your online activities safe, by using a VPN you ensure that your computer or laptop is safe while connected to the Internet. One good VPN that I can recommend is ExpressVPN, US-based but security and privacy-focused player of theVPN market. Another tool that you can use to encrypt your Internet connect is, Tor.
Review and reassess regularly: I strongly urge you to review and reassess your computing requirement, and this includes software. New software is continuously being written, your needs will change given time or circumstances.  It would be in your own interest to just take time out and do this. Hardware is part of the continuum, they’re getting smaller, lighter and more mobile, along with many more features. It’s your opportunity to keep abreast with technology.
So in order to review what this article is all about, these are the key things:
  • Use passwords and change regularly
  • Use anti-virus
  • Try IBM Trusteer Rapport
  • Use a Firewall,
  • Keep software updated
  • Only use trusted sources
  • Use good web browser
  • Never open compressed or unknown attachments in email
  • Secure wi-fi router
  • Never leave equipment unattended
  • Deep web or dark net, don’t go there unless your experienced
  • Using offline storage and USBs
  • Education
  • Encrypt your Internet connection via VPN, Tor or other encryption tools
  • Review and reassess
Conclusion
I’ve tried to give you some good direction in this article.  However, risk and discipline will always prevail, so we must be careful in what we do and where we go. Life these days, alas is governed by discipline and risk, to which I proffer, each go hand in hand.
Ultimately, computers are an excellent tool which we use in our daily lives.  Enjoy your work, study and free time or whatever you wish to do, though may I say, be guarded and enjoy.
Top/Featured Image: By Kristoferb at English Wikipedia [CC BY-SA 3.0, GFDL, CC BY-SA 3.0 or GFDL], via Wikimedia Commons
Originally posted on Security Gladiators

iPad Pro to kill off the Windows laptop


Back in June, Wall Street Journal's Christopher Mims recommended "Apple should kill off the Mac". He argues that the Mac with its 20 million units is just a distraction, albeit a profitable one, and that the resources dedicated to it would be better invested elsewhere. Looks like something entirely different is about to happen. 
In truth, the Mac is a bit odd. Roughly speaking, the 300 million units PC market is split into expensive commercial machines and cheap consumer machines. The Mac as an expensive consumer machine does not quite fit in. So why doesn't Apple position the Mac as an expensive commercial machine and take a bigger share of the market? The answer is that corporate IT departments resist it. They have been trained to work with Windows machines for decades, are busy maintaining legacy applications and are concerned about keeping the lights on. For them, Apple products are at best tolerated as an exception in a BYOD culture. 
This changed markedly when the iPhone replaced the Blackberry as the device of choice for corporate road warriors. With its relatively closed iOS, the iPhone appeared less supicious than an unruly Mac and services like MobileIron make it palatable to them. For the first time in Apple's nearly 40 years of history, the gates to corporate IT departments are wide open. And here is where the iOS powered iPad Pro fits in. Scores of executives frustrated by cumbersome Windows machines will flock to the iPad Pro. Despite its big screen, it is lighter than the lightest laptop. With its keyboard and the Microsoft Office apps, it lets you handle all corporate tasks. The split screen feature is perfect to comment on documents and with a SIM card, it is always online. Add the facts that it is nearly maintenance free and that IBM and Cisco are developing corporate applications and you have a winner.
Observers describing the iPad Pro as a rival to Microsoft's Surface Pro are missing the point. It is not a laptop that looks like a tablet but a tablet that will severely challenge the Windows laptop - at least in the corporate world.

Wanna buy a laptop? Lenovo? Think Twice!

When you purchase a laptop you expect it to work perfectly, at least for an year or should i say for 6 months or may be atleast 1 month.That is exactly what's not happening and cherry on the top is that as per Lenovo the only solution is to get your windows re-re installed till the warranty period is over and then its not even their head ache.
This is to report the utter negligence of Lenovo service support. I recently purchased a laptop from their renowned store and it wasn't even a week when the laptop started having issues.It is extremely slow plus screen becomes unresponsive for more than an hour and mind this all this was happening when my laptop was brand new . After all this, I went to their service center and they reinstalled my windows and assured me the issue was addressed. Within 2 days same issues started happening again, and this time the laptop even stayed hang for more than 3 hours. Again i went to the service center asking for a permanent solution but this time not only they were rude but also claimed that reinstalling my windows is the only option since there were no issues in the hardware. And not even a day has passed my laptop started displaying issues and this time it hangs up with a freezed cursor and the screen going blank for hours. Then i called lenovo's customer services and registered a complaint and the solution they suggested was to get my windows re installed again.
I even went to the lenovo store and service centers asking for a replacement for my laptop but in the name of their so called 'replacement policy', they denied. I even asked to show me their complete policy, but everyone seems to be to busy to mail it and there's no hard copy present at their stores or even service centers.
Please tell me how do you expect a laptop to work for 3 more years ( which btw they cover in extended warranty) if its having issues after a week of purchase.
Or as a consumer it is my responsibility to first pay them money for the laptop and then further spend my time and money again and again every week to get it fixed for the problem which has been inbuilt by Lenovo, and which is absolutely not my fault, because you know as per their bullshit policies, i have purchased the laptop and they don't give a replacement for laptops after seven days and that to only if their is some issue accept issue in os, battery, ram, or any hardware. (seriously! Are there any issues left )
A friend of mine suggest me Lenovo as their service support " USED " to be good. But after such an experience i would really suggest that every person who's going to buy a Laptop, don't buy a Lenovo. Because if by any chance it has an issue then you are stuck in this vicious cycle of re-re-installing your windows.
I NEED A PERMANENT SOLUTION ASAP.Otherwise i have to resort to other ways. Lenovo is a big name and such type of non cooperation is something which we don't look forward to as your customer.
PS. I have already filled complaint in consumer Court.