No matter how cool, phones are not tablets or computers. Or are they?I see a lot of discussions about using phones in the enterprise but I never hear how well that works for anyone. Phones are not tablets or computers and aren't great for heavy BYOD use. But with a little tweaking, could they be?August 21, 2013 by Ken Hess in Mobile OS
A funny thing happened to me on the way to the Apple storeIt's no secret that for years I've wanted a Macbook Air. I love them. They're lightweight, powerful, fast, very thin, and just plain cool. My wife knew how much I wanted one and for my birthday, she took me to the Apple store.August 19, 2013 by Ken Hess in Apple
Are tablets the first step toward mobile or non-existent classrooms?When students can use tablets in school, instead of books, does it mean that we're about to see completely mobile classrooms or no classrooms at all?August 13, 2013 by Ken Hess in Government
Legacy software support is no reason to maintain outdated constructsThe debate and commentary has been quite lively concerning my idea to get rid of DOS drive letters from our midst. The worst argument so far is to maintain them to support legacy applications.August 9, 2013 by Ken Hess in Microsoft
Dear Microsoft: It's time to stop using drive letters and whacksDrive letters and whacks worked for a season but now it's time to change with the seasons and to stop using them both. They're limited. They're outdated. And they're fashion backward.August 8, 2013 by Ken Hess in Windows
Windows annoyance #342: Everything goes to the C driveSometimes the sheer pain of dealing with Windows' quirks, 'features', and various anomalies is just about more than any sane person can bear. The fact that everything goes to the C drive drives me crazy and after 20+ years with Windows, that drive is pretty short.August 7, 2013 by Ken Hess in Microsoft
Reported data breached records in US from 2005 to present exceed 500 millionYou probably are more than a little paranoid about giving out your social security number but that risk is just the tip of the iceberg. Data breaches over the past eight-and-a-half years put millions of people at risk.August 5, 2013 by Ken Hess in Security
Where have all the good browsers gone?It's frustrating to deal with the constant threat of browser-based malware, pop-ups, and extensions gone wild. I wonder where all the good browsers have gone? It would be nice to have one that works.August 2, 2013 by Ken Hess in Enterprise Software
iPhone 5 lightning strikes twice: I want my iPhone 4 back, pleaseThe iPhone 5 has some great features but there's one that it doesn't and it makes me want my iPhone 4 back. Apple's connector blunder makes me want to toss my iPhone 5 out the window or possibly through one.July 31, 2013 by Ken Hess in Apple
Ubiquitous connectivity is a matter of national securityA little cross country travel makes one realize that connectivity is essential. A lot of cross country travel makes one realize that connectivity is sparse at best. A connected nation is a safer nation.July 26, 2013 by Ken Hess in Cloud
Using smartphones during sex and in the shower beyond BYODIt's beyond comprehension that people still text while driving but it's even more shocking to know that people can't refrain from using their phones during normally intimate times. It defines a whole new meaning for 'bring your own device.'July 15, 2013 by Ken Hess in Smartphones
Microsoft: The monohedral and the bizarreIt's obvious to all observers that Microsoft is in a state of transition and transformation. Ballmer has declared that now that there is 'One Microsoft.' E Pluribus Unum, dude. What's the next move?July 12, 2013 by Ken Hess in Microsoft
Three billion devices run Java. Yeah, but do they like it?When you install Java, you see a graphic that informs you of Java's popularity. But the question is, do we as users, have a choice? The answer is, "Yes, but."July 10, 2013 by Ken Hess in Oracle
Overheard conversations: When heightened mobile security fails to protectYou can encrypt, use multi-factor authentication, connect via VPN, have anti-malware software and still give away your identity by making a fundamental mistake when using your mobile phone: Talking too loud.July 9, 2013 by Ken Hess in Security
For mobile devices, size does matterMobile phones started out as brick-heavy, full-sized behemoths. Then they were tiny candy-bar sized toys. Now we're on the grow again. How big is too big for mobile devices? And how small is too small?July 3, 2013 by Ken Hess in Mobility